Admiral Mike Rogers, NSA and CyberCommand chief, tries with White House officials to woo Silicon Valley. They want in to our communications and those in the Valley are finally fighting back. Government is becoming increasingly irrelevant in the peer-to-peer, IP-based communications systems we thrive on. These issues of cybersecurity are exactly what I cover in my latest novel, 4o4 - A John Decker Thriller, about the surveillance state, just out from Cornucopia Press. Pick up your copy from Amazon today! And check out this news story from the incomparable team of Perlroth and Sanger at The New York Times.
NSA Director Adm. Mike Rogers rips critics, calls for 'less simplistic' national conversation about surveillance.
White House Takes Cybersecurity Pitch to Silicon Valley
SAN FRANCISCO â President Obamaâs newly installed defense secretary, Ashton B. Carter, toured Silicon Valley last week to announce a new military strategy for computer conflict, starting the latest Pentagon effort to invest in promising start-ups and to meet with engineers whose talent he declared the Pentagon desperately needed in fending off the nationâs adversaries.
Mr. Carter immediately acknowledged, though, the need to rebuild trust with Silicon Valley, whose mainstays â like Apple, Google and Facebook (whose new headquarters he toured) have spent two years demonstrating to customers around the world that they are rolling out encryption technologies to defeat surveillance. That, of course, includes blocking the National Security Agency, a critical member of the military-intelligence community.
âI think that people and companies need to be convinced that everything we do in the cyber domain is lawful and appropriate and necessary,â Mr. Carter told students and faculty at Stanford.
He urged the next generation of software pioneers and entrepreneurs to take a break from developing killer apps and consider a tour of service fending off Chinese, Russian and North Korean hackers, even as he acknowledged that the documents leaked by Edward J. Snowden, the former intelligence contractor, âshowed there was a difference in view between what we were doing and what people perceived us as doing.â
Mr. Carterâs careful appeal was part of a campaign last week by government officials trying to undo the damage of Mr. Snowdenâs revelations. While Mr. Carter got a respectful hearing, Jeh Johnson, the secretary of Homeland Security, and a group of other government officials ran into a buzz saw of skepticism at the worldâs largest conference of computer security professionals, just 30 miles to the north.
Those officials argued for some kind of technical compromise to allow greater security of electronic communications while enabling the F.B.I. and intelligence agencies to decode the emails and track the web activities of suspected terrorists or criminals. Yet many among the computer security professionals at the conference argued that no such compromise was possible, saying that such a system would give Russians and Chinese a pathway in, too, and that Washington might abuse such a portal.
Not long after Mr. Johnson declared that âencryption is making it harder for your government to find criminal activity and potential terrorist activity,â large numbers of entrepreneurs and engineers crammed into the first of several seminars, called âPost-Snowden Cryptography.â There, they took notes as the worldâs best code makers mocked the Obama administrationâs drive for a âtechnical compromiseâ that would ensure the government some continued access.
Ronald Rivest, one of the inventors of a commonly used encryption algorithm, took on the arguments by Mr. Johnson and other senior officials, including John P. Carlin, the head of the Justice Departmentâs national security division, that the best minds in Silicon Valley could find a way to ensure legal government access while still assuring users that communications and data stored in their iPhones and the cloud are safe.
âThere are lots of problems with these ideas,â Mr. Rivest said. âWe live in a global information system now, and itâs not going to be just the U.S. government that wants a key. Itâs going to be the U.K., itâs going to be Germany, itâs going to be Israel, itâs going to be China, itâs going to be Iran, etc.â
It was clear all week that the Snowden revelations, while fading in memory across much of the country, have not been forgotten in the rapidly growing computer and encryption communities here.
One of Mr. Johnsonâs deputies, Phyllis Schneck, projected colorful graphics on a screen that showed the governmentâs plans for real-time monitoring and blocking of malware flowing through the Internet, urging private industry to help.
âWe want you to make money,â said Ms. Schneck, a former chief technology officer at McAfee Inc., known for its virus-protection software. Many in the crowd, though, said they worried whether the government would turn any malware-monitoring system to other uses.
Mr. Obamaâs cybercoordinator, Michael Daniel, who has been trying to preside over the unwieldy administration debate over encryption rules, was meeting executives in private and calling in public for âcybernorms of behaviorâ that could constrain the kind of hackers who attacked American corporations, the White House, the State Department and the Pentagon. But he acknowledged that this was an area where the grindingly slow wheels of diplomacy were being outpaced by technological development.
âThe government fears its own obsolescence,â said retired Adm. Patrick M. Walsh, who left the Navy in 2012 and is now an executive at iSight Partners, a cybersecurity firm.
Mr. Carter, in his Stanford talk, noted that past wars were fought state to state. But in computer conflict, he said, the most sophisticated threats and weapons are seen by banks, security firms and Silicon Valley companies like Apple, Google, Yahoo, Twitter and Facebook that serve as conduits for the worldâs communications. That is data Washington most needs.
Yet nearly two years after the Snowden revelations, many companies are as reluctant as ever to give the government any information unless they are compelled to do so, particularly as they try to convince foreign customers in global markets that they are doing everything they can to keep Washington at a distance.
The new defense secretary received what was probably the warmest welcome of government officials on the tour through Silicon Valley. Mr. Carter, who did graduate work at Stanford, returned for much of last year, until Mr. Obama pulled him back to Washington. That time gave him a new appreciation, he said, for how ill suited the Pentagonâs lumbering procurement system is in taking advantage of new technology and start-ups.
At Facebook, he talked with Sheryl Sandberg, a former colleague from the Clinton administration, about using social media to connect the troops â and the challenges it poses as terror groups become adept at exploiting it. On Friday, he went to a venture capital firm, Andreessen Horowitz, to meet with the founders of a series of relatively new ventures.
âHe really just wanted to explore how their technologies might be applied to current problems at the Pentagon,â said Margit Wennmachers, a partner at the firm, who joined the session.
During the meetings, Mr. Carter spoke with an executive of Github, an Andreessen Horowitz portfolio company, which China recently targeted in a cyberattack intended to keep Western news reports out of the hands of the Chinese public.
Mr. Obama, on a trip to Stanford in February, had expressed sympathy with those who were striving to protect privacy, even while saying it had to be balanced against the concerns of the F.B.I. and other agencies that fear âgoing darkâ because of new encryption technologies. (Apple says that with its new iPhone operating system, it has no way to decode data in phones, even if given a court order.) [NOTE: Of course, a phone's a device, a physical thing. Software and software services are an entirely different thing. ED] Mr. Obamaâs aides say decisions about how to resolve these differences are still months away.
With so much more data at stake, and attacks so frequent, cryptographers say the need for encryption is greater than ever.
One proposal, by Adm. Michael S. Rogers, the head of the National Security Agency, is to develop a split-key system in which companies hold half and the government, or some outside agent, holds the other half of the key to unlock encrypted communications. The two would be put together only with approval of a court. But many computer security experts reject that idea, saying it would leave too much room for theft and would motivate other governments to require the same.
âThe amount of information that intelligence officials are collecting â even if some sources go dark â is dramatically more than it has been in history,â Paul Kocher, a cryptographer, said Wednesday. âThe idea that we need to stop rolling out technology to keep our industries and businesses safe, to keep a few sources from going dark, is certainly not a trade-off.â
Recent Comments