New Journalism and Cyber Wars
by Sinclair Noe
DOW
– 9 = 15,238
SPX – 0.57 = 1642
NAS + 4 = 3473
10 YR YLD + .05 = 2.21
OIL - .26 = 95.77
GOLD + 2.40 = 1388.00
SILV + .26 = 22.05
SPX – 0.57 = 1642
NAS + 4 = 3473
10 YR YLD + .05 = 2.21
OIL - .26 = 95.77
GOLD + 2.40 = 1388.00
SILV + .26 = 22.05
Last
week, the Guardian, a British newspaper, published classified
information on phone and internet monitoring by the US government, as
well as classified information about how the US has been conducting
cyber attacks around the globe. Today we learned that the guy who
leaked the classified information to the Guardian is a guy named
Edward Snowden; he's 29 years old; he got the classified data while
he worked for Booz Allen Hamilton, a private contractor. Snowden
recently moved to Hong Kong. Still waiting to hear if he'll be
extradited.
For
several years now, my friends Pat and Linda Gorman have invited me to
speak at the economic conferences each year. Each day, here on the
radio I talk about the economic news of the day, so when I speak at
their annual conference I try to make those presentations about big
trends. In 2011, one of the trends I brought up was something I
labeled New Journalism, based in part on the Wikileaks model. In
2012, another trend was CyberWars. I've expanded on those ideas in
this presentation I made this past April. So, I went back and looked
at that speech over the weekend. I'll share some of it with you
today.
The
idea of New Journalism was that we have seen a failure of main stream
media to pull back the veil of secrecy in government and in
corporate America; not surprising since corporate America controls
the media and has an almost incestuous relationship with government.
Here, I hoped we might see a Wikileaks bank dump. We still haven't
seen that. I did not expect changes in main stream media. I wasn't
that naïve. The bank dump supposedly exists, but make no mistake,
the bankers are in control. They have choked off funding sources for
Wikileaks, and the US government has threatened legal action against
Julian Assange.
I
also told attendees at the conferences about CyberWars. And I was
spot on with that trend. We've been attacked. The Cyber World has
been exposed for huge vulnerabilities. We all use those
interconnected tubes that form the internet, and everything you do on
the internet is extremely unsecured. One of the major threats is to
the electric grid; beyond the physical threat from cyberattack, there
is the concern about secrets. Major corporations, and major
departments of government have been hacked. What gets scary is that
the Department of Defense and Department of Justice and major
financial institutions are vulnerable to attacks. Even Michelle
Obama's finances were hacked. The best thing I can tell you is that
you need some physical assets in your hot little hands. Otherwise,
there will come a time when you get caught.
It's
important to recognize that although no cyberwar has ever been
declared, cyberwarfare is now a part of life. The war is pervasive
and we are all vulnerable to attack. It's
impossible to say who fired the first "shot" in this war,
but the US government has certainly stepped up the fight. President
Obama accelerated cyberattacks (begun during the Bush administration)
on the computer systems that run Iran's nuclear enrichment
facilities. The worm that the US (in conjunction with Israel) created
to carry out the attacks accidentally became public in the summer of
2010; a programming error allowed it to escape its target in Iran,
and it was discovered by computer security experts. They named it
Stuxnet. Stuxnet was the US's first sustained use of cyberweapons;
the attacks marked the first time that a computer worm was used to
cause physical damage.
Well
that's both kind of scary and cool, but so what? What's the point?
How does it affect me? The point is that the genie is out of the
bottle, and there's no going back. Unlike in a traditional war, in a
cyberwar it's the more developed nations that are the most vulnerable
to attack. The fact that the US has recently been so brazen in
its cyberwar efforts, virtually ensures an increase in cyberattacks
against the US government and US businesses.
Security
has now become the third pillar of computing, joining
energy-efficient performance and Internet connectivity in importance.
The takeaway for US businesses should be that they need to pay more
attention to securing their networks. The takeaway for investors
should be that with the proliferation and increasing sophistication
of cyberthreats, there will be growing demand to protect against it.
As the weapons in this cyberwar evolve, so too must the defenses
against them. And that's big business; the market is in the
neighborhood of $25 billion worldwide, and double-digit growth is
projected for years to come.
This
past week's leaks to the Guardian newspaper weren't really new. We
knew the government has been working with telecom companies to
monitor telephone and internet communication. It's been going on for
years now. When intelligence agencies talk about terrorist “chatter”,
they're not talking about conversations using walkie talkies. And the
CyberWar – well, we started it, and it isn't some virtual video
game, it is very real; and it affects our most basic infrastructure,
from defense to transportation to electricity to water to food, and
the entire supply chain.
Booz
Allen Hamilton, the company that employed Edward Snowden – the man
who has admitted he leaked top secret info to the Guardian, Booz
Allen Hamilton has approximately 25,000 employees, 76 percent of
whom have a US government security clearance and 49 percent of whom
have security clearances at the level of "top secret or higher."
That's 12,250 people employed at Booz Allen alone who have "top
secret" clearance. How much of the company's work is for the US
government? Almost all of it. In each of the past three years, 98
percent or more of its income came from government contracts.
How
on earth can you keep secrets if just one American company has enough
people with top secret access to fill a mid-sized American
town?There's no small irony that much of Booz Allen's work for the
government is about securing government data from hackers and spies.
The first subsection of the annual report is titled "Keeping
Information Secure: An integrated approach enables effective
cybersecurity." How
much of their work is with the NSA and other intelligence agencies is
hard to say. Understandably, that's not played up in the annual
report, and the company has contracts focusing on everything from
veterans affairs to air traffic control.
But
plenty of intelligence work is disclosed, most of it with military,
like the work it does with the Army's Intelligence and Information
Warfare Directorate to build a database that "delivers massive
and elastic data storage and processing capacity, with the power to
query, sort, and analyze hundreds of millions of textual intelligence
products in less than one second." Booz Allen Hamilton's sales
have doubled in the last four years and profit has nearly tripled.
Oh, and guess who the majority owner of Booz is? Carlyle Group, the
long-time DC heavyweight private equity firm with deep connections to
the Bush family. We can see how clever it is proving to be to have
outsourced big chunks of the defense, security, and intelligence
apparatus.
In
other words, there are a lot of companies making big bucks in the
Cybersecurity business, and there are way too many people with access
to top secret info, and that access is not just to government secrets
but also corporate secrets. It's just a matter of time until we see a
Wikileaks style bank dump, or other major corporations wake up one
morning to realize their dirty laundry is on the line. And when that
happens, every time that happens, we pull back the curtain a little
more.
Sun's
CEO Scott McNealy may have stated it best, or at least the most
bluntly. "You have zero privacy. Get over it." In this
view, the Internet opened the door, the NSA just tiptoed through it.
Every day, we voluntarily upload mountains of data -- our
thoughts, our jokes, our activities, our photos -- for at least part
of the world to see. If we assume any degree of privacy for that
material, we probably shouldn't be allowed to operate a television,
much less a computer.
But
we send emails to named recipients, we visit websites for our own
information or entertainment. Despite the warnings from experts to
encrypt everything but our underwear, we do those things with an
expectation of privacy. The problem is that we do almost all those
things for free.
Yes,
we hear the triumphant cry of the early Internet enthusiasts ringing
in our minds' ears: Information wants to be free. However, people's
time and effort is never free. The people whose ingenuity and
expertise have made all our online activities possible certainly
weren't doing it for free. If you doubt that, check what the founders
of Google are driving these days. And at least since the advent of
the web portal, online companies have engaged us in a bargain no less
unproclaimed and undebated (if as of now less sinister) than the
security-for-privacy deal the federal government has made on our
behalf: our "free" activity in return for our transactional
data, which is then used to lure advertisers. It's a cliche by now,
but no less true for that: If you don't pay for the product, you are
the product.
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.