comparemela.com

It is a look at what i feel is the new form of warfare that is emerging in the 21st century. Ive covered natural Security Affairs for over 30 years all over the world covering these issues and i think that it is a reflection of the Information Age that we are looking at this new form of warfare that i Call Information warfare, and i do find that both as the technical cyber that we have seen so much of in terms of Cyber Attacks on the russians and chinese as well as the content including type of thing. Which really emerged in the last president ial election with the cyber enabled influence operation cities will b so these dominant form of warfare just as it is dominating our lives, so too in the realm of conflict we are going to see that and our adversaries are looking into this as a cheap way to achieve strategic goals without resorting to connecticut military conflict that is expensive and costly in terms of resources. Host so they think of it in connecticut terms, soldiers, armies, land. And this discusses non kinetic forms of warfare in the digital realm. Do you think the media and society have an awareness of the importance of Information Warfare and the use of the media campaigns or is part of the goal to raise Awareness Among the public . The simple answer is no this is the point i make in the buck we are under information asphalt that includes our government and the public at large. As you recall in a recent hearinthe recenthearing that yoe chair of, one of the witnesses testified about the russian propaganda outlet and an official told them that they would have no audience in the United States if they u. S. Media were doing its job properly. So what has traditionally been the role of the American Media is to provide both education and information has fallen off. Right now we are seeing a politicization of the media into generally liberal and conservative camps. They are not really presenting the kind of news on International Affairs. One of the things ive always tried to do in my journalism career is to highlight threats and the reason i do that is because if people dont have an understanding about the threat, then its a difficult to get the tools and resources necessary to deal with the problems. So again, this is a script that deals with the main threats of Information Warfare and it tries to show that this is a serious strategic threat to the United States across a Broad Spectrum of areas from International Affairs to domestic affairs. Host so you talk about the increase of information n. And Information Warfare in the United States. And one interesting part of this discussion needs to be covered is the use of social media. Facebook users you include this statistic of the 4. 75 billion pieces of content every day so theres a lot of information out there as we see in our facebook feeds, twitter, facebook, smith chart, you choose a social network and they also changed the conflict and in the book in fact, you talk about the Islamic State of social media. It is the agility and ability to respond often outperforming state media in the middle east. This is the sophisticated use of the network of dedicated online supporters who amplified the state message. What should the u. S. Do to combat the . On a plane to go in the book that there is kind of a conflicting approach to this problem. On the one hand, theres pressure from the government to shut down the terrorist use of social media and on the other hand the need to find out what they are doing so this is a challenge how do you balance these competing needs. Monitoring the social media much of which is an open source to produce valuable intelligence especially people who were going to perpetrate attacks. I make the case that social media is being recognized and we need to figure out ways to be able to have the same kind of agility. They are known to be using this to recruit and then they will rapidly have their own private means of setting up new Communication Channels very quickly. So its kind of a lacrimal where they have others they can use and they are communicating. Now they get even more sophisticated and they are going to encrypt their communications. We solved this in a cas the casf the terrorists in london who ran over a number of pedestrians on the bridge and he was using a telegram that is a key tool and Russian Software that is allowing us to communicate in much more difficult ways for intelligence agencies in the west to detect them. Host does u. S. Law enforcement and policy makers, do we have an adequate strategy to effectively use the social media to combat misinformation with the truth and make sure potential recruits actually see them calling into question that this is not to be an interpretation of islam for example . Guest ive looked at that carefully, and basically what i found is the main tool for this is the state Department Center strategic counterterrorism communications. Researching the book, all of them agreed that they have a real challenge and they are not allowed to address the topic of islam. They adopted under the Obama Administration and of course the Trump Administration is now changing and talking openly of radical islamic terrorism and in the past it was violent extremism and i argued that this has made it very difficult for us to do counter ideological operations. Operations. So, the state department under the center did a study based on some experts its a classified study they wouldnt release it but they have been reported on in the press. Because the u. S. Government has no credibility they shouldnt attempt to do counter propaganda efforts against these terrorist groups and that is the geeky kid approach. You will never succeed if you do not even try. There are some efforts just in december the efforts of congressional defense bill contained a new provision thats calling for counter disinformation propaganda that is targeted against russia but it needs to be much broader and targeted against all bs been adversaries and of course the adversaries love their acronyms that stands for china russia iran korea and trigger some s terrorism. Im hoping that they will get more effort and resource people and leadership to tackle these tough problems. Host one of the most impressive part is what the different case studies and youve just named china russia and north korea, iran and the Islamic State. I wanted to delve into some of these areas that we have seen 80s specific countries. The first one that i would like to go to is north korea. The general public is aware of the sony hack because it got so much Media Coverage and its in response to the movie the interview. Why was this such a significant event because we spent a lot of time talking about this in the book. Guest i do a deep dive into the sony attack that took place in 2014, and it was based on the north korean government recognition that they were opposed this movie the to this e interview, which was what i call a ribald comedy. It wasnt that good of a movie that it was important in exposing the kind of problems north korea poses. It needs to be understood coming and i dont think a lot of people understand this is a crimes against humanity regime you did the human rights commissions have exposed that and theyve identified it and get here we are still dealing with this regime that those horrible unspeakable things to its people. The sony hack was the first time a government had attacked a private industry for political gain. So Sony Pictures took information that was extremely damaging to the company. The software that was used to describe the entire networks of these people. Its kind of a harbinger of things to come. For the research of the book i interviewed a north Korean Defector and he actually trained hackers in north korea and issued a dire warning saying the u. S. Should take this as serious. What they are going for is the u. S. Infrastructure ability to turn out the lights com, to dame the infrastructure and prevent us from operating as a society. And of course everyone recognizes the u. S. Is probably the most wired country in the world and if you attack that infrastructure, you could cause strategic damage to the United States and that is a danger. The North Koreans are building on that capability and they are still considered a secondtier threat to the russians and chinese. Host you are critical of the u. S. Lack of response to the hack. Can you go into that more to understand what the u. S. Did after the attack and if there were missed opportunities . Guest ive been covering this issue for a long time and it goes back as far as 2011. I learned from intelligence sources in the government of senior officials of all the major agencies, the Intelligence Community, the pentagon, Law Enforcement presented a series of options to the Obama White House and basically they were saying we are under attack from these various places, Cyber Attacks and others and unless we do something in a very real way, these are going to continue so they presented a range of options ranging from imposing sanctions on these entities whether that was government officials or hackers all the way to conduct in offenses for the chinese unit that was linked to the office of personnel management. The white house rejected all of those options. So basically, there hasnt been anything done. In the case of sony, they made some symbolic sanctions from the north korean officials that would have no impact. Things like blocking them from their dream in the United States for access to the financial system. While those are okay measures, they want to have an impact and as a result, we have seen an escalating scale of the cyber influence operations. Its getting worse and its not getting better. The reason that there needs to be a greater response of the Current National Security Agency has been one of the strongest advocates for the tufty turns response. In other words, hes been advocating that the cost of entry into this realm of information, cyber influence is so low that its irresistible for the enemies to engage in it. Sthat. So if there is a greater cost the couple have a deterring effect if you have the United States he will be attacked back and that will change the equation. Host i think it highlights an important question for policymakers that we are grappling with because it is a nongovernmental agency, what role should prefer the defense play when we are discussing admiral rogers, what should they play in combating and making sure we are sharing information with Nongovernmental Organizations of Cyber Threats . Guest they allow the government to be able to do things very blurred. Most of the infrastructure is in private companies in charge of their own security. The government has a great resource of securities and they are kind of restrained from using it. Theres a lot of reasons for that. Some are political. They are turned against the National Security agency which is other intelligence and Law Enforcement have good capabilities but they are constrained by law and regulation about what they can do. Thats why they need a new entity i call it information america where we would set up something that would be similar to the u. S. Information agency of the cold war era and it would transcend various agencies because Information Warfare would be to the connecticut military. It would be a support function and if its in the Intelligence Community it would be imposed by heavy secrecy and if it is in the state department, it would be diplomacy and cared. At the state department is oriented with getting involved in foreign nations, so if we have an agency that can do this kind of thing i think it would help clarify those lines of authority and it would be both a content and promotion as well as technical and cyber to cross over these two things and interact better in the private sector. Host so that is an interesting proposal i will get to and i also wanted to highlight of the other countries that have utilized. We talk about north korea being in tier two. You write no other nation today poses a greater danger than china. A state engaged in an Unprecedented Campaign of Information Warfare using massive Cyber Attacks and influence operations aimed at diminishing what is regarded as the most strategic importance enemy, the u. S. I was one of those that was part of the hacking. Why was that such a significant event and second, talk about the broad capabilities and how they differ from the actors. Guest the chinese recognized they do not have the capabilities to challenge the United States and right now, china is challenging the United States as the main enemy. It is a communist dictatorship often lost in the debate and ive been covering that for over 30 years. What they are also doing is trying to manage the decline of the United States. They have the decline. In the United States and see the United States as a diminishing power and that they are a rising power and working to help diminish the United States, so that is the underpinning of the Information Operations and United States. I highlight a number of areas where they do that. 22 million federal records were attacked but that is one element of this that had been going on for a decade. It was primarily a Cyber Espionage intelligence operation, and they stole the records that included some of the most Sensitive Information you could possibly have in the u. S. Government, things of security clearances. Its about somebody getting a clearance and this is extremely valuable for the future Cyber Attacks. What the chinese can do with that information is using the data mining tools to be able to identify a systems administrator inside of thin spite of the defe contractor and with other intelligence, they could target officials and learn the password credentials to gain access to further information operation. A lot of times, these attacks have been kind of diminished as an intelligence gathering. But that is i think a misnomer. The reason you cant say that its just a simple intelligence gathering is because there are two things that happen when the chinese get inside a network like the office of personnel management. They steal massive amounts of data and this is a little known fact day planned something callecalled a sleeper agent sofe that is software that communicates with beijing but its almost impossible to detect. Its maybe communicates back once a year and is mixed in with one knee and zero. In the crisis they could accuse that software to shut down networks or do other sabotage efforts. So thats why we are having trouble with the terminology whether it is cyber sabotage or a combination of both. One statistic that is astounding in terms of the amount of data, the nsa estimates the amount stolen by chinese spies amounts to an extraordinary 50 terabytes of data, the equivalent of five times all the information contained in the nearly 161 million books and other materials in the library of congress. That is astounding. That demonstrates how much of a threat this is and how far behind the United States is and how we have a strategy to combat this type of cyber warfare. The use of the data is what is critical. I interviewed a person from the Data Mining Company in the u. S. , his name is tom reilly. He basically said in china there are some 6,000 companies emerging so its not just that they are stealing data, but they have the ability to manipulate or the useful intelligence and also to conduct future Cyber Operations. Another actor is russia, which you spend a fair amount of time on in the book. Can you give the viewers a sense of the size and scope of the use of Information Warfare because it is significant. Guest just last week i went to a conference where the Deputy Director of the agency was giving a speech in afterwards, i went up to him and said he heard a member of years ago the director of National Intelligence said russia had eclipsed as the nature threads in the cyber realm. Whos the bigger threat, russia or china and he said russia but he wouldnt tell me why. The reason is they are building their capabilities on the soviet past as a Major Nuclear power, they had a tremendous technology base. Theyve now emerged as the key players in the round. They are going in and using these Cyber Capabilities began as what they see as the main threat under Vladimir Putin. Its the Cyber Operations in more of those are as recent as two weeks ago with an indictment against the Russian Hackers and Intelligence Officers involved in the yahoo attack. Host i know weve talking debate talked about the cyber warfare but they allow us to implement Information Operations and Information Warfare. I wanted the Russian Federation in 2013 he said coming into this is in your book the war with nonmilitary means of achieving political and strategic goals has grown and in many cases exceeded the power to forc of fh weapons in the effectiveness. I think as we are looking at russias increasing influence particularly when it comes to undermining the nato allies, we see a very unique way that they are using Information Warfare and operation. Can you talk about that in terms of the operations in ukraine and in crania specifically and how its been used in russia . Guest the Russian Strategic threat is extremely dangerous. Ive been covering National Security a long time and i dont scare easily do the thing but tt happened over the last several years have really frightened me about the concerns happening. Its the Nuclear Development and in addition to developing the new Nuclear Weapons and modernizing across the range of systems on the missiles, bombers, submarines as well as developing even school Nuclear Weapons conflict i recently mentioned in the book the pentagon did a study of what they call the low yield Nuclear Weapons and change their tactics to the point they had a policy called escalates to de escalate and they will rapidly use the Nuclear Weapons in the regional conflict because the conventional forces have become so weak and outmoded that they need Nuclear Weapons. So when you combine this kind of hair trigger with the use of Information Warfare to the strategic ends you have a very dangerous situation as it relates that was like a case study in has been known as hybrid warfare. Basically they took over this industrial region of ukraine without firing a shot into the use the special force troops without insignia and what became known as little green men but behind the scenes they were also using these operations to put forth the narratives in this part of ukraine that belonged to russia and had a Large Russian population and had organized demonstrations to make it appear like the people in crania wanted them to take over this industrial heartland of ukraine. So, this was a wakeup call to the west. As far as the russian ideology goes, ive looked at what is motivating Vladimir Putin to do these. Hes kind of adopted a nationalist neofascist approach. He is called the collapse of the soviet union the biggest catastrophe for russia and hes bent on kind of reestablishing a russian supremacist state that he is at full stretc says will e pacific to the atlantic and will control all of the areas around russia including the arctic by the grace of thiteresa this is s situation as we are seeing the russians emerge under a regime that has designs taking over the nations. The propaganda outlets for russia have dismissed this by saying what is a little section of the country like crimea. It is that the aggression is allowed to proceed unchecked and leads to very bad things come and thats where we are right now unless this aggression is reversed, we are going to see more problems with russia down the road. How can we do that as i am certainly concerned about this spirit i want to ensure what im reading in the news is fox base do not shape by our adversaries. Host its a real challenge dealing with the press today and in my own business i have seen the news media is in turmoil. You find that newspapers had a huge profit margin when they were print advertising and are now struggling to survive setting up paywalls but as i mentioned theres also been a certain politicization of the media and as we say the liberal media is dominated by three issues which is gender identity, racism and global warming. On the conservative side you have a oak is on security issues, say immigration as a domestic issue and a little bit or concerns about government overreach and these two issues have created a Division Within our society so people, if you watch to the network news every night is ideal i found it incredibly biased. The divide is so obvious and people arent getting a real sense but a lot of it is mostly domestically focused. There has been a lot of coverage overseas. Lest lessers a major at them like a terrorist attack we arent covering overseas. We are covering these threats and again its identifying these threats. The other thing is in the liberal media today there is this kind of the postmodern philosophy. The only real threats out there or from the terrorists who are kind of on the french. As far as nationstates there is very little difference and our enemies dont agree that you are all and thats what we need to focus on, understanding these threats. Host and other horrible fact in the book is the fact that the russians have conducted the first cyber attack against the foreign nations electrical power grid. You write the military demonstrate the russians are leading the way with Cyber Attacks including the first noncyber attack against the electrical power grid which turned out the lights for tens of thousands of ukrainians. From my perspective thats deeply concerning the fact that the cyber attack scan happened to Critical Infrastructure around the world or in the u. S. With potential threat could that pose for us in the u. S. And what can we do to ensure that we have the defense measures in place to combat back . Guest that is the big enchilada in terms of Cyber Threats and the bad news is u. S. Intelligence and Law Enforcement has already detected both russian and chinese cyber intruders getting into the networks that map the electrical grid and controls the electrical grid. What does that mean . That means that they are doing recognizance so in a future conflict or crisis even they could shut down the power. In fact i present kind of a fictional scenario in the china chapter which shows as a result of a crisis in the South China Sea where a u. S. Plane sinks a chinese warship that rather than conducting a kinetic counterattack the chinese dispatch covert commandos to pennsylvania at a specific node in the grid and they actually make it look like it was a Natural Disaster, a tree falling on a powerline and then they use Cyber Attacks to create a cascading power failure over the three grades of the u. S. Electrical grid. Rate thats exactly the kind of thing that people are worried about and i think some steps are being taken to try and strengthen and harden the grid against those attacks but its not going to be easy. For example transformers. Its been shown through cyber you can cause a transformer to explode and blow up. Replacing large transformers is going to be very costly and it would take a long time because the u. S. Doesnt make transformers. They are made in germany or south korea so this is the kind of thing i think we need a more comprehensive approach and obviously the infrastructure, you know they talk about Critical Infrastructure but all the Critical Infrastructure everything runs on electricity and that should be the top priority. Host there is one additional country that you cover in this book and its eye round. What type of threats does iran face when it comes to Information Warfare . Guest iran is definitely an emerging power in the Information Warfare sphere and what i highlight in the iran chapter of iwar is iran has gone from kind of lowlevel defacement of web sites to Cyber Espionage to denialofservice attacks escalating to the destructive cyber attack, that is the ability to create damage and sabotage through cyber means and i also elkis on the case of the hacking of the sands casino in las vegas which was a very sophisticated cyber attack against the casino owner Sheldon Adelson who had made comments about iran and the iranians attacked his site, basically shut down and destroyed or damaged the computers at his casino but more recently we have seen the iranians venturing into infrastructure. This is about a dam in upstate new york where they were able to get inside the comptroller of this dam and if they wanted to have this control been active but fortunately it wasnt, they could have created a Natural Disaster which would have flooded a local community in upstate new york. That to me is where the iranians are heading and its a very serious threat. I think the government has done a little bit. They indicted a number of iranian hackers recently which revealed some of the information that much more information has to be put out. We have got to identify these threats. If we dont we arent going to know how to counteract those threats. Host absolutely ends inside represents new yorks 25th district deeply concerning to me but more partly many of these examples highlight that these are Nongovernmental Organizations, institutions and the u. S. Needs to do a much better job in information sharing so we can ensure whether you are a private company, a financial institution, Critical Infrastructure you have the tools to be able to invest in Cyber Security so these situations dont happen. Now i want to look our practice some of the conclusions in the book, and i want to read this quote at the big question is where do we go from here . We have an opportunity with the new administration and the new congress to put forth a strategy when it comes to Information Warfare. Ive done that quite compelling. In the book you talk about a the 2012 study produced by the joint chiefs of staff and it found that the u. S. Lacks a strategic understanding of warfare on the war on terror. For decades quote the u. S. Was slow to recognize the importance of information in the battle for the narrative to achieve the objective at all levels. It was often ineffective in applying and aligning the narrative to the goals and the desires of the state. Talked about the need for a new Information Agency. How is that part of where we go from here . At love to hear some of the conclusions you draw in the book with policymakers. Guest its always been a feature of my books and again i highlight a lot of the threats and the paints a pretty dark picture. I not only try to present proposals for how to fix the problem but in this case i present the outlines of a number of issues. I mention the information u. S. Aid for the 21st century. How it could be structured is up for debate. It could be a Government Entity like it was in the past. It could hear private sector say a Nongovernmental Organization funded by philanthropist or realistically a combination of the two where would be supported by intelligence agencies and Diplomatic Service as well but really focused on setting up programs. I present an outline on how we do this. Obviously there is room for debate. We need to identify these problems and come up with some solutions. I think ive got a pretty good idea that if we dont try to do this we are going to be in bigger trouble down the road. The problem is getting worse. We didnt talk extensively about the russian influence operation but clearly that was a new stab and that let the government saying well we never thought about our elections as part of the Critical Infrastructure and during the cold war one of their jobs was to counteract then soviet influence. They kind of got out of that mission and its very difficult to do in the polarized political environment but i think we need to have a public debate on these issues and come up with real solutions. Im optimistic the Trump Administration will take a look at this. I know like yourself and others in congress they are also looking at solutions for this as well. Host in the solution chapter and i love books that look very critically at the challenges they face within present ideas and recommendations. You talk about as part of information america a number of projects from some of the peaks my interest and i think will pique your interest. I could go through these and get a quick summary of what they are are. The big data project. What does theyll that look like . Guest well already the government is very much interested in using big data. Its all of this opensource material whether the social media or news sources from other sources and putting it altogether all together and identifying patterns. We are able to use that in a constructive way to counteract some of these false narratives. Thats kind of what they are doing. I mentioned the company that is doing that. They do some government work but its a very complicated area. It involves the ability to gather that data and most importantly to be able to make sense of it to find out whats going on. Again you have to have this in russian and in chinese so you have to develop new Language Skills and technology that can assist in chinese characters so i think thats really a growth area for focus to be able to use the data. Host another project he recommended that the u. S. Government needs to embark on is the hollywood project. Can you talk about what that is . I thought that was interesting. Guest this is idea of not just countering information by promoting america, promoting the idea of freedom liberty democracy, free markets. Americans Film Industry was one reason that people around the world loves america but unfortunately in hollywood today you have a narrative that portrays the United States in the worst light possible. Its cliche in every movie that it anticorporate and antigovernment. The bad guys who in the past used to be the good guys. Im not saying we should let them do that but i know theres a big market for grow american patriotic movies that have a different narrative. Lets set up a pro american Film Industry or studio. I know glenn beck is talked about doing this and in something that is urgent. I think it would be a commercial market because we do portray america well. It could the propaganda but we need to get over that and say look we have some great things to offer the world. We need to promote democracy against the chinese socialist model and against the russian fascist model and that would be one right to do it. Host that brings me to my next point. You mentioned this idea of the hamilton project. Obviously thats in response to the hamilton musical and the success we have seen beyond all previous broadway plays. I saw hamilton and earlier in the book separate from his hamilton projects you talk about how our Founding Fathers understood the importance of Information Warfare and influence operations. What would the hamilton project look like . I have said i think every number congress should see hamilton because it does highlight the strength of our u. S. Republican democratic government and the challenges that our founders faced. What does the hamilton project look like . Guest its oriented towards using the broadway arts and plays and musicals for this purpose. I think the hamilton project really does show that you can use artistic venues to promote the best of america. I dont think we should apologize for that. Again the liberal left narrative is that america is evil country and should all of its faults should be highlighted. My view is the opposite, there is hope for the world and we need to promote that. Host now we are going to turn the tables. What is your recommendation for members of congress . I said on the House Armed Services committee and the over the Defense Department and the Intelligence Community. What is your recommendation for elected officials and the Big Questions we need to be asking in the process we need to go through to be in a better place to do for years from now when it comes to Information Warfare . Guest i would say the biggest thing congress could do would be to help the American People understand the threats that we are facing. That is really the key. People dont think theres a threat or they think the foreign threat is just a reflection of the same thing that the u. S. Government does. Theres a misunderstanding there. Congress can be a valuable resource in helping the Defense Department to promote things like understanding the chinese Information Warfare threat or the russian Information Warfare threat. The Intelligence Community as well. They have information but their whole culture is we cant let anybody know this and the cyber realm again the information explosion around the world, things travel at light speed and yet we cant get information out with something comes to light. If we could establish better procedures and policies to better inform and educate the American Public i think congress could play a key role there. All of the best things that ive seen in my career and 30 years in washington have come as a result of congressional action. Heres an example. Congress mandated that the pentagon produce an annual report on the chinese military. The chinese complain about it every time we do this annual report but its one of the most important baselines for understanding whats going on. Similar things with Information Warfare and Cyber Threats. We have to get information out there so people know and so are Companies Know and we can take steps to fix the problem. Host one of the policy questions that we are grappling with on the House Armed Services committee is the importance of u. S. Cyber command. As you know admiral rogerss dualheaded as the commander of u. S. Cybercommand. What can we do to mature the Cyber Command and should we look at that dual hats . Guest this has been one of the key questions. Its the chicken or egg problem. The problem is an essay which is colocated with Cyber Command is this repository of the best cyber capability. Those capabilities are focused on intelligence gathering. Cyber commands job is to both of the threats and to be ready when needed to be able to take action come either defense of action or in a warfare since to wage cyber warfare in the future. The lines of authority remain blurred. In fact the Pacific Command commander testified recently that the problem is that the lawyers are controlling things and he said either we change the system or we get better lawyers because they are not allowed to use Cyber Capabilities because they are restricted by legal constraints. There clearly needs to be at some point Cyber Command will be separated from nsa and it would probably be elevated to its own combatant command but until they can figure out the legal differences and figure out a way that the nsa can directly supports Cyber Command is probably going to stay that way i would guess for another year or so. Host im a big lever and publicprivate partnerships and i think theres an opportunity to work with Silicon Valley whether its the big data projects are the social Media Projects that you talk about at the end of the book. How can we more effectively work with the there and specifically our Technology Companies that are in testing in research and development and Big Data Analytics . Guest Silicon Valley is the industrial heart of america right now and i point out in iwar a lot of people in Silicon Valley have been coopted by the left. There was a great article by name a guy named Michael Anton who talked about San Francisco values and the political left in a lot of ways has coopted many of the people in Silicon Valley. These things could be much more developed in a pro america pro security directive. Instead Silicon Valley is leading in the libertarian political direction where they kind of dont want to interact with the government. The government has too many problems and is too bureaucratic bureaucratic. I think there needs to be some outreach. I know the cia has a Technology Unit in Silicon Valley. The pentagon has an Innovation Center there too. I think the challenge is really to try to get them to contribute to this battle against the foreign Information Warfare threat. I think if the leaders of Silicon Valley and the social Media Companies and the titans out there were educated to some of the things that im writing about in iwar a think it would change their view on how to deal with these problems. Host do you think theres an opportunity for this administration to invite members of companies that are leading the way in Silicon Valley . There are so Many Companies that need to understand the importance of Cyber Security and information war there has been increasing problem against the u. S. Produces an opportunity for this administration . Guest absolutely. It should form a Blue Ribbon Panel of experts. A lot of times commissions can be oriented by the people you pick so it has to be done in a way that will create some real policy proposal. That would be the first step. Lets get some of the Silicon Valley people. Lets get some of our warmer Government People involved in Information Operations. Lets get them working together to figure out how to address this problem. I feel its an urgent necessity because this problem is going to get a lot worse. We saw the last election with the russian influence operation, its not going to stop. James comey the fbi director said its going to be here in 2020, its going to be here in 2018 so this is an urgent problem that needs to be addressed right away. Host now i want to turn to some fun questions, how your experience was writing this book. Can you tell me how long this book took you to right . To know its a culmination of your career but from start to finish in terms of brainstorming to publication, how long did it take . Guest thats a good question. I began work on the book in april of 2016 and my deadline to turn in the manuscript was august 1. Host thats pretty quick. Guest very quick. Ive relied on a lot of reporting that ive done and i basically took the stories ended further research and further interviews of people and i tried to identify again without having known the government had identified these Major Players i was able to do chapters on each and every one of these. I have a lot of inside information. Thats one of the advantages to writing. This is the first book that ive written since 2008 and back then there wasnt the same level of access to information as there is now. We have so much information at their fingertips. Its just an information explosion out there so theres just incredible resources that are out there. For example i found the report that was done for nato on russian Information Warfare. It was done by a polish woman and it was a fascinating look at how the russians orchestrated the takeover of crimea. A lot of that information i was able to get that and put it all together. The publisher was very good. We had a bit of a back and forth. We change some of the chapters around and move the north korea chapter to the front. I think he cannot very well. Host the feedback has been quite positive. There are number of the north korea chapter is a great example of that. Can you talk about what the response has been to the feedback when. Guest this is amazing that one of the solutions to the north korea problem i said was theres a way to change the regime in north korea and i think we should also realize we need to change that regime. Again the crime against humanity regime. Shouldnt be allowed to torture his own people for so long in the past. My solution was to get Nongovernmental Organizations and have them send cell phones and computers into north korea. Lets get this hermetically sealed totalitarian state wired. We know from china that they can control the technology but i know from the Korean People they are innovative enough that they will eventually find ways around all of these government controls and breakthrough the information walls and get the information. Once information starts flowing into that country will change. It will change very rapidly. I also mentioned one of the tools would be to set up a government in exile. I said lets use the estranged brother kim jongun and the north Korean Leader as a tool to really put the pressure on him to change the regime. As we saw within weeks of publication of the book the North Koreans to their ministry of state security conducted a clandestine assassination of kim jong and as he walked through the airport using a nerve agent. Two women went up to him and rubbed his eyes and within minutes the nerve agent killed him. This took away the potential leader and the north korean regime is a family dynasty, three generations. The solution is to target as they say in military terms the center of gravity of the north korean regime which is the kim family. Host i had the opportunity to travel to south korea as part of the Intelligence Committee for new members in japan and south korea and the cover of the newspaper was two days after that assassination of kim jonguns halfbrother. It is a significant National Security challenge and it is going to be incredibly important for policymakers and important to Pay Attention whats happening in syria and iraq that the north korean challenge is significant and a strategy to shed light and ensure the north korean population have access to the truth and the information because i think that will undermine the regime and have the potential for a Better Future for north korea. It certainly was eyeopening visiting there. We have reached the end of our book talk. Again this is bill gertz to talk about his new book iwar war and peace in the Information Age age. This is a timely book. Has incredible right conditions from policymakers and i just want to thank you for your time and your thoughtful answers and for your willingness to put bacon soup work into writing a book like this. Guest thank you very much for they know you are very busy and i really appreciate you taking the time. Host thank you

© 2025 Vimarsana

comparemela.com © 2020. All Rights Reserved.