Yesterday, our very own Ishmael Zechariah provided a link to an "Ars Technica" article with the above title. The article focused on the heads of several IC agencies speaking at the Intelligence & National Security Summit, an event described as an industry event largely attended by beltway bandits and government toadies trying to stop “the poisoning of the public debate around their missions, and especially around the issue of encryption, by unreasonable haters.”
Wow. This unreasonable hater had to read on.
*******************************************
The opening statements from Comey and others were focused on that "venom," as the intelligence chiefs—many of whom had just testified that morning with Director of National Intelligence James Clapper on cybersecurity threats before the House Select Intelligence Committee—sought to make it clear that they were speaking largely to help shift the direction of public discourse about the Intelligence Community. Specifically, they want to find ways to end what they perceive as irrational hostility against their agendas. (TTG note - Can't you just see him scowling as he claims, "And I would have gotten away with it if not for you meddlesome kids.")
"I have something on my mind that affects all the work we do as an intelligence community," Comey said in his opening remarks. "I think that citizens should be skeptical of government power. But I fear it's bled over to cynicism. It is something that is getting in the way of reasoned discussion, and I'm very concerned about how to change that trend of cynicism." He sees that cynicism directed toward everyone from law enforcement officers on the beat to the intelligence community at large.
In particular, Comey said, he feels that his push for some way to gain backdoor access to encryption was "met with venom and deep cynicism."
"How do we get to a healthier place in talking about authority?" he asked.
NSA head Rogers said that "we have got to engender a better dialogue" on security issues. "In the end, we serve the citizens of the nation... all the revelations [a reference to Edward Snowden and WikiLeaks] have made life more difficult for us." (Ars Technica)
*******************************************
Well bless their hearts. So they wonder how to cut through all the venom and deep cynicism engendered by the ungrateful rabble. For starters, Comey could reach over to that lying, Ming the Merciless looking POS Clapper and slap his mouth dry for lying so blatantly to Congress and the American people. Then he can slam his own head on the table, repeatedly, for insisting on having complete, unencrypted access to all our digital records and communications. Ubiquitous encryption is the answer, not the problem.
On a more serious note, they can embrace their complete and utter failure in defending our digital lives. I have yet to see an acknowledgement of the true seriousness of the most recent series of failures to protect databases at OPM. Comey lamented about someone now reading his SF-86 security questionnaire. That’s small stuff. With the depth and breath of the information collected by China, they can construct an accurate model of how our government works. For years China has been doing a lot of work in AI using geometric algebra and other things I don’t understand. I do know someone who not only understands but creates this stuff for a living. It’s present capabilities and future promise are science fiction scary. With the data China now has on our government (and associated contractors) and the right AI, a predictive model of frightening accuracy of our government’s innermost workings is not just possible, but probable. Think of the Mycroft supercomputer in “The Moon Is a Harsh Mistress” on a far grander scale. I think this is going to bite us in the ass for decades to come. And the people responsible for letting this happen continue to sit on panels like this, revel in their bureaucratic power, collect their fat paychecks and waltz through the revolving doors with impunity. If they had any honor or sense of shame (which they clearly do not) they’d resign and move to the Everglades never to be heard from again. They'll feel right at home among the gators and pythons.
TTG
You have hammered that nail well, TTG. My only disagreement, as a Floridian, would to keep them out of the Everglades. There are enough problems there already.
Posted by: Lars | 12 September 2015 at 12:22 PM
"We've been peeping in your window every night for years, and you STILL aren't in love with us?" -- NSA
Posted by: Jeffliss | 12 September 2015 at 12:40 PM
It's not only the people data stuff. China has logically mapped all our key infrastructure, and are dumping Worms, Trojans and such quietly waiting inside the networks, just logging observations of what does what to whom, waiting for the voice of the master.
Posted by: Peter | 12 September 2015 at 12:58 PM
Just two points as addenda.
1. The readiness of these public servants to take complete liberty (license) to pronounce and condemn in vituperative language is facilitated, in part at least, by the abdication of responsibility by the President. All he has done for the past six years encourages this arrogant attitude and removes inhibitions. By all reports, John Brennan was the agent who first exercised a Rasputian influence on Obama - exploiting the man's gullibility and instinctive deference to established authority.
2. As to the prospects of the Chinese learning with exactitude what we are thinking and planning, I am somewhat less troubled. Think of ISIL/Iraq/Syria/Yemen/KSA. There is no evidence of any coherent thinking at all or reasoned strategy. Beijing's search for them will lead either to mistaken conclusions or a state of disorientation that mirrors our own.
Posted by: mbrenner | 12 September 2015 at 01:00 PM
TTG,
"Ubiquitous encryption is the answer, not the problem."
You are absolutely right.
My 3rd career, for the past,soon to be, 20 years, has been as a Systems
Engineer/Architect(Cryptology)with a major engineering company.
I was still in the Bu during the first of the "Crypto Wars" during which
the Bu and the several other 3 letter agencies waged war against
American civil liberties and industry.The Bu did not even have the satisfaction of being the "evil genius" behind this attempt; it had the more contemptible role of "lawn jockey"/bum boy/fall guy for a more technically savvy crowd.Fortunately the outcome then was a good one. The technical arguments of the best academic crypto minds and wide based concerns over electronic freedom beat back the IC/LE assault.
One of the [probably didn't really happen] stories they used to tell in
those days was of the Bu in the early 1950's testifying about the negative
effect on law enforcement of the proposed National Interstate Highway System " first thing you know them bank robbers gonna be racing cross state lines
in stolen automobiles at high speeds, we ain't never gonna catch them. Won't
be a bank or car in America ever safe again".
Nightsticker
USMC 65-72
FBI 72-96
Posted by: Nightsticker | 12 September 2015 at 01:21 PM
TTG: I think a little more respect for gators and pythons is called for. It is deeply ironic this crew asking us in earnest "where's the trust?"
Posted by: Medicine Man | 12 September 2015 at 01:44 PM
Nightsticker, the current running jokes at work are "sub it out to the Chinese, they know our system better than we do" and "why install back doors when the widows are open"
Posted by: Peter | 12 September 2015 at 01:44 PM
More like sharing the view point of the physician during your colonoscopy.
Posted by: ex-PFC Chuck | 12 September 2015 at 02:11 PM
Private sector security consultant Lauren Weinstein had a post on his blog yesterday on the inter-agency unintended comedic irony show. Near the end of his screed on the arrogance and incompetence at all levels of government he drops money sentence: "The technical reality is that the kinds of encryption backdoors you want cannot be made secure and would themselves represent horrific security risks." Which pretty much sums it up.
http://lauren.vortex.com/archive/001123.html
Posted by: ex-PFC Chuck | 12 September 2015 at 02:39 PM
Nightsticker, what do your acronyms mean? I wouldn't bother to ask if your comment was ignorable.
Posted by: MRW | 12 September 2015 at 04:06 PM
IC- Intelligence Community
LE- Law Enforcement
https://www.schneier.com/crypto-gram/archives/2015/0815.html#2
The above URL leads to an easy to read explanation of why
government backdoors are not only bad science but bad policy.
Posted by: Nightsticker | 12 September 2015 at 04:15 PM
Then, of course, the admin blamed the Russian government in August, 2014 for hacking 75 million-plus banking customers...'because it was so sophisticated'. This past July the FBI arrested the real perps: two Israelis, and two 20/30-something American-Israeli frat brothers based out of Florida. It's anyone's guess whether Israel will extradite the two Israelis, though they have been asked.
My question is who has confirmed that it was the Chinese Government that did the unencrypted OPM heist?
If NSA can't catch these domestic cyber terrorists, operating right under their noses, what good are they? No wonder the American public treat them with derision; $75 billion plus a black budget can't defeat four hackers, or catch some low-level Chinese employee working with an unencrypted system..
Posted by: MRW | 12 September 2015 at 04:22 PM
MWR,
I, too, do not accept our government's claims simply because it says it is so. However, I have been convinced by sources and evidence outside of our government that the Chinese government is the ultimate culprit. I have witnessed drug-addled teens orchestrate the take down of major national ISP just for shits and grins. I've also had to warn that smug SOB Alexander that kids owned a number of his routers and switches when he was at INSCOM. His people in the much vaunted Information Domination Center couldn't see it. So yes, i am aware of what nongovernmental hackers are capable of doing and what governments can do to stop them. Nevertheless, ubiquitous encryption will go a long way to address the problem.
Posted by: The Twisted Genius | 12 September 2015 at 05:01 PM
"Attackers successfully compromised U.S. Department of Energy computer systems more than 150 times between 2010 and 2014, a review of federal records obtained by USA TODAY finds."
http://www.usatoday.com/story/news/2015/09/09/cyber-attacks-doe-energy/71929786/
Yep. Having more back doors will certainly make us all more secure.
I truly cannot decide if these folks are as delusional as they seem to be in my coordinate system-or if they are so crafty that they appear to be delusional.
Ishmael Zechariah
Posted by: Ishmael Zechariah | 12 September 2015 at 05:02 PM
Lars and Medicine Man,
You're both right. I should be a little more respectful of gators and even pythons and not wish such a vile plague on the swamps of Florida. Maybe Clapper, Comey and the rest of their kind will stick their heads so far up their arses that they'll disappear in little puffs of black smoke.
Posted by: The Twisted Genius | 12 September 2015 at 05:08 PM
I would like to award this post a Pulitzer Prize.
Head and shoulders above that thing we usually give the prizes to -- the thing we call the media, which is particularly freakish this weekend btw.
Posted by: gemini33 | 12 September 2015 at 07:35 PM
I sense that what is of greatest importance in these remarks by directors of our security-intelligence apparatus is what it conveys in the way of attitude rather than any specific plans they may have for more intrusive surveillance. As for the latter, these men who are so obviously mediocre in talent and ambition are capable of only modest damage. Moreover, neither they nor the organizations they head have demonstrated much in the way of sheer competence at their trade.
Yet, the arrogance and contempt for the citizenry, for the law, and for the constitution (as well as implicitly for the President) are breathtaking. Even J. Edgar Hoover in his heyday would never dare say in public the things these men do so cavalierly. They are setting a tone, they are redefining in drastic ways the limits of the acceptable, and they are conjuring a fictive world of threat that could conceivably pave the way for far more dangerous people. Those types would find willing accomplices in the self-important and self-righteous blowhards who were up there on the platform. The world has seen this before.
Posted by: mbrenner | 12 September 2015 at 09:44 PM
Pete,
I always thought of Chertoff as the Crypt Keeper. I remarked about this similarity at several inter-departmental meetings only to be shooshed by fearful underlings. No sense of humor whatsoever.
Posted by: The Twisted Genius | 12 September 2015 at 11:36 PM
Skeletor
Posted by: gemini33 | 13 September 2015 at 05:39 AM
http://www.usatoday.com/story/money/2015/07/21/jpmorgan-chase-hack-arrests-israel-florida/30469203/
Posted by: Will | 13 September 2015 at 08:27 AM
I've always thought that was one of Obama's likability problems- Too darn skinny. People like their leaders fleshed out and avuncular. That's my theory and I"m sticking to it.
Posted by: Will | 13 September 2015 at 08:36 AM
Thank you, this is what needs to be emphasized. I would go farther and say that rather than "conceivably" paving the way for some future rotten bunch, they are in fact paving a way, and then the question becomes just how long until a rotten bunch gets its hands on the levers, whether from within or without the de jure government. Only someone with no knowledge of history would press forward assuming that organization integrity will be maintained forever.
Posted by: MS2 | 13 September 2015 at 11:43 AM
I'm in total agreement with what has been said here, but I am wondering about how the predictive AI model would work. Given that the decision-making at this level is so thoroughly corrupt, self-serving and completely at odds with the stated mission, the model would have to essentially account for non-logical logic.
The depressing thought is that cynicism is unbounded, think about what we've all had to endure since the Shoe Bomber was elevated to super-terrorist threat status, and what Cherthoff was able to bank off the Rapiscan scam. Oh yes, who is the newest member of the Cherthoff Group team? General Hayden, of course. The cynical mind says we are resigned to pay twice for every cyber-attack in the future - once in direct consequence, and the other to pay the bill for whatever profitable scheme the Cherthoffs et al can dream up in response; Cyber-disaster capitalism is the new self-licking ice cream cone.
Posted by: DeWitt | 13 September 2015 at 01:03 PM
DeWitt,
The AI I am familiar with has proved quite adept in accounting for non-logical logic and the darker quirks of human behavior.
Posted by: The Twisted Genius | 13 September 2015 at 01:21 PM
The disclosure that the Office of Personnel Management and its treasure trove of information had been penetrated, or "hacked", or compromised, and that the penetrators had gotten a lot of information and data out of it was bad enough. But what really was astonishing was that the system, including the part involving "security clearances" and the like, was connected to the outside world and, apparently, to the Internet! Access did not appear to occur through the old serial line into the phone system and to a bank of modems at the OPM, so it must have been tied to the Internet.
It seems obvious that if you have a computer or local computer network that you want to be secure, you do not connect it to the public switched telephone network or to the Internet. To solve a lot of the problem, they can disconnect the system from the outside and, if they are going to use computers, they use only a local area network. Still remaining are the issues of the old "Tempest" standards to prevent the picking up outside of the electronic emissions from the equipment and cables that go through the walls, a Faraday Cage, and all that jazz.
If they insist on using computers and not paper, they can hire William Binney, whose business after his resignation from the NSA was torpedoed by the Department That Calls Itself Justice, which included, unfortunately, involvement by the FBI. Being a mathematician, code breaker, analyst, systems developer, people manager, and Patriot, he could go a long way to cleaning the mess up.
But that will not happen.
It took a long time for the director of the department, Katherine Archuleta, an Obama political worker, to leave. She is to be replaced by Beth Cobert, the Office of Management and Budget deputy director for management. Apparently, Ms. Cobert worked for a long time at McKinsey and Company, a "management consulting" firm. One thing that means is that she believes in hiring "consultants". Outside private companies for a fee, of course.
And speaking of outside companies, I saw Ms. Archuleta in a Congressional hearing on this say that the contractor involved was not going to be fired. I do not remember the name, but this article from June of this year talks about that issue, and that another company, Imperatis, f/k/a Jorge Scientific Corp., got a "sole source" contract to develop a new "database environment" for the OPM--
http://fcw.com/articles/2015/06/24/house-oversight-opm.aspx
The least they can do is to follow Mr. Binney's advice and encrypt files on a standalone computer not connected to the network, before putting the files on a connected machine for transfer.
Posted by: robt willmann | 13 September 2015 at 09:48 PM