Friday, October 21, 2016

Just After Reports of Another North Korean Ballistic Missile Test ...

My followers began asking for clarity from an expert on the relationship between China and North Korea's nuclear program.  I asked Gordon Chang, author of Nuclear Showdown: North Korea Takes on the World, and internationally respected pundit on security matters in Asia, about this.



With his comprehensive approach and gracious style, Gordon Chang is renowned for his incisive analyses and commentary.  He lived and worked in Shanghai as Counsel to the American law firm Paul Weiss, and earlier in Hong Kong as Partner in the international law firm Baker & McKenzie.  He has briefed the United States CIA, Pentagon and State Department on security developments and he shared this assessment with me this week:

"North Korea has three launchers--theTaepodong-2, the KN-08, and KN-14--that can hit the lower 48 states.  The better view is that the North cannot mate a nuclear warhead to them, but that is only a matter of about three years.  The North Koreans have already put a nuke on top of their intermediate-range Nodong.

Beijing could rein in North Korea, but Chinese leaders do not want to do so because they view America as their main strategic rival.  They find Kim Jong Un's antics useful in keeping us and our allies off balance. 

We could force Beijing into being helpful--by, for example, imposing secondary sanctions on Chinese banks and enterprises--but so far there have been only tentative moves to do so.  The U.S. sanctions on Dandong Hongxiang industrial, imposed last month, show attitudes in the American capital are changing.  They are changing because an unstable Kim Jong Un in control of the world's most destructive weapons is presenting American policymakers with little choice."

N.B. Gordon Chang will be presenting The New Nuclear Politics: China, Iran and North Korea, at the Election Night 2016 Security Summit, 80 Minutes Around the World: Security Briefings for the Next American President, in Westport, CT, on November 8th.

 

Wednesday, October 19, 2016

With News of the Iraqi Effort to Take Back Mosul from the Islamic State ...

 
I asked Dr. Austin Long, authority on international security matters and particularly urban operations in counterinsurgency, to put this in perspective for us.  He replied:  "The long awaited offensive to retake Mosul is a welcome sign of progress in the war on the Islamic State but should not be heralded as the beginning of the end. The loss of Mosul will hurt the group but not fatally.  We should always remember that retaking Fallujah in 2004 was seen as a major sign of progress but two years later Al Qaeda in Iraq, the Islamic State's predecessor, was stronger than ever."
Hear Dr. Long on Monday, November 7, 2016, at 7:00 p.m. at Sacred Heart University in Fairfield, CT.  He delivers, The Islamic State in Iraq and Syria: Crucible for the Next American President.  For details: LisaBernard@SecuritySpeak.net or www.Facebook.com/PodiumTime.

Saturday, October 1, 2016

October is National Cyber Security Awareness Month and Robert Bigman, Former CISO of the United States CIA - under whose watch the Agency was never hacked – shares his thoughts with Lisa Bernard

 
I arrived in Arlington, Virginia, at News Channel 8 Studios to meet Robert "Bob" Bigman before he went on the air as Francis Rose’s guest on Government Matters. From the get-go, I sensed the “quiet celebrity” he enjoys among those in-the-know in Washington, D.C. He is the man who served for thirty years at the Central Intelligence Agency – most of the latter years as Chief Information Security Officer (CISO).  Simply put, he kept the CIA’s data secure.  Now, at a time when most Americans – private citizens and public officials – feel the threat or pain of being hacked, Bob's insights seem particularly pertinent and his achievements especially notable.  I was delighted that this down-to-earth professional – who for so long was under the radar – was graciously coming into the spotlight to share his sense of this with us.  What he conveyed was as inspiring as it was stirring.  His cheerful manner and serene demeanor bespoke a guarded “could-be-done” attitude about recovering the upper hand in the cyber security challenges we face – “guarded” being the operative word.  My takeaway was that we Americans can combat these threats provided 1) our resolve comes with calm, candor and clarity about the nature of the technologies and the humans who engage them and 2) that we have devoted leadership at the organizational and national levels.
LISA BERNARD: On one thing all cyber-security experts agree: human behavior and psychology loom large as key factors.  We are a nation of e-consumers, wed to convenience and beginning to integrate into the job force a generation raised on the efficiency of their smart phones.  Bob, what will it take - new technology or a crisis - to shift the pendulum from user-myopia to individual vigilance? 
 
LISA BERNARD: We are electing ourselves a new Commander-in-Chief next month and although it is now common knowledge that the software we use is outdated - even in our nuclear missile systems -  we hear little about this from the candidates. Just how outdated is government software and why are antiquated systems still in use? 
 
LISA BERNARD: Many of my followers are CISOs themselves or CEOs who rely on them.  With the proliferation of mobile devices and the trend toward super-computing what advice can you give them?
 
 
LISA BERNARD:  If our next POTUS appointed you "Tsar of Cyber Security," with all the resources you would need to set our nation on a modern and safe course, what would be your first priority?
 
 
LISA BERNARD: Since leaving government service,  as a consultant,you have been moving the dial, persuading firms to move toward more managed and isolated networks.  In the private sector, where the internet is like oxygen, how are you doing this? 
 
ROBERT BIGMAN: The really bad news is that even if you wanted to stay disconnected, increasingly, technology and the evolution of your world will connect you.  The marketplace has already determined that you're going to stay connected to the internet.  So what can you do?  Start with your biggest risk - which is how you and your devices - computers, mobile devices, smart phones - how they actually connect to the internet. Know that to ameliorate this risk, you just can't simply any longer rely on commercial capabilities like firewalls, modems and router protection and control lists.  There's a collection of simple things you can do. First, I recommend that you NOT use commercial applications like Windows or Adobe. Instead use alternative operating systems like Ubuntu and Opera as a browser. 
 
 
LISA BERNARD: What products are now available to make this "shift" possible and attractive in a culture that is hyper-connected?
 
ROBERT BIGMAN: There are probably very few products that I would recommend where you can say that if you buy this product that you can secure your data completely and your don’t have to worry any more.  In fact, there are no products like that despite what vendors will tell you.  What I find is the biggest problem is that organizations simply don’t understand the risks to their systems, their networks, and their data and they too often – as a result of attending the RSA conference, the Black Hat conference, the DefCon conference – they too often fall into the trap of using technology to solve very complex problems that require people issues, process issues, policy issues and yes, some technology issues.  But trying to address them with just technology is the number one mistake.  And I know the vendors don’t want you to hear that message, but the fact is that unless you have a cyber-security program and that you have as the component parts of governance, IT management, public policies and processes, no matter how much technology you buy, you’ll still get beat.  And every event, every incident I’ve been involved where we’ve investigated – unauthorized access, penetration, hacking, unauthorized use of data – all involve the process and policy issues violations as ever as they involve misuse or improper technology.
###
 
Bob Bigman is available for briefings, talks and workshops via Lisa Bernard's SecuritySpeak, LLC. See his bio at www.SecuritySpeak.net.  To discuss the particulars of hosting him, phone (203) 293-4741 or email LisaBernard@SecuritySpeak.net.