Intelligence Technology, Waiting for Superman

…or Superwoman.

Amid the continuing controversies sparked by Edward Snowden’s whistleblowing defection revelations, and their burgeoning effects on American technology companies and the tech industry worldwide, the afflicted U.S. intelligence community has quietly released a job advertisement for a premier position: the DNI’s National Intelligence Officer for Technology.

You can view  the job posting at the USAJOBS site (I first noticed it on ODNI’s anodyne Twitter feed @ODNI_NIC), and naturally I encourage any interested and qualified individuals to apply. Keep reading after this “editorial-comment-via-photo”:

How you'll often feel if you take this job...

How you’ll often feel if you take this job…

Whether you find the NSA revelations to be infuriating or unsurprising (or even heartening), most will acknowledge that it is in the nation’s interest to have a smart, au courant technologist advising the IC’s leadership on trends and directions in the world of evolving technical capabilities.

In the interest of wider exposure I excerpt below some of the notable elements in the job-posting and description…. and I add a particular observation at the bottom.

Job Title: National Intelligence Officer for Technology – 28259

Agency: Office of the Director of National Intelligence

Job Announcement Number: 28259

Salary Range: $118,932.00  to  $170,000.00

Major Duties and Responsibilities:

Oversees and integrates all aspects of the IC’s collection and analytic efforts, as well as the mid- and long-term strategic analysis on technology.

Serves as the single focal point within the ODNI for all activities related to technology and serves as the DNI’s personal representative on this issue.

Maintains senior-level contacts within the intelligence, policymaking, and defense communities to ensure that the full range of informational needs related to emerging technologies are met on a daily basis, while setting strategic guidance to enhance the quality of IC collection and analysis over the long term.

Direct and oversee national intelligence related to technology areas of responsibility; set collection, analysis, and intelligence operations priorities on behalf of the ODNI, in consonance with the National Intelligence Priorities Framework and direction from the National Security Staff.

In concert with the National Intelligence Managers/NIOs for Science and Technology and Economic Issues, determine the state of collection, analysis, or intelligence operations resource gaps; develop and publish an UIS which identifies and formulates strategies to mitigate gaps; advise the Integration Management Council and Integration Management Board of the gaps, mitigation strategies, progress against the strategies, and assessment of the effectiveness of both the strategies and the closing of the intelligence gaps.

Direct and oversee Community-wide mid- and long-term strategic analysis on technology. Serve as subject matter expert and support the DNI’s role as the principal intelligence adviser to the President.

Oversee IC-wide production and coordination of NIEs and other community papers (National Intelligence Council (NIC) Assessments, NIC Memorandums, and Sense of the Community Memorandums) concerning technology.

Liaise and collaborate with senior policymakers in order to articulate substantive intelligence priorities to guide national-level intelligence collection and analysis. Regularly author personal assessments of critical emerging technologies for the President, DNI, and other senior policymakers.

Develop and sustain a professional network with outside experts and IC analysts, analytic managers, and collection managers to ensure timely and appropriate intelligence support to policy customers.

Brief senior IC members, policymakers, military decisionmakers, and other major stakeholders.

Review and preside over the research and production plans on technology by the Community’s analytic components; identify redundancies and gaps, direct strategies to address gaps, and advise the DNI on gaps and shortfalls in analytic capabilities across the IC.

Determine the state of collection on technology, identify gaps, and support integrated Community-wide strategies to mitigate any gaps.

Administer National Intelligence Officer-Technology resource allocations, budget processes and activities, to include the establishment of controls to ensure equities remain within budget.

Lead, manage, and direct a professional level staff, evaluate performance, collaborate on goal setting, and provide feedback and guidance regarding personal and professional development opportunities.

Establish and manage liaison relationships with academia, the business community, and other non-government subject matter experts to ensure the IC has a comprehensive understanding of technology and its intersection with global military, security, economic, financial, and/or energy issues.

Technical Qualifications:

Recognized expertise in major technology trends and knowledge of analytic and collection issues sufficient to lead the IC.

Superior capability to direct interagency, interdisciplinary IC teams against a range of functional and/or regional analytical issues.

Superior interpersonal, organizational, and management skills to conceptualize and effectively lead complex analytic projects with limited supervision.

Superior ability to work with and fairly represent the IC when analytic views differ among agencies.

Superior communication skills, including ability to exert influence with senior leadership and communicate effectively with people at all staff levels, both internal and external to the organization, to give oral presentations and to otherwise represent the NIC in interagency meetings.

Expert leadership and managerial capabilities, including the ability to effectively direct taskings, assess and manage performance, and support personal and professional development of all levels of personnel.

Superior critical thinking skills and the ability to prepare finished intelligence assessments and other written products with an emphasis on clear organization, concise, and logical presentation.

Executive Core Qualifications (ECQs):

Leading People: This core qualification involves the ability to lead people toward meeting the organization’s vision, mission, and goals. Inherent to this ECQ is the ability to provide an inclusive workplace that fosters the development of others, facilitates cooperation and teamwork, and supports constructive resolution of conflicts. Competencies: Conflict Management, Leveraging Diversity, Developing Others, and Team Building

Leading Change: This core qualification involves the ability to bring about strategic change, both within and outside the organization, to meet organizational goals. Inherent to this ECQ is the ability to establish an organizational vision and to implement it in a continuously changing environment. Competencies: Creativity and Innovation, External Awareness, Flexibility, Resilience, Strategic Thinking, and Vision.

HOW YOU WILL BE EVALUATED:

You will be evaluated based upon the responses you provide to each required Technical Qualifications (TQ’s) and Executive Core Qualifications (ECQ’s). When describing your Technical Qualifications (TQ’s) and Executive Core Qualifications (ECQ’s), please be sure to give examples and explain how often you used these skills, the complexity of the knowledge you possessed, the level of the people you interacted with, the sensitivity of the issues you handled, etc. Your responses should describe the experience; education; and accomplishments which have provided you with the skills and knowledge required for this position. Current IC senior officers are not required to submit ECQs, but must address the TQs.

Only one note on the entire description, and it’s about that last line: “Current IC senior officers are not required to submit Executive Core Qualifications, but must address the Technical Qualifications.”  This is perhaps the most important element in the entire description; it is assumed that “current IC senior officers” know how to lead bureaucratically, how to manage a staff – but in my experience it cannot be assumed that they are necessarily current on actual trends and advances in the larger world of technology. In fact, some might say the presumption would be against that currency. Yet they must be, for a variety of reasons never more salient than in today’s chaotically-evolving world.

Good luck to applicants.

[note: my title is of course a nod to the impressive education-reform documentary "Waiting for Superman"]

 

Debating Big Data for Intelligence

I’m always afraid of engaging in a “battle of wits” only half-armed.  So I usually choose my debate opponents judiciously.

Unfortunately, I recently had a contest thrust upon me with a superior foe: my friend Mark Lowenthal, Ph.D. from Harvard, an intelligence community graybeard (literally!) and former Assistant Director of Central Intelligence (ADCI) for Analysis and Production, Vice Chairman of the National Intelligence Council – and as if that weren’t enough, a past national Jeopardy! “Tournament of Champions” winner.

As we both sit on the AFCEA Intelligence Committee and have also collaborated on a few small projects, Mark and I have had occasion to explore one another’s biases and beliefs about the role of technology in the business of intelligence. We’ve had several voluble but collegial debates about that topic, in long-winded email threads and over grubby lunches. Now, the debate has spilled onto the pages of SIGNAL Magazine, which serves as something of a house journal for the defense and intelligence extended communities.

SIGNAL Editor Bob Ackerman suggested a “Point/Counterpoint” short debate on the topic: “Is Big Data the Way Ahead for Intelligence?” Our pieces are side-by-side in the new October issue, and are available here on the magazine’s site.

Mark did an excellent job of marshalling the skeptic’s view on Big Data, under the not-so-equivocal title, Another Overhyped Fad.”  Below you will find an early draft of my own piece, an edited version of which is published under the title A Longtime Tool of the Community”:

Visit the National Cryptologic Museum in Ft. Meade, Maryland, and you’ll see three large-machine displays, labeled HARVEST and TRACTOR, TELLMAN and RISSMAN, and the mighty Cray XMP-24. They’re credited with helping win the Cold War, from the 1950s through the end of the 1980s. In fact, they are pioneering big-data computers.

Here’s a secret: the Intelligence Community has necessarily been a pioneer in “big data” since inception – both our modern IC and the science of big data were conceived during the decade after the Second World War. The IC and big-data science have always intertwined because of their shared goal: producing and refining information describing the world around us, for important and utilitarian purposes

What do modern intelligence agencies run on? They are internal combustion engines burning pipelines of data, and the more fuel they burn the better their mileage. Analysts and decisionmakers are the drivers of these vast engines, but to keep them from hoofing it, we need big data.

Let’s stipulate that today’s big-data mantra is overhyped. Too many technology vendors are busily rebranding storage or analytics as “big data systems” under the gun from their marketing departments. That caricature is, rightly, derided by both IT cognoscenti and non-techie analysts.

I personally get the disdain for machines, as I had the archetypal humanities background and was once a leather-elbow-patched tweed-jacketed Kremlinologist, reading newspapers and HUMINT for my data. I stared into space a lot, pondering the Chernenko-Gorbachev transition. Yet as Silicon Valley’s information revolution transformed modern business, media, and social behavior across the globe, I learned to keep up – and so has the IC. 

Twitter may be new, but the IC is no Johnny-come-lately in big data on foreign targets.  US Government funding of computing research in the 1940s and ‘50s stretched from World War II’s radar/countermeasures battles to the elemental ELINT and SIGINT research at Stanford and MIT, leading to the U-2 and OXCART (ELINT/IMINT platforms) and the Sunnyvale roots of NRO.

In all this effort to analyze massive observational traces and electronic signatures, big data was the goal and the bounty.

War planning and peacetime collection were built on collection of ever-more-massive amounts of foreign data from technical platforms – telling the US what the Soviets could and couldn’t do, and therefore where we should and shouldn’t fly, or aim, or collect. And all along, the development of analog and then digital computers to answer those questions, from Vannevar Bush through George Bush, was fortified by massive government investment in big-data technology for military and intelligence applications.

In today’s parlance big data typically encompasses just three linked computerized tasks: storing collected foreign data (think Amazon’s cloud), finding and retrieving relevant foreign data (Bing or Google), and analyzing connections or patterns among the relevant foreign data (powerful web-analytic tools).

Word CloudThose three Ft. Meade museum displays demonstrate how NSA and the IC pioneered those “modern” big data tasks.  Storage is represented by TELLMAN/RISSMAN, running from the 1960’s throughout the Cold War using innovation from Intel. Search/retrieval were the hallmark of HARVEST/TRACTOR, built by IBM and StorageTek in the late 1950s. Repetitive what-if analytic runs boomed in 1983 when Cray delivered a supercomputer to a customer site for the first time ever.

The benefit of IC early adoption of big data wasn’t only to cryptology – although decrypting enemy secrets would be impossible without it. More broadly, computational big-data horsepower was in use constantly during the Cold War and after, producing intelligence that guided US defense policy and treaty negotiations or verification. Individual analysts formulated requirements for tasked big-data collection with the same intent as when they tasked HUMINT collection: to fill gaps in our knowledge of hidden or emerging patterns of adversary activities.

That’s the sense-making pattern that leads from data to information, to intelligence and knowledge. Humans are good at it, one by one. Murray Feshbach, a little-known Census Bureau demographic researcher, made astonishing contributions to the IC’s understanding of the crumbling Soviet economy and its sociopolitical implications by studying reams of infant-mortality statistics, and noticing patterns of missing data. Humans can provide that insight, brilliantly, but at the speed of hand-eye coordination.

Machines make a passable rote attempt, but at blistering speed, and they don’t balk at repetitive mindnumbing data volume. Amid the data, patterns emerge. Today’s Feshbachs want an Excel spreadsheet or Hadoop table at hand, so they’re not limited to the data they can reasonably carry in their mind’s eye.

To cite a recent joint research paper from Microsoft Research and MIT, “Big Data is notable not because of its size, but because of its relationality to other data.  Due to efforts to mine and aggregate data, Big Data is fundamentally networked.  Its value comes from the patterns that can be derived by making connections between pieces of data, about an individual, about individuals in relation to others, about groups of people, or simply about the structure of information itself.” That reads like a subset of core requirements for IC analysis, whether social or military, tactical or strategic.

The synergy of human and machine for knowledge work is much like modern agricultural advances – why would a farmer today want to trudge behind an ox-pulled plow? There’s no zero-sum choice to be made between technology and analysts, and the relationship between CIOs and managers of analysts needs to be nurtured, not cleaved apart.

What’s the return for big-data spending? Outside the IC, I challenge humanities researchers to go a day without a search engine. The IC record’s just as clear. ISR, targeting and warning are better because of big data; data-enabled machine translation of foreign sources opens the world; correlation of anomalies amid large-scale financial data pinpoint otherwise unseen hands behind global events. Why, in retrospect, the Iraq WMD conclusion was a result of remarkably-small-data manipulation.

Humans will never lose their edge in analyses requiring creativity, smart hunches, and understanding of unique individuals or groups. If that’s all we need to understand the 21st century, then put down your smartphone. But as long as humans learn by observation, and by counting or categorizing those observations, I say crank the machines for all their robotic worth.

Make sure to read both sides, and feel free to argue your own perspective in a comment on the SIGNAL site.

Bullshit Detector Prototype Goes Live

I like writing about cool applications of technology that are so pregnant with the promise of the future, that they have to be seen to be believed, and here’s another one that’s almost ready for prime time.

TruthTeller PrototypeThe Washington Post today launched an exciting new technology prototype invoking powerful new technologies for journalism and democratic accountability in politics and government. As you can see from the screenshot (left), it runs an automated fact-checking algorithm against the streaming video of politicians or other talking heads and displays in real time a “True” or “False” label as they’re speaking.

Called “Truth Teller,” the system uses technologies from Microsoft Research and Windows Azure cloud-computing services (I have included some of the technical details below).

But first, a digression on motivation. Back in the late 1970s I was living in Europe and was very taken with punk rock. Among my favorite bands were the UK’s anarcho-punk collective Crass, and in 1980 I bought their compilation LP “Bullshit Detector,” whose title certainly appealed to me because of my equally avid interest in politics :)

Today, my driving interests are in the use of novel or increasingly powerful technologies for the public good, by government agencies or in the effort to improve the performance of government functions. Because of my Jeffersonian tendencies (I did after all take a degree in Government at Mr. Jefferson’s University of Virginia), I am even more interested in improving government accountability and popular control over the political process itself, and I’ve written or spoken often about the “Government 2.0″ movement.

In an interview with GovFresh several years ago, I was asked: “What’s the killer app that will make Gov 2.0 the norm instead of the exception?”

My answer then looked to systems that might “maintain the representative aspect (the elected official, exercising his or her judgment) while incorporating real-time, structured, unfiltered but managed visualizations of popular opinion and advice… I’m also a big proponent of semantic computing – called Web 3.0 by some – and that should lead the worlds of crowdsourcing, prediction markets, and open government data movements to unfold in dramatic, previously unexpected ways. We’re working on cool stuff like that.”

The Truth Teller prototype is an attempt to construct a rudimentary automated “Political Bullshit Detector, and addresses each of those factors I mentioned in GovFresh – recognizing the importance of political leadership and its public communication, incorporating iterative aspects of public opinion and crowd wisdom, all while imbuing automated systems with semantic sense-making technology to operate at the speed of today’s real world.

Real-time politics? Real-time truth detection.  Or at least that’s the goal; this is just a budding prototype, built in three months.

Cory Haik, who is the Post’s Executive Producer for Digital News, says it “aims to fact-check speeches in as close to real time as possible” in speeches, TV ads, or interviews. Here’s how it works:

The Truth Teller prototype was built and runs with a combination of several technologies — some new, some very familiar. We’ve combined video and audio extraction with a speech-to-text technology to search a database of facts and fact checks. We are effectively taking in video, converting the audio to text (the rough transcript below the video), matching that text to our database, and then displaying, in real time, what’s true and what’s false.

We are transcribing videos using Microsoft Audio Video indexing service (MAVIS) technology. MAVIS is a Windows Azure application which uses State of the Art of Deep Neural Net (DNN) based speech recognition technology to convert audio signals into words. Using this service, we are extracting audio from videos and saving the information in our Lucene search index as a transcript. We are then looking for the facts in the transcription. Finding distinct phrases to match is difficult. That’s why we are focusing on patterns instead.

We are using approximate string matching or a fuzzy string searching algorithm. We are implementing a modified version Rabin-Karp using Levenshtein distance algorithm as our first implementation. This will be modified to recognize paraphrasing, negative connotations in the future.

What you see in the prototype is actual live fact checking — each time the video is played the fact checking starts anew.

 – Washington Post, “Debuting Truth Teller

The prototype was built with funding from a Knight Foundation’s Prototype Fund grant, and you can read more about the motivation and future plans over on the Knight Blog, and you can read TechCrunch discussing some of the political ramifications of the prototype based on the fact-checking movement in recent campaigns.

Even better, you can actually give Truth Teller a try here, in its infancy.

What other uses could be made of semantic “truth detection” or fact-checking, in other aspects of the relationship between the government and the governed?

Could the justice system use something like Truth Teller, or will human judges and  juries always have a preeminent role in determining the veracity of testimony? Will police officers and detectives be able to use cloud-based mobile services like Truth Teller in real time during criminal investigations as they’re evaluating witness accounts? Should the Intelligence Community be running intercepts of foreign terrorist suspects’ communications through a massive look-up system like Truth Teller?

Perhaps, and time will tell how valuable – or error-prone – these systems can be. But in the next couple of years we will be developing (and be able to assess the adoption of) increasingly powerful semantic systems against big-data collections, using faster and faster cloud-based computing architectures.

In the meantime, watch for further refinements and innovation from The Washington Post’s prototyping efforts; after all, we just had a big national U.S.  election but congressional elections in 2014 and the presidential race in 2016 are just around the corner. Like my fellow citizens, I will be grateful for any help in keeping candidates accountable to something resembling “the truth.”

Petraeus as Ozymandias

I only met David Petraeus once before he came to CIA, in 2006 at U.S. Central Command while he was winding up his tour as commander of the Multi-National Security Transition Command Iraq (acronymically pronounced “minsticky”), and before he took command of MNF-I or CENTCOM, or the war in Afghanistan for that matter. I briefed him on something topical going on (I was still working at DIA at the time) and we certainly didn’t talk long. In fact I came away with only one impression: not so much about him, but about his already-well-commented-on entourage of “Petraeus guys.” He had a reputation as a fast-moving reformer, but it was an outsized group of admirers, I thought, who showed not respect for him, but devotion – even awe.

They weren’t alone; the man’s been compared as a military leader to “Ulysses S. Grant, John J. Pershing, George Marshall and Dwight D. Eisenhower” – and that was by his own boss! (That’s the comparison made by Chairman of the Joint Chiefs of Staff Adm. Mike Mullen last year when Petraeus retired from the military to join CIA.)

So, yes, news that the Director of the CIA had resigned because of an extramarital affair hit DC like a thunderclap yesterday.  Check out the volume of this twitter search for the prevailing phrase people uttered when they heard the news: “Holy shit.” It was almost comic that the news broke the same day that the new James Bond film opened in DC. Its plot features an intelligence agency director under personal assault and its title mirrors the mood of many in Langley today: “Skyfall.”

I’m not surprised by the fact that a powerful man was having an affair – heck, I did marry a divorce lawyer after all.  The news won’t affect intelligence operations immediately; the professionals at CIA and the intelligence community are still going about their business and tend to look forward to the horizon, not backward. Meanwhile journalists are already delving into the particulars of this peculiar turn of events. Pundits (and the Congressional intelligence oversight committees) will be exploring any linkages or ramifications of this scandal for the Benghazi investigations, and the candidates for Petraeus’s replacement are already making their direct or whisper campaigns known, in emails already bcc’ing around the Beltway. More on that in due time.

I only have two observations now, one larger in scope and one quite small, at human scale. The first is the question of what the scandal says about the intelligence security practices in our modern national security state. Petraeus held the highest security clearances. He earned the confidence of the President, the trust of his silent warrior employees, the endorsement of the U.S. Senate (94-0!) and the faith of a nation that had cheered his battlefield successes in the Iraq surge and in Afghanistan. Yet the CIA’s confidence in its director was undergirded not only by the Petraeus resume, but by our national security infrastructure of clearances, polygraphs, and professional investigators. Forget the question of one man’s integrity – he was living a lie, big-time, and we missed it. Completely. There will be many questions asked about what that means for other high government clearance-holders, but for now there’s a feeling prevalent in DC akin to what happens when a law-enforcement crime lab discovers shoddy mistakes: all previous convictions are under suspicion and, sometimes, verdicts are reversed. Something to ponder about CIA institutional analytic or operational judgment over the past year….

Secondly, I’m struck by the ironies in the personal side of this affair. David Petraeus grew up as a literature-loving son of a New England village librarian. I know this because I read his biography – yes, the hagiographic book All In: The Education of David Petraeus written by the woman at the center of the affair. Now I may be one of the few in DC who actually read the whole book when it came out – as in, I didn’t just flip through the index looking for the “good parts.”

The book has the literature-loving Petraeus actually quoting poetry at a pivotal point in his life. At his change-of-command ceremony, giving up his praetorian position in Afghanistan, Petraeus gave a thoughtful set of remarks and then chose to quote several lines from an obscure poem by young British soldier John Bailey, serving in Afghanistan in 2008. I say “obscure,” because until today the poem itself appears in only one spot on the Internet: a small U.K. site devoted to British war poetry.  Did poetry-lover Petraeus find the poem there himself, or was it simply good staff/speechwriter work? These are the words Petraeus used, in his “emotional” farewell to the wars he had led, and to his chosen career as a military leader:

And what is asked for the service we give?

No high praise or riches if we should live,

Just silence from friends, our name on a wall,

If this time around, it is I that fall.

- from “The Volunteer” by John Bailey

When Petraeus read out that poem, he was standing like Caesar astride a narrow world, a four-star general having “won” two wars in distant ancient lands and commanded USCENTCOM, whose mission area sprawls across Africa, the Middle East and Central Asia.

Perhaps this poetry lover knows Percy Bysshe Shelley well; perhaps like me in school Petraeus read Shelley’s Ozymandias, based on the ironic life of Ramesses II, mighty Egyptian pharaoh. One account writes, “Ramesses could have filled an ancient edition of the Guinness Book of Records all by himself: he built more temples, obelisks and monuments; took more wives (eight, not counting concubines) and claimed to have sired more children (as many as 162, by some accounts) than any other pharaoh in history. And he presided over an empire that stretched from present-day Libya to Iraq in the east, as far north as Turkey and southward into the Sudan.”

Yet Ramesses is mostly forgotten now, and Shelley’s poem about him captures the fall of great men in a short, powerful sonnet. When I first heard the news about Petraeus from my wife, this is the poem I thought of, and I believe its irony pairs with the lines Petraeus quoted quite sadly.

I met a traveller from an antique land

Who said: “Two vast and trunkless legs of stone

Stand in the desert. Near them on the sand,

Half sunk, a shattered visage lies, whose frown

And wrinkled lip and sneer of cold command

Tell that its sculptor well those passions read

Which yet survive, stamped on these lifeless things,

The hand that mocked them and the heart that fed.

And on the pedestal these words appear:

`My name is Ozymandias, King of Kings:

Look on my works, ye mighty, and despair!’

Nothing beside remains. Round the decay

Of that colossal wreck, boundless and bare,

The lone and level sands stretch far away”.

Harry Truman on BenghaziGate

As the New York Times is reporting today, “Secretary of State Hillary Rodham Clinton said Monday night that she took ‘responsibility’ for the failure to successfully defend against the Sept. 11 attack on the United States diplomatic compound in Benghazi, Libya.  ‘I take responsibility,’ she said in an interview with CNN.” 

The move is widely being interpreted, naturally, in light of the presidential campaign, as Secretary Clinton offering to take the fall for the blossoming political scandal over the deaths of the U.S. Ambassador to Libya and three other American officials in Benghazi last month, to take some pressure off of President Obama.

It is not publicly known (yet) whether Clinton’s move was coordinated by, or with, the White House, or the Obama reelection campaign.

The gambit reminded me, however, of something I read years ago while researching Cold War policies, in a transcript of a 1946 press conference by President Harry Truman.

President Truman and his desk sign, “The Buck Stops Here.”

Q. Mr. President, do you support the State Department’s policy that the United States should–

THE PRESIDENT. The State Department doesn’t have a policy unless I support it. [Laughter] finish your question–I’m sorry.

Q. I mean with regard to the inter-American defense treaty, that we will not sign it if Argentina–

THE PRESIDENT. I don’t know anything about any preliminary decision, or whether it will be signed or won’t be signed, but whatever policy the State Department has, I will support it, or it won’t be a policy. The State Department carries out the policies that are laid down by the President of the United States.

 

Some might note a contrast in leadership approaches.

 

 

Peering into North Korea’s Future: the Cyber Angle

Looking out over the DMZ into the drab proto-industrial North Korean villages along the border.

With the death of North Korean dictator and “Dear Leader” Kim Jong Il, I join the rest of the world in welcoming this early Christmas gift… at least I hope that it proves to be so.

Egypt’s Mubarak is gone but the country is less stable; post-Qadhafi Libya’s political course is still an open question. So uncertainty is the only safe prediction about North Korea’s near-term political environment. But no nation’s people have endured such unrelenting deprivations (mass starvation, no fuel) for so long in the post-World War II era.

I have no special insight into North Korea’s future. My only DMZ visit on the Peninsula, with a close-up look at Panmunjeom and beyond it “the last Stalinist state on earth,” was in 2006 (see my photos and observations here).

But I have noted the Western-education background (and apparently technologically-intensive current activities) of “The Great Successor,” Kim’s son Kim Jong-Un. One can understand the intense focus which Western governments have trained on the younger Kim’s background and activities, for any clues into his plans – and the plans of those who surround him, or potentially could rival him.

Only a year ago, in October 2010 SCIENCE Magazine published a short but interesting story on Kim Jong-Un, asking “Will Korea’s Computer-Savvy Crown Prince Embrace Reform?”

According to internal North Korean propaganda, informants claim, Kim oversees a cyberwarfare unit that launched a sophisticated denial-of-service attack on South Korean and U.S. government Web sites in July 2009. South Korea’s National Intelligence Service blamed the North, which has not commented publicly on the attack. Kim Jong Un’s involvement cannot be confirmed, says computer scientist Kim Heung-Kwang, founder of North Korea Intellectuals Solidarity, a group of university-educated defectors that raises awareness of conditions in the North… But it’s plausible: Kim claims that Kim Jong Un was tutored privately by a ‘brilliant’ graduate of Universite Paris X who chaired the computer science department at Kim Chaek University of Technology in Pyongyang before disappearing from public view in the early 1980s.” [emphasis added]

To get a feel for how the North’s military has gone about organizing for cyber activities, the best unclassified source I know of remains Christopher Brown’s 2004 Naval Postgraduate School thesis “Developing a Reliable Methodology for Assessing the Computer Network Operations Threat of North Korea.” Brown wrote, by the way, that his thesis was an attempt “to prove that a useful methodology for assessing the CNO capabilities and limitations of North Korea can be developed using only open source information” (emphasis added). Brown also wrote about the early personal role of Kim Jong Il’s eldest son Kim Jong Nam in establishing the priority of computer network operations among military activities (Nam once headed a North Korean intelligence agency, though in recent years he dissipated into a South-Park-like role as a casino-loving playboy).

More recently, there’s information on North Korea’s cyber hacking military units here, where StrategyPage.com concluded (in 2009) that “North Korea is something of a museum of Stalinist techniques. But it’s doubtful that their Internet experts are flexible and innovative enough to be a real threat.”

The contrary view, with a heightened state of alarm about North Korea’s capabilities and intentions, runs through Richard Clarke’s 2010 book Cyber War, where he recounts breathlessly the Soviet-Olympic-style recruitment of “elite students at the elementary-school level to be groomed as future hackers.” In a publicity interview for the book, Clarke told Forbes magazine: “if you ask who’s the biggest threat in the sense that they might use their abilities, it might be North Korea. First, they’re crazy, and second, they have nothing to lose.”  Even China’s People’s Daily English-language version carried a dire summary in December 2010 of North Korea’s aggressive cyber intentions, “Cyber Attack from Pyongyang: South Korea’s Nightmare?”

I hope and expect that cyber activities will not be the immediate focus of the new post-Kim Jong Il leader. Certainly regime transition and  consolidation of authority is the first priority. So far, two days after the actual death, we’re seeing a mannered roll-out of news and propaganda consistent with the clockwork transition from “Great Leader” Kim Il-Sung to his own son in 1994.

Everyone’s watching….

My stroll over to the far side of the famous Demilitarized Zone (DMZ) table, where I was testing the patience of the MP breathing down my neck.

Tech Trip to Argentina

With Luis Ruvira, President of the Argentine American Dialogue Foundation, after my speech at the Argentine Council on International Relations

I’m traveling in Argentina this week, on a trip sponsored by the U.S. Department of State in their official Speaker’s Program. The U.S. Embassy in Buenos Aires had requested of DoS an American technology speaker “who can talk about technology innovation and bleeding edge kinds of things.  The goal is to highlight the role that innovation and technology plays in creating a better society.” I was delighted to accept the invitation when asked by my friend Lovisa Williams of the State Department’s Internet Steering Committee.

Most of the trip is being spent in Buenos Aires, second largest city in South America – so large it is constitutionally recognized as an autonomous federal entity alongside the 23 Argentinian provinces, with its own government ministers and municipal administration. I am also enjoying side visits to Rosario and La Plata, large cities and provincial capitals. I’ll write about several aspects of the trip separately.

Working together to cram in a series of whirlwind meetings have been my excellent co-hosts, the U.S. Embassy and the respected Argentine American Dialogue Foundation. Below are the highlights of the visit, plucked from my official agenda:

Monday 9/19: Meeting with the Minister of Education for Buenos Aires city and visit to the Escuela Gauchos de Guemes school which is studying the social and educational benefits of having given each child their own netbook. Tour of the Universidad Abierta Interamericana (UAI) (the Open InterAmerican University), visiting their robotics labs, meetings with engineering students, and a separate meeting with authorities from the university and national civil servants. Meeting with Pedro Janices, National Director at the National Office for Information Technologies (executive-branch component of the President’s Office; Pedro has been called “the Argentine CIO,” and has worked with the first U.S. CIO Vivek Kundra.)

Tuesday 9/20: Public speech at the Argentina Council for International Relations (CARI, one of the most important think tanks in Latin America), topic: “Governments 2.0 and the impact of new technologies.” Lecture at the American Club of Buenos Aires, with participating companies from the American Chamber of Commerce of Argentina, members from the academic sector and public servants (including the Head of International Relations of the National Ministry in Science and Technology). Tour of the Supreme Court of Argentina, meeting with Deputy Chief Justice Highton, who was the first woman appointed to the Court (under a democratic government).  Videoconference lecture on “Innovation and Government” at the National Technological University (UTN), transmitted live to 13 campuses of the University in the interior of the country.

Wednesday 9/21: Trip to Rosario, second largest city in Argentina and capital of Santa Fe Province. Visit and tour of largest tech firm in Rosario, Neoris; lunch with Neoris Latin American President Martin Mendez.  Meeting with the Secretary of Production and Local Development for the city of Rosario, subject “Creating conditions for local technology-industry growth.” Meeting with Rocio Rius of the Fundacion Nueva Generación Argentina (Argentina New Generation Foundation). Lecture at the Universidad Abierto Interamericana (UAI) campus in Rosario on new technologies and their impact on government; audience of authorities and students from UAI and other universities, faculty from the Engineering School, and also local public servants.

Thursday 9/22: Trip to La Plata, capital city of Buenos Aires Province.  Meeting with Governor Daniel Scioli (Vice President of Argentina 2003-2007) and other provincial civil servants, including Undersecretary of Institutional Relations, Director of Interministerial Relations, and Chief of Cabinet.  Public Lecture at the National University of La Plata, guest of Dean of the Informatics Faculty.

Friday 9/23: Participate in opening ceremonies in Buenos Aires of the IX Congreso Internacional en Innovación Tecnológica Informática (CIITI, Ninth International Congress on IT Innovation). Visit to Universidad Argentina de la Empresa, (UADE, Argentine University of Enterprise), meetings with faculty/students from Government, Law, and Engineering departments, and tours of laboratories. Lecture at the American Club of Buenos Aires. Meeting with Director of the Business School at Argentine Catholic University, and Dean of the Faculty of Economic Sciences. Private meeting at Embassy with U.S. Ambassador Vilma Martinez. Panel speaker on “Ciberculture Y Gobierno” (Cyber-culture and Government) at the IX Congreso CIITI with international panel.

I’ve been on several other State Department-sponsored trips before (to Mexico and, many years ago near the end of the Cold War, to the Soviet Union), but I must say that this frenetically busy jaunt through lovely Argentina may be my favorite. I’ll write more over the next few days.

Share this post on Twitter

Email this post to a friend

Follow

Get every new post delivered to your Inbox.

Join 6,248 other followers

%d bloggers like this: