Modern field guide to security and privacy

Podcast: Half-life of secrets, golden age of surveillance, and the US military's Starship Enterprise

On The Cybersecurity Podcast, Passcode's Sara Sorcher and New America's Peter Singer interview leading privacy and Internet scholar Peter Swire and Palo Alto Networks' Chief Security Officer Rick Howard. 

|
Eddie Keogh/Reuters
A detail from graffiti art is seen on a wall near the headquarters of Britain's eavesdropping agency, Government Communications Headquarters. British media have attributed the new work to acclaimed British street artist Banksy, as a spoof on recent government spying scandals exposed by former U.S. National Security Agency contractor.

Is law enforcement "going dark" in its pursuit of criminals and terrorists as default security protections for consumer devices get stronger, or does the proliferation of technology and expansion of online communications mean we're living in a Golden Age of Surveillance?

What more could the US do to reform its surveillance practices? Why is it so difficult for the government to keep secrets in the Digital Age – and will the threat of leakers such as Edward Snowden exposing classified surveillance programs persist? 

Leading privacy and cyberlaw scholar Peter Swire joins New America’s Peter Singer and Passcode’s Sara Sorcher to answer all those questions and more on The Cybersecurity Podcast

"A thumb drive holds more than a mainframe did not that long ago," said Mr. Swire, a professor at Georgia Institute of Technology who also served on President Obama’s Review Group on Intelligence and Communications Technology.

"You can walk out of a facility with a thumb drive. You can post things through WikiLeaks – and you don't have to have The New York Times decide whether they want to print it," Swire continued. "And when we think about the Internet of Things and sensors everywhere, going somewhere secretly without a camera seeing you – and then big data analytics seeing the patterns when they've done it – these technology trends really make it harder to have your activities be secret." 

Rick Howard, chief security officer for Palo Alto Networks and an Army veteran, joins the podcast to weigh in on the line between spying for economic advantage and state secrets. He also discusses whether companies should be able to strike back when they’re under cyberattack – and if proposed threat information-sharing plans will be effective. He also shares stories about how the military, in the early days of cybersecurity, took a stab at recreating science fiction. 

The podcast is cohosted by Peter W. Singer, strategist at the New America think tank and author of "Cybersecurity and Cyberwar: What Everyone Needs to Know," and Sara Sorcher, deputy editor of The Christian Science Monitor's Passcode. The podcast is available for download on iTunes. You can find more information about the podcast on Passcode's long-form storytelling platform. Bookmark New America's SoundCloud page for new episodes or sign up for Passcode below.

In previous episodes, The Cybersecurity Podcast team interviewed Katie Moussouris, chief policy officer for HackerOne, about ways to incentivize hackers to report vulnerabilities they find and whether stunt hacking – such as when two security pros compromised a Jeep Cherokee while a reporter was driving it – is the only way to draw attention to cybersecurity issues. They also spoke with Brunswick Group's Siobhan Gorman about the "golden rules" companies should follow when disclosing they've been breached. 

Singer and Sorcher also spoke with Cory Doctorow – science fiction author, journalist, and coeditor of Boing Boing – about the lessons about cyber conflict that can be learned from science fiction and whether young people even care about the mass collection of their personal online data by governments and countries. Dan Kaufman, who at the time was head of the Defense Advanced Research Projects Agency's Information Innovation Office, also joined the podcast to discuss what it's like to run the part of the Pentagon's futuristic arm responsible for anticipating future cyberconflict and developing new Internet technologies. 

Previous episodes have also included guests such as Bruce Schneier, prolific author and chief technology officer at Resilient Systems; Nate Fick, the chief executive officer of Endgame, a venture-backed security intelligence software company; and Wired's Kim Zetter, author of "Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon.

The team also interviewed Alex Stamos, who at the time was Yahoo's chief information security officer, and Heather West of Internet performance and security company CloudFlare.

Lt. Gen. Edward Cardon, the Army's top cyber commander, and Shane Harris, reporter at The Daily Beast and author of '@War, The Rise of the Military-Internet Complex,' joined for the first episode. 

You can find the episodes on New America's SoundCloud page and they are available for download on iTunes. 

 

You've read  of  free articles. Subscribe to continue.
Real news can be honest, hopeful, credible, constructive.
What is the Monitor difference? Tackling the tough headlines – with humanity. Listening to sources – with respect. Seeing the story that others are missing by reporting what so often gets overlooked: the values that connect us. That’s Monitor reporting – news that changes how you see the world.

Dear Reader,

About a year ago, I happened upon this statement about the Monitor in the Harvard Business Review – under the charming heading of “do things that don’t interest you”:

“Many things that end up” being meaningful, writes social scientist Joseph Grenny, “have come from conference workshops, articles, or online videos that began as a chore and ended with an insight. My work in Kenya, for example, was heavily influenced by a Christian Science Monitor article I had forced myself to read 10 years earlier. Sometimes, we call things ‘boring’ simply because they lie outside the box we are currently in.”

If you were to come up with a punchline to a joke about the Monitor, that would probably be it. We’re seen as being global, fair, insightful, and perhaps a bit too earnest. We’re the bran muffin of journalism.

But you know what? We change lives. And I’m going to argue that we change lives precisely because we force open that too-small box that most human beings think they live in.

The Monitor is a peculiar little publication that’s hard for the world to figure out. We’re run by a church, but we’re not only for church members and we’re not about converting people. We’re known as being fair even as the world becomes as polarized as at any time since the newspaper’s founding in 1908.

We have a mission beyond circulation, we want to bridge divides. We’re about kicking down the door of thought everywhere and saying, “You are bigger and more capable than you realize. And we can prove it.”

If you’re looking for bran muffin journalism, you can subscribe to the Monitor for $15. You’ll get the Monitor Weekly magazine, the Monitor Daily email, and unlimited access to CSMonitor.com.

QR Code to Podcast: Half-life of secrets, golden age of surveillance, and the US military's Starship Enterprise
Read this article in
https://www.csmonitor.com/World/Passcode/2015/0820/Podcast-Half-life-of-secrets-golden-age-of-surveillance-and-the-US-military-s-Starship-Enterprise
QR Code to Subscription page
Start your subscription today
https://www.csmonitor.com/subscribe