Quantum Computing and Counterintelligence Posted By N.M. Guariglia On February 13, 2011
The United States intelligence community has four strategic functions. The first is collection, or the gathering of raw data through a whole host of means. The second is analysis, or providing policy makers with interpretations and estimations regarding this data. The third is covert action, or espionage - the James Bond-stuff midway between diplomacy and war. The fourth function is counterintelligence: efforts to protect data, information, and U.S. intelligence from foreign adversaries and intelligence services. Since the CIA's formation in 1947, each function has gradually obtained more tools, more methods, and thus more responsibilities. The satellite changed the nature of collection. Surveillance systems changed the nature of espionage. And so forth. At the beginning of 2011, the intelligence community may have bitten off more than it ought to chew. It is unfair and unwise to task an overwhelmed bureaucracy to keep up with the exponential pace of technology. This trend is occurring most haphazardly within the realm of counterintelligence. Technology is a fine servant but a dangerous master. It changes in unpredictable ways. It redefines the boundaries of human potential. It compels us to reevaluate the nature of secrecy and our notions of privacy. The recent WikiLeaks controversy is small potatoes, the tip of the iceberg. The Stuxnet computer worm, though mysteriously advantageous in our efforts against the Iranian nuclear program, is the most advanced piece of malware <http://uk.reuters.com/article/idUKTRE68N3PT20100924> [1] ever discovered. It could turn its sights elsewhere. It could change everything. Then there's quantum computing <http://www.slate.com/id/2082874/entry/2082958> [2]. Moore's Law states the capabilities of microprocessors double every 18 months. In ten to twenty years, this law will likely collapse. Silicon Valley will go quantum. Circuits will be measured on a molecular and atomic scale. Computers will be infinitely more powerful than they are today. According to Michio Kaku, quantum physicists today can conduct simple multiplication problems with just seven atoms. In the near future, when millions of atoms are able to be utilized, no CIA code will be safe <http://www.youtube.com/watch?v=PW8rgKLPHMg> [3]. This is the technological trajectory of the world. There is a great debate as to whether or not cyber-warfare is the fifth domain of war (along with land, sea, air, and space). Some believe cyber-warfare is merely a tactic <http://www.wired.com/threatlevel/2010/03/schmidt-cyberwar/> [4] within the framework of the preexisting domains of war, much like terrorism. Others believe it is a new dimension altogether, requiring our attention and unwavering vigilance. Former DNI Mike McConnell wants to go so far as to "reengineer the Internet <http://www.washingtonpost.com/wp-dyn/content/article/2010/02/25/AR201002250 2493.html> [5]." Though much of this is turf-battle infighting, it is a fact that the Chinese have conducted cyber-operations <http://www.economist.com/node/16478792> [6] against the United States. In a bipolar context like the Cold War, U.S. counterintelligence would be tasked with keeping pace. But the twenty-first century will be very unlike the twentieth-century. Our enemies, whether big powers like China or networks like al-Qaeda, will always undertake that metamorphosis which best exposes our soft underbelly. The underlying premise of counterintelligence this century, therefore, is not who we shall encounter but rather what we shall encounter. Suppose a quantum computer in 2025 can break every CIA code. It's safe to say that this technology won't remain confined. Someone will pay top dollar for it. Due to an American-created global market, the natural lifespan of technology leads to its eventual dissemination throughout the world; it becomes cheaper and more plentiful. Such is the history of war between the West and its unfree enemies, the latter having grown parasitic on Western technology they did not create and cannot adequately use on their own accord. This is part of the dangerous irony of living in an open and democratic society. We develop astounding technologies for national security purposes. These technologies eventually transcend their initial purpose and enter the marketplace. They become commercialized for the betterment of our society and are then sold in the global market to other countries. In short, our military technology matures and is put to a civilian purpose, whereas other nations - perhaps hostile to us - take the civilian-version of that technology and put it to military purpose. This fosters an international environment of parity and equilibrium. And we should expect this to continue. Is it too far of a stretch to infer that a super-secret CIA document on Stalin from 1949 looks somewhat similar to Wikipedia's page on Stalin? Information that was once hard to collect is now easy to collect (and will grow easier). Francis Gary Powers' U-2 spy plane has given way to Google Earth. Open-source information and photo-imagery intelligence is prevalent throughout the Internet. Digital banking is a reality. Cloud-computing, according to some futurists <http://www.computerworlduk.com/advice/applications/1610/clouds-and-storms-n icholas-carr-on-cloud-computing/> [7], will have the same impact as electricity generators had on the frozen water trade in the early twentieth-century. The implication for counterintelligence is clear. The CIA should become more of a "De-Centralized" Intelligence Agency, deferring to private companies with expertise in nanotechnology, encryption codes, and particle physics. But this alone will not suffice. We may soon reach a tipping point when twentieth and even nineteenth-century intelligence tactics regain their operational relevance. When the grid goes down, or when anyone can get on the grid, it might be time to take stuff off the grid. Counterintelligence might need to go back to its roots; when files were kept in file cabinets; when secrets weren't encrypted or coded, but were kept in their most pure form - in the mind and conscience of a loyal individual. _____ Article printed from Pajamas Media: http://pajamasmedia.com URL to article: http://pajamasmedia.com/blog/quantum-computing-and-counterintelligence/ URLs in this post: [1] most advanced piece of malware: http://uk.reuters.com/article/idUKTRE68N3PT20100924 [2] quantum computing: http://www.slate.com/id/2082874/entry/2082958 [3] no CIA code will be safe: http://www.youtube.com/watch?v=PW8rgKLPHMg [4] merely a tactic: http://www.wired.com/threatlevel/2010/03/schmidt-cyberwar/ [5] reengineer the Internet: http://www.washingtonpost.com/wp-dyn/content/article/2010/02/25/AR2010022502 493.html [6] Chinese have conducted cyber-operations: http://www.economist.com/node/16478792 [7] according to some futurists: http://www.computerworlduk.com/advice/applications/1610/clouds-and-storms-ni cholas-carr-on-cloud-computing/ [Non-text portions of this message have been removed] ------------------------------------ -------------------------- Want to discuss this topic? Head on over to our discussion list, [email protected]. -------------------------- Brooks Isoldi, editor [email protected] http://www.intellnet.org Post message: [email protected] Subscribe: [email protected] Unsubscribe: [email protected] *** FAIR USE NOTICE. This message contains copyrighted material whose use has not been specifically authorized by the copyright owner. OSINT, as a part of The Intelligence Network, is making it available without profit to OSINT YahooGroups members who have expressed a prior interest in receiving the included information in their efforts to advance the understanding of intelligence and law enforcement organizations, their activities, methods, techniques, human rights, civil liberties, social justice and other intelligence related issues, for non-profit research and educational purposes only. We believe that this constitutes a 'fair use' of the copyrighted material as provided for in section 107 of the U.S. Copyright Law. If you wish to use this copyrighted material for purposes of your own that go beyond 'fair use,' you must obtain permission from the copyright owner. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtmlYahoo! Groups Links <*> To visit your group on the web, go to: http://groups.yahoo.com/group/osint/ <*> Your email settings: Individual Email | Traditional <*> To change settings online go to: http://groups.yahoo.com/group/osint/join (Yahoo! ID required) <*> To change settings via email: [email protected] [email protected] <*> To unsubscribe from this group, send an email to: [email protected] <*> Your use of Yahoo! Groups is subject to: http://docs.yahoo.com/info/terms/
