Your Undivided Attention - The Invisible Cyber-War

Episode Date: August 4, 2022

When you hear the word cyber-attack, what comes to mind? Someone hacking into your email, or stealing your Facebook password?As it turns out, our most critical infrastructure can be hacked. Our banks,... water treatment facilities, and nuclear power plants can be deactivated and even controlled simply by finding bugs in the software used to operate them. Suddenly, cyber-attack takes on a different meaning.This week on Your Undivided Attention, we're talking with cyber-security expert Nicole Perlroth. Nicole spent a decade as the lead cyber-security reporter at The New York Times, and is now a member of the Department of Homeland Security’s Cybersecurity Advisory Committee. She recently published “This Is How They Tell Me The World Ends” — an in-depth exploration of the global cyber arms race.CORRECTIONS: In the episode, Nicole says that "the United States could have only afforded 2 to 3 more days of Colonial Pipeline being down before it ground the country — our economy — to a halt." The correct number is actually 3 to 5 days. She also refers to a 2015 study researching why some countries have significantly fewer successful cyber-attacks relative to cyber-attack attempts. That study was actually published in 2016.RECOMMENDED MEDIA This Is How They Tell Me The World EndsNicole Perlroth’s 2021 book investigating the global cyber-weapons arms raceReporter Page at the New York TimesNicole’s articles while the lead cyber-security reporter at the New York TimesThe Global Cyber-Vulnerability Report (in brief)Brief of a 2015 study by the Center for Digital International Government, Virginia Tech, and the University of Maryland that researched why some countries have significantly fewer successful cyber-attacks relative to cyber-attack attemptsRECOMMENDED YUA EPISODES The Dark Side Of Decentralization with Audrey Kurth Cronin: https://www.humanetech.com/podcast/49-the-dark-side-of-decentralizationIs World War III Already Here? Guest: Lieutenant General H.R. McMaster: https://www.humanetech.com/podcast/45-is-world-war-iii-already-hereA Problem Well-Stated Is Half-Solved with Daniel Schmachtenberger: https://www.humanetech.com/podcast/a-problem-well-stated-is-half-solvedYour Undivided Attention is produced by the Center for Humane Technology. Follow us on Twitter: @HumaneTech_

Transcript
Discussion (0)
Starting point is 00:00:00 In 2021, there is a cyber attack on the colonial pipeline, the largest pipeline system for refined oil in the U.S., carrying 3 million barrels of oil per day between Texas and New York. The United States could have only afforded two to three more days of colonial pipeline being down before it ground the country, our economy, to a halt. That's Nicole Pearlroth. She spent a decade as the lead cybersecurity reporter at the New York Times. It was because Colonial Pipeline paid this ransom and the criminal group honored their hostage note that they were able to eventually get these operations back up and running. But it is worth pausing to think that all it would take to bring the world's richest economy to its knees is one stolen password.
Starting point is 00:00:53 That is what it took. This is what a bumbling cybercriminal group could do. think of what a nation-state could do in this space. As Nicole intimately understands, bumbling cybercriminals and nation-states alike can bring entire economies to their knees through the mere identification of bugs in our software. So as software eats the world,
Starting point is 00:01:18 fragility eats the world. I'm Tristan Harris. And I'm Azaraskin. And this is your undivided attention, the podcast from the Center for Humane Technology. Nicole Perloth is a member of the Department of Homeland Security's Cybersecurity Advisory Committee. She recently published, This is How They Tell Me, The World Ends, an in-depth investigation of the global cyber arms race.
Starting point is 00:01:45 Nicole, welcome to the show. Thanks so much for having me, Tristan. We are really big fans of your work here, and we have not covered on this podcast the aspect of cyber defense, cyber offense, cyber weapons, but it actually links very closely. You know, people know us for our work on the social dilemma, social media, which is a kind of way in which to always invoke E.O. Wilson's problem statement that the fundamental problem of humanity is we have paleolithic emotions, medieval institutions, and 21st century accelerating godlike technology. I was adding some words there. But the speed of the tech moving faster than our institutions is one of the
Starting point is 00:02:26 main overarching issues, and social media is one aspect of that. We've not yet covered on this show cyberweapons. And just to kind of like frame this up before we get into the whole conversation, we often talk about how, as we look at the world moving forward, there's sort of these two attractors. It's like a bowling alley. And on one side of the bowling alley, we have all this new technology that's moving faster and faster and faster, and the cost of that technology is going down and down and down and into more and more hands. So we have synthetic biology that's available to more people. We have artificial intelligence that's available to more and more people. We have viral tweets that can be spreading ideas memetically or through information warfare to more and more
Starting point is 00:03:06 people in that capacity is being decentralized. So we call that the chaos side of the gutter of the bowling alley. And then in response to that is another gutter called oppression, which is the let's lock everything down and make sure no one can do anything with anything. We don't want people to have synthetic gene printers in their basement. We don't want people to have CRISPR. We don't want people to have social media where they can reach millions of people. So let's create a free speech monitoring top-down system that monitors what people say or the China's model of censorship.
Starting point is 00:03:33 And so these two attractors, these two sides of the bowling alley, in framing that up, again, we have not yet talked about in this program, the history of the cyber weapons arms race. And that this is really a critical and an important aspect of how the world is going to have to navigate itself if we want to find this third attractor of some kind of digital open society that is able to somehow bind or control this decentralized power that's available in more and more hands, but not create these totalitarian societies you don't want to live in. So with that said, we are so excited to have you on and maybe starting with a story. I know you had this special kind of salmon dinner in Las Vegas and I think it would be helpful for maybe listeners to hear.
Starting point is 00:04:14 How did you get into this and how did that dinner in Las Vegas kind of? lead you to do this. So one correction is that it was actually in Miami. Most hacking conferences are in Las Vegas, Black Hat, DefCon, all in Las Vegas. This conference that you're referring to is a very special subset of the cybersecurity industry. S4 is the name of the conference. And every year in Miami, they pull together industrial cybersecurity experts, people who specifically focus on the cybersecurity.
Starting point is 00:04:47 of the software that makes its way into pipelines, nuclear plants, hospitals, water treatment facilities, the power grid. And I was invited to this conference. And I show up. And the first night, the conference organizer, who's a former NSA codebreaker named Dale Peterson, invited me to dinner. And we go to this dinner in Miami. And it's Dale. It's a person named Ralph Langner, who was a German industrial control security specialist. So I was sitting next to Ralph. And then on the other side of the table were two Italian hackers who had a very interesting business model. And they searched for bugs in the software that makes its way into industrial systems. And they sold them to anyone. And so the question on my mind was,
Starting point is 00:05:46 was who are you selling these two? And maybe more importantly, who will you not sell these two? I really wanted an answer. Because what they were doing was they weren't just selling bugs in Internet Explorer. They were selling bugs that could be used by bad actors to shut down a pipeline, trigger an explosion at a pipeline, shut down the grid, shut down a pacemaker. The possibilities were endless. So I kept asking this question, who do you sell to? And they wouldn't answer. And finally, I said, okay, well, who won't you sell to? Iran, North Korea, China. And of the two, Luigi had the better English. And you could tell he was just sitting there thinking about my question, staring at his plate. And finally, he said, Nicole, I could answer your question, but I'd rather talk about my
Starting point is 00:06:44 salmon. And at that moment, Ralph just exploded because here is a guy whose job it is to try to plug basically every one of these bugs and vulnerabilities and protect these critical systems who had seen just how many more systems were still vulnerable. And the Italians were clearly making his job a lot harder. And so he just exploded at the table. And the way I remember it is he said, Nicole, these men are young. They have no idea what they're doing. They have no idea that one day they might have blood on their hands. And then he turned back to Luigi and Donato and said, but tell us, tell us about your fucking salmon. And from that point on, the fucking salmon just percolated in my head for years and years and years until the point where I said, I have to write a book just about this market for
Starting point is 00:07:41 bugs and where it's going and just how many players beyond the usual suspects are now buying these bugs because the reality is that 20 years ago there were only a few players that had the people with the knowledge and the skill sets to find these critical bugs and to exploit them in such a way that not only were they powerful tools for intelligence and counterintelligence and espionage, but sabotage and destruction. And unfortunately, because of this market for bugs, the number of players who can play in that space is endless because even if you don't have the people with the skills or the tools, you can now buy them from the Luigi's and the Donados of the world.
Starting point is 00:08:38 And what really sucked me in was the question of morals. Who can sell these? Who are they selling them to? Who don't they sell them to? How do they sleep at night? How do they know how they will get used or how they won't get used? I couldn't believe that there was a market out there for these tools, for the raw material, for cyber weapons and spyware, and nobody was willing to talk about it or answer any kind of basic questions.
Starting point is 00:09:06 And so that is what led me down this road. You know, one of the things I have to say, Nicole, is as I've listened to your work, the number of times I've had to pause and absorb what you say. And I realized a big part of the problem is the language that is being used. Like, I've heard you say the word bug, bug, bug, bug, but to me what a bug is, is like my iPhone glitches out, like my computer doesn't start as fast. Like the font is a little bit weird. it's not in the same class as a thing
Starting point is 00:09:36 that a person can hit a button one side of the world and create an explosion in a petrochemical plant in another side of the world. That's like a different thing. Same thing with cyber. It's like I've been hearing
Starting point is 00:09:45 about cyber attacks and ransomware attacks for a while but it wasn't until I really hit pause on your podcasts and listen that I realize these aren't actually cyber attacks. It creates explosions in the physical world and every time we say the word cyber
Starting point is 00:09:58 it's obfuscating the true impact. And so I'm just curious to hear you react to that? Like, is that true? Is that like a frustration that you have? And then are there other better ways that we could talk about this that elevates its importance? So it actually fits the physiological like folds of our minds? Yeah, it's such a good question. So when I got on this beat, everyone hated the term cyber pearl harbor. Everyone was warning of a cyber pearl harbor. But most of the people in the cybersecurity industry said that fear-mongering. You're scaring people to sell your security software. And unfortunately, that is a
Starting point is 00:10:39 real dynamic. But there is another reality that has become very clear, which is that, okay, maybe we don't use the word cyber Pearl Harbor. Maybe that's fraught. Maybe we actually use the word cyber Fukushima, because that's what is happening here. I have seen Russian hackers probe our nuclear plants. And they are not there for intellectual property theft. They are probing these plants for bugs in the software that touches these critical systems, just like Stuxnet did. And it's worth actually just lingering on Stuxnet for a second. Stuxnet is a cyber weapon that was co-developed by the NSA and Israel around 2006 to infect Natanz, which was Iran's nuclear facility.
Starting point is 00:11:32 It exploited bugs in Microsoft and Siemens Industrial Control Software in order to control the speed of nuclear centrifuges. The NSA in Israel somehow got someone carrying a USB drive that had Stuxnet to walk into Natanz and plug in the USB drive, which unleashed the code. If you were an engineer at Natanz, everything looked like it was functioning perfectly. But over a period of months, Stuxnet took out one-fifth of Iran's uranium supply. And then Stuxnet got out, which is how people realized what the U.S. and in Israel had done. It ended up infecting hundreds of thousands of systems worldwide, including those of American companies like Chevron.
Starting point is 00:12:13 It was designed not to damage systems that were not anton's, but it still infected them. On the one hand, Stuxnet was an extraordinary counterproliferation effort involving no physical warfare or bombs or weapons. On the other hand, it showed the world what was possible, with bugs, code. And so since then, over the last 10 years, I actually joined the times in 2010, the year Stuxnet got out. And what I covered over the next 10 years was the post-Stuxnet era, this era in which every government on the planet and cybercriminal groups woke up to the potential for code, both for espionage and destruction, and started investing in the development. of or acquiring offensive cyber attack tools. And the raw material for those tools is bugs in the
Starting point is 00:13:09 code, bugs in iOS, Apple, iPhone software, bugs in Schneider Electric's safety locks, the very thing that prevents some kind of explosion at an oil facility or a petrochemical plant. And I started covering attacks where actors like Russia's GRU or others were caught using these bugs. We're started seeing nation states conducting attacks using these bugs in the code. And so the cat really was out of the bag. And that is why it was critical, I think, to call this out that we are now living in the post-Stuxnet era, because most Americans still don't even know what Stuxnet is. They don't realize the Pandora's box that was opened in 2010. And then to my earlier point about the fact no one wanted to talk about this. We needed to talk about this because clearly when software is now
Starting point is 00:14:04 eating the world, you know, as Mark Andreessen says, well, no one paused to say, is that a good thing? You know, are there some systems that are so critical to our lives, our safety, livelihood, freedom, that maybe we shouldn't be baking buggy software into those systems? And the reason governments like ours were stockpiling these bugs was justified by national security. We need these bugs because we need to shut down Iran's nuclear enrichment program. We need these bugs because we need to be able to spy on this Russian official or this Chinese official or terrorists. The problem is that 25 years ago, if the NSA found a bug in Chinese software, a Russian software, and held on to it, didn't disclose it. There would be no foul,
Starting point is 00:15:02 no harm to Americans because we weren't using that software. Today, for the most part, with a few exceptions, we are all using the same software. So when a government like ours holds on to a bug in Apple iOS software or Siemens Industrial Software or Schneider Electric software, they're not just holding on to it for their own operations. They are necessarily leaving their own people vulnerable and also increasingly our own critical infrastructure vulnerable as software started making its way into these critical systems. I'd love for you to tell the story of the colonial pipeline, which this is another one moment where I had to pause your podcast and I'm like, oh, this was a successful attack against the U.S. that all,
Starting point is 00:15:52 Only via the good graces of the people that attacked us, it could have taken the entire U.S. down. Yeah, so one of the issues with this space is that it truly is asymmetric. I don't think people realize the United States is now among the most targeted countries by cyber attacks. And you could argue among the most vulnerable because we have such a, wide, complex attack surface now that we have plugged software into everything we do. And most of the people who are just putting the software in are not thinking about how it could be abused or used against them. So some of the worst attacks we've seen aren't even these
Starting point is 00:16:44 sophisticated bugs that trade in these underground market, which are called zero days. Zero days are bugs in software that the software company doesn't know about. That's why they're called zero days, because the second they're exploited against people who use the software, the software company has zero days to fix them. A zero-day exploit is therefore a cyber attack that uses zero-day bugs. So some of the worst attacks we've seen aren't even the sophisticated bugs. bugs that trade in these underground market, which are called zero days. They're configuration errors. They are someone not turning on two-factor authentication. And that is the story of
Starting point is 00:17:29 Colonial Pipeline. A bumbling cyber criminal group didn't even have to develop the code themselves. They actually rented ransomware code from a criminal group that rents out ransomware as a service. they rented it out and they used it to breach colonial pipeline and hold colonial pipeline's business network hostage. How did they get in? Because colonial pipeline forgot to deactivate an old employee account. That employee had a password and the company had not enabled multi-factor authentication. So all it took for this criminal group to hold colonial Pipeline Systems Hostage was a stolen password. They didn't actually get into the pipeline. That's important. They got into the IT systems. They didn't get into what's called the OT systems, the
Starting point is 00:18:26 operation. But they hijacked their network in such a way that Colonial Pipeline couldn't get billing information, that their confidence in their operation was so shaken. They weren't sure whether it was possible for these cyber criminals to hold hostage the pipeline itself. So the company actually took the preemptive step of shutting down the pipeline. And we all saw what happened next on TV, where we saw people panic buying at the pump. We saw people trying to fill up plastic garbage bags with gas. We saw nonstop flights get grounded. But what you didn't see is something I got in my reporting with David Sanger on this attack, which was a confidential Department of Energy Assessment that concluded that as a country, the United States could have only afforded
Starting point is 00:19:22 two to three more days of colonial pipeline being down before it ground the country, our economy, to a halt. And it was interesting. It was not so much the oil or the gas. It was the diesel required to run our factories. If you couldn't run our factories and manufacturing, we were in trouble. And it was because Colonial Pipeline paid this ransom and the criminal group honored their hostage note that they were able to eventually get these operations back up and running. But it is worth pausing to think that all it would take
Starting point is 00:20:04 to bring the world's richest economy to its knees, is one stolen password. That is what it took. And unfortunately, I would love to tell you that colonial pipeline is the outlier. Unfortunately, they are very indicative of the sad state of America's cybersecurity and cyber defenses. That is how unprepared we are. This is what a bumbling cybercriminal group could do. Think of what a nation state could do in this space. Think of what if a nation state decided not to bring the operation back up and running or they didn't just hit one colonial pipeline, but five colonial pipelines. Then you start getting into a new realm where these are also powerful psychological tools. Right now, we are all complaining about
Starting point is 00:20:57 the spike in gas prices. And it is looking like it will have a huge effect on the upcoming midterm elections. This is what people care about most apparently in America. Think about a coordinated Russian attack on the equivalent of five colonial pipelines, which is entirely possible, and what that would do to influence an election or to influence Western support for the sanctions that we are putting in place against Russia for their invasion in Ukraine. And you start to see that it's not necessarily the Pearl Harbor, the explosions that are the most likely scenario or it would even be the most effective,
Starting point is 00:21:39 it would be sort of these coordinated, stealthy attacks on our pipeline systems that would shut them down and become a huge psychological, political tool. Those are the ones I really worry about. Or a leak at a nuclear plant where it's not entirely clear who started it. It would take time to pinpoint how it began and who was behind it.
Starting point is 00:22:00 And you start to see just how much more pernicious a cyber attack could be than some of the traditional attacks that we talk about in the realm of Pearl Harbor or 9-11. There's just so much to impact with everything you're sharing. One is the stakes, and to A's point about language, I think when we call it a cyber attack or a bug in code, what if we called it a hospital attack,
Starting point is 00:22:28 a chemical plant attack, a water system attack, a nuclear power plant attack, an oil pipeline attack, air traffic control system attack. You start to get a different picture of what these things are when we don't talk about them as bugs in code, but in terms of the systems that they're affecting. And to your point, we are rapidly wanting to digitize just about every single vein in our central nervous system
Starting point is 00:22:50 of our economy. And part of that, actually, it's interesting, it's also linked to economic risks, right? Because actually economic growth, we make a lot more money when we can sell people's stuff that's like the digital version of the thing they have. So why don't you want the digital lights for your house, the digital heating system, the digital energy system,
Starting point is 00:23:06 and economic growth comes with that. But basically, as we are digitizing our society, to the point of Mark and Driesen's software eating the world, we are making our society fragile. So when software eats the world, fragility eats the world. And so the trend of market incentives driving a mass digitization, which basically going from analog, slightly more secure infrastructure,
Starting point is 00:23:26 to a mass attack surface area that is digitized, where they're not incentives, because the company that tries to make sure, that security is embedded in their thing if they get out competed by another company that's going faster and has raised to market dominance. So the company that gets their first is often the one that wins
Starting point is 00:23:43 and so the way to get there first is to not do it with all the security stuff baked in unless you're incentivized to do so. So we end up in this growing attack surface area combined with the lower and lower cost to actually hack that surface area and then a kind of oblivious
Starting point is 00:23:59 public because this is not legible in a simple way to everyone. And so just framing some of that up, it just makes you pause and think about which world we're really living in. And this again gets back to paleolithic emotions, medieval institutions, because where is the regulation and the protection? And is that even possible when the speed of the technology means that generally speaking, the way to keep winning is to just move faster and faster in the arms race, which basically means moving faster and faster into danger? I'd love to also name what the stakes of this are. You're talking about the colonial pipeline and
Starting point is 00:24:32 hey, we were only two days away from basically being brought to our knees. Give us a taste of what happened maybe in Ukraine. So there's a little bit more of an experiential sense for listeners, maybe. Yeah, and just as you were talking, I was thinking, it's not just software eats world, not to pin everything on Mark Andreessen and Mark Zuckerberg, the Marx, but it's been a collision over the last 10 years of move fast and break things and software eats world.
Starting point is 00:24:57 There were no incentives to say, slow down, make sure your code is secure, check your mistakes, because your code is going to be used in systems that would allow for massive breaches of people's personal data and increasingly an active sabotage on our critical infrastructure. No one was talking about that threat model. So for years, Ukraine really has been Russia's test kitchen for a lot of different attacks. You know, they've had fishing attacks. They've had attacks on their media organizations. They've been a testing ground for disinformation campaigns and propaganda. The attack that I don't think people discuss enough was an attack in 2017 called Not Petcha. Sometime between 2016 and 2017, someone appeared on
Starting point is 00:25:52 Twitter and they claimed to have hacked the NSA and to have stolen the NSA zero days, these bugs. And over the course of several months, they started dribbling out these bugs and information about what the NSA had, some of their most coveted offensive cyber tools. And within weeks of that release, there was a gigantic ransomware attack by North Korea that hijacked systems all over the world. A month later, we saw Russia use that same stolen NSA, zero-day exploit, in what initially appeared to be a a ransomware attack on Ukrainian government agencies, but was not a ransomware attack because even if you paid, there was no way to get your data back. And that attack didn't just hit Ukrainian government ministries. It hit the railway systems. It got into the radiation monitors at the old Chernobyl nuclear site. And it didn't just hit Ukraine. It hit any company that had even a
Starting point is 00:26:58 single employee working remotely in Ukraine. So it hit Merck. The untold story, actually, of that attack is what happened to Merck. Merck had an existential crisis. They had to tap into the CDC's emergency supplies of the Gardasil vaccine that year because their vaccine production lines were completely paralyzed in that attack. I think with the escalation of Russia's invasion into Ukraine with the support that the West has given Ukraine. At some point, Putin will respond. And I think the most likely avenue for some kind of retaliation is a cyber attack similar to what happened with Not Petcha. It was interesting when Not Petcha happened. I went to Ukraine because, again, this is the test kitchen. And what the Ukrainian said to me after I spent weeks kind of going through the
Starting point is 00:27:52 inards of these attacks and understanding what this is. true impact was, was this. They said, listen, we think we are the test kitchen and we think you are the end target. And the difference is that when this attack comes your way, it will be so much worse. Because for the most part, we're still pretty manual and analog here. You know, we still do our elections on pen and paper. We are not putting Schneider Electric software into every part of our critical infrastructure. And in fact, these attacks have been such a wake-up call. that it's an opportunity for us to rebuild a lot of our economy from scratch and think very carefully about which systems are so sacred.
Starting point is 00:28:34 We don't want software touching them at all. But you, you are fully automated, and you are only rushing into the age of automation and machine learning. And so when it does hit you, it will be that much worse. And that really was the message I thought, wow, we need to take this home And people need to understand that there is this confluence of dynamics, of software eats world, of move fast and break things. And the last thing I'll say on this is just our adversaries know that they might not ever be able to match the Pentagon's budget in terms of military spending. But they now know we have a very soft underbelly when it comes to cyber and they can do a lot more harm with these methods perhaps than they could even do with kinetic weaponry.
Starting point is 00:29:23 I think many of our listeners are, of course, familiar with the Internet of Things and understand that the cameras they put in their home and the thermocets and they put in their home are pretty vulnerable and that hackers can get in and listen to their conversations. That's sort of when I think, before listening to you, when I think of cybersecurity, that's sort of where my mind goes. And the realization I had, especially as you speak now, is that we're not talking about the Internet of Things.
Starting point is 00:29:50 We're talking about the Internet of National Backer. We're talking about the internet of our life support systems as nations and as cities. And when we've been looking into more our domain like social media, one of the things that we constantly see is that we used to have protections in the physical world that get lost when we move to the digital world. We used to have regulations around what kids could watch on morning cartoons. But when you move to YouTube, all those protections just go away. And I'm sort of imagining the U.S. military saying, like, you know what?
Starting point is 00:30:28 Yeah, we're in on the Navy. We should definitely have a Navy. And we're in on the Army. Yeah, that seems like a good idea. But you know what? We just don't need an Air Force. We don't need one of those things. And that's sort of the place we are now with our fundamental infrastructure is that the U.S. is saying,
Starting point is 00:30:43 I guess we don't need it. So that's sort of the question I have for you. It's like, I think in one of your interviews you pointed out that 80% of the critical infrastructure of the U.S. is now run and operated by private companies. So obviously we must have laws that make these companies beholden to the country that gave them birth, right? Like there must be national security laws that say, you guys have responsibilities and obligations so you can step out of like the competition that Tristan was talking about before. So do we have those laws?
Starting point is 00:31:12 No. And, you know, I always think in the physical world how I was pulled over recently because the sticker on my license plate was out of date. And yet, you know, there's not even a body who would come in and investigate whether a company like Colonial Pipeline has multifactor authentication enabled. There's just nothing like it. There was an attempt in 2012 to pass a cybersecurity bill that would have mandated strict cyber hygiene standards for the companies that run America's critical infrastructure. Chemical factories, nuclear plants, power, pipelines, water treatment facilities, hospitals, telecom networks.
Starting point is 00:31:53 It failed because lobbyists from the U.S. Chamber of Commerce successfully convinced John McCain, the late Senator from Arizona, that those cyber hygiene standards would be too onerous or too expensive for business. And I don't think that Senator McCain truly understood cybersecurity or was very technical or took the time to understand what the threat actually was. And so he filibustered, and we never saw that bill passed. And over the last 10 years, any cybersecurity regulation we've had has come in the form of a toothless presidential executive order. We saw them from Trump. Most recently, we saw them from Biden. Now, what Biden did with the most recent cybersecurity bill, he does deserve credit.
Starting point is 00:32:47 it for because it's the most comprehensive we've seen. And it really clearly understood what the government's limitations are in this market. So what they had to do is say, okay, we're handcuffed here, right? We have no authority in this space. There's no laws in this space. This is an executive order. Who do we have control over? Well, we have control over federal agencies. So we're just going to mandate from now on that federal agencies meet these strict cyber hygiene standards. And we don't really have control over private business, but we do have the power of the purse. And we can use that to say that any federal contractor needs to meet these standards. Otherwise, we won't do business with them. So what they did was they said, listen, we'll rip out the red tape. You don't
Starting point is 00:33:33 have to get some third-party auditor. We'll even let you self-certify that you meet the following cyber hygiene standards. But if we catch you lying to us, which we will, because likely you'll get hit by a ransomware attack that exposes the fact you didn't patch your systems. You are banned from ever doing business with the federal government again. So that's the first stick we've seen in this space. Now, very recently, just in the last couple months, we did see a breach disclosure law passed that mandates that those companies that run 80% of America's critical infrastructure have to disclose when they've been breached. And that is a good thing. That's nothing. to sneeze at, because when you see these attacks happen on one company, there is a very high
Starting point is 00:34:22 likelihood that they were not the only target. Usually, particularly with cyber espionage from China, we see state-backed hackers go for an entire industry. So that is one step forward. But there's still a long way to go. And really, the federal government is left in this position to essentially beg the private sector to disclose. disclose these breaches to raise the level of cyber hygiene. And again, you know, when all it takes to hold the biggest conduit for gas and oil and diesel to the eastern seaboard is a lack of multi-factor authentication and a poor password, it's hopeless. And that is where government has a role to play. And part of the medieval institutions bit is that medieval laws, right? So our
Starting point is 00:35:15 laws are moving always slower than the way that the tech might change even the definition or the meaning of the moral concepts that we used to hold dear. And so the way that we define the boundaries on our laws is also being outmatched by the speed and the unique characteristics of the tech. And I think, again, we come back to that E.O. Wilson quote, it seems like if we zoom out, there's just this overall effect of the things you're talking about, which is a fundamental change in the symmetries and asymmetries of power. You know, in the medieval times, if you have a castle, that was a new defensive technology. So now cannons broke past some of those defenses.
Starting point is 00:35:53 But then what the canon was to the castle, I would say social media is to the nation state and cyber is to the nation state. Because no matter the fact that you've got those Patriot missile defense systems or those F-35s, the chinks in the armor as you digitize your society, the entire armor, quote-unquote, that we're wrapping around our society with the digital, actually basically, puts us in a vulnerability suit. We're kind of wrapping ourselves in a vulnerability suit because while we have an Air Force and a Navy and a space force, we don't have a Metaverse force or an Instagram force or a, we do have a cyber defense force, but as you said, the issue
Starting point is 00:36:24 is the public-private nature of the relationship when 80% of our infrastructure is created by private companies and the government has limited abilities sort of mandate things. I love your idea, though, about just like you got pulled over because you had an outdated smog check. Like, why don't companies all get pulled over for having an outdated security check. I think these kinds of metaphors go a long way in sort of just making it clear for us that there's a collective action problem. And if I do it and the other guy doesn't, then I just added a bunch of cost to my balance sheet. Meanwhile, the other guys are getting off free. And so unless there's sort of enforcement for everybody, it doesn't make economic
Starting point is 00:36:58 sense. Yeah. And we need metrics. I mean, we all have FICO scores. You know, what is the risk a credit card company is taking on when they give us a credit card? We don't have that in cyber. We don't have the equivalent of a FICO score for the supply chain. So when you take on a vendor, or you acquire a company, or you adopt open source code, you have no idea how much risk you are taking on by working with that company or that code. So there are companies out there that are working on creating ratings, security ratings, just from what they can gather outside the organization. They'll look at your organization and do a scan. They have a server that's just sitting out there on the open internet or it's unpatched. We will lower their score. But we definitely
Starting point is 00:37:50 need metrics. The other thing is when you go back to your bowling alley analogy, you know, between chaos and oppression. We talk about software eating the world, move fast and break things where the incentives lie, which are only leading us towards further vulnerability, this market that has crept up, that incentivizes hackers to just sell their bugs under the table to governments for millions of dollars, not see to it that they get patched. You really get a sense for chaos, you know, for the potential for chaos. On the other side, on the oppression side, what China did over the last few years is they put in place new laws to try to control this chaos. And the laws say, if you are a Chinese hacker, security researcher, you are forbidden from attending Western hacking conferences and presenting all the ways you can break into a Tesla or an iPhone or Schneider Electric. You can't do that anymore. That's illegal. Also, if you find a zero day, which is a bug and code that the manufacturer doesn't know about, you have to give the state right of first refusal on that bug. So basically,
Starting point is 00:39:03 they are cutting the market out at its knees. The other thing is that the U.S. and the West no longer dominate the market for these goods. If I'm a hacker and I find a zero-day bug in your iPhone software, your iOS software, that can remotely read your text messages, track your location, do all the things I would need to do to slap an invisible ankle bracelet on you. The going rate for that iOS zero-day exploit I just described, I believe, is $2.5 million. if you sell it to a broker in the United States. A Saudi Emirati dealer called CrowdFense, last time I checked their pricing, it was $3.5 million.
Starting point is 00:39:43 So we're already getting outpriced by a million dollars. And all of these hackers, they're not sitting inside the United States. For my book, I went down to Argentina, and I met with people there. And I had a very interesting conversation with an old hacker there who's not in this market, but he's sort of the godfather of the hacking scene. And Argentina, for a number of factors, cultural education, are very good at finding zero days and exploiting them. And they can make a good penny and skirt inflation by selling these two brokers all
Starting point is 00:40:21 over the world. And I asked him the same question that I asked Luigi and Donato so many years earlier. I said, well, who will they sell them to? And I regret how I phrase this. I apologize to everyone in advance. But I said, well, you only sell these to good Western governments. And he laughed in my face. And he said, Nicole, the last time I checked the country that bombed another country into oblivion wasn't China or Iran. So we don't share your moral calculus. Most people will just sell these to the country that hands them the biggest bag of cash. And right now, that biggest bag of cash isn't a U.S. broken. It's an Emirati broker or a Saudi broker. And how are they using zero days, largely to try to preempt what they see as their biggest national security threat, which is another Arab Spring. So for the most part, they are using these for spyware and surveillance tools on their own people on dissidents and journalists and human rights activists. To put that $2.5 million into context, certainly the U.S. has more F-35s than anyone else in the world.
Starting point is 00:41:31 For the cost of an F-35, you could buy 2,000 of those exploits per day for a year. And so it just shows you this shift in asymmetry. The image that I have in my head is like on our move to digital, we have this double whammy because we've built a sort of brain implant into the brain of cell. society. And that's both social media and it's also our infrastructure. And we've left the electrodes of that brain implant just sticking out for anyone to touch, whether it's like bumbling criminals or whether it's nation states. And you can touch some of those electrodes and you can stop all the gas flow or the diesel in the U.S. and bring our nation to its knees.
Starting point is 00:42:13 Or you could find a zero-day exploit in the psychology of the U.S., which is finding those culture war like fault lines and using amplification to heighten those tensions. And so now we're getting hit doubly, both at our infrastructure level and at our cultural level. And that's sort of, to me, the connection between our work and yours. Totally. And just to even pair it back something that you said, have the Twitter trending topics list is basically the zero-day vulnerabilities for the cultural fault lines of democracies. Because you basically, we're publishing, hey, exactly where to hack us and cause division and chaos.
Starting point is 00:42:53 Just talk about any one of these ten topics that are trending, and I guarantee you'll get visibility, engagement, and division. So just amplify those. So we've sort of walked deep down into this dark valley. It feels pretty hopeless down in here. What are the kinds of ladders that you can show us where we can start to see how we might climb up? So, okay, a couple ones.
Starting point is 00:43:18 One is, and this is the most frequent question I get asked right now, is why haven't we seen more cyber attacks from Russia in Ukraine or in the West as a result of Western support for Ukraine? And I think that is a great question, and I think we are watching the potential limits of cyber attacks and cyber war play out in real time. Now, I should back up and say that there have been a number of very serious cyber attacks against Ukraine from Russia. We saw them hack Vyasat, which was an attack intended to basically disrupt everyone's connection to the internet. But, I guess, thanks to Starlink, people have still been able to connect and broadcast every video in these images from the invasion. So that didn't go as well as planned. they also did hack several Ukrainian power stations in the days going into the war and Ukraine's cyber defense with some help from, I believe, the United States and Western allies, they were
Starting point is 00:44:24 able to discover that attack before it detonated. So that is one point of optimism. Even without these laws, even with this sort of disconnect between the private sector who run our critical infrastructure and the federal government, I have to say that one area for optimism is that no one is letting the Ukrainian crisis go to waste. I have never seen the level of real-time collaboration between the federal government, our allies and the private sector in the cybersecurity industry than I am seeing right this minute. There are Slack channels lighting up where everyone is voluntarily disclosing anomalous behavior, malware strains that they're catching
Starting point is 00:45:05 on their network. And companies, particularly well-resourced companies, are really able to do what the federal government calls shields up, you know, basically act like you're about to get breached, assume breach. Now, that raises other questions about what some call a cybersecurity poverty line, which is, okay, that's fine for the Johnson and Johnsons of the world and the Fortune 500, but when so much of our critical infrastructure is run by, you know, mom and pops who are running the local water treatment facility and don't even have a single IT guy in the building and are running Microsoft Windows software that hasn't been patched in years. What about those guys? Because the impact from an attack on them is, in some cases,
Starting point is 00:45:50 arguably worse than an attack on a Merker or Johnson & Johnson. So we have to deal with that. But for right now, we have come a long way in a very short amount of time. And I am hoping that that will continue. Another ray of hope is there was a study done back in, I believe, 2016. So it's out of date. If anyone wants to pick this up, who's listening, please do. But using semantics data, a group of academics and researchers looked at attempts to breach a country system versus successful attempts. And they looked at, okay, where are the countries in the world who they're seeing their fair share of cybersecurity incidents or probing, but they aren't actually. getting breached? Who are those countries? The answer was in Scandinavia, Finland, Sweden,
Starting point is 00:46:46 Norway, Denmark actually do a pretty good job of deflecting a lot of the cyber attacks and incidents that come their way. And so the researchers looked at, okay, why are these countries somehow better prepared than everyone else at cyber defense? And the answer is that they have national, comprehensive, cyber security policies in place that they update every year along with the threat that have real carrots and real sticks for companies that operate the country's critical infrastructure. They get fined if they're not using multifactor authentication. They get fined if they haven't upgraded their software to the latest patched version of Windows or iOS or Schneider Electric or whatever it is.
Starting point is 00:47:36 So what that tells you is that we need a comprehensive national cybersecurity policy with laws that have real teeth that are fining people when they don't do the equivalent of getting a smog check. That is just not one of those things where regulation makes it all worse. It is an area where we have neglected our responsibility to national security by not mandating that these. companies meet strict cyber hygiene standards and finding them when they don't meet those standards. We don't have that here. Regulation has become such a dirty word that no politician has been willing to sort of re-up this fight. I mean, we finally have leadership in place that I think is, regardless of how you feel about the Biden administration, there's no doubt that they have done more over the last year for cybersecurity than any other administration on record. But it's not
Starting point is 00:48:40 enough. You know, we still have so far to go. What worries me, and I have friends who work in cybersecurity, who are saying at the beginning of Ukraine-Russia war, that what happens when all of those cyber hackers who are perfectly happy before to accept a couple million dollar payout are now not motivated by money, but are motivated by geopolitical ambitions? And it's like Brazilian in Jiu-Jitsu. I put you in the posture and I am locking you in and you can't tap out. Before you could pay me and I'll release my grip and now I'm not going to release my grip because I simply have that motive. And I think that's one of the things I'm increasingly worried about as we go on. There's another story from the Ukraine war. When Putin went in, it activated obviously
Starting point is 00:49:21 everybody who disagreed with that decision, the entire global hacking community. He didn't just declare the special military operation or war against Ukraine. Everyone in the world who was a hacker who was against that, could now, as non-state actors, just say, you know what, I'm going to go after hacking the GRU. And so what's also difficult about this environment is the lack of attribution, because now you have 17-year-olds in their basement in Argentina who are saying, you know, I don't like Putin either. And so they're collaborating with hackers in the Netherlands and in Norway and random places all throughout the world, and they're making changes to directly wipe software and files from the GRU's computers. There's a specific example of
Starting point is 00:49:59 someone who was running a famous JavaScript library, and they updated it to basically say if this library that I wrote is being run, if this code is being run inside of Russia, then basically wipe the computer that I'm on. And this code library was shipped, you know, they did a little software update, and then everybody who was running that code library in Russia, their computers were wiped. Now, what happens when Putin thinks that that was actually the U.S. or the CIA and not some independent 17-year-old sitting in his basement in Argentina? And so the decentralized nature of a war of all against all in this kind of Hobbesian sense creates, again, more of that attractor towards this chaos.
Starting point is 00:50:36 And so what I hope, though, is that we're moving to this period of such net fragility across the board that we recognize how unstable the situation is and that we have to be very careful about assuming that there's a warlike action taken. But the problem, of course, is that many more of these decentralized actors can trigger something and make you believe that it was actually a U.S. hacker because they could have also disguised them. themselves. So it gets infinitely complex. And I share the concern. I mean, there was so much raw, raw around what groups like anonymous were doing in the beginning of the Russian invasion by infiltrating Russian state television outlets and broadcasting actual images of the Russian invasion. And I shared that enthusiasm until I thought about a couple things, which is one, the potential for escalation, and to the fact that Putin, because I do believe this is one man's war, that he is
Starting point is 00:51:30 a conspiracy-minded fellow. He thinks that Hillary Clinton and the CIA were behind Ukrainians getting together an independent square and kicking out his puppet government. So it's a real consideration to think that he's not going to look at what Anonymous is doing as some individuals gathering around the globe for one cause, but as a hidden Western intelligence operation that he would respond to accordingly. And then to your point, Tristan, about perhaps things like the Russian invasion or, hey, maybe the overturning of Roe v. Wade in the United States,
Starting point is 00:52:15 you know, maybe people are starting to say, I don't want to get this fixed so that this government can be more secure, or I'd rather sell this to someone who can hack that country or those systems. I think that is a very real consideration, and I am actually shocked we haven't seen climate activists participate in this market and try and hijack coal companies or major contributors to the climate crisis using these methods. But I think at some point, that's coming. And then finally, to your point on attribution, this is a real. issue. You know, attribution has gotten way better now than it was 10 years ago. Western governments at
Starting point is 00:52:59 least have been much more quick to attribute some of these attacks now. There's this question of whether the public will believe them, which is what happened with Sony when they did attribute it to North Korea. There was this period where no one wanted to believe that intelligence. Likewise, you know, when the Biden administration came out and said Russia will invade Ukraine on this week, There were a lot of people who said, you're a liar. Attribution is very difficult, and we've actually seen some of these nation-state actors actively playing around with attribution. So, for instance, a couple years ago, there was an attack on a French television network that took out several French television stations and put up pro-ISIS propaganda. So everyone assumed, okay, this is ISIS.
Starting point is 00:53:46 It took several months for them to actually attribute that attack back to Russia's GRU. There was an attack on the South Korean Olympics, the opening ceremonies, where no one could get in to the opening ceremonies because the ticketing system had been hijacked. And everyone assumed, oh, this has to be North Korea. But it took several months, and they found out, oh, this was the GRU. And then there was an attack on a Saudi petrochemical facility where someone broke in and they knew, the safety locks. Now, in the process, they had a bug in their code that shut the whole plant down. And everyone assumed initially this had to have been Iran because Iranian hackers had been hacking Saudi oil facilities over the past few years. And so it took a long time before researchers
Starting point is 00:54:34 said, actually, we were able to tie this back to a secret arm of the Kremlin. So why is Russia hacking French television networks pretending to be ISIS, hacking the South Korean Olympics, hacking a Saudi petrochemical facility. Why are they doing these things? Well, I think the answer is pretty simple. I think they are playing around with attribution. They're experimenting to see what could we get away with that wouldn't immediately be pinned back on us?
Starting point is 00:55:02 Because we know that they have the capabilities to cause a cyber attack that would cause serious destruction, like the power grid outages in Ukraine. We know that they have access in too many cases already to our infrastructure, to critical infrastructure around the world that we've seen them probing for years. But what they haven't done until now is pulled the trigger on the access and the capabilities. And I suspect that is because we have stumbled into a new era of mutually assured digital destruction, where, yes, they might be in our systems. Yes, we recently
Starting point is 00:55:38 declassified a report that said the Chinese have been probing our pipelines. to get a foothold in the event of some escalating geopolitical conflict. But I've also reported that Cyber Command has hacked the Russian grid. So we're all in each other's systems. And so no one actually wants to pull the trigger because they know that the minute they do that, their adversary could do the same back to them. So we do have a little bit of this very messy, mutually assured digital destruction.
Starting point is 00:56:06 And I think that's why attribution becomes critical. Tristan, your analogy of everyone having everyone else in a jiu-jitsu sort of headlock. And because everyone is headlocking everyone else, we don't do anything. When I think about what your work points at as an even more fundamental trend, is that we're moving from mad, mutually short destruction, to all mad, where it's not just nation states that can do this to other nation states, but can be an individual who now buys for $2.6 million, one of these zero-day exploits and launch it as a nation-state
Starting point is 00:56:39 and how do you do attribution to that? And that problem of decentralized James Bond weapons for everyone where we get to retain some version of our liberties is the central problem of our times and your work is highlighting the ground zero of that. So thank you very much for coming on your undivided attention. Thanks, everyone.
Starting point is 00:57:08 Nicole Pearl Roth spent a decade as the lead cyber security reporter at the New York Times, investigating cyber attacks from Russian hacks of nuclear plants to North Korea's attack against Sony Pictures. She recently published the New York Times bestseller, This is How They Tell Me, The World Ends, a detailed investigation of the global cyber arms race. Today, Nicole is a member of the Department of Homeland Security's Cybersecurity Advisory Committee and a guest lecturer at the Stanford Graduate School of Business. Your undivided attention is produced by the Center for Humane Technology, a non-profit organization working to catalyze a humane future.
Starting point is 00:57:44 Our executive producer is Stephanie Lepp. Our senior producer is Julia Scott. Mixing on this episode by Jeff Sudakin. Original music and sound design by Ryan and Hayes Holiday, and a special thanks to the whole Center for Humane Technology team for making this podcast possible. You can find show notes, transcripts, and much more at HumaneTech.com. A very special thanks to our generous lead supporters, including the Omidyar Network, Craig Newmark Philanthropies, and the Evolve Foundation, among many others.
Starting point is 00:58:13 And if you made it all the way here, let me just give one more thank you to you for giving us your undivided attention.

There aren't comments yet for this episode. Click on any sentence in the transcript to leave a comment.