22 juin 2018 | International, C4ISR

Top intelligence officials fear U.S. behind in quantum computing, cyber

By:

The universities and research institutions in the United States focusing on quantum computing are “sub-par,” a top National Security Agency official said June 21.

The complaint is among a laundry list of examples, topped by cybersecurity, where American innovation in the intelligence field is struggling, said George Barnes, deputy director at the NSA.

“We have to be better at playing the long game,” he said. Barnes added that the Chinese “can play the long game” and “they are taking steps that might not be realized for 20 years.”

The warnings, made at the Capitol Hill National Security Forum in Washington, highlighted mistrust between the government and private sector, as well as the structural challenges of supporting innovation.

Whether it is quantum computing, space or artificial intelligence, Robert Cardillo, Director of the National Geospatial-Intelligence Agency worried that “the moment will be too late” for American innovation.

Experts say that when quantum computers are fully operational, they will upend the use of password-protected systems, artificial intelligence and other areas of information technology.

“Whoever achieves quantum first, everything they are doing and have been doing is irrelevant,” Rep. Will Hurd, R-Texas, said. He added the United States needs to treat quantum the way it treated the Y2K crisis, where the government “spent billions of dollars and spent a decade preparing ... We need to be the leader.”

Hurd said that he supports a recently proposed bill from Rep. Lamar Smith, R-Texas, that aims to “accelerate quantum research and development.”

But the intelligence officials at the forum said that the very nature of American government that prioritizes short-term gains may harm innovation. With their centralized five-year plans, China does not have the potential sequesters and fluctuating budgets that are features of the U.S. government.

Rob Joyce, the newly installed senior adviser at the NSA, said that government needs to give “more people the license to fail.” He said that while the agency doesn't want to squander taxpayer money, “oversight regulation” does not encourage innovation.

Joyce said that the agency needs to boost partnerships with the banking industry, power companies and other areas of critical infrastructure because government has moved to a “support” role.

“We are not the finishers now,” Joyce said.

Asked what the most important emerging threat was for the NSA, Barnes answered with one word: “Cybersecurity.”

“The attack surface is broad and the solution requires government and the public sector together,”Barnes added.

Barnes said that that agency is not used to working with the private sector however, and it harms cybersecurity. “Trust is an issue.”

https://www.fifthdomain.com/industry/2018/06/21/top-intelligence-officials-fear-us-behind-in-quantum-computing-cyber/

Sur le même sujet

  • US aid will boost Ukraine, but doubts remain over 2025 supplies

    22 avril 2024 | International, Terrestre

    US aid will boost Ukraine, but doubts remain over 2025 supplies

  • Marines need to equip defensive cyber teams

    14 décembre 2018 | International, C4ISR

    Marines need to equip defensive cyber teams

    By: Mark Pomerleau The Marines are looking to develop and equip specialized tactical cyber teams with a specific defensive tool set. These teams, known as defensive cyber operations-internal defensive measures (DCO-IDM) companies, are designed to help defend critical digital assets at the tip of the spear. These companies will fall under the newly established Marine Expeditionary Force Information Groups, or MIGs, and one will reside within each MEF providing MEF commanders information-related capabilities to include cyber, intelligence, electronic warfare and information operations. All three DCO-IDM companies have reached the minimum threshold for deployment,though their specific kits are not in place yet, Gregg Kendrick, executive director of Marine Corps Forces Cyberspace Command, said Dec. 6 at the Charleston Defense Contractors Association Defense Summit. In the interim, service-retained cyber protection teams — strategic-level defensive cyber teams that feed up to U.S. Cyber Command — are partnering with the companies to conduct operations and participate in exercises. These companies will serve as a “paired down version” of cyber protection teams in the cyber mission force and be employed at the Marine Air Ground Task Force level, said MGySgt Carlos Torres, senior enlisted Marine in the cyberspace division for the Deputy Commandant for Information, during the annual C4ISRNET Conference in May. The companies have used the expertise from cyber protection teams and Marine Corps Forces Cyberspace Command throughout their establishment. Kendrick said the companies and elements of a cyber protection team participated in the NATO-led Trident Juncture exercise in Norway that took place from Oct. 25 to Nov. 7. Kenneth Bible, deputy director of the C4 directorate and deputy CIO, said Trident Juncture served as a good example of giving these teams exposure to operations and commanders, who want this capability. Kendrick added that the deputy commandant for information, which oversees all aspects of information for the Corps, to include the MIGs, requested Marines with intelligence backgrounds to go to each of the DCO-IDM companies. This will allow them to begin the process of establishing an organic intelligence support ability in the defensive cyber sphere as opposed to having to rely on outside resources, such as Marine Corps Forces Cyberspace Command. This is critical given the expeditionary and tactical nature of these teams. https://www.fifthdomain.com/dod/marine-corps/2018/12/11/marines-need-to-equip-defensive-cyber-teams/

  • Contracts for September 16, 2021

    17 septembre 2021 | International, Aérospatial, Naval, Terrestre, C4ISR, Sécurité

    Contracts for September 16, 2021

    Today

Toutes les nouvelles