{"id":47322,"date":"2019-05-06T14:41:11","date_gmt":"2019-05-06T04:41:11","guid":{"rendered":"https:\/\/www.aspistrategist.ru\/?p=47322"},"modified":"2019-05-06T14:41:11","modified_gmt":"2019-05-06T04:41:11","slug":"the-strategist-six-mike-rogers","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/the-strategist-six-mike-rogers\/","title":{"rendered":"The Strategist Six: Mike Rogers"},"content":{"rendered":"
<\/figure>\n

Welcome to \u2018The Strategist Six\u2019<\/em>, a feature that provides a glimpse into the thinking of prominent academics, government officials, military officers, reporters and interesting individuals from around the world.<\/em><\/p>\n

1. It appears that the United Kingdom has decided to allow the Chinese company Huawei to build part of its 5G network. Does that present a security problem for Britain? And how seriously is that decision likely to be viewed by the other members of the Five Eyes intelligence-sharing network?<\/strong><\/p>\n

The official British position is that this is still a matter under deliberation. I\u2019ve always said it\u2019s up to each nation to determine the right answer for itself. What\u2019s right for one may not be for another.<\/p>\n

This is an issue that almost every nation, particularly industrialised nations, is coming to grips with. Australia has concluded that there\u2019s a level of risk it isn\u2019t comfortable with and Huawei will not be part of its 5G infrastructure. In the United States, we\u2019re still working our way through this.<\/p>\n

As a director of the US National Security Agency and the commander of US Cyber Command, I said this boils down to the level of risk we were comfortable with and I\u2019d make it less about a specific nation or company and much more about how a nation ensures its economic competitiveness in the digital age. It is certainly a security issue, but with 5G you need to look through the prism of not just traditional national security, but national security in a much broader sense.<\/p>\n

As 5G is going to be such a fundamental aspect of a nation\u2019s economic competitiveness, I\u2019d be worried about something that could call that into question. There are some areas where I think you could take some level of risk, but there are others where I would say the risk is very high. And I\u2019d be very concerned about any entity if you didn\u2019t have complete confidence that you knew what it had provided and some measure of control or oversight over it. That becomes very complex with 5G because so much of the capability is not centralised but is spread out across the network. It becomes much more difficult to mitigate the risk.<\/p>\n

2. Former Australian prime minister Malcolm Turnbull said recently that he\u2019d raised with US President Donald Trump his concern that 5G technology was available from a limited number of providers, none of which were in the United States. Can the US catch up in that field and provide the sort of technology that countries like Australia need?<\/strong><\/p>\n

I think the challenge is to create an environment where there are commercial options that Australia, the US, the UK, Japan and others would feel comfortable with. Part of the economic challenge is that Huawei has positioned itself with a price that US firms and other nations can\u2019t match. We need to ask ourselves how and why that happened and whether we\u2019re comfortable with it.<\/p>\n

I\u2019d hope governments could come together to work out how to generate alternatives. It seems possible to have vendors that provide a good price without the high level of risk posed by vendors like Huawei and ZTE. Can you trust a particular vendor? What\u2019s the relationship between that vendor, that company, and its nation-state? Is that company from an authoritarian state where the legal regime and nature of the state mean the government can access data purely upon request?<\/p>\n

It\u2019s not just the laws on China\u2019s books, it\u2019s the fact that the Chinese Communist Party decides what the law is as and when it likes. It doesn\u2019t have to go through a court or any kind of independent verification or justification. It can just tell the company, \u2018You\u2019re a corporate entity from our nation. The law says I can have access to whatever data I want. This is what I want.\u2019 We need to spend some time, the US, Australia and others, on what we need to do to develop a viable alternative, and how can we help industry. Alternative 5G technology providers like Nokia, Qualcomm and Ericsson exist, and telcos like Telstra here in Australia are bringing 5G solutions to market.<\/p>\n

3. Turnbull also raised concerns that the threshold for response to cyberattacks on Western nations is very high. Before you left Cyber Command, you put in place a different approach to offensive cyber operations, including the concept of defending forward. How important is that, and how can it be done? And what impact can it have on criminals and other nations\u2019 agencies?<\/strong><\/p>\n

One of the greatest challenges we face is to change the risk calculus of actors out there to get them thinking that perhaps stealing intellectual property on a massive scale, interfering with democratic elections, and penetrating infrastructure and other areas, such as power, water, petroleum and financial that are a huge concern to any nation, are not worth the risk.<\/p>\n

How can we convince them to step back and think, \u2018While I could do this, the risk is pretty high and maybe it\u2019s not in my best interest to do so.\u2019<\/p>\n

If we continue to just respond passively, to wait for people to come after our networks and to steal our intellectual property, then we\u2019re just responding, which is a reactive strategy, a losing strategy. My experience as a military leader taught me that you want to shape the behaviour of any potential adversary, to drive them to make choices that benefit you, not them.<\/p>\n

We need to talk about cyber as one of a broad set of capabilities we have at our disposal. We\u2019re prepared to use that range of capabilities in the right place and at the right time within an international legal framework, with a sense of proportionality\u2014being very discrete and very specific. It was important that adversaries knew the US had cyber capabilities and that it was prepared to use them at the time and place of our choosing if they insisted on engaging in this risky behaviour.<\/p>\n

I think you\u2019ve seen a shift in the past 18 months to this idea that we just can\u2019t sit outside the network waiting for somebody to penetrate before we respond.<\/p>\n

4. How does an offensive cyber capability work in response to an attack, how important was the elevation of Cyber Command to a combat command, and what did that signify about the US defence establishment\u2019s level of concern about cyber threats?<\/strong><\/p>\n

There\u2019s a full range of possibilities. Just because someone comes at us in cyber, doesn\u2019t mean we\u2019re going to do always the same thing.<\/p>\n

My argument was, let\u2019s look at the full range of capabilities that we enjoy as a nation and which of the tools we have makes the most sense in this scenario, given the target they went after and the impact they had. It shouldn\u2019t be one size fits all.<\/p>\n

We need to fundamentally change the risk calculus of nation-state and criminal actors because this is costing the US, Australia and others billions of dollars in the theft of intellectual property. It\u2019s potentially placing some of our critical infrastructure at risk as opponents penetrate that infrastructure, study it, and look at changing it, degrading it, denying it over time. It\u2019s providing intelligence and insights that can be used to disrupt and undermine policy- and national decision-making over time, including through cyber intrusions into political parties\u2019 information systems.<\/p>\n

We don\u2019t want that to happen. One of my biggest concerns was that this should be based on a structure and a system that everybody understands. In the US system, combatant commanders, as the senior operational commanders, are a key part of discussions about strategy, resources and prioritisation. That\u2019s how important cyber is. Cyber Command needs to work at that level, needs to be part of those discussions. It\u2019s also a real positive in terms of speed of decisions and reaction.<\/p>\n

5. How serious will cyber threats become, and how will the world deal with them?<\/strong><\/p>\n

While states such as China, Russia, North Korea and Iran attract considerable attention, the greatest activity out there doesn\u2019t involve nation-states\u2014it\u2019s criminal. Criminals use cyber as a vehicle to generate money and a tool to penetrate systems, steal credit card information and identities, and run scams.<\/p>\n

For most citizens outside authoritarian states like China and Russia, the greatest impact cyber will have in their lives is if someone steals their identity or their credit card number. Will we see cyber criminals link with terrorist groups or forming partnerships, sharing people and tools, going after common sets of targets? Will we see nation-states turning to criminal actors as a way, for example, to hide attribution?<\/p>\n

Do you see criminal actors telling a nation, \u2018If you give me protection so I\u2019m not thrown in jail, I\u2019m not extradited, I\u2019ll apply my criminal activities, capabilities and cyber skills to support you\u2019? We need to pay attention to that.<\/p>\n

6. When the internet was established, it was generally seen as a very positive institution and a way to spread knowledge. It\u2019s certainly done that. But it\u2019s also been a vehicle for hate speech and promotion of terrible brutality. Is the system beyond control, or can it still be a force for good?<\/strong><\/p>\n

The average person with internet access can gather more information than anyone in the past and that can be a force for good in terms of personal growth, economic growth, sharing of information and the ability of widely dispersed individuals to coalesce around issues of concern.<\/p>\n

The positives far outweigh the negatives. But there are some negative aspects to this unfettered connectivity (the model in large parts of the world) and the ability to move information and to coordinate around the world.<\/p>\n

It goes back to when the internet was started in the late 1960s by the US Department of Defense to move information within the department over great distances without being stuck with using faxes and mail. Nobody was going to steal unclassified stuff, and we knew who the users were, so security wasn\u2019t a big deal. So, we\u2019ve built this global engine but we really didn\u2019t think about how to defend it, how to work out if someone was real or not.<\/p>\n

One of the questions we\u2019re dealing with now is how do we create something totally new and build in defensibility, reliability, redundancy, and a means to ensure identity? Do you rebuild it with something new or do you keep it where it is?<\/p>\n

But the sunk capital costs in the structure are so high, I can\u2019t see us totally replacing it anytime soon.<\/p>\n

That\u2019s only possible in authoritarian states\u2014not in truly open, market-driven economies. Again the Chinese precedent seems to show that you can shift the structures to enable high levels of social control over your population\u2014and this system of authoritarian control through internet technologies is what they\u2019ve been keen to export, with some success.<\/p>\n

So how can you attempt to address some of these issues using this existing framework and how do we change it over time? You\u2019re seeing how we do domain control, naming infrastructure, all those things continue to evolve. So it\u2019s manmade, it\u2019s global, but it\u2019s going to be a changing dynamic.<\/p>\n","protected":false},"excerpt":{"rendered":"

Welcome to \u2018The Strategist Six\u2019, a feature that provides a glimpse into the thinking of prominent academics, government officials, military officers, reporters and interesting individuals from around the world. 1. It appears that the United …<\/p>\n","protected":false},"author":587,"featured_media":47323,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[1],"tags":[2268,52,169,2138,1629,31],"class_list":["post-47322","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general","tag-5g","tag-china","tag-cyber-crime","tag-cybersecurity","tag-the-strategist-six","tag-united-states","dinkus-strategist-six"],"acf":[],"yoast_head":"\nThe Strategist Six: Mike Rogers | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/the-strategist-six-mike-rogers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Strategist Six: Mike Rogers | The Strategist\" \/>\n<meta property=\"og:description\" content=\"Welcome to \u2018The Strategist Six\u2019, a feature that provides a glimpse into the thinking of prominent academics, government officials, military officers, reporters and interesting individuals from around the world. 1. It appears that the United ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/the-strategist-six-mike-rogers\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2019-05-06T04:41:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2019\/05\/612872-V-ZFQ42-948-e1556866636374.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"533\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Brendan Nicholson\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Jerry Cashman\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Brendan Nicholson\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/the-strategist-six-mike-rogers\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2019\/05\/612872-V-ZFQ42-948-e1556866636374.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2019\/05\/612872-V-ZFQ42-948-e1556866636374.jpg\",\"width\":800,\"height\":533,\"caption\":\"Adm. Michael S. Rogers, Commander of the U.S. Cyber Command and Director of the National Security Agency, spoke to cadets and staff and faculty during a Leader Professional Development Session at the United States Military Academy, Jan. 9. During the LPD, he spoke about the challenges of a dynamic cyber domain, the importance it will play in the future, and how USMA graduates can help support Cyber operations. The graduating class of 2015 marks the first class of USMA graduates that will branch directly in to the U.S Army Cyber Branch. (Photo by Sgt. 1st Class Jeremy Bunkley, USMA Public Affairs)\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/the-strategist-six-mike-rogers\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/the-strategist-six-mike-rogers\/\",\"name\":\"The Strategist Six: Mike Rogers | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/the-strategist-six-mike-rogers\/#primaryimage\"},\"datePublished\":\"2019-05-06T04:41:11+00:00\",\"dateModified\":\"2019-05-06T04:41:11+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/05899c3f9ed739cee652cbad02490edb\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/the-strategist-six-mike-rogers\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/the-strategist-six-mike-rogers\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/the-strategist-six-mike-rogers\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Strategist Six: Mike Rogers\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/05899c3f9ed739cee652cbad02490edb\",\"name\":\"Brendan Nicholson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/432efb040ac92cb9a2cecaa148e1f70f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/432efb040ac92cb9a2cecaa148e1f70f?s=96&d=mm&r=g\",\"caption\":\"Brendan Nicholson\"},\"sameAs\":[\"https:\/\/twitter.com\/Jerry Cashman\"],\"url\":\"https:\/\/www.aspistrategist.ru\/author\/brendan-nicholson\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Strategist Six: Mike Rogers | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/the-strategist-six-mike-rogers\/","og_locale":"en_US","og_type":"article","og_title":"The Strategist Six: Mike Rogers | The Strategist","og_description":"Welcome to \u2018The Strategist Six\u2019, a feature that provides a glimpse into the thinking of prominent academics, government officials, military officers, reporters and interesting individuals from around the world. 1. It appears that the United ...","og_url":"https:\/\/www.aspistrategist.ru\/the-strategist-six-mike-rogers\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2019-05-06T04:41:11+00:00","og_image":[{"width":800,"height":533,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2019\/05\/612872-V-ZFQ42-948-e1556866636374.jpg","type":"image\/jpeg"}],"author":"Brendan Nicholson","twitter_card":"summary_large_image","twitter_creator":"@Jerry Cashman","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"Brendan Nicholson","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/the-strategist-six-mike-rogers\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2019\/05\/612872-V-ZFQ42-948-e1556866636374.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2019\/05\/612872-V-ZFQ42-948-e1556866636374.jpg","width":800,"height":533,"caption":"Adm. Michael S. Rogers, Commander of the U.S. Cyber Command and Director of the National Security Agency, spoke to cadets and staff and faculty during a Leader Professional Development Session at the United States Military Academy, Jan. 9. During the LPD, he spoke about the challenges of a dynamic cyber domain, the importance it will play in the future, and how USMA graduates can help support Cyber operations. The graduating class of 2015 marks the first class of USMA graduates that will branch directly in to the U.S Army Cyber Branch. (Photo by Sgt. 1st Class Jeremy Bunkley, USMA Public Affairs)"},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/the-strategist-six-mike-rogers\/","url":"https:\/\/www.aspistrategist.ru\/the-strategist-six-mike-rogers\/","name":"The Strategist Six: Mike Rogers | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/the-strategist-six-mike-rogers\/#primaryimage"},"datePublished":"2019-05-06T04:41:11+00:00","dateModified":"2019-05-06T04:41:11+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/05899c3f9ed739cee652cbad02490edb"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/the-strategist-six-mike-rogers\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/the-strategist-six-mike-rogers\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/the-strategist-six-mike-rogers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"The Strategist Six: Mike Rogers"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/05899c3f9ed739cee652cbad02490edb","name":"Brendan Nicholson","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/432efb040ac92cb9a2cecaa148e1f70f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/432efb040ac92cb9a2cecaa148e1f70f?s=96&d=mm&r=g","caption":"Brendan Nicholson"},"sameAs":["https:\/\/twitter.com\/Jerry Cashman"],"url":"https:\/\/www.aspistrategist.ru\/author\/brendan-nicholson\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/47322"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/587"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=47322"}],"version-history":[{"count":5,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/47322\/revisions"}],"predecessor-version":[{"id":47356,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/47322\/revisions\/47356"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/47323"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=47322"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=47322"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=47322"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}