Transcript
A (0:02)
You're listening to the CyberWire network powered by N2K.
B (0:21)
Welcome to Afternoon cybertea. I am your host, Dan Johnson. On Afternoon cybertea, we focus on where innovation and security intersect. From the front lines of digital defense to the groundbreaking advancements shaping our digital future, we bring the latest insights, expert interviews and captivating stories to help cyber leaders and defenders stay one step ahead. Today on Afternoon cybertea, I am joined by Ali Mellon, a principal analyst and one of the most clear eyed voices in cybersecurity today. Ali is also the author of a new book, Code War How Nations Hack, Spy and Shape the Digital Battlefield, which takes on one of the most misunderstood topics in our industry, nation state cyber conflict, and what that really means for leaders, boards and organizations navigating an increasingly complex digital world. Welcome to Afternoon cybert Alley. It's great to have you.
A (1:18)
Thank you so much for having me. I'm thrilled to be here.
B (1:21)
Well, first, congratulations on your book. I definitely want to talk about that a bit and start there because codewar feels both timely and a little bit overdue. So for leaders who hear Nation State Cyber and immediately think this does not apply to them, how would you describe that this book is really about and why you felt compelled to write it now?
A (1:42)
Thanks. Yeah, it's so funny that you say that because I too feel like the timing on the one hand is very, very good, unfortunately. But also things just change so much constantly that the book could have been written at any point and I think there would have been a lot of value in having it out there. But ultimately, what Code War is about is it is the intersection of cybersecurity and geopolitics. It is all about how the histories of Russia, China and the United States have led to the way that they use cyber attacks and defenses against other nation states and their citizens. So in the book, I go back to Tsarist Russia and imperial China and I pull out themes that put into context why these nations use cyber attacks the way that they do. That's the first piece of what it's about, but it's actually about more than that as well. I start the book off with a quote from Richard Feynman and his 1986 Rogers Commission report on the Challenger shuttle disaster, which is, for a successful technology, reality must take precedence over public relations, for nature cannot be fooled. I really love this quote. I think that it is, of course, it was very timely when it was first given, when it was referencing how technical failures can't just be covered up by press releases and good pr. You can't just pretend that they don't happen. But I also find that this quote is so applicable to cybersecurity and to the world that we operate in every day, just in a very different way. Throughout the book I emphasize that without a real world impact, without a real world purpose and meaning, cyber attacks and defenses by nation states, they're just not going to happen. They're motivated by something that every person can understand, by some element of national power, whether that's diplomatic, economic, military or resource related. And at the end of the day, that's the true meaning of this book. And what I really wanted to get across is that reality must take precedence. I ground every attack and defense I talk about in the historical context, but also the modern context that help explain that motivation better and what the nations were really looking to get out of that attack in that moment.
