NASHVILLE Gilbert Herrera was accustomed to never seeing the fruits of his labor.
After spending almost 40 years at Sandia National Laboratories, Herrera was appointed in 2021 as the head of the National Security Agencys Research Directorate, the largest research and development organization in the U.S. clandestine community.
One of the reasons why I decided to come to NSA is because I spent a career engaged in research and technology deployment in a field that you hope your research would never be tested, Herrera told The Record on Thursday during the Vanderbilt University Summit on Modern Conflict and Emerging Threats. Sandia, based in Albuquerque, New Mexico, is one of the federal governments most important nuclear science laboratories.
But at NSA, research eventually makes its way into mission, helping anyone ranging from lower-level agency analysts all the way to policymakers who seek better information.
The Record sat down with Herrera before his appearance at the summit to discuss the directorate, how it works to be relevant and the outlook for some of todays top emerging technologies. This transcript has been edited for length and clarity.
The Record: What is the job of the Research Directorate?
Gilbert Herrera: The role of the Research Directorate is really twofold.
One is, it needs to be the eyes and ears of the agency in terms of what's happening in research, in academia and in industry; to kind of have this outward-facing look. That's why we have a number of facilities that are unclassified, like universities and whatnot.
The other is to help prevent technology surprise on the inside. We help advise the agency, make sure we're prepared for that. And part of that is developing tools and techniques that help in a mission.
TR: How does the directorate stay operationally relevant? Do you keep an ear out for whats happening in the private sector or academia? Are you tinkering in a lab? Are you receiving orders from leadership to explore certain technologies?
GH: We have a lot of people who are outward-facing, but we also have people who are inward-facing and people that do both.
So having people go forward to work with the mission customers, so they could better understand what their needs are, so they could feel the pain. That helps inform the research. It's this virtuous cycle of gaining an understanding of the mission needs; understanding in part through practice and in part through observation of what the best opportunities are in the research regime. Then conducting tailored and focused research so you can create tools that will make the life of the analyst easier is really what an effective research organization and a mission organization does.
It's that virtuous cycle of understanding, awareness, creation and deployment.
TR: What's changed at the directorate under your tenure and where do you want to put emphasis?
GH: It's easy to get caught up in the moment of wanting to solve today's problem, but what I'm trying to do is make sure we have an adequate balance of today, tomorrow, and then the future transformational problems.
Because we need to do all three. An example of the today is, we actually have an email distribution list where if an analyst has a scientific question that they need answered, then it goes to this [distribution list] of a bunch of scientists called Scientist on Call and then they can answer it. That's an important thing for us to do. That's probably not research.
When the [Ukraine] war broke out, there were a number of things we did where we deployed researchers in order to help in the prompt.
The other is that as I came in, it was right around the time of changing focus away from looking at the war on terror. We also had China and Russia and Iran and others as priorities and more focusing on the realities of today. Our mission pivoted at the time that I came in, and so I'm working with my leadership team to make sure that we're following that pivot.
TR: Lets talk about some emerging technologies. Artificial intelligence. What excites you about it? What concerns you?
GH: What excites me is that it's developing at a level much faster than I ever expected. I've been involved in AI for a while and I never thought it could actually help research, per se.
But I'm beginning to change my mind on that.
I'm beginning to believe now that AI might be able to actually support science. What it's done relative to writing is beyond belief. These models are so big. I see that there's a lot more near-term opportunity.
Now from a threat perspective the most immediate one is that AI can now help the infamous Nigerian prince and other phishers to make more credible English-sounding attacks.
But it's much more than that in terms of potential for reverse engineering.
Right now, the big companies have said that they have put protections on it. You can't tell DALL-E to make child pornography or write stuff like that, but innovative people can find loops around that. The LLaMA model that Facebook had done has gotten into the outside world and people are already modifying that.
Bad actors will pursue ways to get around it and do bad things like child porn, like finding zero-day vulnerabilities and all these other terrible things.
The challenge we have with AI is similar to the challenge we had in 1968 when the protocols were developed for TCP IP. If you develop these technologies without envisioning how you integrate security into them, then that's a problem. I don't know how well we've done with AI. I don't have an opinion at this point.
TR: Lightning round time. Your take on quantum computing, encryption and a non-obvious threat we should be talking about today?
GH: Let me do the reverse order.
What are the energy ramifications of AI? These models take massive amounts of energy to train and to update [and utilize]. AI is going to help revolutionize things but at what energy cost? I don't think weve fully thought through the ramifications. It could be that in the final analysis, we save energy through AI, but I'm not sure that's obvious.
Now, relative to quantum, you really said two questions in one. The first one relative to the encryption part. NSM-10 came out. People need to take it seriously. There's guidance in moving to quantum-resistant encryption. NIST has published a bunch of standards. Something the government rarely does in my reading, they published some standards a year early, and more will come out this summer.
Now, back to computing. I've been involved in quantum computing since 2006. I am on the National Quantum Initiative Advisory Committee, and, over time, my optimism has diminished. I still am a believer in quantum computing. We'll get there someday, but it's a really tough problem.
We need the best minds working on it. The Laboratory for Physical Sciences, which is the physical science research arm of my organization, is funding academics all over the world in pursuit of dealing with the underlying problems for quantum computing because there are still a lot of unanswered questions.
What I hope we can do in quantum computing space is get through the quantum winter, because a winter is coming.
Remember, AI was coined in 1956. Then it ran into the reality of the compute they had. Then there was another revolution in the early 80s when the microprocessor came out and they realized you had neither enough information or compute power. The next one came towards the end of the 90s with the dawn of the internet, but the infrastructure wasn't there. We're finally successful now where we have sufficient compute power and information and new technologies like the GPU, so we can train models. There were, in my counting, three winters before we got to the final goal.
What I tell people is my own personal estimate is somewhere between and I stole this from somebody else 10 years and never.
Martin Matishak is a senior cybersecurity reporter for The Record. He spent the last five years at Politico, where he covered Congress, the Pentagon and the U.S. intelligence community and was a driving force behind the publication's cybersecurity newsletter.
See the original post:
The NSA's research chief on emerging tech including 'beyond ... - The Record by Recorded Future
- WhatsApp overhauling status tab with encrypted Snapchat Stories-like feature - 9 to 5 Mac [Last Updated On: February 21st, 2017] [Originally Added On: February 21st, 2017]
- GOP demands inquiry into EPA use of encrypted messaging apps - CNET [Last Updated On: February 21st, 2017] [Originally Added On: February 21st, 2017]
- Encryption Apps Help White House Staffers Leakand Maybe Break the Law - WIRED [Last Updated On: February 21st, 2017] [Originally Added On: February 21st, 2017]
- World Wide Web Creator Calls for Internet Decentralization & Encryption - The Data Center Journal [Last Updated On: February 21st, 2017] [Originally Added On: February 21st, 2017]
- What It Means to Have an 'Adult' Conversation on Encryption - Pacific Standard [Last Updated On: February 21st, 2017] [Originally Added On: February 21st, 2017]
- Confide in me! Encryption app leaks sensitive info from Washington DC - SC Magazine UK [Last Updated On: February 21st, 2017] [Originally Added On: February 21st, 2017]
- Gmail v7.2 Prepares to Add Support for S/MIME Enhanced Encryption - XDA Developers (blog) [Last Updated On: February 26th, 2017] [Originally Added On: February 26th, 2017]
- Top 6 Data Encryption Solutions - The Merkle [Last Updated On: February 26th, 2017] [Originally Added On: February 26th, 2017]
- Your Guide to the Encryption Debate - Consumer Reports - ConsumerReports.org [Last Updated On: February 26th, 2017] [Originally Added On: February 26th, 2017]
- Google helps put aging SHA-1 encryption out to pasture - Engadget [Last Updated On: February 26th, 2017] [Originally Added On: February 26th, 2017]
- Decipher your Encryption Challenges - Infosecurity Magazine [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- How the Politics of Encryption Affects Government Adoption - Freedom to Tinker [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- How Encryption Makes Your Sensitive Cloud-Based Data an Asset, Not a Liability - Security Intelligence (blog) [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- Set up VMware VM Encryption for hypervisor-level security - TechTarget [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- How The Media Are Using Encryption Tools To Collect Anonymous Tips - NPR [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- Encryption patent that roiled Newegg is dead on appeal | Ars Technica - Ars Technica [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- Research proposes 'full-journey' email encryption - The Stack [Last Updated On: March 1st, 2017] [Originally Added On: March 1st, 2017]
- Database-as-a-service platform introduces encryption-at-rest - BetaNews [Last Updated On: March 1st, 2017] [Originally Added On: March 1st, 2017]
- Encrypted Messaging Service 'Signal' Adds Video Call Option - Top Tech News [Last Updated On: March 2nd, 2017] [Originally Added On: March 2nd, 2017]
- Germany, France lobby hard for terror-busting encryption backdoors ... - The Register [Last Updated On: March 2nd, 2017] [Originally Added On: March 2nd, 2017]
- How to Send Encrypted Nudes, a Guide for the Discerning Lover - Inverse [Last Updated On: March 2nd, 2017] [Originally Added On: March 2nd, 2017]
- Ironclad Encryption Corporation Announces New Ticker Symbol OTCQB: IRNC - Yahoo Finance [Last Updated On: March 2nd, 2017] [Originally Added On: March 2nd, 2017]
- The Best Email Encryption Software of 2017 | Top Ten Reviews [Last Updated On: March 2nd, 2017] [Originally Added On: March 2nd, 2017]
- No, you shouldn't delete Signal or other encrypted apps - TechCrunch [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- Best encryption software: Top 5 - Computer Business Review [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- Encryption Backdoors, Vault 7, and the Jurassic Park Rule of Internet Security - Just Security [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- That Encrypted Chat App the White House Liked? Full of Holes - WIRED [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- What the CIA WikiLeaks Dump Tells Us: Encryption Works - New York Times [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- Snake-Oil Alert Encryption Does Not Prevent Mass-Snooping - Center for Research on Globalization [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- Customer Letter - Apple [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- Don't Let WikiLeaks Scare You Off of Signal and Other Encrypted Chat Apps - WIRED [Last Updated On: March 12th, 2017] [Originally Added On: March 12th, 2017]
- BT to offer customers encryption service for data - Capacity Media (registration) [Last Updated On: March 12th, 2017] [Originally Added On: March 12th, 2017]
- Encryption - technet.microsoft.com [Last Updated On: March 12th, 2017] [Originally Added On: March 12th, 2017]
- Use FileVault to encrypt the startup disk on ... - Apple Support [Last Updated On: March 12th, 2017] [Originally Added On: March 12th, 2017]
- Viber launches secret chats to go beyond encryption - SlashGear [Last Updated On: March 13th, 2017] [Originally Added On: March 13th, 2017]
- Zix wins 5-vendor email encryption shootout - Network World [Last Updated On: March 13th, 2017] [Originally Added On: March 13th, 2017]
- A lesson from the CIA WikiLeaks dump: Encryption works - The Seattle Times [Last Updated On: March 13th, 2017] [Originally Added On: March 13th, 2017]
- What the CIA WikiLeaks Dump Tells Us: Encryption Works - NewsFactor Network [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- Panicked Secret Service Says It Lost Encrypted Laptop But It's Fine, Everything's Fine - Gizmodo [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- Google Cloud adds new customer-supplied encryption key partners ... - ZDNet [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- Preseeding Full Disk Encryption - Linux Journal [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- Bypassing encryption: 'Lawful hacking' is the next frontier of law enforcement technology - Boston Business Journal [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- SecurityBrief NZ - Gemalto introduces on-prem encryption key solution for 'highly regulated' organisations - SecurityBrief NZ [Last Updated On: March 21st, 2017] [Originally Added On: March 21st, 2017]
- 'Always Be Concerned': US Court Slaps Down Fifth Amendment Defense of Encryption - Sputnik International [Last Updated On: March 21st, 2017] [Originally Added On: March 21st, 2017]
- Quantum Key System Uses Unbreakable Light-Based Encryption to Secure Data - Photonics.com [Last Updated On: March 21st, 2017] [Originally Added On: March 21st, 2017]
- Wikileaks Only Told You Half The Story -- Why Encryption Matters More Than Ever - Forbes [Last Updated On: March 21st, 2017] [Originally Added On: March 21st, 2017]
- EPA Sued For Withholding Info On Encrypted Text Messages | The ... - Daily Caller [Last Updated On: March 22nd, 2017] [Originally Added On: March 22nd, 2017]
- Opinion Data encryption efforts ramp up in face of growing security threats - Information Management [Last Updated On: March 22nd, 2017] [Originally Added On: March 22nd, 2017]
- Bypassing encryption: Lawful hacking is the next frontier of law enforcement technology - Salon [Last Updated On: March 22nd, 2017] [Originally Added On: March 22nd, 2017]
- NeuVector Announces Container Visualization, Encryption, and Security Solution for NGINX Plus - DABCC.com [Last Updated On: March 23rd, 2017] [Originally Added On: March 23rd, 2017]
- Is encryption one of the required HIPAA implementation specifications? - TechTarget [Last Updated On: March 23rd, 2017] [Originally Added On: March 23rd, 2017]
- Paper Spells Out Tech, Legal Options for Encryption Workarounds - Threatpost [Last Updated On: March 23rd, 2017] [Originally Added On: March 23rd, 2017]
- Encryption debate needs to be nuanced, says FBI's Comey - TechTarget [Last Updated On: March 25th, 2017] [Originally Added On: March 25th, 2017]
- Comey Renews Debate Over Encryption - 550 KTSA [Last Updated On: March 25th, 2017] [Originally Added On: March 25th, 2017]
- UK minister says encryption on messaging services is unacceptable - Reuters [Last Updated On: March 28th, 2017] [Originally Added On: March 28th, 2017]
- The why and how of encrypting files on your Android smartphone - Phoenix Sun [Last Updated On: March 28th, 2017] [Originally Added On: March 28th, 2017]
- UK targets WhatsApp encryption after London attack - Yahoo News [Last Updated On: March 28th, 2017] [Originally Added On: March 28th, 2017]
- Critical flaw alert! Stop using JSON encryption | InfoWorld - InfoWorld [Last Updated On: March 28th, 2017] [Originally Added On: March 28th, 2017]
- SecureMyEmail is email encryption for everyone - TechRepublic - TechRepublic [Last Updated On: March 28th, 2017] [Originally Added On: March 28th, 2017]
- Apple iOS 10.3 will introduce encryption which makes it MORE difficult for cops and spooks to crack into ISIS nuts ... - The Sun [Last Updated On: March 29th, 2017] [Originally Added On: March 29th, 2017]
- How to Analyze An Encryption Access Proposal - Freedom to Tinker [Last Updated On: March 29th, 2017] [Originally Added On: March 29th, 2017]
- Questions for the FBI on Encryption Mandates - Freedom to Tinker [Last Updated On: March 29th, 2017] [Originally Added On: March 29th, 2017]
- Justice Department anti-terror chief keeps pressing on encryption - Politico (blog) [Last Updated On: March 29th, 2017] [Originally Added On: March 29th, 2017]
- UK government can force encryption removal, but fears losing, experts say - The Guardian [Last Updated On: March 29th, 2017] [Originally Added On: March 29th, 2017]
- Encryption FAQs [Last Updated On: March 29th, 2017] [Originally Added On: March 29th, 2017]
- Why isn't US military email protected by standard encryption tech? - Naked Security [Last Updated On: April 9th, 2017] [Originally Added On: April 9th, 2017]
- How have ARM TrustZone flaws affected Android encryption? - TechTarget [Last Updated On: April 9th, 2017] [Originally Added On: April 9th, 2017]
- Keeping the enterprise secure in the age of mass encryption - Information Age [Last Updated On: April 9th, 2017] [Originally Added On: April 9th, 2017]
- Lack of encryption led to Dallas siren hack - WFAA [Last Updated On: April 12th, 2017] [Originally Added On: April 12th, 2017]
- Internet Society tells G20 nations: The web must be fully encrypted - The Register [Last Updated On: April 12th, 2017] [Originally Added On: April 12th, 2017]
- Make Encryption Ubiquitous, Says Internet Society - Infosecurity ... - Infosecurity Magazine [Last Updated On: April 12th, 2017] [Originally Added On: April 12th, 2017]
- Can we encrypt the web while giving governments a backdoor to snoop? - SC Magazine UK [Last Updated On: April 12th, 2017] [Originally Added On: April 12th, 2017]
- Why we need to encrypt everything - InfoWorld [Last Updated On: April 12th, 2017] [Originally Added On: April 12th, 2017]
- Hacked Dallas sirens get extra encryption to fend off future attacks - Computerworld [Last Updated On: April 12th, 2017] [Originally Added On: April 12th, 2017]
- SHA-1 Encryption Has Been Broken: Now What? - Forbes [Last Updated On: April 14th, 2017] [Originally Added On: April 14th, 2017]
- Hewlett Packard Enterprise touts encryption tool for federal clients - The Hill [Last Updated On: April 14th, 2017] [Originally Added On: April 14th, 2017]
- Encryption on the Rise in Age of Cloud - Infosecurity Magazine - Infosecurity Magazine [Last Updated On: April 14th, 2017] [Originally Added On: April 14th, 2017]
- Lawmaker Pushes Bill That Requires Encryption by Pennsylvania State Employees - Government Technology [Last Updated On: April 14th, 2017] [Originally Added On: April 14th, 2017]
- Disk encryption - Wikipedia [Last Updated On: April 14th, 2017] [Originally Added On: April 14th, 2017]
- The apps to use if you want to keep your messages private - Recode [Last Updated On: April 15th, 2017] [Originally Added On: April 15th, 2017]