Quantum Computing and Counterintelligence

The United States intelligence community has four strategic functions. The first is collection, or the gathering of raw data through a whole host of means. The second is analysis, or providing policy makers with interpretations and estimations regarding this data. The third is covert action, or espionage -- the James Bond-stuff midway between diplomacy and war. The fourth function is counterintelligence: efforts to protect data, information, and U.S. intelligence from foreign adversaries and intelligence services. Since the CIA’s formation in 1947, each function has gradually obtained more tools, more methods, and thus more responsibilities. The satellite changed the nature of collection. Surveillance systems changed the nature of espionage.  And so forth.

At the beginning of 2011, the intelligence community may have bitten off more than it ought to chew. It is unfair and unwise to task an overwhelmed bureaucracy to keep up with the exponential pace of technology. This trend is occurring most haphazardly within the realm of counterintelligence.

Technology is a fine servant but a dangerous master. It changes in unpredictable ways. It redefines the boundaries of human potential. It compels us to reevaluate the nature of secrecy and our notions of privacy. The recent WikiLeaks controversy is small potatoes, the tip of the iceberg. The Stuxnet computer worm, though mysteriously advantageous in our efforts against the Iranian nuclear program, is the most advanced piece of malware ever discovered. It could turn its sights elsewhere. It could change everything.

Then there’s quantum computing. Moore’s Law states the capabilities of microprocessors double every 18 months. In ten to twenty years, this law will likely collapse. Silicon Valley will go quantum. Circuits will be measured on a molecular and atomic scale. Computers will be infinitely more powerful than they are today. According to Michio Kaku, quantum physicists today can conduct simple multiplication problems with just seven atoms. In the near future, when millions of atoms are able to be utilized, no CIA code will be safe.

This is the technological trajectory of the world. There is a great debate as to whether or not cyber-warfare is the fifth domain of war (along with land, sea, air, and space). Some believe cyber-warfare is merely a tactic within the framework of the preexisting domains of war, much like terrorism.  Others believe it is a new dimension altogether, requiring our attention and unwavering vigilance. Former DNI Mike McConnell wants to go so far as to “reengineer the Internet.”

Though much of this is turf-battle infighting, it is a fact that the Chinese have conducted cyber-operations against the United States. In a bipolar context like the Cold War, U.S. counterintelligence would be tasked with keeping pace. But the twenty-first century will be very unlike the twentieth-century. Our enemies, whether big powers like China or networks like al-Qaeda, will always undertake that metamorphosis which best exposes our soft underbelly. The underlying premise of counterintelligence this century, therefore, is not who we shall encounter but rather what we shall encounter.