Under the Trump administration, the traditional structure of White House oversight of American offensive and defensive cyberactivities is being dismantled. David E. Sanger Read Quote
Once cyber crosses into the realm of the physical, then it’s a physical attack, but it starts with cyber. And the idea of a cyber attack being able to take control of machines – that becomes a scary process. David E. Sanger Read Quote
In the Chinese view, the United States has designed its own system of rules about what constitutes ‘legal’ spying and what is illegal. David E. Sanger Read Quote
Until Japan’s economy drove off a cliff, there was a running argument in Asia about whether it would be wiser to follow the ‘Japan model’ – with its megacorporations, jobs for life, state control of strategic industries – or the ‘American model’ of largely unfettered markets. David E. Sanger Read Quote
As we put autonomous cars on the road, connect Alexas to our lights and our thermostats, put ill-protected Internet-connected video cameras on our houses, and conduct our financial lives over our cell phones, our vulnerabilities expand exponentially. David E. Sanger Read Quote
Even China’s leaders routinely let the news media pool in, though they do their best to ignore them. David E. Sanger Read Quote
American officials sometimes dig into corporations because they are suspected to be witting or unwitting suppliers of technology to the North Koreans or the Iranians. David E. Sanger Read Quote
In the old nuclear age, you could sit under a big screen under a mountain in Colorado, and you could see where the missiles were coming from. David E. Sanger Read Quote
If there’s a cyberattack from China or Russia or Romania or Mexico, it may well run through a server in another country. And it may take months before you know where it really came from. David E. Sanger Read Quote