Quantum Computing Threat
The following is an excerpt by Skip Sanzeri, Co-Founder and COO at QuSecure, from his contributed book chapter 17 in Counterterrorism and Cybersecurity: Total Information Awareness (3rd ed. 2024 Edition)
Every day, each one of us increases our digital footprint by generating ever-greater volumes of data collected through our use of computers and mobile phones. Used Waze lately? Hooked on ChatGPT? Scrolling on TikTok or Instagram? Ordered anything on Amazon? Logged onto, or visited any website? If you think about it, most of our decisions, behaviors, preferences, locations, and personal information are now stored in vast databases which are accessible via the Internet. Unfortunately, our convenient access to sites and data also means this information can be stolen and decrypted by adversarial nation-states and bad actors.
Decades ago, we could not have imagined how much information we would create, then willingly trade for convenience. Today, with every click, swipe, video creation or audible word, we are continually adding to the mountain of digitally logged and stored government secrets, corporate data and personal information. To make things worse, the future will offer us unrefusable deals to create even larger digital shadows for machine learning and AI (Artificial Intelligence) to process (starting with ChatGPT and moving to more powerful Artificial Intelligence models).? According to Statista, the amount of data created and captured globally could reach 120 zettabytes in 2023 (each zettabyte is 1 billion terabytes). Up to 2025, global data creation is projected to grow to more than 180 zettabytes. Unfortunately, due to our use of the internet, all this data can be accessible to hackers, thieves and those who would disrupt or cause harm. In other words,
there is no future scenario that offers less risk to our data and systems being compromised.
To date, the encryption?(encryption is the technology that is designed to keep our data safe as it travels through networks and over the Internet and while it is stored) we use to protect our ever-increasing data and 24/7 communications to a great extent has held up. Since this encryption was designed to thwart data decryption by hackers using the digital computers we use today, it’s done a reasonable job of protecting us from theft, disruption and harm.
But what if I told you that there is a new form of computer on the horizon that has the capability to illegally access all our existing data and control any systems such as energy grids, satellites, military weapons systems, and financial systems? Unfortunately, there is, and it's called a Quantum Computer. This chapter will cover how Quantum computers will be used to break the cryptography we use to access nearly everything, and all the data listed above will be laid bare (more on this later). And consider yourself warned that quantum computers pose an existential threat to the very way of life we live in the free world and whichever nation brings a sufficiently powerful quantum computer online will have an opportunity at global domination.
In the wrong hands, quantum computers may be the greatest terrorism device ever invented.
About the Book
Graduated from the FBI Citizens Academy in 2021, Prof. Newton Lee offers a broad survey of counterterrorism and cybersecurity history, strategies, and technologies in the 3rd edition of his riveting book that examines the role of the intelligence community, cures for terrorism, war and peace, cyber warfare, and quantum computing security.
This book is indispensable for anyone who is contemplating a career at the FBI, think tanks, or law enforcement agencies worldwide. It is also a must-read for every executive to safeguard their organization against cyberattacks that have caused more than $10 billion in damages.
In the spirit of President John F. Kennedy, one may proclaim: “Ask not what counterterrorism and cybersecurity can do for you, ask what you can do for counterterrorism and cybersecurity.”
Reviews and Praise
“The book presents a crisp narrative on cyberattacks and how to protect against these attacks. … The author views terrorism as a disease that may be cured through education and communication. … The book is a relevant, useful, and genial mix of history, current times, practical advice, and policy goals.”
领英推荐
- Brad Reid, ACM Computing Reviews
“Very professional and well researched.”
- Eleanor Clift, Newsweek and The Daily Beast
“I would fully recommend following the author's steps, reaching beyond our borders, making friends outside our norm, and helping to foster world peace and a better tomorrow.”
- Veteran Staff Sergeant Andrew Price, U.S. Air Force
“I commend the author for putting together such a useful and informative book. I rate the book 5 out of 5 stars. The fight against terrorism and ensuring cybersecurity is not the duty of just the government or security agents alone; each individual has a role to play. The book is exceptionally well edited.”
- Ebere Writes Concept, OnlineBookClub.org
"The book demystifies the Total Information Awareness (TIA) program. Lee's Counterterrorism and Cybersecurity is a must-read page turner infused with knowledge and wisdom that challenges our beliefs and opens our mind to a more peaceful high-tech world."
- Sweta Bose, Cyber Security News
Get your copy on Amazon
Professional Website Developer with 7+ Years of Experience
5 个月Newton, thanks for sharing!