William Lynn III: Cyber attacks, from theft to disruption and soon destruction

Video: “Something like this will happen,” says former deputy secretary of defense William J. Lynn of Washington Post Live’s simulation cyber attack. Lynn recounts that the cyber threat used to be theft of information or theft of money. “We’ve now moved up to disruption,” he says. “The third level is actual destruction. I think it’s reasonable to believe that we’re moving in that direction.”

As part of its 2013 Cybersecurity Summit, Washington Post Live convened leading national security officials, industry experts and journalists for conversations addressing cyber risks and the future of cyber defense.

William Lynn III, former U.S. deputy defense secretary; chief executive, DRS Technologies

Gallery

A gaucho rides a wild horse during the annual celebration of Criolla Week in Montevideo, April 15, 2014. Throughout Easter Week, 'gauchos', the Latin American equivalent of the North American cowboy, from all over Uruguay and neighboring Argentina and Brazil will visit Montevideo to participate in the Criolla Week to win the best rider award. The competition is held from April 13 to April 20 this year. REUTERS/Andres Stapff (URUGUAY - Tags: ANIMALS SOCIETY)

Photos of the day

South Korean ferry capsizes, Boston marathon bombing anniversary, T. rex bones, Viking longboat on the Thames and more.

Two trends are converging. It used to be the focus of cyber-intrusions was theft of information, theft of data, theft of money. We’re seeing a lot now of disruption ... and we’re on our way to actual destruction. The other trend is cyber-capabilities, like most sophisticated military capabilities, were [once] the province of sophisticated nation-states. That’s getting less and less true. A dozen guys in flip-flops and with Red Bull getting stuff off eBay can pose a significant threat. When those two trends converge — greater destructiveness of cyber-intrusions and greater maliciousness of the potential actors — we’re going to see some sort of attempt on U.S. infrastructure.

The arms race in cybersecurity

After leaks, NSA struggles for trust

Fort Meade transforming from Army base to cyber city

 
Read what others are saying