Difference between revisions of "James Adams (UK journalist)"

From Powerbase
Jump to: navigation, search
 
(12 intermediate revisions by 2 users not shown)
Line 1: Line 1:
[[James Adams]] is a former journalist with the [[Sunday Times]], well known for acting as a conduit for official and intelligence leaks. He is the Formerly the CEO of [[UPI]] and is CEO of both [[I-Defense]] and the [[Ashland Institute for Strategic Studies]]<ref>Jon Swartz, [http://www.usatoday.com/tech/news/2004-08-02-cyber-terror_x.htm Cyberterror impact, defense under scrutiny], USA Today, 2-August-2004, Accessed 12-December-2009</ref><ref>''Frontline'', [http://www.pbs.org/wgbh/pages/frontline/shows/hackers/interviews/adams.html Interview with James Adams], ''Frontline'', Accessed 12-December-2009</ref>.
+
[[James Adams]] is a former journalist with the [[Sunday Times]], well known for acting as a conduit for official and intelligence leaks. He is the Formerly the CEO of [[UPI]] and is CEO and founder of both [[IDefense]] and the [[Ashland Institute for Strategic Studies]]<ref>Jon Swartz, [http://www.usatoday.com/tech/news/2004-08-02-cyber-terror_x.htm Cyberterror impact, defense under scrutiny], USA Today, 2-August-2004, Accessed 12-December-2009</ref><ref>''Frontline'', [http://www.pbs.org/wgbh/pages/frontline/shows/hackers/interviews/adams.html Interview with James Adams], ''Frontline'', Accessed 12-December-2009</ref>. He is also an adviser to the US [[National Security Agency]]<ref>James Adams, [http://www.foreignaffairs.org/20010501faessay4771/james-adams/virtual-defense.html Virtual Defense], Foreign Affairs, May/June 2001, accessed 22 Sept 2009</ref>.
  
 
He was involved in the controversy over the Sunday Times's reporting of the [[Gibraltar Killings - 6 March 1988|killings in Gibraltar in March 1988]], in which three unarmed [[Irish Republican Army]] (IRA) members were shot dead by undercover members of the [[Special Air Service]] (SAS).  
 
He was involved in the controversy over the Sunday Times's reporting of the [[Gibraltar Killings - 6 March 1988|killings in Gibraltar in March 1988]], in which three unarmed [[Irish Republican Army]] (IRA) members were shot dead by undercover members of the [[Special Air Service]] (SAS).  
Line 7: Line 7:
 
:James Adams is the Chief Executive Officer of [[United Press International]]. Formerly the Washington Bureau Chief, managing editor, and defense correspondent for the London Sunday Times, he has reported on American politics and international relations, with special interest in terrorism and intelligence, and is also the author of twelve previous books, both fiction and nonfiction. He lives in Cabin John, Maryland.<ref>[http://www.powells.com/cgi-bin/biblio?inkey=17-0684834529-0#product_details Author Biography in Review of James Adams, ''Next World War Computers Are the Weapons''], Powell's Books website, accessed 22 Sept 2009</ref>
 
:James Adams is the Chief Executive Officer of [[United Press International]]. Formerly the Washington Bureau Chief, managing editor, and defense correspondent for the London Sunday Times, he has reported on American politics and international relations, with special interest in terrorism and intelligence, and is also the author of twelve previous books, both fiction and nonfiction. He lives in Cabin John, Maryland.<ref>[http://www.powells.com/cgi-bin/biblio?inkey=17-0684834529-0#product_details Author Biography in Review of James Adams, ''Next World War Computers Are the Weapons''], Powell's Books website, accessed 22 Sept 2009</ref>
  
In 2001 Adams published an article in the May/June issue of [[Foreign Affairs]], the journal of the [[Council on Foreign Relations]]. The introduction to the article described him as Co-founder and Chairman of [[iDefense]], a cyber-intelligence and risk-management firm, and as serving on the [[National Security Agency Advisory Board]].<ref>James Adams, [http://www.foreignaffairs.org/20010501faessay4771/james-adams/virtual-defense.html Virtual Defense], Foreign Affairs, May/June 2001, accessed 22 Sept 2009</ref>.
+
==Cyberterrorism==
  
==Cyberterrorism==
+
Adams appears regularly in the media warning of the danger of cyberterrorism.
  
Adams is also the CEO of the [[Ashland Institute for Strategic Studies]], a research based think tank. Adams was quoted in an interview with ''USA Today'' commenting on potential cyberterrorist attacks, he said:
+
He was quoted in an interview with ''USA Today'' commenting on potential cyberterrorist attacks, he said:
  
:"Al-Qaeda doesn't see cyberterrorism as achieving significant military goals. They see the world in a rather old-fashioned way, where bombings and shootings have direct impact and scare people." He went on to say that "There are a large number of threats: hackers, cybercriminals, other countries," says Amit Yoran, director of the Department of Homeland Security's National Cyber Security Division. "It goes beyond al-Qaeda.<ref>Jon Swartz, [http://www.usatoday.com/tech/news/2004-08-02-cyber-terror_x.htm Cyberterror impact, defense under scrutiny], USA Today, 2-August-2004, Accessed 12-December-2009</ref>."
+
:Al-Qaeda doesn't see cyberterrorism as achieving significant military goals. They see the world in a rather old-fashioned way, where bombings and shootings have direct impact and scare people<ref>Jon Swartz, [http://www.usatoday.com/tech/news/2004-08-02-cyber-terror_x.htm Cyberterror impact, defense under scrutiny], USA Today, 2-August-2004, Accessed 12-December-2009</ref>.
  
 
In an interview with PBS Adams described the danger posed by cyberterrorism:
 
In an interview with PBS Adams described the danger posed by cyberterrorism:
  
:"you and I can go into our local computer store and buy what is essentially an immensely powerful weapon: the computer. And you can load that weapon with very powerful bullets, which are hacks downloaded from the web, and you can fire that weapon at pretty much anybody you choose"<ref>Frontline, [http://www.pbs.org/wgbh/pages/frontline/shows/hackers/interviews/adams.html Interview with James Adams], ''Frontline'', Accessed 12-December-2009</ref>.
+
:You and I can go into our local computer store and buy what is essentially an immensely powerful weapon: the computer. And you can load that weapon with very powerful bullets, which are hacks downloaded from the web, and you can fire that weapon at pretty much anybody you choose<ref>Frontline, [http://www.pbs.org/wgbh/pages/frontline/shows/hackers/interviews/adams.html Interview with James Adams], ''Frontline'', Accessed 12-December-2009</ref>.
  
 
===Cyberterrorism as the Next World War===
 
===Cyberterrorism as the Next World War===
Line 23: Line 23:
 
In an interview with ''Frontline'', Adams described how intelligence agencies see cyberterrorism as the next world war:  
 
In an interview with ''Frontline'', Adams described how intelligence agencies see cyberterrorism as the next world war:  
  
:". . . For example, when I was in Moscow a couple of years ago, it was very clear to me, from talking to the senior people in the scientific and intelligence communities, that they already feel they're at war. They are convinced that they are engaged in the next world war, that it is happening in cyberspace, and that they're losing. They're very active in the area, but they think that America has a very significant advantage, which is why the Russians have come up with two proposals for arms control agreements in cyberspace"<ref>Frontline, [http://www.pbs.org/wgbh/pages/frontline/shows/hackers/interviews/adams.html Interview with James Adams], ''Frontline'', Accessed 12-December-2009</ref>.
+
:. . . For example, when I was in Moscow a couple of years ago, it was very clear to me, from talking to the senior people in the scientific and intelligence communities, that they already feel they're at war. They are convinced that they are engaged in the next world war, that it is happening in cyberspace, and that they're losing. They're very active in the area, but they think that America has a very significant advantage, which is why the Russians have come up with two proposals for arms control agreements in cyberspace<ref>Frontline, [http://www.pbs.org/wgbh/pages/frontline/shows/hackers/interviews/adams.html Interview with James Adams], ''Frontline'', Accessed 12-December-2009</ref>.
  
:"Well, they haven't got much of a reception for that, because America and its allies think that we're winning the war, so why should we have a treaty? But it is a very dynamic environment, where everybody sees that they need to play, and everybody is trying to seize advantage. And all the aggressors currently have the opportunity, because nobody is properly defended"<ref>Frontline, [http://www.pbs.org/wgbh/pages/frontline/shows/hackers/interviews/adams.html Interview with James Adams], ''Frontline'', Accessed 12-December-2009</ref>.
+
:Well, they haven't got much of a reception for that, because America and its allies think that we're winning the war, so why should we have a treaty? But it is a very dynamic environment, where everybody sees that they need to play, and everybody is trying to seize advantage. And all the aggressors currently have the opportunity, because nobody is properly defended<ref>Frontline, [http://www.pbs.org/wgbh/pages/frontline/shows/hackers/interviews/adams.html Interview with James Adams], ''Frontline'', Accessed 12-December-2009</ref>.
  
===The role of i-Defense in cmbatting cyberterrorism===
+
===The role of i-Defense in combatting cyberterrorism===
  
 
Adams describes the role of i-Defense in
 
Adams describes the role of i-Defense in
  
:"Well, from a personal perspective, because I've seen so much of the consequences of war and of chaos, I wish to play a part in not having chaos. My job is not offensive information warfare. Could we have the capability if we chose? Sure. But would I ever launch an offensive attack? Absolutely not. That's not our business. If others choose to do that, fine. All I provide is the intelligence that says, "This is an indication, this is a warning, this is what you need to do." And I can then serve, not just America, but I can serve Japan and Asia from iDefense Japan, and I can serve Europe from iDefense UK. So hopefully, I can serve the globe without fear or favor in an impartial way, with intelligence that enables everybody to defend themselves"<ref>Frontline, [http://www.pbs.org/wgbh/pages/frontline/shows/hackers/interviews/adams.html Interview with James Adams], ''Frontline'', Accessed 12-December-2009</ref>.
+
:Well, from a personal perspective, because I've seen so much of the consequences of war and of chaos, I wish to play a part in not having chaos. My job is not offensive information warfare. Could we have the capability if we chose? Sure. But would I ever launch an offensive attack? Absolutely not. That's not our business. If others choose to do that, fine. All I provide is the intelligence that says, "This is an indication, this is a warning, this is what you need to do." And I can then serve, not just America, but I can serve Japan and Asia from iDefense Japan, and I can serve Europe from iDefense UK. So hopefully, I can serve the globe without fear or favor in an impartial way, with intelligence that enables everybody to defend themselves<ref>Frontline, [http://www.pbs.org/wgbh/pages/frontline/shows/hackers/interviews/adams.html Interview with James Adams], ''Frontline'', Accessed 12-December-2009</ref>.
  
 
==Affiliations==
 
==Affiliations==
  
[[Sunday Times]] | [[Gibraltar Killings - 6 March 1988]] | [[United Press International]] | [[Foreign Affairs]] | [[Council on Foreign Relations]] | [[iDefense]] | US [[National Security Agency]]<ref>Frontline, [http://www.pbs.org/wgbh/pages/frontline/shows/hackers/interviews/adams.html Interview with James Adams], ''Frontline'', Accessed 12-December-2009</ref> (Advisory Board)
+
[[Sunday Times]] | [[Gibraltar Killings - 6 March 1988]] | [[United Press International]] | [[Foreign Affairs]] | [[Council on Foreign Relations]] | [[iDefense]] | US [[National Security Agency]]<ref>Frontline, [http://www.pbs.org/wgbh/pages/frontline/shows/hackers/interviews/adams.html Interview with James Adams], ''Frontline'', Accessed 12-December-2009</ref> (Advisory Board) | [[Ashland Institute for Strategic Studies]]
  
 
==Notes==
 
==Notes==
 
<references/>
 
<references/>
  
[[Category:journalism]][[Category:Media]][[category:journalists]][[Category:Media Industry]]
+
[[Category:Journalism|Adams, James]][[Category:Media|Adams, James]][[category:Journalists|Adams, James]][[Category:Media Industry|Adams, James]]

Latest revision as of 15:53, 12 May 2010

James Adams is a former journalist with the Sunday Times, well known for acting as a conduit for official and intelligence leaks. He is the Formerly the CEO of UPI and is CEO and founder of both IDefense and the Ashland Institute for Strategic Studies[1][2]. He is also an adviser to the US National Security Agency[3].

He was involved in the controversy over the Sunday Times's reporting of the killings in Gibraltar in March 1988, in which three unarmed Irish Republican Army (IRA) members were shot dead by undercover members of the Special Air Service (SAS).

The following is Adams's biography on the Powell's Books website:

James Adams is the Chief Executive Officer of United Press International. Formerly the Washington Bureau Chief, managing editor, and defense correspondent for the London Sunday Times, he has reported on American politics and international relations, with special interest in terrorism and intelligence, and is also the author of twelve previous books, both fiction and nonfiction. He lives in Cabin John, Maryland.[4]

Cyberterrorism

Adams appears regularly in the media warning of the danger of cyberterrorism.

He was quoted in an interview with USA Today commenting on potential cyberterrorist attacks, he said:

Al-Qaeda doesn't see cyberterrorism as achieving significant military goals. They see the world in a rather old-fashioned way, where bombings and shootings have direct impact and scare people[5].

In an interview with PBS Adams described the danger posed by cyberterrorism:

You and I can go into our local computer store and buy what is essentially an immensely powerful weapon: the computer. And you can load that weapon with very powerful bullets, which are hacks downloaded from the web, and you can fire that weapon at pretty much anybody you choose[6].

Cyberterrorism as the Next World War

In an interview with Frontline, Adams described how intelligence agencies see cyberterrorism as the next world war:

. . . For example, when I was in Moscow a couple of years ago, it was very clear to me, from talking to the senior people in the scientific and intelligence communities, that they already feel they're at war. They are convinced that they are engaged in the next world war, that it is happening in cyberspace, and that they're losing. They're very active in the area, but they think that America has a very significant advantage, which is why the Russians have come up with two proposals for arms control agreements in cyberspace[7].
Well, they haven't got much of a reception for that, because America and its allies think that we're winning the war, so why should we have a treaty? But it is a very dynamic environment, where everybody sees that they need to play, and everybody is trying to seize advantage. And all the aggressors currently have the opportunity, because nobody is properly defended[8].

The role of i-Defense in combatting cyberterrorism

Adams describes the role of i-Defense in

Well, from a personal perspective, because I've seen so much of the consequences of war and of chaos, I wish to play a part in not having chaos. My job is not offensive information warfare. Could we have the capability if we chose? Sure. But would I ever launch an offensive attack? Absolutely not. That's not our business. If others choose to do that, fine. All I provide is the intelligence that says, "This is an indication, this is a warning, this is what you need to do." And I can then serve, not just America, but I can serve Japan and Asia from iDefense Japan, and I can serve Europe from iDefense UK. So hopefully, I can serve the globe without fear or favor in an impartial way, with intelligence that enables everybody to defend themselves[9].

Affiliations

Sunday Times | Gibraltar Killings - 6 March 1988 | United Press International | Foreign Affairs | Council on Foreign Relations | iDefense | US National Security Agency[10] (Advisory Board) | Ashland Institute for Strategic Studies

Notes

  1. Jon Swartz, Cyberterror impact, defense under scrutiny, USA Today, 2-August-2004, Accessed 12-December-2009
  2. Frontline, Interview with James Adams, Frontline, Accessed 12-December-2009
  3. James Adams, Virtual Defense, Foreign Affairs, May/June 2001, accessed 22 Sept 2009
  4. Author Biography in Review of James Adams, Next World War Computers Are the Weapons, Powell's Books website, accessed 22 Sept 2009
  5. Jon Swartz, Cyberterror impact, defense under scrutiny, USA Today, 2-August-2004, Accessed 12-December-2009
  6. Frontline, Interview with James Adams, Frontline, Accessed 12-December-2009
  7. Frontline, Interview with James Adams, Frontline, Accessed 12-December-2009
  8. Frontline, Interview with James Adams, Frontline, Accessed 12-December-2009
  9. Frontline, Interview with James Adams, Frontline, Accessed 12-December-2009
  10. Frontline, Interview with James Adams, Frontline, Accessed 12-December-2009