Podcast: AI-Guided Drone Warfare, North Korean Cybercrimes : The NPR Politics Podcast Amid a frenetic campaign newscycle, we take a look at some of the very real challenges that the next president will have to tackle during their four-year term including AI-guided weaponry and a complex web of North Korean cybercrime.

This episode: national political correspondent Sarah McCammon, cybersecurity correspondent Jenna McClaughlin, and national security correspondent Greg Myre.

The podcast is produced by Jeongyoon Han, Casey Morell and Kelli Wessinger. Our intern is Bria Suggs. Our editor is Eric McDaniel. Our executive producer is Muthoni Muturi.

Listen to every episode of the NPR Politics Podcast sponsor-free, unlock access to bonus episodes with more from the NPR Politics team, and support public media when you sign up for The NPR Politics Podcast+ at plus.npr.org/politics.

What the next president has to contend with: AI weapons, North Korean cybercrime

  • Download
  • <iframe src="https://www.npr.org/player/embed/1197964527/1255340086" width="100%" height="290" frameborder="0" scrolling="no" title="NPR embedded audio player">
  • Transcript

LILY: Hi. This is Lily (ph), sweltering in my ranger uniform. Thank goodness we negotiated for shorts if it's above 90 degrees. But there's only so much that big old hat can do. This podcast was recorded at...

SARAH MCCAMMON, HOST:

12:26 p.m. Eastern time on Monday, July 8, 2024.

LILY: Things might have changed by the time you hear this, but I'll still be swearing in Junior Rangers and hopefully giving really good guided hikes. Enjoy the show.

(SOUNDBITE OF THE BIGTOP ORCHESTRA'S "TEETER BOARD: FOLIES BERGERE (MARCH AND TWO-STEP)")

MCCAMMON: Sounds familiar. Just got a kid off to scout camp this week myself.

GREG MYRE, BYLINE: Yeah. It sounds like it's hot everywhere.

MCCAMMON: Hey there. It's the NPR POLITICS PODCAST. I'm Sarah McCammon. I cover the presidential campaign.

JENNA MCLAUGHLIN, BYLINE: I'm Jenna McLaughlin. I cover cybersecurity.

MYRE: And I'm Greg Myre. I cover national security.

MCCAMMON: Today on the podcast - a reminder of the stakes for this presidential election and a look at some of the big challenges the next president will have to confront. We're going to start with AI weaponry. And Greg, you've been doing some reporting about weapons being sold by an American defense contractor in Ukraine that are supposed to be able to use artificial intelligence to decide what to target. That sounds really futuristic, but it's not. It's now. So tell us about these drones.

MYRE: Right. Well, so I visited a company called Anduril. It's just 7 years old. It's based in Costa Mesa, Calif., just south of Los Angeles. It's one of a number of these new companies that are developing AI weapons. And their drones, in particular, are really interesting because you think of a typical drone and the kinds of weapons that have been used. It has an operator guiding that drone, looking at the video footage, sending it places. But, of course, there has to be a signal between the drone and the person operating it.

But Anduril and other companies are making drones that don't require that - that the drone, in effect, has a brain. So for example, as they're being used in Ukraine, if you want to go take out a Russian tank, you can tell the drone, go in this area, look for a Russian tank. And if you see one, hit it. And the reason is because the Russians can jam those signals and render the drone useless. So Anduril and others are trying to make these drones that can act on their own and don't - literally don't require a human once they've set the target.

MCCAMMON: You know, I have to ask, Greg - I mean, it sort of begs the question. Machines can make errors, too, right? I mean, how accurate are these things?

MYRE: Oh, absolutely. You send a drone up there, and it's supposed to decide what is a military vehicle and a legitimate target and what is a civilian vehicle and not a legitimate target. How do you distinguish a soldier from a civilian? You know, is the AI - is the artificial intelligence good enough to make these distinctions? Now, humans can certainly make these mistakes.

MCCAMMON: Now, beyond the technology itself, the brain behind this stuff - the real, human brain - the person who founded this company might be familiar to some. His name is Palmer Luckey. You've been reporting on his background and his current work. Greg, tell me more about him.

MYRE: Right. So I met with him, had a long interview with him when I went out to Anduril in California. When he was just a teenager, he built the Oculus Rift. This was the first virtual-reality headset for gaming that really hit it big in the consumer market. Just a couple years later, when he was still in his early 20s, he sold it to Facebook for $2 billion. And then he went to work for Facebook - didn't work out. So he took his fortunes. He decided to get into the defense business.

He's a very iconoclastic figure in the tech world. He has a mullet. He always wears shorts and flip flops and Hawaiian shirts. He's got very conservative politics. He's been a big supporter of Donald Trump for years. So he is not your typical Silicon Valley tech person, and he's certainly not your standard buttoned-down defense contractor. He says his goal is to give the U.S. and its allies the very best tech in the world. It's so good, hopefully it will deter rivals from even fighting. And the better the tech, the better the weapons that can operate on their own, the fewer soldiers you have to put in harm's way.

MCLAUGHLIN: Yeah. So Greg, I mean, when you mention a mullet, flip-flops, that's not really what you think of with these traditional big defense contractors - your Boeings, Lockheed Martins. How has this evolution kind of developed between those guys and this company?

MYRE: Right. So those big companies - you know, they have revenues of tens of billions of dollars. They've been around for decades. They sign a contract with the Pentagon to make fighter jets or submarines or tanks. That contract may last for decades. There's often cost overruns, stuff is not ready on time, and this is kind of the way defense contracting has been done for decades.

But this idea that Anduril has is very, very different. Their idea is to make AI weapons much cheaper, much more quickly, much more adaptable than these big defense contractors. Some of their drones fold up and can be put in a backpack. So obviously, they're not going to carry the same amount of punch as, say, a fighter jet with a big missile on it. But they say this is the future - small, nimble weaponries. And I spoke to Palmer Luckey about why he decided to get into this business. And let's hear what he had to say.

PALMER LUCKEY: I had this belief that the major defense companies in the U.S. didn't have the right talent or the right incentive structure to invest in things like artificial intelligence, autonomy, robotics. And the companies that did have expertise in those things, like Google, like Facebook, like Apple, were refusing to work with the U.S. national security community.

MYRE: So that's the second part of it is that there are other tech companies - the big ones he just named - that could do this kind of stuff, but they've really shied away from working in the national security space, with the military. And so he saw an opening. Other companies are moving into that space. They're still small. It's still changing, but it does seem to be something we're going to see a lot more of.

MCCAMMON: You know, it's so interesting, Greg. I think everybody recognizes now how much power many of these tech CEOs have, right? We've seen them upend other industries in ways that have big implications for the way that we think about even truth and misinformation. But this is - it feels like maybe another level. I mean, we're talking about military power here and sort of upending some of the conventional power players and gatekeepers. We talked earlier about some of the risks of taking humans out of the equation. I mean, what kind of restraints are in place, or are there any?

MYRE: Sarah, there really aren't. There aren't any rules. This is new. It's developing. We don't really have a system to deal with that. Now, some countries and human rights groups - Human Rights Watch in particular - are calling for a formal set of rules about how AI weapons can and can't be used, how they should be regulated. And, you know, but the basic principle, of course, that you just mentioned is you don't want to take humans out of the loop. They should always be part of the decision-making process, even though humans are certainly very fallible.

But in battlefield situations, you could see how these restraints easily can break down. And it would be very easy to start sending weapons into areas, and maybe the AI is not good enough. It's not making distinctions that it should be making. And what happens when civilians gets hit? Who's responsible? The person who - if you have a situation where a large number of civilians are killed by an AI weapon, is that the responsibility of the soldier in the field who used it? Is that the responsibility of a commander who picked a target or the AI weapons-maker who didn't have a system that was sophisticated or subtle enough to distinguish between a military target and a civilian target?

MCCAMMON: We talked about Ukraine. Are we seeing this elsewhere? Are other countries using this same kind of technology, and how worried are U.S. defense officials about it?

MYRE: Oh, it's a very real thing. Certainly, I think the two big countries are China and Russia. China has very good technology. And if the U.S. and China were to get in a conflict, both of them would be using very advanced AI weapons - Russia maybe a little less so. But Russia is very good at things like electronic jamming, so it can block drones and a lot of weapons.

And, again, I can't stress enough how the Ukraine war has just become a laboratory. All of these companies doing this kind of cutting-edge research and weapons-building wanted to get into Ukraine, see how their weapons performed, try to sell it to countries like Ukraine, which desperately needed anything it could get. So what we're seeing is an explosion of these efforts in Ukraine. And wars have a tendency to speed up innovation, and that's exactly what we're seeing here.

MCLAUGHLIN: Yes, Sarah. Greg and I have both reported out of Ukraine, and we're really seeing these technology rules being written in real-time.

MCCAMMON: Fascinating. We're going to take a quick break. And when we get back, we'll talk about working remotely from North Korea.

And we're back. And Jenna, I'm metaphorically swiveling my chair toward you. You've got a story about an exposed North Korean campaign to get remote workers hired at U.S. companies and a lot of implications that flow from that campaign. So what's going on with this?

MCLAUGHLIN: Yeah, Sarah. It's a really crazy story. And let me take you back to March 2020. The WHO announces a global pandemic. We all start working from home. And at that moment, North Korea actually saw an opportunity so its workers could apply for those same remote jobs undercover.

So this actually follows in kind of a long line of North Korean scams. They're always trying to make money, and they need to find ways to stay afloat to support their nuclear weapons program. They've done that all sorts of ways, and that includes building stadiums for major sports tournaments. They were selling fake Viagra pills in the '90s. There's North Korean restaurants in world capitals everywhere. But in the last decade or so, North Korea has really advanced their technical skills because it doesn't take a ton of money or resources to develop those skills, and they work, hard long hours.

MCCAMMON: And Jenna, what kind of scale are we talking about here?

MCLAUGHLIN: I actually spoke to Dr. Jung Pak at the State Department. She's the deputy assistant secretary of the bureau of East Asian and Pacific affairs, and she's in charge of diplomatic relations with North Korea or DPRK.

JUNG PAK: They are generating revenue by getting jobs to develop websites. They're designing dating apps.

MCLAUGHLIN: The government estimates that there are thousands of workers at dozens of Fortune 500 companies. It's hard to actually pinpoint that thousands number because, when I did some interviews on this, some of these workers are doing more than one job. They're all sort of stuffed together in group houses - you know, 10-plus people in one space. They're working kind of around the clock. And that makes it hard to actually put a number on it. But they are making around $300 million a year, so that's pretty large-scale.

MCCAMMON: And this is all happening remotely from North Korea?

MCLAUGHLIN: It's not actually all happening from North Korea. So some of these workers are in places like Russia and China - places that are friendly to Pyongyang - but they're still heavily monitored by North Korean officials.

MYRE: Jenna, I'm always amazed at what the North Koreans can do in the cyber world. This is not a country with a big tech industry. It seems like, you know, where do they develop these skills, and how have they figured out this huge opportunity to use these hacking skills and intelligence efforts and have so many people who are qualified to do it?

MCLAUGHLIN: Yeah, Greg. That's a good point. And you mentioned that sort of they don't have an industry, and that's because they kind of don't need an industry. You know, all of these workers are in service of the regime, so kind of all the resources that they've got go into promoting those ends. It's really interesting what's been happening recently. These IT workers previously were kind of grouped in this bucket of North Korean scams. But Dr. Jung Pak said that State is now viewing this activity differently. It's not just part of the traditional scam bucket. It's part of North Korea's broader cyber efforts.

So when we're thinking about North Korean elite hackers, they do have some similarities with other nation-state hackers from China, from Russia. They're breaking into defense industry companies in the U.S. and nearby in South Korea and Japan. They're gathering intelligence from those places. They want to bolster their own defense programs. But, you know, they're also wreaking havoc.

Back in 2014, after that movie, "The Interview," with Seth Rogan and James Franco came out, a lot of officials were very angry. They infamously hacked Sony and dumped a ton of sensitive emails from movie executives and movie stars. And, you know, now they're constantly stealing cryptocurrency to fund the regime as well. So a lot of these things are being blended. They're working together. They're getting a lot out of this access that they're having.

MCCAMMON: And Jenna, just to be clear, these jobs we're talking about, just - they seem like or they are just regular IT jobs, right?

MCLAUGHLIN: Yeah, exactly. And, you know, it's interesting how people have tried to work to uncover what's going on here. I spoke to Michael Barnhart at Google's Mandiant, and he's been studying North Korean hackers for a very long time. And he said, you know, looking back, in retrospect, they were able to kind of see this pattern happening, especially once COVID started.

MCCAMMON: So, I mean, what can be done to stop this? Obviously, the U.S. government is concerned about it. I mean, where do these companies that are hiring these workers in or supported by North Korea - where do the companies come in?

MCLAUGHLIN: Yeah, it's difficult. You know, these workers are experts at this at this point. They've had a couple of years to perfect it. And that will take the government stepping in and providing some of this intelligence, talking to these companies about what to look out for. But it'll also take some pretty traditional things, like vetting candidates, requiring them to go on video for their interviews, actually parsing through their resumes, calling their references - things that will make it really difficult for them to actually fake those things.

MCCAMMON: Obviously, we are dealing with a lot of campaign news right now. You know, Trump was online calling for military tribunals for his political antagonists over the weekend. President Biden is out with a letter to Democrats insisting he will not step away from the Democratic ticket. But as all of that goes on, both of these stories are really reminders of some of the big, thorny problems that one of these men very, very likely will have to deal with every day in the coming years. You know, I mean, Greg, I feel like it's just a good reminder of the stakes for this election.

MYRE: It's always struck me that there's this conventional wisdom that elections are not decided on foreign policy or national security. And yet I always find that kind of strange because presidents have a lot more power to act unilaterally when it comes to these issues. They can more or less start wars or end wars or make big changes to a policy with a country like Russia or China in a way that, domestically, you have so many constituencies pushing against each other one way or another. A president can't really make these decisions unilaterally. So yeah, I think this is a big issue, and we'll be watching.

MCCAMMON: All right, we're going to leave it there for today. I'm Sarah McCammon. I cover the presidential campaign.

MCLAUGHLIN: I'm Jenna McLaughlin. I cover cybersecurity.

MYRE: And I'm Greg Myre. I cover national security.

MCCAMMON: Thank you for listening to the NPR POLITICS PODCAST.

(SOUNDBITE OF THE BIGTOP ORCHESTRA'S "TEETER BOARD: FOLIES BERGERE (MARCH AND TWO-STEP)")

Copyright © 2024 NPR. All rights reserved. Visit our website terms of use and permissions pages at www.npr.org for further information.

NPR transcripts are created on a rush deadline by an NPR contractor. This text may not be in its final form and may be updated or revised in the future. Accuracy and availability may vary. The authoritative record of NPR’s programming is the audio record.