Thursday, April 5, 2018
Exactly Where is Cyberspace?
Don't offer me a place...
out in cyberspace...
'cause where in the hell's that at?!
Billy Bragg lyrics
If we are fighting a
cyberwar, where are we fighting it? On the hardwired worldwide Web? In file
servers and computer terminals where signals are stored or begin or end? In the
mobile and satellite transmissions through the atmosphere and all around us? We
seem to know what the weapons are: malware, ransomware, shutting down entire
systems, taking over control of critical operations, disinformation, hacking
information, stealing technology and hard cash, secretly tracking “every step
you take, every move you make” and rendering everything that matters to you
useless.
Oh, and it’s not always
the “bad guys” over there that use these tools of obvious devastation. Of
course, to our enemies, we are the “bad guys.” During the Obama administration,
for example, the US/Israeli Stuxnet malware caused Iranian
weapons-grade-plutonium-separating centrifuges to fly apart, effectively
setting Tehran’s nuclear program back years (before the six-party, UN-sponsored
accord was signed). When you think of the potential consequences of such
malware – from crashing satellites to erasing/altering financial or medical
records, shutting down the financial markets entirely to knocking out a massive
power grid that could take years to rebuild to rerouting weapon systems and
shutting down aircraft mid-flight – the threat of nuclear weapons slides down
the priority list quickly. Why?
Because nuclear weapons
are too easy to trace, too simple to retaliate against. And the retaliation can
often be “mutually assured destruction.” There is no plausible deniability with
nukes. And there are always efforts toward nuclear arms reduction,
non-proliferation treaties, since testing nukes is hardly a big secret. We know
who’s got nukes because they cause a rather dramatic big bang, even when tested
deep underground. Cyber weapons, on the other hand, can be deployed secretly
with plenty of plausible deniability.
But why aren’t there any
treaties – hell, even any negotiations – concerning cyber-conflicts? Because to
negotiate a treaty, first a government has to admit that it does it and second
the parties have to explain what they are able to do. Even our national
security agencies often keep secrets from each other! The cyber-conflict world
is buried so deeply into cloak and dagger darkness – to the point where the
government hardwires in the ground in strategic communities are buried and
unmarked – that no one is even willing to admit that these technologies even
exist.
The Russians are way out
ahead of the United States in this arena. And North Korea, China and Iran are
not that far behind. Israel is quiet about their involvement but are legendary
in their capacity. Funny that nations with nuclear weapons also seem to be able
to generate amazing cyber-weapons as well. North Korea is addicted to
disrupting its targets and has a special operation that focuses simply on
stealing money, particular crypto-currencies. China wants technology, and
Russia tends to operate through “plausibly deniable” third parties, often
young, hip computer-geeks with expensive drug habits or a taste for the finer
things in life.
Because it is so
disruptive, so difficult absolutely to prove beyond any doubt, cyberwarfare is
rather completely unregulated. The “good” and “evil” players in the space are
pretty much able to do anything they want. Our most sensitive and vulnerable
critical civilian and military systems have been so tested and probed that we
know without even the slightest doubt that our enemies could shut down the
entire country, from air traffic to our power grids to our entire financial
system.
But because of some deep
and unknown reluctance by Donald Trump – will we ever really find out? – our
most malevolent cyber-foe, Russia, has been given a seeming carte blanche to
deploy its cyber-weapons against us with little or minimal defensive or
comparable offensive efforts against them. As testimony before Congressional
committees has evidenced, Donald Trump has simply not authorized the relevant
national securities agencies to respond with any force. The money is
authorized, but the President will not pull the trigger.
The April 2nd The
Cipher Brief warns all of us that failing to act, failing to mount
counter-measures in a constant and persistent manner, not only encourages our
enemies, it gives them time to operate, set up their systems (and test their
effectiveness) and penetrate our capabilities with only a horribly diminished
American response. Without countermeasures’ achieving some balance, we are
being pushed into a serious and perhaps permanent disadvantage. Make no
mistake, U.S. Cyber Command has
the full capacity to do what must be done, but the political will at the top is
lacking. What do these experts think we must do?
“First and foremost,
in its vision, U.S. Cyber Command calls for fewer operational
constraints to allow them to ‘defend forward’ and is clear: ‘We
will pursue attackers across networks and systems.’ They are smart to avoid
calling this ‘active defense’ – a controversial concept often mistakenly
associated with hacking back – but the idea isn’t far off: by ‘seizing the
initiative, retaining momentum, and disrupting our adversaries’ freedom of
action.’
“This means
energetically ‘contesting active campaigns,’ by kicking adversaries out of networks.
If, for example, teams of the Cyber Mission Force see Russian intelligence
forces building infrastructure in other countries from which to conduct
additional espionage or disruptive campaigns against the U.S. and our allies,
they will have the authority to apply some ‘tactical friction….compelling them
to shift resources to defense and reduce attacks.’
“This might mean
entering in those same systems to establish their own presence, kick out the
Russians, or even take control of the Russian malware. ‘Fewer operational
constraints’ can mean doing so without asking mother-may-I or even if the
Russians are in computers or networks in the territory of NATO or other allies.
“The immediate goal is
to slow down adversaries with tactical friction. But (co-author of 2017
cyber-warfare study, Richard Harknett) sees a larger mechanism.
Persistent engagement ‘can, over time, lead to a normalization of cyberspace
that is less free-for-all and potentially more stable. It is not contradictory
to assume that in an environment of constant action it will take counter action
to moderate behavior effectively.’
“Related to this
vision is the gaining continued access to key adversary infrastructure
to make reciprocal threats. This is not part of defending forward but
ensuring that if adversaries want to hold US infrastructure at risk, then the
President has similar, symmetric options to respond.
“And last constant
contact means potentially increasing cyber intelligence
operations in ‘grey’ and ‘red’ space, that is in non-U.S. computers
and infrastructure and those of the adversary. For years, this has been the
case, and with a new U.S. vision to triple-down, it may increase further as all
adversaries grab what they can, actively contest each other’s access, and gain
new purchase in (for example) the internet backbone to better improve their
intelligence advantages for persistent engagement.” The Cipher Brief.
In the end, we are
going to have to figure how to lift the veil of secrecy enough for the world to
develop cyber-military/civilian conventions and protocols. Treaties. As much as
we can feel the threat of nuclear force at some deep and atavistic level, wars
and conflicts have a much greater probability of being born out of
cyber-attacks. There are so many targets, and the cyber world is not so clearly
defined into civilian and military space. All that malware, hacking-searchers
and disinformation is pretty much in that cyber universe… wherever that might
be… ready to disrupt life as we know it.
I’m
Peter Dekom, and I suspect that given a president who seems mired in the past,
fighting globalization when automation is really the new challenge or tilting
at nukes while ignoring the technology wars in cyberspace, it not surprising
that he seems to be either corrupted or befuddled by this new battleground for
the 21st century.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment