Why Cyberwar Is Here To Stay

hostilities

Why Cyberwar Is Here To Stay

The New York Times  revealed that the Obama administration had prepared a cyberattack plan to be carried out against Iran in the event diplomatic negotiations failed to limit that country’s nuclear weapons development.

The plan, code-named Nitro Zeus, was said to be capable of disabling Iran’s air defenses, communications system and parts of its electric grid. It also included an option to introduce a computer worm into the Iranian uranium enrichment facility at Fordow, to disrupt the creation of nuclear weapons. In anticipation of the need, U.S. Cyber Command placed hidden computer code in Iranian computer networks. According to The New York Times, President Obama saw Nitro Zeus as an option for confronting Iran that was “short of a full-scale war.”

The reports, if true (to be fair, they have not been confirmed by any official sources), reflect a growing trend in the use of computers and networks to conduct military activity.

The United States is not, of course, the only practitioner. One notable example from recent history involves the apparent Russian assault on the transportation and electric grid in Ukraine. That attack, which happened late in 2015, was a “first of its kind” cyberassault that severely disrupted Ukraine’s power system, affecting many innocent Ukrainian civilians. It bears noting that the vulnerabilities in Ukraine’s power system are not unique – they exist in power grids across the globe, including the U.S. power grid and other major industrial facilities.

Built-in vulnerabilities

The vulnerability of digital networks is, in many ways, an inevitable consequence of how the Internet was built. As then-Deputy Secretary of Defense William Lynn put it in a 2011 speech announcing our military strategy for operating in cyberspace: “The Internet was designed to be open, transparent and interoperable. Security and identity management were secondary objectives in system design. This lower emphasis on security in the internet’s initial design … gives attackers a built-in advantage.”

Among many factors, two in particular contribute to the growing sense of unease.

One is the problem of anonymity. Those who seek to do harm can easily do so at a distance, cloaked in the veil of anonymity behind false or shielded identities in the vastness of the web. With no built-in identity verification, pretending to be someone else is as easy as getting a new email address or registering a pseudonymous Facebook account.

Unmasking attackers is possible, but requires a significant investment of time and resources. It also often requires the “good guys” to use “bad guy” techniques to track the malefactors, because they need to hack the hackers to find out who they are. It took a Canadian company, using hacker techniques, more than a year to find out who had hacked the Dalai Lama’s official computers – it was the Chinese.

In effect, this prevents targets from retaliating against attackers. Though most observers think Russia is behind the Ukrainian assault, there is no truly conclusive proof. It is very difficult to deter an unknown attacker. In addition, international coordination to respond to attacks that threaten global stability can be stymied without solid proof of the source of an assault.

A new definition of war

Second, and perhaps more significantly, the online world changes the boundaries of war. President Obama seems to think that cyberattacks are less than full-scale war (or so the Times reports). Is that realistic? Consider the following hypotheticals – all of which are reasonably plausible.

An adversary of the United States (known or unknown):

  • Disrupts the stock exchanges for two days, preventing any trading;
  • Uses a digital attack to take offline a radar system intended to provide early warning of an aerial attack on America;
  • Steals the plans to the F-35 fighter;
  • Disrupts the Pentagon’s communication system;
  • Introduces a latent piece of malware (a piece of malicious software that can be activated at a later date, sometimes called a “logic bomb”) into a radar station that can disable the station when triggered, but doesn’t trigger it just yet;
  • Makes a nuclear centrifuge run poorly in a nuclear production plant, eventually causing physical damage to the centrifuge; or
  • Implants a worm that slowly corrupts and degrades data on which certain military applications rely (such as GPS location data).

Some acts, like stealing the plans for a new fighter jet, won’t be considered acts of war. Others, like disrupting our military command and control systems, look just like what we have always thought of as acts of war.

Introducing uncertainty

But what about the middle ground? Is leaving a logic bomb behind in a radar station like espionage, or is it similar to planting a mine in another country’s harbor as a preparation for war? What about the computer code Nitro Zeus allegedly placed in the Iranian electric grid? And what if that code is still there?

These are hard questions. And they will endure. The very structures that make the Internet such a powerful engine for social activity and that have allowed its explosive, world-altering growth are also the factors that give rise to the vulnerabilities in the network. We could eliminate anonymity and restrict the potential for digital attacks, but only at the price of changing the ease with which peaceful people can use the Internet for novel commercial and social functions.

Those who want both ubiquity and security are asking to have their cake and eat it, too. So long as this Internet is “The Internet,” vulnerability is here to stay. It can be managed, but it can’t be eliminated. And that means that those who bear responsibility for defending the network have a persistent challenge of great complexity.

About The Author

rosenzweig paulPaul Rosenzweig, Professorial Lecturer in Law, George Washington University. He is a Senior Editor of the Journal of National Security Law and Policy and as a member of the Advisory Committee to the ABA’s Standing Committee on Law and National Security.

This article originally appeared on The Conversation

Related Book:

Cyber War: The Next Threat to National Security and What to Do About It

hostilitiesAuthor: Richard A. Clarke
Binding: Paperback
Features:
  • Used Book in Good Condition

Brand: Brand: Ecco
Studio: Ecco
Label: Ecco
Publisher: Ecco
Manufacturer: Ecco

Buy Now
Editorial Review:

Author of the #1 New York Times bestseller Against All Enemies, former presidential advisor and counter-terrorism expert Richard A. Clarke sounds a timely and chilling warning about America’s vulnerability in a terrifying new international conflict—Cyber War! Every concerned American should read this startling and explosive book that offers an insider’s view of White House ‘Situation Room’ operations and carries the reader to the frontlines of our cyber defense. Cyber War exposes a virulent threat to our nation’s security. This is no X-Files fantasy or conspiracy theory madness—this is real.





Cyberwar: How Russian Hackers and Trolls Helped Elect a President What We Don't, Can't, and Do Know

hostilitiesAuthor: Kathleen Hall Jamieson
Binding: Hardcover
Studio: Oxford University Press
Label: Oxford University Press
Publisher: Oxford University Press
Manufacturer: Oxford University Press

Buy Now
Editorial Review: The question of how Donald Trump won the 2016 election looms over his presidency. In particular, were the 78,000 voters who gave him an Electoral College victory affected by the Russian trolls and hackers? Trump has denied it. So has Vladimir Putin. Others cast the answer as unknowable. In Cyberwar, Kathleen Hall Jamieson marshals the troll posts, unique polling data, analyses of how the press used hacked content, and a synthesis of half a century of media effects literature to argue that, although not certain, it is probable that the Russians helped elect the 45th president of the United States. In the process, she asks: How extensive was the troll messaging? What characteristics of social media did the Russians exploit? Why did the mainstream press rush the hacked content into the citizenry's newsfeeds? Was Clinton telling the truth when she alleged that the debate moderators distorted what she said in the leaked speeches? Did the Russian influence extend beyond social media and news to alter the behavior of FBI director James Comey? After detailing the ways in which Russian efforts were abetted by the press, social media, candidates, party leaders, and a polarized public, Cyberwar closes with a warning: the country is ill-prepared to prevent a sequel. In this updated paperback edition, Jamieson covers the many new developments that have come to light since the original publication.




The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age

hostilitiesAuthor: David E. Sanger
Binding: Hardcover
Features:
  • For all our books; Cargo will be delivered in the required time. 100% Satisfaction is Guaranteed!

Studio: Crown
Label: Crown
Publisher: Crown
Manufacturer: Crown

Buy Now
Editorial Review: In 2015, Russian hackers tunneled deep into the computer systems of the Democratic National Committee, and the subsequent leaks of the emails they stole may have changed the course of American democracy. But to see the DNC hacks as Trump-centric is to miss the bigger, more important story: Within that same year, the Russians not only had broken into networks at the White House, the State Department, and the Joint Chiefs of Staff, but had placed implants in American electrical and nuclear plants that could give them the power to switch off vast swaths of the country. This was the culmination of a decade of escalating digital sabotage among the world’s powers, in which Americans became the collateral damage as China, Iran, North Korea, and Russia battled in cyberspace to undercut one another in daily just-short-of-war conflict.

The Perfect Weapon is the startling inside story of how the rise of cyberweapons transformed geopolitics like nothing since the invention of the atomic bomb. Cheap to acquire, easy to deny, and usable for a variety of malicious purposes—from crippling infrastructure to sowing discord and doubt—cyber is now the weapon of choice for democracies, dictators, and terrorists. Two presidents—Bush and Obama—drew first blood with Operation Olympic Games, which used malicious code to blow up Iran’s nuclear centrifuges, and yet America proved remarkably unprepared when its own weapons were stolen from its arsenal and, during President Trump’s first year, turned back on the US and its allies. The government was often paralyzed, unable to threaten the use of cyberweapons because America was so vulnerable to crippling attacks on its own networks of banks, utilities, and government agencies.

Moving from the White House Situation Room to the dens of Chinese government hackers to the boardrooms of Silicon Valley, New York Times national security correspondent David Sanger—who broke the story of Olympic Games in his previous book—reveals a world coming face-to-face with the perils of technological revolution. The Perfect Weapon is the dramatic story of how great and small powers alike slipped into a new era of constant sabotage, misinformation, and fear, in which everyone is a target.




hostilities
enafarzh-CNzh-TWtlfrdehiiditjamsptrues

follow InnerSelf on

google-plus-iconfacebook-icontwitter-iconrss-icon

 Get The Latest By Email

{emailcloak=off}

follow InnerSelf on

google-plus-iconfacebook-icontwitter-iconrss-icon

 Get The Latest By Email

{emailcloak=off}