Monday, June 3, 2019
The History Of International Cybersecurity Politics Essay
The History Of multinational Cybersecurity Politics EssayThe United States, England, and Continental Europe check very(prenominal) different approaches to cybersecurity. The United States and United Kingdom conceive of cyber primarily as a national security problem to be handled by the army- which in circuit sees the Internet as a 5th domain of war to be dominated. The rest of the European Union, however, sees cyber threats well-nighly as an irritant for commerce and individual privacy that should be dealt with by civilian authorities working in combination with private enterprise.Addition altogethery, while the United States can have a unity policy, fifty-fifty though its unmatchable implemented by many different federal departments, the European Union is made up of twenty-seven nations with their own laws, notions, and philosophical differences all all over how to approach cyber issues. Finally, in that respect is NATO, where a unified transatlantic cyber vision must be reconciled and arranged in a coherent manner among xxviii ally by means of a cumber just most bureaucratic process. To slay sense of these conflicting visions, this essay reviews cyber fires against NATO members, attempts to outline the challenges of developing a transatlantic vision for cyber policy, and highlights some of the fundamental differences among NATO members.It is helpful to remember that although the Internet is so ensconced in most of our lives that it is hard to envision living without it, the first modern Web browser didnt instauration until 1993 and broadband access has only become widespread over the nett decade. As a dissolving agent, senior governing body and military leaders did not deform up with the Internet and ar gradually having to adapt to emerging cyber realities. Franklin Kramer, who worked as assistant secretary of defense under President Bill Clinton, draws a equation with the Great Fire of London, he notes that it nearly destroyed the c ity in 1666 because an advance in living conditions- wooden houses for many- was not matched by security measures. there were no paint a picturefighting technologies, no firefighting processes, and no resources devoted to fire fighting. This was still true more than two centuries later with the Great Chicago Fire. Despite our slow development curve, in the modern world, while fire may strike, it is not the city-devouring scourge that it once was. Through government activity regulations that established building codes and through volunteer and government-run fire departments, a protective-response was established over the centuries.1Former Deputy Secretary of confession William J. Lynn III uses a more aggressive analogy The first military aircraft was bought, I think, in 1908, somewhere around there. So were in about 1928, he said. Weve kind of seen some biplanes shoot at each other over France, he added. But we havent really seen kind of what a true cyberconflict is going to look like.2Currently, European policymakers seem to treat cybersecurity more along fire-prevention lines rather than as biplanes over France. And framing is captious when thinking about cyber issues. As Kramer observes, Ask the wrong question, and you generally depart get the wrong answer. And cyber- and what to do about cyber conflict- is an bena where there is generally no agreement on what is the question, certainly no agreement on what are the answers, and evolving so fast that questions are transmuted and affect and change the inclemency of answers that have been given. He argues that the lack of agreement over the nature of the problem, lack of coherent regulation and authority mechanisms, and conflict between connectivity and security together make cyber a wicked problem not easily susceptible to resolution.3Lynn manages to frame the issue in military and security terms but fully ac sleep togetherledges that the verity is quite blurred and that no clear lines exist in th is rising domain. I mean, clearly if you take down significant portions of our economy we would probably retrieve that an attack. But an intrusion stealing entropy, on the other hand, probably isnt an attack. And there are an enormous number of steps in between those two.4Lynn goes on to say, one of the challenges facing Pentagon strategists is deciding at what threshold do you consider something an attack I think the policy community both inside and outside the government is wrestling with that, and I dont think weve wrestled it to the ground yet. In other words, it is difficult to know whether the house is on fire or biplanes are shooting at each other.5Correspondingly tricky, defense off-keyicials say, is how to pin office who is doing the attacking. This raises further complications that are clearly at the heart of the Pentagons mission. At the Council on Foreign Relations Lynn summarized the issue If you dont know who to attribute an attack to, you cant retaliate against th at attack, As a result, you cant deter through punishment, you cant deter by retaliating against the attack. He discussed the complexities that make cyberwar so different from, say, nuclear missiles, which of course come with a return address.6The cyber threat is very much a part of our current reality. Over the last several years several NATO members and partners, including the United States, have been targeted by severe cyber attacks.EstoniaWhat is commonly believed to be the first known vitrine of one state targeting another(prenominal) by cyber-warfare began on April 27, 2007, when a massive denial-of-service attack was launched by Russia against Estonia over a dispute involving a statue. The attack crippled websites of government ministries, political parties, newspapers, banks, and companies.7The attack was nicknamed Web War One and it caused a resonation within transatlantic national security circles.8The German newspaper Deutsche Welle wrote that Estonia is particularly vul nerable to cyber attacks because it is one of the most equip countries in the world. Nearly everyone in Estonia conducts banking and other daily activities on line. So when the cyber attack occurred, it nearly shut Estonia down.9Then-EU culture Society and Media commissioner Viviane Reding called the attacks a wakeup call, commenting that if people do not understand the urgency now, they never will. Her reaction was to incorporate a response into an EU-wide law on identity theft over the Internet.10Additionally, NATO did establish a Cyber Center of Excellence in Tallinn, which will be discussed later in the essay.GeorgiaWhile not a NATO member, Georgia is a NATO partner, and the April 2008 Bucharest flush declared that it will become a member at some unspecified time in the future, a promise reiterated at the November 2010 capital of Portugal Summit.11Weeks forrader the August 2008 Russian land invasion and air attack, Georgia was subject to an extensive, merged cyber attack. A merican experts estimated that the attacks against Georgias Internet infrastructure began as early as July 20, with coordinated barrages of millions of requests- known as distributed denial of service, or DDOS, attacks- that overloaded and effectively shut down Georgian servers.12The pressure was intensified during the early days of the war, effectively shutdown down critical communications in Georgia.After defacing Georgian President Mikheil Saakashvilis web site and integrating a slideshow portraying Saakashvili as Hitler, coming up with identical images of both Saakashvili and Hitlers public appearances, the site remained under a sustained DDoS attack. Writing as the attacks were under flair, security consultant Dancho Danchev believed it smells like a iii letter intelligence agencys propaganda arm has managed to somehow supply the creative for the defacement of Georgia Presidents official web site, thereby forgetting a simple rule of date in such a conflict- risk forwarding t he responsibility of the attack to each and every Russian or Russian supporter that ever attacked Georgian sites using publicly obtainable DDOS attack tools in a coordinated fashion.13Bill Woodcock, the research director at Packet Clearing House, a California-based non-profit-making group that tracks Internet security trends, noted that the attacks represented a landmark the first use of a cyber attack in conjunction with an armed military invasion.14The nature of cyber attacks is such that, two and a half years later, there is still no definitive answer on who caused the attack. They certainly emanated from Russia, but the precise role of Moscows military and intelligence services cadaver unclear. Given that the cyber attacks preceded and accompanied conventional military attacks, there appears to be a link to the Russian government. A March 2009 report by Greylogic concluded Russias Foreign Military Intelligence agency (the GRU) and Federal Security Service (the FSB), rather tha n patriotic hackers, were likely to have played a key role in coordinating and organizing the attacks. They added, The available evidence supports a strong likelihood of GRU/ FSB supplying and direction at a high level while relying on Nashi intermediaries and the phenomenon of crowd-sourcing to obfuscate their involvement and implement their strategy.15United StatesIn a 2010 essay for Foreign Affairs, Lynn revealed thatin 2008, the US Department of Defense suffered a significant compromise of its classified military computer networks. It began when an infected flash drive was inserted into a US military lap swipe computer at a base in the Middle East. The flash drives bitchy computer code, placed there by a foreign intelligence agency, uploaded itself onto a network run by the US Central keep in line. That code spread undetected on both classified and unclassified systems, establishing what amounted to a digital beachhead, from which breeding could be transferred to servers u nder foreign control.16The upshot is that adversaries have acquired thousands of files from US networks and from the networks of US allies and industry partners, including weapons blueprints, operational plans, and surveillance info.17Lynn classified this attack as the most significant breach of US military computers ever and stated that it served as an important wake-up call.18He acknowledged that to that point, we did not think our classified networks could be penetrated.19The result of this new awareness was Operation Buckshot Yankee, a fourteen-month program that rid US systems of the agent.btz worm and helped lead to a major reorganization of the armed forces knowledge defenses, including the creation of the militarys new Cyber Command.20United KingdomIn a speech at the 2011 Munich Security Conference, British foreign secretary William Hague revealed that a series of cyber attacks on his country took place the previous year. He noted that in late declination a spoofed email purporting to be from the White House was sent to a large number of international recipients who were directed to click on a link that then downloaded a variant of ZEUS. The UK Government was targeted in this attack and a large number of emails bypassed some of our filters.21Additionally, sometime in 2010 the national security interests of the UK were targeted in a deliberate attack on our defense industry. A malicious file posing as a report on a nuclear Trident missile was sent to a defense contractor by mortal masquerading as an employee of another defense contractor. Good protective security meant that the email was detected and blocked, but its purpose was undoubtedly to steal teaching relating to our most warm defense projects.22Finally, in February 2011, three of my staff were sent an email, apparently from a British colleague outside the FCO, working on their region. The email claimed to be about a forthcoming visit to the region and looked quite innocent. In fact it was from a hostile state intelligence agency and contained computer code plant in the attached document that would have attacked their machine. Luckily, our systems identified it and stopped it from ever reaching my staff.23Still, the prevalence and sophistication of these attacks are a principal reason why cybersecurity and cyber-crime were listed as two of the top five priorities in the UKs National Security Strategy.24Given the interconnectivity of the Internet, Hague argued that more comprehensive international collaboration is vital, noting that, while cyber security is on the agendas of some 30 multilateral organizations, from the UN to the OSCE and the G8, the problem is that much of this debate is fragmented and lacks focus. He continued, We believe there is a need for a more comprehensive, structure dialogue to obtain to build consensus among like-minded countries and to lay the basis for agreement on a set of standards on how countries should act in cyber blank shell.25US- European Attitudinal DifferencesWe begin to be able to discern a pattern The United States and the United Kingdom take cyber security very seriously and view it primarily through the lens of national security. The EU and most Western European members of NATO see it primarily as a national infrastructure problem. In the run-up to the November 2010 Lisbon NATO Summit, Pentagon officials were pressing very firmly to incorporate a concept of active cyber defense into the revised NATO Strategic Concept. Lynn argued that the Cold War concepts of shared warning turn in in the 21st century to cyber security. Just as our air defenses, our missile defenses have been colligate so too do our cyber defenses need to be linked as well. However, this notion was firmly rejected by the Europeans, with the French particularly adamant.26USCYBERCOMA July 2010 Economist story proclaimed After land, sea, air and space, warfare has entered the fifth domain cyberspace.27It noted that President Obama had d eclared the digital infrastructure a strategic national asset and had appointed Howard Schmidt, the former head of security at Microsoft, as the first cybersecurity tsar. Peter Coates notes that the air force had actually anticipated this move in December 2005, declaring cyber a fifth domain when it changed its mission literary argument to To fly and fight in air, space, and cyberspace. In November of the following year, it redesignated the 8th Air Force to become Air Force Cyberspace Command.28In May 2010 the Defense Department launched a new subunified command, United States Cyber Command, with Gen. Keith Alexander dual-hatted as its chief while continuing on as director of the National Security Agency. CYBERCOM is supercharged with the responsibility to direct the operations and defense of specified Department of Defense information networks and prepare to, and when directed, conduct full spectrum military cyberspace operations in order to enable actions in all domains, ensure US/ Allied freedom of action in cyberspace and deny the same to our adversaries.29As the descale of cyberwarfares threat to US national security and the US economy has come into view, the Pentagon has built layered and robust defenses around military networks and inaugurated the new US Cyber Command to integrate cyber-defense operations crosswise the military. The Pentagon is now working with the Department of Homeland Security to protect government networks and critical infrastructure and with the United States closest allies to expand these defenses internationally. An enormous amount of foundational work remains, but the US government has begun putting in place various initiatives to defend the United States in the digital age.30Even with stepped-up vigilance and resources, Lynn admits, adversaries have acquired thousands of files from US networks and from the networks of US allies and industry partners, including weapons blueprints, operational plans, and surveillance data.31Th e cyber policy of the United States is rapidly evolving, with major developments under way even as I write this essay. The White House issued a new International Strategy for Cyberspace in May 2011. While not by any means moving away from a defense-oriented posture- indeed, it generated breathless commentary by declaring the right to meet cyber attacks with a kinetic response- it sought to shoot down commercial, individual, diplomatic, and other interests into the equation. This was followed by a new Department of Defense cyber strategy in July 2011, which built on Lynns Foreign Affairs essay.European Network and Information Security Agency (ENISA)While CYBERCOM is the most powerful and well-funded US cyber agency, the lead EU cyber agency is ENISA, the European Network and Information Security Agency. Whereas CYBERCOM is run by a general with an intelligence background, ENISA is run by a physics professor with long experience in the IT sector, including the energy industry, insura nce company engineering, aviation, defense, and space industry.32The agencys mission is to develop a culture of Network and Information Security for the benefit of citizens, consumers, business and public sector organizations in the European Union.33In December 2010 ENISA released a report identifying what it sees as the top security risks and opportunities of smartphone use and gives security advice for businesses, consumers and governments. The agency considers spyware, poor data cleansing when recycling phones, accidental data leakage, and unaccredited premium-rate phone calls and SMSs as the top risks.34New regulations are proposed that would see the perpetrators of cyber attacks and the producers of related and malicious software prosecuted, and criminal sanctions increased to a maximum two-year sentence. European countries would in like manner be obliged to respond quickly to requests for help when cyber attacks are perpetrated, and new pan-European criminal offences will be created for the illegal interception of information systems. Home affairs Commissioner Cecilia Malmstrm added that criminalizing the creation and selling of malicious software and improving European police cooperation would help Europe step up our efforts against cybercrime.ENISAs new mandate will let the agency organize pan-European cybersecurity exercises, public- private network resilience partnerships, and risk assessment and awareness campaigns. ENISAs funding will also be boosted, and its management display panel will get a stronger supervisory role. ENISAs mandate is also to be extended by five years to 2017. The new directive will also supersede a 2005 council framework decision on cybercrime because that previous regulation did not focus sufficiently on evolving threats- in particular, large-scale simultaneous attacks against information systems, such as Stuxnet, and the increasing criminal use of botnets. Stuxnet was recently used to attack Irans nuclear power infrastruc ture, and a single botnet, Rustock, is estimated to be responsible for two-fifths of the worlds spam.35Additionally, EU states are constrained by Directive 95/ 46/ EC, better known as the Data Protection Directive, which provides enormous protection for any information relating to an identified or identifiable natural person. Compare this to the USA Patriot Act, which gives enormous leeway to US law enforcement and intelligence agencies to access electronic data held by US companies in order to investigate and deter terrorist activities. In June 2011 Gordon Frazer, managing director of Microsoft UK, set off a firestorm when he declared that European guest data stored on cloud computing services by companies with a US presence cannot be guaranteed the protections afforded under the Data Protection Directive, setting off a demand from some EU lawmakers to resolve this issue.36GermanyIn late February 2011 Germanys outgoing minister of the privileged, Thomas de Maizire, unveiled the c ountrys Nationale Cyber-Sicherheitsstrategie (National Cyber Security Strategy).37To American eyes, the fact that it was the interior ministry, not the defense ministry, issuing the strategy is striking. It was no accident this is by no means a defense document.The documents introduction notes that in Germany all players of favorable and economic life use the possibilities provided by cyberspace. As part of an increasingly interconnected world, the state, critical infrastructures, businesses and citizens in Germany depend on the reliable functioning of information and communication technology and the Internet. Among the threats listed Malfunctioning IT products and components, the break-down of information infrastructures or serious cyber attacks may have a considerable negative impact on the performance of technology, businesses and the giving medication and hence on Germanys social lifelines. Contrast this with Lynns analogy of biplanes over France, and his pondering at what thr eshold do you consider something an attack?German security scholarly person Thomas Rid laments that the strategy is coming a bit late and that Germanys thinking lags that of the United States and the United Kingdom. Beyond that, he notes that the two agencies created to manage cyber issues are woefully understaffed and tasked with myriad responsibilities related tangentially at best to cyber security. And, according to a cyber kodex established in the new strategy, German interests in data security would be pursued in international organizations such as the UN, the OSCE, the European Council, the OECD, and NATO- in that order.38United Kingdom as OutlierAs is frequently the case on matters of international security, the United Kingdom is much more in line with its American cousin than its neighbors on the Continent. In an October 12, 2010, speech at Londons International Institute for Strategic Studies, Iain Lobban, director of GCHQ (the UKs National Security Agency analogue, respo nsible for signals intelligence) noted that his country combines the intelligence and information assurance missions in a single agency, an arrangement shared by only a few other countries, most notably the US. It gives us a richer view of vulnerabilities and threats than those who consider them purely from the point of view of defense.39He confessed to constant barrages of spam, worms, theft of intellectual property on a massive scale, some of it not just sensitive to the commercial enterprises in question but of national security concern too, and all manner of other attacks that have caused significant disruption to Government systems. Consequently, his government was looking to significantly increase its investment in the cyber realm even at a time when the global recession was forcing significant austerity in other departments, including in more traditional military assets.40Thomas Rid notes the sheer breadth of Lobbans focus Cyber encompasses, for instance, more and more onlin e government services (read steadily increasing vulnerability) critical national infrastructure, publicly or privately run online crime in all its facets espionage (both industrial and governmental), and such things as the proper norms of appearance for responsible states.41The implications are vast, as Lobban hints and Rid explicates partnerships of a new kind are needed to deal with cyber threats and risks. International partnerships, with like-minded countries that need to establish and maintain appropriate norms of behavior in crisis situations- and intersectoral partnerships, between government agencies and industry, especially the high-tech sector.42In his Munich Security Conference speech, Hague noted that we rely on computer networks for the water in our taps, the electrical energy in our kitchens, the sat navs in our cars, the running of trains, the storing of our medical records, the availability of food in our supermarkets and the flow of money into high street cash mach ines. Further, Many government services are now delivered via the internet, as is education in many classrooms. In the UK, 70 percent of younger internet users bank online and two thirds of all adults shop on the internet.43Given the new awareness of vulnerabilities and the degree of dependence, then, the United Kingdoms new National Security Strategy ranks cyber attack and cyber crime in our top five highest priority risks. This is not lip service. At the same time that the British military is suffering such severe cutbacks that the Royal Navy is trim back to sharing a single aircraft carrier with France, the current budget provided 650 million of new funding for a national cyber-security program, which will improve our capabilities in cyber-space and hale together government efforts. As part of that effort, Hague said, We have established a new Ministerial Group on cyber security which I chair. And we have boosted the UKs cyber capabilities with the makeup of a new Defense Cyb er Operations Group, incorporating cyber security into the mainstream of our defense planning and operation.44NATO ResponsesAfter months of study and debate the 2010 NATO Summit in Lisbon issued a new strategic concept on November 19, 2010. In it, cyber issues were officially recognized for the first time as a core alliance mission. Recognizing that cyber attacks are becoming more frequent, more organized and more costly in the damage that they inflict, NATO pledged to develop further our ability to prevent, detect, defend against and recover from cyber-attacks, including by using the NATO planning process to enhance and coordinate national cyber-defense capabilities, bringing all NATO bodies under centralized cyber protection, and better integrating NATO cyber awareness, warning and response with member nations.45This was followed in June 2011 by a revised NATO policy on cyber defense and a parallel cyber defense action plan. Combined, they offer a coordinated approach to cyber def ense across the Alliance with a focus on preventing cyber threats and building resilience. Additionally, all NATO structures will be brought under centralized protection.46What practical actions will flow from these policy statements remains unclear, especially in an era of radically declining budgets. But they give an overview of what it terms NATOs principle cyber defense activities.47Coordinating and Advising on Cyber DefenseThe cyber-defense policy was implemented by NATOs political, military, and technical
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.