Tag: Cybersecurity

How serious is the cyber threat?

By now, Americans should be thoroughly acclimated to exaggerations of threat:  the Soviet threat was inflated, the Iraq weapons of mass destruction threat was inflated, and the global terrorism threat has been inflated.  Now we’ve got the Defense Science Board (DSB) and the Director of National Intelligence warning about cyber threats and the National Security Advisor fingering China.  So how serious is the situation, and how far should we go in responding to it?

Like all the threats that came before it, cyber sounds serious enough:  foreign powers could not only steal your emails and block your internet access but also disrupt power and water supplies, purloin valuable commercial secrets and render US military operations unusable, including our nuclear forces.  If you believe the newspapers, we know the Chinese are already grabbing emails from organizations they are interested in as well as intercepting commercially important plans and data.  We also know from the press that Israel and the US have used cyber attacks to slow the Iranian nuclear enrichment program, which suggests a capability to disrupt vital infrastructure.  Iranians are smart–if we’ve done something to them, you can be pretty sure they are trying to figure out how to do it to us.  The Chinese won’t be sitting on their laurels either.

The DSB gives this graphic description of the consequences of a full-spectrum cyber attack on US forces:

…attacks would be expected to include denial of service, data corruption, supply chain corruption, traitorous insiders, kinetic and related non-kinetic attacks at all altitudes from underwater to space. U.S. guns, missiles, and bombs may not fire, or may be directed against our own troops. Resupply, including food, water, ammunition, and fuel may not arrive when or where needed. Military Commanders may rapidly lose trust in the information and ability to control U.S. systems and forces. Once lost, that trust is very difficult to regain.

But that is only the military piece.  A full-spectrum cyber attack would also target civilian systems:

The impact of a destructive cyber attack on the civilian population would be even greater with no electricity, money, communications, TV, radio, or fuel (electrically pumped). In a short time, food and medicine distribution systems would be ineffective; transportation would fail or become so chaotic as to be useless. Law enforcement, medical staff, and emergency personnel capabilities could be expected to be barely functional in the short term and dysfunctional over sustained periods. If the attack’s effects were reversible, damage could be limited to an impact equivalent to a power outage lasting a few days. If an attack’s effects cause physical damage to control systems, pumps, engines, generators, controllers, etc., the unavailability of parts and manufacturing capacity could mean months to years are required to rebuild and reestablish basic infrastructure operation.

While warning about the societal threats, the DSB focuses its recommendations on the Department of Defense.  Most of what they say seems reasonable to me, though I confess I find it difficult to imagine–as the DSB does–the use of nuclear weapons to deter an “existential” cyber attack.  We are going to threaten to nuke the nerds?  We are not even likely to know which country they’ve launched their attack from.

The DSB proposes a three-tiered response to cyberthreats:  defense, consequence management and deterrence.  Here is where things get hard.  Exaggeration of a threat is not in and of itself necessarily harmful, except insofar as it diverts resources from higher priorities.  But it is arguable that we’ve done more damage to ourselves responding to threats than the threats themselves were likely to do.  There aren’t too many people who think the Iraq war was worth it, since Saddam Hussein did not have nuclear weapons and we’ll be paying the trillion-dollar bill for decades.  The Soviet space threat got us excited enough to go to the moon, but how much good has that done for people in Peoria?

It would be easy to do serious damage to the openness of the internet and the social media it has spawned by too much concern about cybersecurity.  Lots of us are already struggling to remember all our damn passwords and usernames.  Adding levels of unnecessary security will make our entire economy less efficient and the benefits of openness more difficult to obtain.  I’m really not all that concerned with the Chinese reading my emails.  In fact, it might make them a bit less competitive than they would otherwise be.

I don’t mean to pooh-pooh the threat.  I only mean to urge us not to overreact.  Wisdom, not panic, should be the mood.  What really needs to be done to reduce the vulnerability of our vital infrastructure?  What are the cheapest and best means?  The DSB takes a “systems” approach.  That seems to me right:  rather than clamping down on everything, which is the natural bureaucratic reaction, lets look at what is most serious and deal with that first.  If our nuclear deterrent has to be protected from cyberattack, I’m all for it.  But let’s not treat my emails the same way.

 

Tags : , , ,

Next week’s peace picks

I am speaking tomorrow about the evolution of democracy in the Balkans (2 pm) at the AID Democracy and Governance conference at George Washington University, but I am not sure that really ranks among the week’s peace picks.  Here is a still immodest list of the week’s best, which includes two other events at which I’ll be participating:

1. Syria Under Growing International Pressure

A CENTER ON THE UNITED STATES AND EUROPE AND SABAN CENTER FOR MIDDLE EAST POLICY EVENT

Turkey, the Arab League, the United Nations and the European Union (EU) have escalated pressure on Damascus in an effort to isolate and punish the Syrian regime for its continuing repression of protesters. With the death toll now exceeding 4,000 civilians, Turkey and the Arab League recently joined the U.S. and the EU in imposing wide-ranging sanctions against Syria—a coordinated, international move considered inconceivable just six months ago.

Tuesday, December 13, 2011
3:00 PM to 4:30 PM

Saul/Zilkha Rooms
The Brookings Institution
1775 Massachusetts Ave., NW
Washington, DC
Map

Contact: Brookings Office of Communications

Email: events@brookings.edu

Phone: 202.797.6105

RELATED CONTENT

More Related Content »

On December 13, the Saban Center for Middle East Policy, the Center on the United States and Europe at Brookings and the Middle East Institute will host a discussion to examine the impact of growing international pressure on the Assad government and analyze the domestic and regional implications of a weakening Syrian regime and economy. Brookings Nonresident Senior Fellow Ömer Taşpinar, Murhaf Jouejati of the National Defense University, and Andrew Tabler of the Washington Institute for Near East Policy will join the discussion. Kate Seelye of the Middle East Institute will provide introductory remarks, and Brookings Senior Fellow Michael Doran will moderate the discussion.After the program, the panelists will take audience questions.Participants

Introduction

Kate Seelye

Vice President
The Middle East Institute

Moderator

Michael Doran

Roger Hertog Senior Fellow, Foreign Policy, Saban Center for Middle East Policy

Panelists

Murhaf Jouejati

Professor of Middle East Studies
National Defense University

Andrew J. Tabler

Next Generation Fellow
The Washington Institute for Near East Policy

Ömer Taşpınar

Nonresident Senior Fellow, Foreign Policy, Center on the United States and Europe

2. Kosovo’s President: What does She Represent?

A discussion with

Her Excellency Atifete Jahjaga


Her Excellency

Atifete Jahjaga

President of Kosovo

Moderated by

Daniel Serwer,

Senior Fellow, Center for Transatlantic Relations

Visiting Scholar, Conflict Management Program , SAIS

Wednesday, December 14, 2011

10:00 am – 11:30 am

Kenney Auditorium

The Paul H. Nitze School of Advanced International Studies

1740 Massachusetts Avenue, NW

Washington, DC 20036

Co-sponsored by the Center for Transaltantic Relations and

Conflict Management Program, SAIS

3.  Incomplete Security Sector Reform in Serbia:  Lessons for Democratic Transition

Wednesday, December 14, 2011

 2:00– 3:30 pm

Room 500

1717 Massachusetts Avenue, NW

Washington, DC 20036

 with

Jelena Milić

Director, Center for Euro-Atlantic Studies,

Belgrade, Serbia

 Comments by

Daniel Serwer
Senior Fellow, Center for Transatlantic Relations

 Vedran Džihić

Moderator
Senior Fellow, Center for Transatlantic Relations

Jelena Milić, director of the Center for Euro-Atlantic Studies, will give an insight into the problems of the security reform in Serbia since the time of the Milosevic regime and democratic changes in 2000 until today. She will discuss the importance of transitional justice for security sector reforms as well as the consequences of current gaps and problems in the reform for Serbia. As the security sector reform is critical for the successs of all post-conflict and democratization efforts the event will outline possible “lessons learned” for democratic transition of regions like North Africa. Finally, Jelena Milić will elaborate on the implications of the recent European Council’s decision on Serbian EU-candidacy bid.

4. Proactive Deterrence: The Challenge of Escalation Control on the Korean Peninsula

Date & Time:
Fri, 12/16/2011 – 12:00pm – 1:30pm
Proactive Deterrence: The Challenge of Escalation Control on the Korean Peninsula
Location:
Korea Economic Institute

1800 K Street NW Suite 1010

Washington, DC 20008

Speakers:
Abraham Denmark, Senior Advisor, CNA
Moderator: Nicholas Hamisevicz, Director of Research and Academic Affairs, KEI
Description:

After the attacks last year by North Korea on the Cheonan and Yeonpyeong Island, the difficult debates continue over the best way South Korea should respond to these types of strikes by North Korea and on ways to deter them in the future. Fears arise that miscalculating the response to North Korean aggression could quickly escalate into war.

And even though South Korea and the U.S., along with other allies, would likely be able to defend South Korea and eventually reunify the Korean peninsula through force, the outbreak of war will likely have huge human, economic, and developmental costs for South Korea. Thus, proper deterrence mechanisms and response procedures are needed.

Please join KEI for a luncheon discussion with Abraham Denmark, Senior Advisor, CNA. Mr. Denmark will discuss his Academic Paper Series report on some of the issues involved with preemptive self-defense and proactive deterrence by South Korea.  He will also present some possible policies for South Korea and the United States that could mitigate the potential for accidental escalation while sustaining deterrence over North Korea. We hope you will join us for this interesting event.

A light meal will be served.

To RSVP for this event, please click here.

5. Combating Botnets: Strengthening Cybersecurity Through Stakeholder Coordination

Millions of American computers have been compromised and are remotely controlled for a variety of malicious purposes in botnets, enabling online crime and aggression. In September, the Departments of Commerce and Homeland Security issued a Request for Information to explore developing a voluntary industry code of conduct to respond to botnets. Internet Service Providers (ISPs), security firms, advocacy groups and citizens submitted comments on how these networks can be detected, how ISPs can notify customers whose computers are affected and how to improve cybersecurity with the appropriate distribution of responsibilities.

Friday, December 16, 2011
1:30 PM to 3:30 PM

Falk Auditorium
The Brookings Institution
1775 Massachusetts Ave., NW
Washington, DC
Map

Contact: Brookings Office of Communications

Email: events@brookings.edu

Phone: 202.797.6105

Register Now
On December 16, the Center for Technology Innovation at Brookings will host a discussion examining how government agencies, private firms and citizens can work together to combat the cybersecurity risks associated with botnets. Representatives of the Department of Commerce and the Department of Homeland Security will present their conclusions from the Request for Information on the industry’s options for moving forward. In addition, a panel of experts will explore the need for stakeholder cooperation and coordination in fighting botnets, how to engage citizens in strengthening cybersecurity, and the challenges of measuring progress. The discussion will highlight the importance of well-crafted public-private partnerships and careful governance in addressing cybersecurity risks.After the program, speakers will take audience questions.
Participants

Introduction and Moderator

Allan A. Friedman

Fellow, Governance Studies

Presenters

Bruce McConnell

Counselor to the National Protection and Programs Directorate Deputy Under Secretary
U.S. Department Of Homeland Security

Ari Schwartz

Senior Advisor to the Secretary on Technology Policy and Member of the Internet Policy Task Force
U.S. Department of Commerce

Panelists

Jamie Barnett

Chief of the Commission’s Public Safety and Homeland Security Bureau
Federal Communications Commission

Sameer Bhalotra

Deputy Cybersecurity Coordinator, National Security Staff
The White House

Yurie Ito

Director, Global Coordination
JP CERT

Michael Kaiser

Executive Director
National Cyber Security Alliance

Brent Rowe

Senior Economist

Tags : , , ,
Tweet