Escolar Documentos
Profissional Documentos
Cultura Documentos
Connie Douglas
FROM:
Lucas Plath
SUBJECT:
DATE:
13APR2016
Introduction
The widespread use and integration of the internet into so many aspects of everyday life
has created a world that is increasingly connected. This allows immediate communication of
enormous amounts of information and enables countries at opposite ends of the globe to interact
in trade, politics, and social issues. Unfortunately, the development of technology has far
outpaced the ability of humans to adapt existing international laws and norms to a quickly
changing landscape of threats in the cyber domain. While borders of countries can be tangible
and certain, cyberspace is a realm of ambiguity with infinitely complex and competing interests.
There have been incalculable benefits to humanity from the development of the internet, but
there are also many unforeseen in the form of cyber attacks and espionage. This report seeks to
define those risks, explore possible solutions, and attempt to reduce the vagueness found in the
world of digital conflict.
Defining Terms
A fruitful discussion on cyber threats is problematic due to ambiguity more than any
other factor. This ambiguity exists on a number of levels, from the anonymous nature of actors
on the internet to the language used to describe their acts. A technologically misinformed and
undereducated public can quickly find itself confused by the technical and political aspects of
cyberspace. To reduce such misunderstanding within the context of this report it is best to begin
with a definition of terms critical to it:
Cyberspace: essentially refers to the world wide web and all interactivity within it. This includes
legal, illegal, public, anonymous, and intentionally concealed activity. Cyberspace is the sum
total of all the known and unknown activity occurring, and that has occurred on the internet.
Cyber Attack: a malicious or criminal act in cyberspace. This is a general term and does not
reflect disposition or intent. A well-meaning act of cyber activism would still be a cyber attack,
but would not necessarily be cyber terrorism.
Cyber Terrorism: a cyber attack with the intention of causing disruption or damage online that
may or may not extend to real world consequences. To consider an act cyber terrorism depends
considerably on the status of the organization(s) involved, the monetary or physical impact of the
attack, and the perpetrators goals (Chen, Cyberterrorism: Understanding). Cyber terrorism is a
term so vague it should always be accompanied by a qualifying explanation.
Cyber Activism (hacktivism): a cyber attack with a
political or ideological agenda (Chen, Cyberterrorism:
Understanding). What typically separates this from
terrorism is the severity of the attack. Activism tends to
be aimed at raising awareness through cyber space
without causing real world harm.
Cyber Warfare: cyber attack with military goals
conducted or sponsored by an internationally recognized
government. Definitive examples of this are hard to
come by as nations are understandably reluctant to make
known any activity that could be construed as an act of
war (Hilkfer, Responding to Cyber Attacks).
Industrial Espionage: cyber spying with the goal of
stealing trade secrets for profit or advancement in
production and research.
attack can commonly be deduced with a fair degree of probability. Certainty, however, remains
elusive.
Issues in cyberspace are rarely black and white. It is a vast landscape of grey and a
difficult one for any individual government or organization to navigate. It is even more difficult
for numerous countries and organizations to manage and keep safe in a cooperative manner. It is
a realm where potentially anyone can interact or influence others, yet no one is clearly
identifiable. There are no walls or agreed upon borders to mark what is off limits and to whom.
Attempts to regulate cyberspace are made by politicians who do not understand it and are usually
too slow to keep pace with technology (Congressional Hearing, 2015). There is also the question
of what level (if any) regulation is acceptable in a world largely thought of as a last bastion for
true freedom and democracy (Mirielle, Extraterritorial Jurisdiction).
Possible Solutions
1. Attaining information on the source of a cyber attack is a difficult task in and of itself.
Accumulating data regarding cyber attacks for analysis and investigation is key to
accomplishing this, but such efforts are hampered by a lack of information sharing.
Organizations and governments are reluctant to reveal information that may be exploited
to make them appear weak and unable to secure themselves. However, sharing cyber
attack data has been shown to increase security among organizations that cooperate with
one another (Esther, Economic Incentives for Sharing Security Information).
a. Challenge: Organizations involved in this sort of sharing raise legitimate concerns
that sharing such data could be used by competing interests to steal proprietary
security systems (Kshetir, Recent US Cybersecurity Initiatives).
2. Binding international agreement on what defines and constitutes varying degrees of cyber
attacks is necessary to prevent potentially disastrous confrontation. It is also necessary to
establish how a government may reasonably retaliate (legally or militarily) if it can be
shown that a particular organization is responsible for an attack (Segal, The Code Not
Taken; Warner, Notes on the Evolution of Computer Security). Currently, there is
hardly any agreement even within any given nation, about how to define the severity of
different type of malicious cyber activity.
a. Challenge: Governments and private organizations conduct cyber espionage even
on their friends. This overwhelming level of suspicion, combined with the ability
to covertly look into those suspicions, offers little incentive towards transparency.
3. So long as the internet is maintained as a generally free and anonymous environment,
educating the public is critical to keeping it safe. The most devastating cyber attacks
almost always begin with human error (Power, Information Age Espionage). A
network might have the advanced safeguards available, but, an individual with poor
awareness can still be a vulnerability that no amount of software can overcome. Security
experts have demonstrated that even top secret facilities can be breached simply because
the people responsible for enforcing policy are reluctant to get involved in confrontation
with a potential threat (Talbot, Cyberespionage Nightmare).
a. Challenge: This is only one of many necessary steps to making cyberspace more
secure. Also it does not address the strain cyber attacks place on international
relations.
4. In the online world it is easy to conceal ones
identity and even ones location. Barring an effort
to require all users to be identifiable in order to
access the internet, cyber attacks may simply be a
new reality that can only be kept in check, but
never be even close to eliminated. That also
means the mutual distrust between competing
entities online may be here to stay as well. What
can be done, however, is to develop defensive
strategies that keep pace with attack trends rather
than lag behind. Organizations could implement
deception and denial methods. For deception, I mean that in cyberspace, an organization
could reveal non-essential factual information and misleading fictional information to
confuse attackers and also tip administrators off to potential intrusions (Heckman,
Denial and Deception in Cyber Defense). By denial I mean essential information
would be concealed but false information would also be concealed but in such a way as to
lure attackers (Heckman, Denial and Deception in Cyber Defense). Most methods
currently in place are vulnerable to social engineering and user error and are not creative
enough to handle modern cyber attacks.
a. Challenge: This is not so much a solution as it is a step for risk mitigation. It is
also a pessimistic acceptance that if the internet is to remain free, its users are to
remain mutually suspicious of one another.
corporate cyber capabilities and increase public trust (Kshetir, Recent US Cybersecurity
Initiatives). It could be argued, however, that initiatives may cause government overreach and
are concerned about whether such a diversity of organizations can trust one another with
potentially sensitive information (Hilkfer, Responding to Cyber Attacks). Even within the
United States, organizations struggle with the possibility of sharing information regarding cyber
security. This is significant to explaining more global issues. The freedom and anonymity
offered by the internet is a difficult, and maybe impossible, thing to let go of and if one nation
cannot do it, it is unlikely that multiple nations will be able to.
Conclusion
Cyberspace is a virtual realm with a continually growing number of participants, and
malicious actions within it can have significant real world consequences. Unfortunately, those
actions are difficult to define and, even if defined, are even more difficult to attribute to a
particular source. This inability to pinpoint the source of attacks causes users, organizations, and
nations to be suspicious of one another. So long as the internet continues to allow users a
considerable degree of anonymity, these suspicions will persist. The more pessimistic view is
probably the more realistic one for the foreseeable future. International agreement in defining
cyber attacks and enforcing consequences is not possible and would likely only protect those
countries advanced enough to find ways around such safeguards. In cyberspace, technological
knowledge is the prerequisite to maintaining security. Those who educate themselves will be
somewhat reassured, those who do not will get left behind, and everyone will remain mistrustful
in the digital world.
References
Esther Gal-Or, Anindya Ghose. The Economic Incentives for Sharing Security
Information. Institute for Operations Research and the Management Sciences
(INFORMS). 2005. E-Text.
Hilkfer, Joseph (Lieutenant Colonel). Responding to Cyber Attacks and the Applicability of
Existing International Law.U.S. Army War College, March 2013. E-Text.
Kristin Heckman, Frank Stech, and Roshan Thomas. Denial and Deception in Cyber
Defense. CYBERSECURITY. The MITRE Corporation. Computer, v48 n4 (201504): 3644. E-text.
Kshetir, Nir. Recent US Cybersecurity Initiatives: Challenges and Implications. Computer, v48
n7 (201507): 64-69. 2015. E-text.