[Infowarrior] - Collateral Damage (in Cyberspace)
Richard Forno
rforno at infowarrior.org
Thu Jun 11 17:32:30 UTC 2009
Collateral Damage
http://www.cringely.com/2009/06/collateral-damage/
There was lots of good discussion last time about cyber warfare, cyber
security, and U.S. policy, but what most respondents seemed to miss
was the international nature of the IT business — all the outsourcing
and offshoring that we were told was so great — and its implications
for U.S. security. The upshot is that any U.S. cyber warfare czar
will have to effectively function as a WORLD cyber warfare czar, a
fact that neither Republican nor Democratic Administrations have yet
been willing to embrace, at least in public.
Forget for the moment about data incursions within the DC beltway,
what happens when Pakistan takes down the Internet in India? Here we
have technologically sophisticated regional rivals who have gone to
war periodically for six decades. There will be more wars between
these two. And to think that Pakistan or India are incapable or
unlikely to take such action against the Internet is simply naive.
The next time these two nations fight YOU KNOW there will be a cyber
component to that war.
And with what effect on the U.S.? It will go far beyond nuking
customer support for nearly every bank and PC company, though that’s
sure to happen. A strategic component of any such attack would be to
hobble tech services in both economies by destroying source code
repositories. And an interesting aspect of destroying such
repositories — in Third World countries OR in the U.S. — is that the
logical bet is to destroy them all without regard to what they
contain, which for the most part negates any effort to obscure those
contents.
You can have 1000 safe deposit boxes with only three holding anything
of real value, but that obfuscation is meaningless if the target is
ALL safety deposit boxes.
To this point cyber security conferences tend to concentrate on
intelligence (probing attacks to learn about a potential enemy, gather
information and map defenses) and tactical deployment (using that
intelligence information to blind, disable, or defend some network
resources in what’s usually perceived as an encounter lasting hours).
There is little to no regard for strategic use of cyber warfare as in
the India-Pakistan example or the nuking of source code libraries. We
don’t talk about it because it is too horrific, not because it can’t
happen.
The result, of course, is that any major power has to be concerned
about the cyber security of all its technology partners, which over
the last decade has come to include a lot of Third World nations. Try
to do a security audit of Argentina or Bangladesh and see what
nightmare is unveiled. Yet this is exactly where major international
companies are deploying more and more technical resources.
The military answer of course is to isolate network traffic, as many
readers have suggested. But how do you enforce that in other
countries? And how effective is it at all against a strategic attack
on essentially commercial resources? Not very.
This is not a battle but a war and wars take a long time to prepare
for and wage. As readers have pointed out we’re not just concerned
with malware and viruses but even hardware-based attacks. Who knows if
that flash memory from Malaysia or that router card from Taiwan is
compromised? Who CAN know? And if you’ve found one hardware exploit
in a product does that mean you’ve found all that are there? Hardly.
One point of view is that this makes both old tech and traditional
firepower more valuable. Analog systems, for example, are unlikely to
be compromised by digital exploits. And 2000-pound bombs are a pretty
darned effective response to a cyber attack IF you can clearly
identify the attacker and figure out where to drop the bombs. Both
effects tend to neutralize the effect of advanced systems, making
Syria a more effective opponent against Israel, AND push superpowers
toward brandishing their biggest guns — nuclear weapons.
So cyber warfare is internationally destabilizing in whole new ways
with the world being dramatically less safe as a result. This works
mainly to the advantage of the bad guys.
Then there’s the Code God Effect — the potential strategic impact of a
single programmer with commanding skills. That very guy or gal who
typically is the creative heart of an entire company (but they never
admit it) because he is the equivalent of 100 average coders can be
the secret weapon in a cyber war, too. And the distribution of such
megabrains is random enough that to say one or more aren’t working
right now in North Korea would be a bad bet — one that a nation like
the United States would be unwise to make.
We see the Code God Effect happening right now with publicized Chinese
Internet incursions and those are just amateurs: the real damage is
being done by much more skillful players we have yet to even detect.
What this means for any major power is that they aren’t as powerful as
they think they are and that power is even less across borders. There
isn’t a U.S. agency I know of — ANY agency — that is prepared to win
such a war against a clever and determined opponent of almost any size.
If the game is U.S. versus Albania, who wins? I don’t know.
We need new tools and new weapons. We need to find ways of changing
the battlefield to negate opponents (this is HUGE), not just shooting
back. We need leadership that understands this. Maybe President
Obama understands it, maybe not. He hasn’t demonstrated yet that he
does, at least not to me.
Let’s hope that’s just part of an incredibly clever master plan.
Yeah, right.
More information about the Infowarrior
mailing list