[Infowarrior] - Privacy May Be a Victim in Cyberdefense Plan

Richard Forno rforno at infowarrior.org
Sat Jun 13 03:07:38 UTC 2009


June 13, 2009
Cyberwar
Privacy May Be a Victim in Cyberdefense Plan
By THOM SHANKER And DAVID E. SANGER

http://www.nytimes.com/2009/06/13/us/politics/13cyber.html?_r=2&hp=&pagewanted=print

WASHINGTON — A plan to create a new Pentagon cybercommand is raising  
significant privacy and diplomatic concerns, as the Obama  
administration moves ahead on efforts to protect the nation from  
cyberattack and to prepare for possible offensive operations against  
adversaries’ computer networks.

President Obama has said that the new cyberdefense strategy he  
unveiled last month will provide protections for personal privacy and  
civil liberties. But senior Pentagon and military officials say that  
Mr. Obama’s assurances may be challenging to guarantee in practice,  
particularly in trying to monitor the thousands of daily attacks on  
security systems in the United States that have set off a race to  
develop better cyberweapons.

Much of the new military command’s work is expected to be carried out  
by the National Security Agency, whose role in intercepting the  
domestic end of international calls and e-mail messages after the  
Sept. 11, 2001, attacks, under secret orders issued by the Bush  
administration, has already generated intense controversy.

There is simply no way, the officials say, to effectively conduct  
computer operations without entering networks inside the United  
States, where the military is prohibited from operating, or traveling  
electronic paths through countries that are not themselves American  
targets.

The cybersecurity effort, Mr. Obama said at the White House last  
month, “will not — I repeat, will not — include monitoring private  
sector networks or Internet traffic.”

But foreign adversaries often mount their attacks through computer  
network hubs inside the United States, and military officials and  
outside experts say that threat confronts the Pentagon and the  
administration with difficult questions.

Military officials say there may be a need to intercept and examine  
some e-mail messages sent from other countries to guard against  
computer viruses or potential terrorist action. Advocates say the  
process could ultimately be accepted as the digital equivalent of  
customs inspections, in which passengers arriving from overseas  
consent to have their luggage opened for security, tax and health  
reasons.

“The government is in a quandary,” said Maren Leed, a defense expert  
at the bipartisan Center for Strategic and International Studies who  
was a Pentagon special assistant on cyberoperations from 2005 to 2008.

Ms. Leed said a broad debate was needed “about what constitutes an  
intrusion that violates privacy and, at the other extreme, what is an  
intrusion that may be acceptable in the face of an act of war.”

In a recent speech, Gen. James E. Cartwright, vice chairman of the  
Joint Chiefs of Staff and a chief architect of the new cyberstrategy,  
acknowledged that a major unresolved issue was how the military —  
which would include the National Security Agency, where much of the  
cyberwar expertise resides — could legally set up an early warning  
system.

Unlike a missile attack, which would show up on the Pentagon’s screens  
long before reaching American territory, a cyberattack may be visible  
only after it has been launched in the United States.

“How do you understand sovereignty in the cyberdomain?” General  
Cartwright asked. “It doesn’t tend to pay a lot of attention to  
geographic boundaries.”

For example, the daily attacks on the Pentagon’s own computer systems,  
or probes sent from Russia, China and Eastern Europe seeking chinks in  
the computer systems of corporations and financial institutions, are  
rarely seen before their effect is felt inside the United States.

Some administration officials have begun to discuss whether laws or  
regulations must be changed to allow law enforcement, the military or  
intelligence agencies greater access to networks or Internet providers  
when significant evidence of a national security threat was found.

Ms. Leed said that while the Defense Department and related  
intelligence agencies were the only organizations that had the ability  
to protect against such cyberattacks, “they are not the best suited,  
from a civil liberties perspective, to take on that responsibility.”

Under plans being completed at the Pentagon, the new cybercommand will  
be run by a four-star general, much the way Gen. David H. Petraeus  
runs the wars in Afghanistan and Iraq from Central Command in Tampa,  
Fla. But the expectation is that whoever is in charge of the new  
command will also direct the National Security Agency, an effort to  
solve the turf war between the spy agency and the military over who is  
in charge of conducting offensive operations.

While the N.S.A.’s job is chiefly one of detection and monitoring, the  
agency also possesses what Michael D. McConnell, the former director  
of national intelligence, called “the critical skill set” to respond  
quickly to cyberattacks. Yet the Defense Department views cyberspace  
as its domain as well, a new battleground after land, sea, air and  
space.

The complications are not limited to privacy concerns. The Pentagon is  
increasingly worried about the diplomatic ramifications of being  
forced to use the computer networks of many other nations while  
carrying out digital missions — the computer equivalent of the Vietnam  
War’s spilling over the Cambodian border in the 1960s. To battle  
Russian hackers, for example, it might be necessary to act through the  
virtual cyberterritory of Britain or Germany or any country where the  
attack was routed.

General Cartwright said military planners were trying to write rules  
of engagement for scenarios in which a cyberattack was launched from a  
neutral country that might have no idea what was going on. But, with  
time of the essence, it may not be possible, the scenarios show, to  
ask other nations to act against an attack that is flowing through  
their computers in milliseconds.

“If I pass through your country, do I have to talk to the ambassador?”  
General Cartwright said. “It is very difficult. Those are the  
questions that are now really starting to emerge vis-à-vis cyber.”

Frida Berrigan, a longtime peace activist who is a senior program  
associate at the New America Foundation’s arms and security  
initiative, expressed concerns about whether the Obama administration  
would be able to balance its promise to respect privacy in cyberspace  
even as it appeared to be militarizing cybersecurity.

“Obama was very deliberate in saying that the U.S. military and the  
U.S. government would not be looking at our e-mail and not tracking  
what we do online,” Ms. Berrigan said. “This is not to say there is  
not a cyberthreat out there or that cyberterrorism is not a  
significant concern. We should be vigilant and creative. But once  
again we see the Pentagon being put at the heart of it and at front  
lines of offering a solution.”

Ms. Berrigan said that just as the counterinsurgency wars in Iraq and  
Afghanistan had proved that “there is no front line anymore, and no  
demilitarized zone anymore, then if the Pentagon and the military  
services see cyberspace as a battlefield domain, then the lines  
protecting privacy and our civil liberties get blurred very, very  
quickly.”


More information about the Infowarrior mailing list