Abstract
The director of the University of âTorontoâs Citizen Labâan interdisciplinary R&D group that works on issues related to digital media, global security, and human rightsâdescribes the new militarization of cyberspace. Deibertâs recent work reveals evidence of sophisticated cyber-espionage aimed at corporations, governments, and human rights groups. In this interview, he explains the implications of these developments on international relations, describes how surging cybersecurity budgets are creating a kind of cyber military-industrial complex, and explains how a computer worm called Stuxnet is an example of a cyber threat to the nuclear complex and other industrial systems. He argues that todayâs deteriorating cyber-environment poses immediate threats to the maintenance of online freedom and longer-term threats to the integrity of global communications networks.
Photo: Glenn Lowson.
For governments around the world, 2010 brought new evidence of the growing cyber threat to national security. The year began with Google announcing that it and other companies had been the target of a China-based cyberattack, known as Operation Aurora, though a direct connection to a government cannot be proved. In the spring the United States named General Keith Alexander, who also heads the National Security Agency (NSA), as the first head of a newly established Cyber Command meant to âfight and win wars in cyberspace.â And late in the year, security experts said a sophisticated computer worm called Stuxnet may have corrupted or damaged industrial control systems around the world, including at Iranâs Bushehr nuclear reactor and Natanz uranium enrichment facility.
Ronald Deibertâwho directs the Canada Center for Global Security Studies and the Citizen Lab at the University of Torontoâs Munk School of Global Affairsâhas co-authored key reports on cyber-espionage, including âTracking Ghostnet,â which documented an alleged cyber-espionage network, orchestrated from Chinese soil, that affected more than 103 countries and 1,295 computers including ones in the headquarters of the Dalai Lama; and âShadows in the Cloud,â which analyzed how a different China-based espionage network operated in part by using cloud computing services. He is also a co-founder of the Information Warfare Monitor project, which, together with the Ottawa-based think tank SecDev Group, tracks the militarization of cyberspace. He spoke with BAS about how cyberthreats affect the global order, and how they relate to existing threats to global security.
This one development will have a ripple effect around the world. Not to put it too bluntly, but other countriesâbeginning with the countries closely allied to the United Statesâhave to fall in step as a function of being closely engaged on an operational level with the US military. Outside the Western allied community, there will be a different, negative reaction. Adversaries will feel that they must adapt or be left behind. If you look at China or Russia, they probably realize they canât compete financially and organizationally on the same level as the US Cyber Command, and so they will look at asymmetric techniques, including potentially cultivating criminal networks, or encouraging so-called patriotic hacking in which citizens themselves wage cyberattacks. Weâve seen all of those techniques crop up with greater frequency. The Internet is being rapidly degraded by militarization, censorship, and surveillance. This unique artificial communication medium that human beings have created, and that should be central to global democratic governance, is being rapidly degraded.
This doctrinal shift is not something that happened overnight; it has been a gradual transformation that started in the middle of the twentieth century. By the 1980s and 1990s new, more systematic, studies and ways of thinking emerged about the so-called âRevolution in Military Affairs,â which recognized the role of information technology in the conduct of US armed forces. But then, in the early 2000s, you had a fundamental reconceptualization in various national security circles that cyberspace itself had become something more than a tool, but an actual environment. This is a transformation on the order of something like what the great British theorist Halford Mackinderâconsidered by many to be one of the founding fathers of geopoliticsâspoke of with respect to the âHeartland Theoryâ and the changes wrought by the Industrial Revolution. We now have an appreciation by the worldâs armed forces that a global technological environment we have createdâan artificial environment, in other wordsâis a space within which states and non-state actors will compete for strategic advantage and try to engineer to suit their strategic interests.
Thereâs evidence that governments are deliberating cultivating an ecosystem of cybercrime and privateering. In the case of the âGhostnetâ (Information Warfare Monitor, 2009) and âShadows in the Cloudâ (Information Warfare Monitor and Shadowserver Foundation, 2010) reports, for example, we could not pinpoint the attacks to the Chinese government itself, but they certainly would benefit by the information that was stolen from compromised victims. Similarly, it cannot be proven that Russian security services orchestrated the attacks on Estonia and Georgia, but the attacks clearly served Russian goals.
The risks also have to be placed in context of social, political, and economic forces that militate against them. We live in a complex interdependent world in which most countries are intertwined and mutually dependent on huge financial flows. That will constrain governments against attacking each othersâ critical infrastructures, a kind of mutual assured destruction in cyberspace. Of course, this dynamic will not have the same effect against small groups or terrorists bent on destruction, but those organizations, for the time being anyway, seemed more focused on spectacular forms of violent behavior that are less complicated to engineer.
The concerns around mass destructionâthe âElectronic Pearl Harbor,â so to speakâcan also be used to justify extreme regulatory measures that diminish privacy and other liberties, or justify major defense contracts for the private computer security sector. We have to be careful to check peopleâs credentials, and ask whether there is a commercial agenda behind their prognoses and warnings, especially in an environment where the cybersecurity commercial market is exploding.
You can look today at the cyber military-industrial complex, where you have major private sector actors offering network attack strategies and surveillance techniques that were never before imagined. Suddenly, companies like Northrop Grumman or SAIC or Booz Allen are not only servicing a market, but they can help create ones by marketing âsolutionsâ to defense agencies, law enforcement, and intelligence services. And that can really begin to change the way in which cyberspace is constituted.
Stuxnet shows the ability of attackers, using very sophisticated techniques, to do damage to industrial control systems. This worm was able to overcome the so-called âair-gappingâ of industrial control systems because it moved through USB sticks and other media. It targets very specific industrial control systems that tend to be arcane and very specializedâSiemens operating systems and specific Windows operating systems. It employed several separate âzero-dayâ attacks, meaning attacks that had yet to be registered by security companies. If present trends continue, forecasts about attacks on critical infrastructures will become more accurate and worrisome.
What we have been able to find in our workâand keep in mind we are a relatively small university-based research team in cooperation with a small private-sector think tankâis that the China-based cyber-espionage included the theft of documents marked âsecretâ and âclassifiedâ from the Indian National Security Secretariat, including detailed discussions of troop movements, analysis of insurgencies that the Indian government was facing, and very detailed defense contracts. Weâve had other investigations, some of which we havenât yet published, where sensitive information has been stolen from law-enforcement agencies and private sector actors in the United States. Anybody who networks today is vulnerable. And there is a massive ecosystem of crime and espionage that feeds parasitically off the hidden underbelly of social networking platforms.
In spite of that, I think itâs worthwhile to push them on it. If I were working for a foreign affairs ministry, Iâd use this as an opening to talk about mutual restraint, cooperation, and push them back on what should be the rules of cyberspace. Some people dismiss cyber arms control, and they are right on one level: We cannot control information weaponsâsomething like Stuxnetâin the way we talk about eliminating certain classes of weapons like ballistic missiles. Information is too difficult to control, and verification would be impossible. So whatâs left? There is some merit in controlling behavior and enforcing rules in cyberspace. Language similar to something like that found in arms control agreements could begin to make sense.
Of course there is a lot that will be difficult to accomplish, especially when it comes to controlling cyber-espionage. But there are mutual interests that relate more to controlling cybercrime, viruses, and denial of service attacks that could form the basis for practical, positive outcomes. For example, one area that could be improved is the networking and integrating of national computer emergency response teams (CERTs) in a more robust, global manner. That is something all countries should probably agree on and can be accomplished in a way that creates a globally distributed sensor net to monitor âbad behaviorâ in cyberspace.
If you look at some outcomes of our own research as an exampleâwe said we had no evidence linking either of the espionage networks we uncovered to Chinaâs government itself. Quietly, and without much public fuss, we sent the information we had on the command and control servers that were being used by the attackers to the Chinese CERT, and to our surprise they thanked us and took measures to shut them down. I thought that was very interesting. If we are looking at trying to control this activity, we are going to need to facilitate and support that type of information sharing. A global network of nationally-based sensor teams monitoring the Internet and sharing information about its health with each other reminds me of the type of organization envisioned for verification of the Comprehensive Nuclear Test Ban Treaty, if it ever comes into force.
