The theme of Secretary of Defense Panetta’s remarks at the
Intrepid Air and Sea Museum on October 12 before the “Business Executives for
National Security”, in the words of the BBC:
Actually, Mr. Panetta, the “cyber Pearl Harbor” has already
happened.
It was called Stuxnet, the virus designed and delivered by
the governments of the United States and Israel to sabotage Iran’s nuclear
program.
By unleashing Stuxnet—an act of cyberwar—a Rubicon was
crossed. Not my words, but the words of
Michael Hayden, the ex-director of the CIA.
Now the United States is scrambling to deal with the
consequences…and the Western media is by and large obligingly doing its best to
help shove Stuxnet into the memory hole.
Panetta used his speech to push for more cybersecurity
legislation by discussing cyberattacks on Aramco in Saudi Arabia and RasGas of
Qatar using the “Shamoon” virus. The
attacks—which occurred and were reported in August 2012, a few months after
Stuxnet—wiped data from tens thousands of management computers, replaced some
files with a taunting image of a burning American flag, and reportedly rendered
the computers useless.
I was amused to hear that Mr. Panetta carefully characterized these
incidents as “the most destructive [cyber] attack that the private sector has
seen to date.”
I assume he added the “private sector” qualifier to put the
fear of cyber-God into the security-obsessed executives he was addressing
(although applying the term “private sector” to Aramco, the state-owned Saudi
Arabian oil behemoth and RasGas, which is 70% owned by state-owned
Qatar Petroleum is a bit of a stretch).
But limiting the scope of discussion to “private sector” cyberattacks also excludes
the much more significant, expensive, fiendishly complex, and destructive Stuxnet virus, which attacked and
disabled a strategic Iranian government installation.
Stuxnet typifies the grave threat to physical infrastructure that Mr. Panetta got so worked up about much more vividly than an office computer data hack along the lines of Shamoon.
Stuxnet typifies the grave threat to physical infrastructure that Mr. Panetta got so worked up about much more vividly than an office computer data hack along the lines of Shamoon.
And Stuxnet escaped into the wild to infect computer systems around the world! Collateral damage-wise, there apparently wasn't much for Stuxnet to do in a non-uranium centrifuge environment, but it did spread to 100,000 hosts in 155 (mostly US-friendly) countries. (There has recently been a good deal of techie back and forth as to whether Stuxnet's global romp was really an unplanned escape; presumably people are implying that the Israeli spooks inserted some kind of hunter-killer app that allowed the virus to search Iran and the globe for similar installations to degrade.)
Despite its obvious utility as an object lesson in the
genuine, real world dangers of cyberweaponry, Stuxnet did not come up in Mr.
Panetta’s remarks, or in much of the media coverage.
Wonder why.
Wonder why.
Instead, DoD backgrounders painted the Shamoon attacks as dastardly underhanded Iranian
payback for (legal and public) sanctions regime, not as possible direct retaliation for a
(secret and unilateral) cyberattack.
To its credit, the New York Times, which got the Stuxnet story from the
Obama White House back in June, did mention the Stuxnet exploit in its coverage of
Panetta’s speech.
In any case, the United States, having committed the first
cyberattack, is trying to pull up the cyberdrawbridge in anticipation of
retaliation.
One of more interesting elements of this exercise is the
U.S. efforts to paint its actions as a response to Chinese and Iranian
cyberthreats, instead of its own actions.
As indicated above, the Western media has been an obliging enabler,
leading to some topsy-turvy reporting.
The Daily News titled the AP report on Panetta’s speech:
Maybe a better title would be Anti-Iran Alliance Reaps Viral Retaliation for Stuxnet Sneak Attack.
Now, I’m sometimes accused of promoting false moral
equivalence between the PRC and the United States i.e. judging Chinese and US
actions by similar standards.
But, in my mind, what is really dangerous is the false
assumption of moral superiority that underlies much of the reporting about
China and Iran.
According the moral superiority equation, the United States
is automatically in the right in any dispute with the PRC and Iran because of
the innate superiority of our system and the ideological, economic, and human
rights defects of the PRC and Iranian regimes.
Despite the resounding disaster of the Iraq war, this
tendency has strengthened in recent years with the further institutionalization
of the “responsibility to protect” doctrine as a pretext for US foreign policy
intervention.
Targets of Western intervention are progressively delegitimized
so that unprovoked attack elicits no condemnation, and efforts by our
adversaries to defend themselves, especially by trying to establish a deterrent
by demonstrating an ability to retaliate are ipso facto morally indefensible.
I was struck, for instance, by the reporting of the Daily
News and New York Post, albeit tabloid outliers, on President Achmadinejad’s
visit to New York to address the UN General Assembly in September (post Stuxnet, of course).
They greeted him with front page, full-sized photos of
Ahmadinejad flashing the V sign, garlanded with the epithet PEACE OF SH!T (Post) and VILE
(News).
This sort of stuff is usually forgiven on First Amendment
grounds and excused as harmless hyperbole used to sell newspapers. But it’s certainly not making war with Iran
less likely, especially in the minds of the easily excited.
The Daily News reported favorably on the assault by an MEK
–linked crowd on a Foreign Ministry official who got separated from his group
on the streets of New York:
Gregory Nelson received cheers and handshakes from anti-Iran protesters after slugging Foreign Ministry mouthpiece Ramin Mehmanparast on 48th St. near Second Ave.
“It felt really good,” said Nelson, 50, after delivering his shot to the Iranian bigwig’s stomach. “It wasn’t that hard, but he felt it.”
Nelson was flanked by a horde of protesters, many of them Iranian immigrants demanding democracy in their homeland, when Mehmanparast walked past after President Mahmoud Ahmadinejad’s United Nations speech.
The former Army National Guard member, doing his best Mike Tyson impression, saw an opening and swung at the spokesman’s midsection before he could escape.
“We don’t usually conduct ourselves like that, but he’s a murderer,” said the bearded, ponytailed Nelson. “That whole regime, everybody is responsible for the murders that go on.”
Maybe Ahmadinjad feels he would have been treated with a little more courtesy if he had the atomic bomb; in any case, I don’t think his reception in New York convinced him Iran should abandon its ideas of a nuclear deterrent.
For those with short memories, the whole “delegitimization
from an attitude of Western moral superiority” thing was applied to Saddam
Hussein before Mahmoud Ahmadinejad, until invading Iraq became a moral
imperative, not just an extremely dubious foreign policy option.
That’s why I consider China-bashing rather worrisome, even
though the combination of the PRC’s nuclear deterrent and Western squeamishness
about land wars in Asia makes an attack on China proper almost inconceivable.
As the Iran precedent shows, there’s still plenty of room
for terrorism, economic warfare, subversion, cyber wars, proxy wars, and every
kind of human misery short of outright invasion.
US policy toward China is getting locked into a
self-reinforcing cycle of continued provocation, response, and delegitimization
which creates an environment of escalating crisis that some in the United
States security establishment seem happy to promote and makes confrontation
with the PRC more likely.
Escalating responses to cyberthreats feed this dynamic.
As Secretary Panetta's speech demonstrates, touting the insidious cyberwar designs of our adversaries has too much efficacy as a national security hot button for the US government and the Western media to be squeamish about pushing it, no matter what we did with Stuxnet. We're the good guys, after all!
That's certainly the case for China, which is a cyber-adversary of considerable notoriety, though (unlike the United States) it has apparently confined the bulk of its efforts to espionage rather than sabotage to date.
In any case, Secretary Panetta (and the media)'s contortions over America's Stuxnet legacy provide a nice and timely segue into my most recent piece for Asia Times.
Escalating responses to cyberthreats feed this dynamic.
As Secretary Panetta's speech demonstrates, touting the insidious cyberwar designs of our adversaries has too much efficacy as a national security hot button for the US government and the Western media to be squeamish about pushing it, no matter what we did with Stuxnet. We're the good guys, after all!
That's certainly the case for China, which is a cyber-adversary of considerable notoriety, though (unlike the United States) it has apparently confined the bulk of its efforts to espionage rather than sabotage to date.
In any case, Secretary Panetta (and the media)'s contortions over America's Stuxnet legacy provide a nice and timely segue into my most recent piece for Asia Times.
The piece discusses the hullaballoo over Huawei and ZTE, two
Chinese telecommunications vendors who the U.S. House of Representatives
Intelligence Committee would like to see banned from any private as well as
public U.S. networks.
I argue that the reason why Huawei and ZTE can’t be trusted
is because the U.S. can’t be trusted. It
unleashed Stuxnet in a unilateral, secret cyberattack and rendered moot the
Pentagon’s hopeful effort to negotiate the rules of cyberwar. With cyberwar not just on the agenda but
actually being practiced out in the field, thanks to President Obama, I’d also
worry that somehow the Chinese government would try to diddle with our precious
networks and the sensitive infrastructure they control.
Whether or not the PRC’s spooks would go through Huawei and
ZTE is, of course, another matter, one for the experts in cybersabotage to
consider. For one thing, many of the
network suppliers whom the Intelligence Committee considers trustworthy, like
Alcatel, already manufacture a lot of sensitive equipment within Chinese
borders.
Anyway, here’s the story on Huawei, the latest Chinese
bugbear. Readers are invited to consider
whether pounding on China this way is making us safer, or pushing us unprepared
toward some kind of dangerous and uncertain future.
It can be reposted if ATOl is credited and a link provided.
US digs in for cyber warfareBy Peter Lee
Recently the US House of Representatives Intelligence Committee took a meat-ax to Huawei, the Chinese telecommunications giant, and its little brother ZTE in a 60-page report on national-security issues posed by the two companies.
The conclusion:
The United States should view with suspicion the continued penetration of the US telecommunications market by Chinese telecommunications companies. [1]Specifically, the committee recommended that the government not purchase any Huawei or ZTE equipment.
The committee rubbed further salt in the wound by recommending that private companies not buy any Huawei or ZTE telecommunications equipment either.
It also invited the legislative branch to expand the jurisdiction of the Committee on Foreign Investment in the United States (CFIUS) to enable it to block procurement of Chinese telecommunication equipment by US customers, in addition to exercising its traditional powers of blocking foreign investment deemed harmful to US security. CFIUS had previously blocked Huawei's participation in a deal to take 3Com private - which was brokered by Mitt Romney's Bain Capital - and recently denied Huawei's attempt to buy 3Leaf, a California cloud computing company.
Certainly not the clean bill of health that Huawei was hoping for when it invited the US government to investigate its operations.
It is clear that the Chinese companies were given the Saddam Hussein treatment. Just as the Iraqi despot was put in the impossible position of proving a negative - that he did not have any weapons of mass destruction - Huawei and ZTE executives were called upon to prove their companies were not untrustworthy.
Mission unaccomplished, for sure.
The public committee report is little more than a litany of complaints about unclear answers, insufficient disclosure, inadequate clarification, failure to alleviate concerns, making non-credible assertions, failure to document assertions, failure to answer key questions, refusal to be transparent, and so on and so forth. Huawei, in particular, was dinged for "a lack of cooperation shown throughout this investigation".
The committee's conclusion:
Throughout the months-long investigation, both Huawei and ZTE sought to describe, in different terms, why neither company is a threat to US national-security interests. Unfortunately, neither ZTE nor Huawei [has] cooperated fully with the investigation, and both companies have failed to provide documents or other evidence that would substantiate their claims or lend support for their narratives.To drive a stake into the heart of any dreams that Huawei or ZTE had of providing "mitigation assurances" - bureaucratese for acceptable measures to allay US security concerns - the committee made the interesting decision to dump all over the British government.
Keen on Chinese investment in its backbone telecommunications networks, the British government accepted the reassurance provided by a cyber-security center, funded by Huawei and staffed by UK citizens with security clearances, with the job of vetting Huawei products for hinky bits.
The US intelligence committee dismissed these efforts as futile given the complex, opaque and frequently updated character of telecommunications software:
The task of finding and eliminating every significant vulnerability from a complex product is monumental. If we also consider flaws intentionally inserted by a determined and clever insider, the task becomes virtually impossible.In terms of specific evidence of Huawei and ZTE malfeasance, there is little meat on the bones of the public document.
On the technical side, the evidence supporting Huawei and ZTE infiltration of the US telecommunications software presented in the public report was less than earth-shaking:
Companies around the United States have experienced odd or alerting incidents using Huawei or ZTE equipment. Officials with these companies, however, often expressed concern that publicly acknowledging these incidents would be detrimental to their internal investigations and attribution efforts, undermine their ongoing efforts to defend their systems, and also put at risk their ongoing contracts.Presumably, the confidential annex to the committee report makes a more compelling case, but one has to wonder.
Similarly, statements by former or current employees describing flaws in the Huawei or ZTE equipment and other potentially unethical or illegal behavior by Huawei officials were hindered by employees' fears of retribution or retaliation.
According to The Economist:
Years of intense scrutiny by experts have not produced conclusive public evidence of deliberate skulduggery, as opposed to mistakes, in Huawei's wares. BT, a British telecoms company that buys products vetted in [the cyber-security center at] Banbury, says it has not had any security issues with them (though it rechecks everything itself, just to be sure). [2]In a sign that no existential smoking cyber-guns had been revealed, the worst punishment for Huawei's lack of cooperation that the committee could apparently mete out (other than trying to destroy Huawei's US business) was threatening to forward information to the Justice Department concerning possible corporate malfeasance in the routine areas of immigration violations, fraud and bribery, discrimination, and use of pirated software by Huawei in its US operations.
It can be taken as a given that the People's Republic of China (PRC) is intensely interested in cyber-espionage - diplomatic, military, and commercial - against the United States and cyber-warfare against US government, security, and public infrastructure if and when the need arises.
However, the case that Huawei is a knowing or even a necessary participant in these nefarious schemes is unproved.
Nevertheless, Huawei's attempts to generate a clean bill of health for itself with Western critics are pretty much futile.
That's because government weaponization of communications technology is a given - for everybody, in the West as well as in China.
Beneath the freedom-of-information rhetoric, the West is converging with the East and South when it comes to protecting, monitoring and controlling its networks.
In the United States, providing government law enforcement with back-door access to networks, aka "lawful intercept", is a legal requirement for digital telecom, broadband Internet, and voice-over-IP service and equipment providers under the CALEA (Communications Assistance to Law Enforcement Act) law. The Federal Bureau of Investigation (FBI) is currently lobbying the US administration and the Federal Communications Commission to require that social-media providers such as Facebook provide similar access so that chats and instant messaging can also be monitored in real time or extracted from digital storage.
In Europe, similar law-enforcement access is institutionalized under the standards of the European Telecommunications Standards Institute.
Particularly in the environment after the attacks of September 11, 2001, law enforcement has expressed anxiety about "going dark" - losing the ability to detect and monitor communications by bad actors as data and telecommunications moved from fixed-wire analog systems to digital, wireless, and band-hopping protocols.
The situation is aggravated by the availability of theoretically unbreakable public/private key 128-bit encryption.
(I say "theoretically", by the way, because creation of the private key relies on a random-number generator on the encrypting computer. A recent study found that some programs were spitting out non-random random numbers, raising the possibility that a certain spook agency of a certain government had been able to diddle with the programs to generate certain numbers preferentially, giving said spook agency a leg up to crack the private keys through otherwise ineffective brute-force computing techniques.) [3]
One way to get around the problem of
anonymous users employing unbreakable encryption
from multiple devices is the trend around the
world toward requiring real name registration -
stripping anonymity from Internet posters - and
requiring Internet service providers to become
active participants in law enforcement by
monitoring the activities of their customers.
For encrypted documents and communications using genuinely random numbers - and absent a mandated, law-enforcement-accessible third-party repository for private keys (a demand recently made of RIM, the BlackBerry people, by the Indian government), the government has to employ either judicial compulsion or covert means to obtain information on private keys from individual computers. Covert means presumably involve using a virus or some other means of access to install a keylogger. [4] [5]
For encrypted documents and communications using genuinely random numbers - and absent a mandated, law-enforcement-accessible third-party repository for private keys (a demand recently made of RIM, the BlackBerry people, by the Indian government), the government has to employ either judicial compulsion or covert means to obtain information on private keys from individual computers. Covert means presumably involve using a virus or some other means of access to install a keylogger. [4] [5]
A while back, the FBI admitted it had such a program, code-named Magic Lantern - strictly a research operation, of course - creating the interesting issue of whether or not anti-virus software vendors could be dragooned into modifying their programs to ignore the officially sanctioned virus.
One plausible reason for excluding Huawei and ZTE from US networks would be to deny them a possibly privileged view of how the legal intercept cyber-sausage gets made.
Even Western governments have also expressed an interest in flipping the dastardly "kill switch" that deprives Internet users of their precious connectivity and is the badge of shame for totalitarian regimes.
During the riots in England last year, the British government thought of taking a page from the playbooks of former Egyptian leader Hosni Mubarak and Iranian President Mahmoud Ahmadinejad.
British Prime Minister David Cameron, in a statement to the House of Commons earlier today, made reference to and mooted the possibility that social media could be "disrupted" or turned off if riots continue.Putting a kill switch in the hands of Huawei is probably the biggest US headache.
Services such as Facebook, Twitter and crucially BlackBerry Messenger - which has been used by rioters and looters to organize disruption across the British capital and other cities in England - could be restricted in a bid to prevent further violence; present day or in future warranted situations.
Speaking in the House of Commons, David Cameron said: "The free flow of information can be used for good. But it can also be used for ill" ...
Conservative Tobias Ellwood MP said in Parliament that police should be given the option to switch off cell network masts "and other social networks" used to coordinate trouble, violence and disorder. [6]
With more and more sensitive data encrypted, it is unclear that squatting on a Huawei switch and copying the flow of 1s and 0s will deliver Chinese spies a considerable incremental benefit over the prodigious targeted hacking operations they are allegedly engaging in already.
The real danger from a hostile piece of telecommunications kit would be disablement in time of crisis or war, as Fred Schneider, a computer scientist at Cornell University in New York state, told Technology Review:
A trigger could be built either into the software that comes installed in switches and network hardware or into the hardware itself, in which case it would be more difficult to detect, says Schneider. The simplest kind of attack, and one very hard to spot, would be to add a chip that waits for a specific signal and then disables or reroutes particular communications at a critical time, he says. This could be useful "if you were waging some other kind of attack and you wanted to make it difficult for the adversary to communicate with their troops", Schneider says. [7]There is a good reason Huawei can't be trusted to deliver clean kit to critical US infrastructure customers. That is that we now live in a world in which cyberwar is an acceptable and legitimate national tactic.
This Pandora's box of cyberwar has already been opened ...
... by the United States.
Amid the ferocious Iran-bashing - and "by any means necessary" justifications for covert action against that country's nuclear program - that have become endemic in the West, the true significance of the Stuxnet exploit has been overlooked by many, at least in the West.
Stuxnet was the release of an important cyber-weapon - a virus that did not simply seek sensitive information or attempt to disrupt communication, but one that was reportedly rather effective in damaging a strategic Iranian facility by an act of sabotage.
It was an act of cyberwar.
As David Sanger, The New York Times' national-security adviser, wrote in his White House-sanctioned account:
"Previous cyberattacks had effects limited to other computers," Michael V Hayden, the former chief of the CIA, said, declining to describe what he knew of these attacks when he was in office. "This is the first attack of a major nature in which a cyberattack was used to effect physical destruction", rather than just slow another computer, or hack into it to steal data.In true US imperial style, Stuxnet was unleashed unilaterally and without a declaration of war, to satisfy some self-defined imperatives of US President Barack Obama's administration.
"Somebody crossed the Rubicon," he said. [8]
That's not a good precedent for other cyber-powers, including China, to rely on US restraint, or to restrain themselves.
The Obama administration's attempt to deal with the issue of its first use of cyber-warfare seems to go beyond hypocritical to the pathetic.
There are rather risible efforts to depict the Stuxnet worm - which caused the centrifuges to disintegrate at supersonic speeds - as little more than a prank, albeit a prank that might impale hapless Iranian technicians with aluminum shards traveling at several hundred kilometres per hour, rather than a massive exercise in industrial sabotage:
"The intent was that the failures should make them feel they were stupid, which is what happened," the participant in the attacks said. When a few centrifuges failed, the Iranians would close down whole "stands" that linked 164 machines, looking for signs of sabotage in all of them. "They overreacted," one official said. "We soon discovered they fired people."According to Sanger, at least President Obama knew what he was getting into:
Mr Obama, according to participants in the many Situation Room meetings on Olympic Games, was acutely aware that with every attack he was pushing the United States into new territory, much as his predecessors had with the first use of atomic weapons in the 1940s, of intercontinental missiles in the 1950s and of drones in the past decade. He repeatedly expressed concerns that any American acknowledgment that it was using cyber-weapons - even under the most careful and limited circumstances - could enable other countries, terrorists or hackers to justify their own attacks.
"We discussed the irony, more than once," one of his aides said. Another said that the administration was resistant to developing a "grand theory for a weapon whose possibilities they were still discovering". Yet Mr Obama concluded that when it came to stopping Iran, the United States had no other choice ...
Mr Obama has repeatedly told his aides that there are risks to using - and particularly to overusing - the weapon. In fact, no country's infrastructure is more dependent on computer systems, and thus more vulnerable to attack, than that of the United States. It is only a matter of time, most experts believe, before it becomes the target of the same kind of weapon that the Americans have used, secretly, against Iran.
But Obama did it anyway, in the service
of a dubious foreign-policy objective - forcibly
and unilaterally disabling Iran's (currently)
non-military nuclear program - that was arguably
an overreaction to Israel's blustering threat to
attack Iran unilaterally, and an attempt to get
himself some political breathing space from
vociferously pro-Israeli interests in US politics.
And of course there were problems.
Stuxnet made a mockery of its reputation as a "surgical strike" magic bullet that would destroy Iran's centrifuges but otherwise do no harm. It escaped into the wild - something that Obama's team likes to blame on the Israelis, but an evasion of culpability that would probably not hold up in a court of law - and infected computer systems around the world.
And of course there were problems.
Stuxnet made a mockery of its reputation as a "surgical strike" magic bullet that would destroy Iran's centrifuges but otherwise do no harm. It escaped into the wild - something that Obama's team likes to blame on the Israelis, but an evasion of culpability that would probably not hold up in a court of law - and infected computer systems around the world.
Presumably, Chinese intelligence services did not have to wait for Stuxnet to arrive in China; they were probably invited to help out with the forensics by the Iranian government, and probably have a very nice idea of how it works, and creative ideas about how it could be modified to target other systems.
The Stuxnet background provides an interesting context to the immense ballyhoo about Chinese cyber-espionage and cyber-warfare threats, of which the House Intelligence Committee report is only one instance.
What better way to distract attention from one's own first use of cyber-weapons than to raise the alarm about what the bad guys might do instead?
One of the sweetest fruits of this exercise in misdirection is an April (pre-Sanger expose) National Public Radio report on what it identified as the real cyber-threat in the Middle East: Iran.
The big fear in the US is that a cyberattacker could penetrate a computer system that controls a critical asset like the power grid and shut it down. Such an effort is probably beyond the capability of Iranian actors right now, according to cyber-security experts. But a less ambitious approach would be to hack into the US banking systems and modify the financial data. [Dmitri] Alperovitch, whose new company CrowdStrike focuses on cyber-threats from nation-states, says such an attack is well within Iran's current capability.The possibility that Israel's traditional bugbear, Hezbollah, could be prevailed upon to deliver the fatal code on Iran's behalf is discussed in detail. [9]
"If you can get into those systems and modify those records, you can cause dramatic havoc that can be very long-lasting," he says.
The Pentagon's cyberwar strategists did their best to frame the cyberwar issue as law-abiding America vs the unprincipled cyber-predators of the PRC.
With Sanger-assisted Stuxnet hindsight, this May report, with its wonderful title "US hopes China will recognize its cyber war rules", is, well, hypocritical and pathetic:
While no one has, with 100% certainty, pinned the Chinese government for cyber-attacks on US government and Western companies, in its 2012 report "Military and security developments involving the People's Republic of China", the US secretary of defense considers it likely that "Beijing is using cyber-network operations as a tool to collect strategic intelligence" ...A few days later, Sanger's story confirmed that the Obama administration had indeed released Stuxnet, rendering moot the Pentagon's plans for a chivalric, rules-based cyberwar tournament, with the US occupying the moral high ground.
The report raises China's unwillingness to acknowledge the "Laws of Armed Conflict", which the Pentagon last year determined did apply to cyberspace ...
Robert Clark, operational attorney for the US Army Cyber Command, told Australian delegates at the AusCERT conference last week how the Laws of Armed Conflict in cyberspace might work internationally to determine when a country can claim self-defense and how they should measure a proportionate response.
One problem with it was highlighted by Iran, following the Stuxnet attack on its uranium-enrichment facility in Natanz, which never declared the incident a cyberattack.
Air Force Colonel Gary Brown, an attorney for US Cyber Command, in March this year detailed dozens of reasons why Iran, in the context of the Laws of Armed Conflicts in cyberspace, didn't declare it an attack. This included that difficulties remain in attributing such an attack to a single state. [10]
Heightened mutual suspicion - maybe we should call it endemic mistrust - is now a given in cyber-relations between the United States and its adversaries/competitors, for a lot of good reasons that don't necessarily have anything to do with Chinese misbehavior, but have more than a little to do with the US willingness to unleash a cyberattack on an exasperating enemy without setting clearly defined ground rules, and its need to pull up the cyber-drawbridge over the national digital moat to prevent retaliation.
Suspicion of other people's cyber-motives has become a self-fulfilling prophecy, and anxious allies are expressing their cyber-solidarity by banding together against the external threat.
In the midst of important national debates on Chinese investment, Canadian and Australian intelligence services, probably prompted by their opposite numbers in the United States, both issued damning reports on Chinese cyber-threats.
The Australian government has banned Huawei and ZTE from participation in its massive National Broadband Network project. In Canada, cyber-spying is cited as a justification for limiting investment by Chinese state-owned enterprises (such as CNOOC) in any strategic Canadian businesses.
On the other side of the fence, Iran, in a decision that was widely mocked in the United States, is developing a more secure national intranet - with equipment allegedly provided by Huawei.
Of course, in the up-is-down rhetoric that drives US Internet policy, Iran's attempts to shield itself from foreign threats is itself a threat:
"Any attempt by a country to make an intranet is doomed to failure," Cedric Leighton, a retired deputy director at the National Security Agency, said in an interview. But he said Iran's "cyber-army", a network of government-supported hackers that has attacked Western targets in recent years, does stand to gain from the attempted creation of a national network. By connecting thousands of servers inside Iran, the government would "build on their knowledge of networks and how they operate", he said, increasing their capabilities to both launch and repel cyberattacks. [11]By the way, the largest intranet in the world is the unclassified chunk of the US military's data network, known as NIPRNET, a fact that perhaps escaped Leighton. SIPRNet, the classified part of the US military network, with 4.2 million users, is also doing OK, though it was the source for the WikiLeaks CD.
As The Economist put it, the Internet is becoming balkanized. [12]
And as Winston Churchill might have put it, a digital curtain is descending across the Middle East, Asia, and virtually every significant national border. This phenomenon is a direct expression of the insecurity of governments as they attempt to limit the vulnerabilities that encrypted connectivity reveal to their internal and external enemies, and as they deal with the consequences of their own efforts to exploit and compromise the Internet.
It is easy for governments to blame others, but they might as well blame themselves.
Notes:
1. Click here for full text of the report (pdf file).
2. The company that spooked the world, The Economist, Aug 4, 2012.
3. Crypto-Gram Newsletter, Schneier, Mar 15, 2012.
4. FBI software cracks encryption wall, MSN, Nov 20, 2001.
5. India: We DO have the BlackBerry encryption keys, The Register, Aug 2, 2012.
6. British PM considers turning off social networks amid further riots, ZD Net, Aug 11, 2011.
7. Why the United States Is So Afraid of Huawei, Technology Review, Oct 9, 2012.
8. Obama Order Sped Up Wave of Cyberattacks Against Iran, The New York Times, Jun 1, 2012.
9. Could Iran Wage a Cyberwar on the US?, Apr 26, 2012.
10. US hopeful China will recognise its cyber war rules, CSO, May 21, 2012.
11. Iran tightens online control by creating own network, Guardian, Sep 25, 2012.
12. The company that spooked the world, Economist, Aug 4, 2012
Newspaper images from Capital New York
6 comments:
"The United States should view with suspicion the continued penetration of the US telecommunications market by Chinese telecommunications companies."
That is the exclusive preserve of Israeli companies!
These are the great blogs; I assure you that I really enjoyed a lot in reading. click here
I want to give my special thanks to you; very first time I have got such type of blog that has described everything perfectly.
direct payday lenders
I really love your write-ups guys continue the good work.whole life ins
Been using Kaspersky security for a few years now, and I'd recommend this product to everyone.
The New York Pass is a 'smart card' - like a credit card with a computer chip inside - which gives you absolutely free admission to over 80 popular New York tourist attractions.
Post a Comment