Read Cybersecurity and Cyberwar Online

Authors: Peter W. Singer Allan Friedman,Allan Friedman

Cybersecurity and Cyberwar (25 page)

By focusing on an adversary's information systems, China advances the idea that cyberattacks turn technical advantage into a liability. In a controversial 1999 volume, two PLA officers wrote, rather pugnaciously, “Who now dares state with certainty that in future wars this heavy spending will not result in an
electronic Maginot line
that is weak because of its excessive dependence on a single technology?” The basic thinking is that any foreign power that might threaten China (i.e., the United States) would depend on well-coordinated technical systems. Infiltrating and disrupting these systems is thus a natural “defensive” posture. Unfortunately, to those on the opposite end of the cyber gun barrel, the emphasis on infiltrating and disrupting communications and command systems looks aggressive.

This amount of military activity and planning in the cyber realm is certainly worrisome to other nations watching China's historic rise over the last few years in economic, political, and now military power. But, for all the concern, no one should confuse ambition with full capability. In fact, Chinese military officers echo many of the same complaints that American officers have about their own cyber problems. Chen Weizhan, head of the Military Training and Service Arms Department of the Guangzhou Military Region, has talked about how “many generations of weapons and equipment exist at the same time … incompatible software systems, unmatched hardware interfaces, and non-unified data formats.” He concluded that “there are considerable gaps in the fundamental conditions of the units, and the
level of informationization
is not high.”

Despite these problems, China's growth in military cyber power still has two major implications, each of which parallel America's own growing military cyber power. Just as in the United States, there is concern whether the Chinese civilian political leadership is involved in and understands enough about their military's own plans. This may be even more of a concern for China, though, as the current Chinese political system gives the PLA an immense amount of leeway. Indeed, there is no equivalent to America's civilian-led and staffed National Security Council or Department of Defense. The risk, therefore, is that Chinese military cyber capabilities and operations could outpace civilian leaders' understanding of them, perhaps crossing “red lines” in a crisis that could have been avoided.

The other problem is what such rapid efforts to militarize cyberspace might do to the Internet. China isn't just a looming superpower, it's also home to the world's largest number of Internet users. As it follows in the United States' steps, it continues a dark trend. A uniquely democratic space created for communication and sharing is instead being transformed into a future battleground. “Winning IT-based warfare” (former Chinese president Hu Jintao) and “Fighting and winning wars in cyberspace” (General Keith Alexander, the first head of the US military's Cyber Command) are certainly important new military responsibilities in the twenty-first century. But that doesn't make them positive developments for the wonderful World Wide Web that so defines modern life.

Fear of a militarized cyberspace, however, may well lead us to avoid the very cyber conflicts we are all gearing up for. At a meeting with US officials, a high-ranking Chinese military officer explained how his views of cybersecurity have evolved as each side has built up its cyber powers and raised the stakes in a potential conflict: “The United States has big stones in its hands but also has a plate-glass window.
China has big stones
in its hands but also a plate-glass window. Perhaps because of this, there are things we can agree on.”

What about Deterrence in an Era of Cyberwar?

“Cyber offense may provide the means to respond in-kind. The protected conventional capability should provide credible and observable kinetic effects globally. Forces supporting this capability are isolated and segmented from general-purpose forces to maintain the highest level of cyber resiliency at an affordable cost. Nuclear weapons would remain the ultimate response and anchor the
deterrence ladder
.”

These lines come from a 2013 US Defense Science Board report, one of the highest-level official advisory groups to the Secretary of Defense. While the text reads like typical Pentagonese, what these lines translate into is a proposal to create a new US military force specially designed to retaliate against a cyber strike. Of note, it wouldn't just be able to respond with counter cyber weapons, but also would include “Global selective strike systems e.g. penetrating bomber, submarines with long range cruise missiles, and
Conventional
Prompt Global Strike [a ballistic missile].”
Foreign Policy
magazine's reaction to the news perhaps
sums it up the best
: “Wow.”

When we think about deterrence, what most often comes to mind is the Cold War model of MAD, mutually assured destruction. Any attack would be met with an overwhelming counterstrike that would destroy the aggressor as well as most life on the planet, making any first strike literally mad.

Yet rather than just getting MAD, deterrence really is about the ability to alter an adversary's actions by changing its cost-benefit calculations. It reflects subjective, psychological assessments, a “state of mind,” as the US Department of Defense says, “brought about by the existence of a credible threat of
unacceptable counteraction
.” In addition to massive retaliation, the adversary's decisions can also be affected by defenses, in what has been called “deterrence by denial.” If you can't get what you want by attacking, then you won't attack in the first place.

Theorists and strategists have worked for decades to fully understand how deterrence works, but one of the key differences in the cyber realm, as we have explored, is the problem of “who” to
deter or retaliate against
. Specifically, this is the issue of attribution we explored earlier.

The effect of this on real-world politics is driven by the fact that the question of “who” in cyberspace is far more difficult than ever could have been imagined by the original thinkers on deterrence theory back in the 1950s. Tanks and missile launches are hard to disguise, while networks of compromised machines or tools like Tor make anonymity easy. The threat of counterstrike requires knowing who launched the initial attack, a difficult thing to prove in cyberspace, especially in a fast-moving crisis. Computer code does not have a return address, and sophisticated attackers have grown adept at hiding their tracks. So painstaking forensic research is required, and, as we saw, it's rarely definitive.

Moreover, for the purposes of deterrence, it's not enough to trace an attack back to a computer or find out who was operating a specific computer. Strategically, we must know what political actor was responsible, in order to change their calculations.

This problem has made improving attribution (or at least making people think you have improved attribution) a key strategic priority for nations that believe themselves at risk of cyberattack. So, in
addition to considering the massive retaliatory forces outlined by the Defense Science Board, the United States has grown its messaging efforts on this front. In 2012, for example, then Secretary of Defense Panetta laid down a public marker that “Potential aggressors should be aware that the United States has the capacity to locate them and to hold them accountable for their actions that may
try to harm America
.” In turn, these potential aggressors must now weigh whether it was bluster or real.

The “who” of deterrence is not just about identification but also context. The United States has approached deterrence very differently when facing terrorists, rogue nations, and major powers. While the theory often lays out a series of set actions and counteractions, the reality is that different actors can dictate very different responses. Imagine, for example, what the Bush administration's reaction might have been if the groups attacking the United States' NATO partner Estonia in 2007 had been linked to Tehran instead of Moscow.

If the actor is known, the next component in deterrence is the commitment to retaliate, a decision whether to match or escalate the use of force. Unlike when the United States and the Soviet Union pointed nuclear weapons at each other's territory, the players and stakes in the cyber realm are far more amorphous. Some even argue that if one wants to change an adversary's “state of mind,” the “credible threat” against cyberattack needs to go beyond the cyber realm.

This is the essence of the Pentagon's plan for a mixed cyber- and real-world retaliatory force, which has also been proposed even in situations of espionage. But going back to the issue of context, the challenge of intellectual property theft is that an in-kind response would not be effective; the very fact that your secrets are being stolen is a pretty good indicator that the enemy doesn't have anything worth stealing back. Likewise, the traditional deterrence and retaliation model in espionage (they arrest your spies, you arrest theirs or deport some embassy staff) doesn't translate well when the spy is thousands of miles away and likely outside of the government. Thus, some have argued that alternative means have to be found to influence an enemy's calculations. Dmitri Alperovitch, who watched the massive Shady RAT attacks play out, argues that we should try to “raise the economic costs on the adversary through the use of such
tools as sanctions, trade tariffs, and multilateral diplomatic pressure to impact their cost benefit
analysis of these operations
.”

Timing also plays a more complicated role in cyber deterrence. In the nuclear age, speed was key to MAD. It was crucial to show that you could get your retaliatory missiles and bombers off the ground before the other side's first strike. In the cyber age, however, there is simultaneously no time and all the time in the world to respond. The first strike might play out in nanoseconds, but there are many compelling reasons to delay a counterstrike, such as to gain better attribution or better plan a response.

Similarly, how much of a guarantee of reprisal is needed? In the nuclear realm, the game theory that guided American Cold War planners put a mandate on having comparable “survivable” counterstrike forces that would make sure the other guy got nuked even if he tried a sneak attack. In a cyber era, it's unclear what a “survivable” counterforce would look like, hence the US plan to establish a nuclear equivalent.

The same lack of clarity extends to the signals that the two sides send each other, so key to the game of deterrence. If you fire back with a missile, the other side knows you have retaliated. But fire back with malware, and the effect is not always so evident, especially as its impact can sometimes play out just like a normal systems failure. This means that different types of cyber weapons will be needed for different purposes in deterrence. When you want to signal, “noisy” cyber weapons with obvious effects may be better, while stealthy weapons might be more key to offensive operations. The result, though, is something that would be familiar to those wrestling with past deterrence strategies: in the effort to head off war, new weapons will be in constant development, driving forward an arms race.

In short, the growing capacity to carry out multiple types of cyberattack is further complicating the already complex field of deterrence. Without a clear understanding or real reservoir of test cases to study for what works, countries may have to lean more heavily on deterrence by denial than during the nuclear age.

Ultimately, while the technologies may be shifting, the goals of deterrence remain the same: to reshape what an enemy thinks. Cyber deterrence may play out on computer networks, but it's all about a state of mind.

Why Is Threat Assessment So Hard in Cyberspace?

In the 1960s there was a heated argument in the Pentagon between Alain Enthoven, a civilian strategist, and an air force general about the number of nuclear weapons that the United States would need if the Cold War ever turned hot. Angry that this nerdy civilian didn't see the threat the same way, the general told Enthoven that his opinion was not wanted. Enthoven then famously responded, “General, I have fought
just as many nuclear wars
as you have.”

This anecdote is useful when thinking about cybersecurity and all the potential ripple effects it will have for arms races, wars, and other conflicts. A “threat assessment” is the process of weighing the risks that any entity faces, be it a nation, a business, or even an individual. Herbert Lin is Chief Scientist for computer science at the National Academies and one of the leading thinkers in the field of cybersecurity. As he has explained, to do a proper threat assessment, one essentially evaluates three basic factors: “The
feasibility of adversaries
being able to identify and exploit your vulnerabilities, the effect that would happen if they were able to take advantage of these vulnerabilities, and, finally, the likelihood that they will, in fact, be willing to do so.”

Threat assessments are notoriously hard. There are usually layers upon layers of uncertainty, not just in evaluating your own vulnerabilities but also gauging the enemy's capabilities and likely intentions. And because it's about weighing risks, there is a natural human and organizational inclination toward “threat inflation.” When you don't know what the exact risks are, many will play it safe and assume a worst-case scenario. You may get it wrong, but you also don't get caught with your pants down. It sounds sensible enough, except you can then waste immense time and energy worrying about risks that aren't real. A good example of this occurred during the Cold War. In 1967, the United States deployed new advanced spy satellites that could monitor Soviet missile sites at a whole new level of detail. It was only then that President Lyndon B. Johnson realized that the US counts of Soviet missiles had been way off. Rather than the previous threat assessment pointing to a “missile gap” that had driven US strategy for the last decade, “We were doing things that we didn't need to do. We were building things that we didn't need to build. We were
harboring fears
that we didn't need to have.”

Other books

Operation Date With Destiny by Blakemore-Mowle, Karlene
A Path Made Plain by Lynette Sowell
Chasing Soma by Amy Robyn
Owls Do Cry by Janet Frame
Dawn of the Ice Bear by Jeff Mariotte
Grandpère by Janet Romain
Outback Bachelor by Margaret Way


readsbookonline.com Copyright 2016 - 2024