Ethereum Miner - Mine and Earn free Ethereum Doloca.net: Online Booking - Hotels and Resorts, Vacation Rentals and Car Rentals, Flight Bookings, Activities and Festivals, Tour

Tuesday, August 22, 2017

The Truth About a Cyber Pearl Harbor

Insights, analysis and must reads from CNN's Fareed Zakaria and the Global Public Square team, compiled by Global Briefing editor Jason Miks.

August 22, 2017

The Truth About a Cyber Pearl Harbor

Earlier this month, the Pew Research Center released the results of a survey asking the citizens of 38 countries to name a major threat to their nation. This week, Global Briefing is running a special series of original op-eds looking at the top five perceived threats among Americans: ISIS, cyber attacks from other nations, global climate change, and China and Russia's power and influence. Our regular Global Briefing will return on September 5.


By James Andrew Lewis

The airplane brought a new technology to warfare, and in the 1930s, aerial bombardment was portrayed as unstoppable and catastrophic. Drop a few bombs, and citizens would panic and riot, governments would fall, and economies would collapse.

Sound familiar? Replace airplanes with cyber attacks and you get the same over the top predictions for hacking. It turns out, however, that catastrophe is hard to produce. Societies are resilient, and anything but a weak government will be resourceful in responding to an attack. In the case of aircraft, years of bombing typically only made people angry and stiffened resistance. People look for ways to retaliate. The same will be true for cyber attacks.

Nuclear weapons are the one exception to this, and Americans became used to thinking in terms of catastrophe and massive attacks during the Cold War. The Cold War reshaped our thinking in ways that distort our views of current threats. However, no cyber attack can match a nuclear weapon in effect. The concept of catastrophe has now been diluted to the point of absurdity. In 1990, say, catastrophe meant the deaths of tens of millions of people and the complete destruction of cities in less than an hour. Now, it means going without lights for a few days.

In fact, there have been very few truly damaging cyber attacks. Cyber crime and espionage occur on a daily basis, and a few countries use cyber attacks to coerce other states (like trying to interfere in an election). But there have been no deaths, and almost no destruction from a cyber attack. 

A good way to think about this is the dreaded Cyber Pearl Harbor, sometimes modernized to Cyber 9/11. But if someone refers to a Cyber Pearl Harbor, it is a sign they don't know what they are talking about. A Cyber Pearl Harbor, in which terrorists would use cyber attacks to cripple critical infrastructure, was first predicted 25 years ago -- and it has never happened.

Why not?

First, terrorists want something dramatic -- they want bloodshed, and a cyber attack does not fulfill their sick fantasies. Second, terrorist groups do not have the capabilities required for launching a truly damaging cyber attack. Advanced cyber attacks require engineering skills and a blend of intelligence techniques. Terrorists typically use the internet for recruitment propaganda, not attack.   

The fear of non-state actors launching crippling cyber attacks against critical infrastructures is a fantasy. Our most dangerous opponents are other nation states. They have the capabilities, the resources, and the intent to use cyber capabilities to attack the U.S. and its allies. 

In this, the United States has four opponents -- Russia, China, Iran and North Korea, all of which have used some kind of cyber attacks against us.  These opponents do not seek "cyber catastrophe." They have used cyber espionage, coercion, and crime to advance their aims (the most important of which is changing the international order in ways that favor them and undercut democracy). 

Unsurprisingly, the way they use cyber attacks is not the way we expected. There have not been attacks on critical infrastructure. There are probes and reconnaissance of power plants and oil pipelines, of course, but so far, no damage. Indeed, Russia has an explicit doctrine, called "New Generation Warfare," that calls for achieving psychological effects to confuse opponents and undercut them politically. By focusing our defense on critical infrastructure as the target for cyber attack, we have created a cyber Maginot Line that our opponents easily move around.

Cyber operations provide unparalleled access to targets, and the only constraint on attackers is the risk of retaliation, a risk they manage by staying below an implicit threshold -- avoiding actions that would provoke a damaging American response. Almost all cyber attacks fall below this threshold, including crime, espionage, and (to date) politically coercive acts. Simply put, these four countries -- even North Korea -- are cautious about doing something that could start a shooting war with America.

Does this mean you can relax about cyber attack? Unfortunately, no.  

To understand the risk from cyber attack you have to look at it through the prism of a bigger conflict. For the first time since 1990, the U.S. faces powerful opponents who want to damage U.S. interests and leadership. They want to displace the U.S. and its allies and recreate a more traditional world, where countries have spheres of influence, dominate their smaller neighbors, and where there is no interfering U.S. presence.  They want untrammeled sovereign rights so they can do as they please with their citizens. 

We are therefore in a new kind of conflict, and cyber provides a new technology that our opponents are already exploiting in this fight. Unfortunately, the United States has not been particularly good at defense. And that does indeed leave us vulnerable to the determined foes we now face – just not in the way that many Americans believe it does.

James Andrew Lewis is a senior vice president with the Technology Policy Program at the Center for Strategic and International Studies. The views expressed are his own.

 

Share

Share
Tweet
Forward
Copyright © 2017 CNN

What did you like about today's Global Briefing? What did we miss? Let us know what you think: GlobalBriefing@cnn.com


unsubscribe from this list      update subscription preferences 
 
Sign Up for Fareed's Global Briefing
Download CNN on the App Store Get CNN on Google Play

No comments:

Post a Comment

Ethereum Miner - Mine and Earn free Ethereum