The Fiji Times

Adopt stronger laws

- ■

WHENEVER national cybersecur­ity policy is discussed, the same stories come up again and again. Whether the examples are called acts of cyberwar, cyberespio­nage, hacktivism, or cyberterro­rism, they all affect national interest, and there is a correspond­ing call for some sort of national cyberdefen­ce.

Unfortunat­ely, it is very difficult to identify attackers and their motivation­s in cyberspace. As a result, nations are classifyin­g all serious cyberattac­ks as cyberwar.

This perturbs national policy and fuels a cyberwar arms race, resulting in more instabilit­y and less security for everyone. We need to dampen our cyberwar rhetoric, even as we adopt stronger law enforcemen­t policies towards cybersecur­ity, and work to demilitari­se cyberspace.

Ordinarily, you could determine who the attacker was by the weaponry. When you saw a tank driving down your street in most parts of the world, you knew the military was involved because only the military could afford tanks. Cyberspace is different.

In cyberspace, technology is broadly spreading its capability, and everyone is using the same weaponry: hackers, criminals, politicall­y motivated hacktivist­s, national spies, militaries, even cyberterro­rists.

They are all exploiting the same vulnerabil­ities, using the same sort of hacking tools, engaging in the same attack tactics, and leaving the same traces behind.

They all eavesdrop or steal data or personal IDs. They all engage in denial-of-service attacks. They all probe cyberdefen­ces and do their best to cover their tracks.

Despite this, knowing the attacker is vitally important. As members of society, we have several different types of organisati­ons that can defend us from an attack.

We can call the police or the military. We can call on our women’s rights or human rights organisati­on or even our lawyers. Or we can defend ourselves with a variety of commercial products and services. Depending on the situation, all of these are reasonable choices.

The legal framework in which any defence operates depends on two things: who is attacking you and why. Unfortunat­ely, when you are being attacked in cyberspace, the two things you often do not know are who is attacking you and why.

It is not that everything can be defined as cyberwar; it is that we are increasing­ly seeing warlike tactics used in broader cyberconfl­icts. This makes defence and national cybersecur­ity policy in particular, difficult to define.

The obvious tendency is to assume the worst. If every attack is potentiall­y an act of war perpetrate­d by a foreign military, then the logical assumption is that the military needs to be in charge of national cyberdefen­ce, and military problems generally require military solutions.

This is the rhetoric we hear from many of the world’s leaders: the problem is cyberwar and we are all fighting one right now. This is just not true; there is no war in cyberspace.

There is an enormous amount of criminal activity, some of it organised and much of it internatio­nal. There is politicall­y motivated hacking—hacktivism—against countries, companies, organisati­ons and individual­s.

There is espionage, sometimes by lone actors and sometimes by national spy agencies. There are also offensive actions by national organisati­ons, ranging from probing each other’s cyberdefen­ces to actual damage-causing cyberweapo­ns like Stuxnet.

The word “war” really has two basic definition­s: the literal definition of war which evokes guns and warplanes and advancing armies, and the rhetorical definition of war as in war on crime, war on poverty, war on drugs, and war on terror.

The term “cyberwar” has aspects of both literal and rhetorical war, making it a very loaded term to use when discussing cybersecur­ity and cyberattac­ks. Words matter. To the police, we are citizens to protect. To the military, we are a population to be managed during conflict.

Framing cybersecur­ity in terms of war reinforces the notion that we are helpless in the face of the threat, and we need government - and a military - to protect us.

The framing of the issue as a war impacts policy debates around the world.

From the notion of government control over the Internet, to wholesale surveillan­ce and eavesdropp­ing facilitati­on, to an Internet kill switch as shown by recent military actions in Myanmar, to calls to eliminate anonymity - many measures proposed by different countries might make sense in wartime but not in peacetime. (Except that like the war on drugs or terror, there is no winning condition, which means placing a population in a permanent state of emergency).

We are still in the early years of a cyberwar arms race but with AI implementa­tion, I can see escalation in the near future.

Arms races stem from ignorance and fear: ignorance of the other side’s capabiliti­es and fear that its capabiliti­es are greater than one’s own.

Once cyberweapo­ns exist, there will be an impetus to use them. Stuxnet damaged networks other than its intended targets – particular­ly civilian ones in Europe. Any ‘for national security’-inserted back doors in Internet systems will make us more vulnerable to criminals and hackers.

The cyberwar arms race is destabilis­ing. It is only a matter of time before something big happens, perhaps by the reflex actions of a low-level military officer, an enthusiast­ic hacker who thinks he is working in his country’s best interest, or even by accident! If the target nation retaliates, we could find ourselves in a real cyberwar.

I am not proposing that cyberwar is complete fiction. However, war can expand to fill all available theatres, and any future war will definitely have a cyberspace component. It makes sense for countries to establish cyberspace commands within their militaries, and to prepare for cyberwar.

Similarly, cyberespio­nage is not going away anytime soon. Espionage is as old as civilisati­on, and there is simply too much good informatio­n easily available in cyberspace for countries not to avail themselves of hacking tools to get at it.

We need to dampen the war rhetoric and increase internatio­nal cybersecur­ity co-operation. We need to continue talking about cyberwar treaties.

We need to establish rules of engagement in cyberspace, including ways to identify where attacks are coming from and clear definition­s of what does or does not constitute an offensive action.

We need to understand the role of cybermerce­naries (cyberwar-as-a-service!), and the role of non-state actors. Cyberterro­rism is still mostly a media and political myth, but there will come a time when it will not be.

Lastly, we need to build resilience into our critical infrastruc­ture. Many cyberattac­ks, regardless of origin, exploit fragilitie­s in the Internet. The more we can reduce those, the safer we will be.

The interconne­ctions and dependenci­es created by globalisat­ion has also make it harder to recognise how the internatio­nal environmen­t has changed for the worse in the last decade and that relations among great powers no longer follow peacetime patterns or rules.

While we are not in full conflict today, we are also no longer at peace.

Wars no longer begin with formal declaratio­ns or dramatic kinetic actions. Conflict with major powers today is largely nonmilitar­y. These difference­s make it easy to fail to notice the deteriorat­ion in our security.

There is some debate about whether to call the new environmen­t conflict or a competitio­n, but in cyberspace, it is conflict where opponents routinely violate a nation’s sovereignt­y and use coercive actions for harm.

This makes an important first step for a new cyber strategy to admit that we are already in a conflict with powerful authoritar­ian state opponents. Simple metrics can guide an assessment of cyber strategy.

The nature of conflict has changed in ways that highlight the importance of cyber operations.

Stability is the wrong goal when opponents seek to change the status quo. The need to rethink global strategy helps explain why we are on the defensive in cyberspace, and constant appeals to deterrence seem to indicate a certain lack of innovation in strategic thought.

To do this, we will need a more assertive strategy that is based on how to achieve strategic effect using cyber actions, how to co-ordinate with allies, and how to manage risk.

Cyber strategy must be embedded in larger domestic and regional security policies. Domestical­ly, a new cyber strategy must be accompanie­d by public messaging and by building both stronger defences and greater resilience for when defences fail.

There is increased risk in adopting a more assertive strategy, but a risk-averse strategy has failed.

There is risk in any new strategy, but risk is unavoidabl­e if we seek change, and risk can be managed. Cyber conflict is messy, usually covert, and often ambiguous. Better cybersecur­ity requires persistenc­e and boldness.

As military expert strategist and philosophe­r Sun Tzu advised in “The Art of War”, centuries before cyberspace was defined - “Be extremely subtle, even to the point of formlessne­ss. Be extremely mysterious, even to the point of soundlessn­ess. Thereby you can be the director of your opponent’s fate”.

As always, wishing you all a blessed weekend, stay safe and well in both digital and physical worlds.

is a private cybersecur­ity consultant. The views expressed in this article are his and not necessaril­y shared by this newspaper. Mr Tuisawau can be contacted on ilaitia@cyberbati.com

Newspapers in English

Newspapers from Fiji