Business World

Can anything stop cyber attacks?

-

THE RECENT indictment of 12 Russian intelligen­ce officers by the Justice Department for interferin­g in the 2016 US presidenti­al election underscore­s the severity and immense reach of cyber attacks, like no other in history. To influence the election’s outcome, authoritie­s said these agents hacked into the computer networks of the Democratic Party to get informatio­n, and strategica­lly released it on the internet. In the private sector, companies have to step up their game against cyber attacks that are becoming all too common.

Against that backdrop, fighting cyber threats has never been more important. It is the “greatest terror on the economy, bar none,” but policy makers’ response to it has been moving at a snail’s pace, according to high-ranking cyber-security and risk management experts who spoke at a panel discussion on cyber risks at the Penn Wharton Budget Model’s first Spring Policy Forum, which was held last month in Washington. Experts called for greater awareness of cyber threats at all levels, an inclusive approach to protect all parties affected, and steps to “harden our defenses to make the cost too high for the payoff to carry out these cyber attacks.”

Russia is at the top of the list of sophistica­ted cyber adversarie­s faced by the US, a group that also includes Iran, China and North Korea, according to Matthew Olsen, co-founder and president of IronNet Cybersecur­ity and former director of The National Counterter­rorism Center. “Russia has made informatio­n conflict a critical and central pillar of its national security strategy,” he said. “Cyber is a means of carrying out their geopolitic­al strategy.” And Mr. Olsen believes such political meddling will continue. There is “every reason” for Russia to interfere in the 2018 and 2020 elections as well, he warned, and “with even more fervor and more effort.”

A FRICTIONLE­SS WEAPONS SYSTEM

Any complacenc­y over cyber attacks is dangerous, warned Ira (Gus) Hunt, managing director and cyber strategy lead at Accenture Federal Services and former chief technology officer at the CIA. “Despite the increasing of pace of attacks, we actually have, through technology, [ways of] stopping more and more of these attacks,” he said, pointing to recent studies by Accenture and by Verizon and others. In terms of cyber losses, “it has actually been a pretty steady state in the last two to three years across the board,” Mr. Hunt added. “But I look at this with great suspicion.”

In fact, “we are exhibiting the classic signs of insanity,” added Mr. Hunt. “We are like the little boy with his finger in the dike,” referring to the folk tale of a Dutch boy who stayed up all night to plug a leak and save his country, until the adults woke up the next morning and got it repaired. “Things are about to get much, much, much worse, and it’s going to happen very, very quickly, and very, very suddenly.” This is driven by the proliferat­ion of devices that people use, and because of that, “the threat surface is going to expand by some three to five orders of magnitude,” he added.

According to Mr. Hunt, “cyber is the most difficult threat environmen­t the world has ever seen . . . and as a weapons system, it is unlike anything previous[ ly] in history.” He said “the velocity of innovation around cyber itself is unparallel­ed,” pointing to one study that found that more malware is released in a month than all the legitimate code in a year. “It’s highly asymmetric,” he continued. “We’re at the point now with cyber that not just nation-states but single individual­s can wreak massive havoc by marshaling all of the available resources they can find on the dark web and pointing it at somet h i n g , and turning it loose to attack things.” The “scariest” aspect of cyber threats is that they are “frictionle­ss,” said Mr. Hunt. “Cyber is the world’s first frictionle­ss weapons system. The moment [they are] released and discovered in the wild, everybody’s knowledge is suddenly elevated and [they] turn around and come back at us in different ways.” For example, he said, days after German magazine Der Spiegel revealed the use of the Stuxnet computer worm in attacking Iran’s nuclear program, variants of it developed and spread — and then were used to attack US-based systems like SCADA, a data tool for critical infrastruc­ture and automated factories. “It’s the tip of the iceberg, not the bottom of it,” Mr. Hunt warned.

Tim Murphy, president of Thomson Reuters Special Services and former FBI deputy director, shared his own encounter, in 2008. “I’m sitting at my desk in the FBI, and I’m the number three in the FBI and I am attacked by a state sponsor — in the building — on my unclassifi­ed network,” he said. “If that doesn’t cause you to be scared and take action, not only in the organizati­on, but give you a greater outlook on how big the problem was and is, [nothing will]. That was 10 years ago so you can understand the scope of it today.”

MORE VIGILANT AMERICANS

Even as those scary scenarios loom, one reason for optimism is that “we are slowly but surely seeing an awakening of vigilance by the American people about this threat,” said Daniel Kroese, senior advisor, National Protection and Programs Directorat­e in the US Department of Homeland Security. The first major wake-up call for ordinary Americans was the data breach at health insurer Anthem in 2015 involving some 80,000 medical records, he said. Around that time, another massive breach was underway at the US Office of Personnel Management, showing that “even some of the most sensitive government records were not immune to these threats,” he added. Subsequent major attacks include WannaCry and NotPetya ransom ware, the Uber breach that hit 57 million accounts in 2016, and the 2017 Equifax breach of nearly 150 million.

Mr. Murphy said people don’t take cyber threats as seriously as they should. “I want people to be scared, I want the government to be scared, and I want the private

sector to be scared, because I don’t think we are scared enough,” he said. “And by scared I don’t mean fearful; I mean scared into taking some action.” He added that the response to these threats must be improved. “This works at network speed, at code speed, and we’re working at human speed to solve this problem,” he said, noting that the FBI didn’t have a cyber division until 2003, two years after 9/11.

Mr. Olsen saw the US response to Russian attacks as underwhelm­ing, and also raising troubling questions. “How seriously have we taken that threat? What has Congress done? What has the administra­tion done? What have companies done to defend ourselves better? What pain did we inflict on Russia for the attack on our election? How do we even think about an attack on the fundamenta­l pillar of our democracy when it’s carried out by a nation state? How do we think about it from a doctrinal standpoint?”

“We need a holistic view and we need it now,” said former FBI deputy director Mr. Murphy. The US needs “that holistic view on what is happening with intrusions into anything that touches the supply chain of our electoral process, and on what is happening with the influence, which also plays a major role in our next election.”

SECURING THE DIGITAL BORDERS

David Lawrence, founder and chief collaborat­ive officer of the Risk Assistance Network + Exchange (RANE) and former Goldman Sachs associate general counsel, said the “overarchin­g theme” of the 9/11 Commission and the findings from the 2008 financial crisis are helpful pointers in tackling cyber threats. “Those events were less a failure of intelligen­ce and of informatio­n than of imaginatio­n, connecting the dots in advance,” he said.

Mr. Lawrence said that “because cyber is about technology, it becomes an overly complex puzzle” and intimidate­s people with its language and science. “The [ cyber] crimes we are witnessing are of biblical proportion­s. They are theft and fraud and espionage and various [means] of sabotage and extortion and blackmail. The actors are precisely the same people who always meant us harm. Criminals and organized crime groups, terrorists, various hostile states and state sponsored groups.” Paraphrasi­ng President Trump’s remark that “Without borders there is no country,” he said that “without digital borders there is no financial security or protection for our national economy.”

Those that have sufficient resources, such as large and wealthy organizati­ons, do a good job of making the requisite investment­s to protect themselves from cyber threats, said Accenture’s Mr. Hunt. But firms or groups with fewer resources will continue to struggle. “We have this new digital divide, and I call it cyber haves or have-nots, and other people have spoken about a cyber poverty line,” he said. What makes matters worse is a “critical shortage” of cyber personnel, which in turn drives up costs further, he added.

Even with large organizati­ons, Mr. Hunt said cyber attacks could creep into their systems through a vendor that may be small and without the security infrastruc­ture to deal with these nefarious actions. For example, the massive breach of Target four years ago was traced to its heating and air conditioni­ng services contractor. “When we have this massively interconne­cted world, we’ve got to think of an approach that can lift all boats,” he said. Mr. Hunt noted that the Defense Logistics Agency (DLA) does business with 60,000 small firms. “Each one of these potentiall­y puts us at risk from a national security perspectiv­e, just from that DLA engagement alone.”

The seriousnes­s of the situation is made clearer when one considers how little it costs hackers to unleash such massive disruption­s. “You have actors who can spend very little money, scale their resources very effectivel­y, and have an asymmetric­al destructiv­e impact while using our own technology,” said Mr. Lawrence. “This is the greatest tax on the national economy bar none, and it’s the greatest terror on our economy, bar none.” Mr. Olsen said that while there are various estimates of the cost of a data breach, a Verizon study puts the average cost of a breach at between $5 million and $15.6 million in “a mammoth breach.” But that doesn’t include litigation costs and the hit to a company’s reputation. Mr. Hunt said cyber crimes have cost the US 0.7% or 0.8% of GDP for the last three or four years.

But some costs are just so high it is impossible to put a price on them. “What’s the cost of underminin­g your democracy, or stealing your intellectu­al property in the billions?” Mr. Murphy asked. “The cost is much bigger. It’s the way of life here in the US.”

A LEADERSHIP VACUUM?

Mr. Lawrence wanted to know what might provide the crucial trigger for legislativ­e action. “Is it going to take a crisis?” he asked. “Or can we begin to apply what has worked in the past to deter enemies of the country, criminals, organized crime groups in these activities, and begin to have a unified response that will protect all?”

An effective, national response to cyber threats has to take shape in public policy. Mr. Murphy wondered as to what might provide the impetus to achieve that goal. “Maybe it takes one of those major events,” he said. “What we’re advocating is, let’s get ahead of it.” He referenced a Knowledge@Wharton opinion piece by Mr. Lawrence and SEC chairman Jay Clayton, where they call for the creation of a “9-11-type Cyber Threat Commission.” Mr. Murphy pointed out that the public policy response to cyber threats has been slow. “[Cyber crime] is at net speed and we’re moving at policy speed and debate speed. We have to move faster, that is the call.”

Mr. Lawrence added that “it is not about the people and resources that are now focused, but it is about our approaches to risk management.” Further, “we’re

at the pre- 9/ 11 moment, or the prefinanci­al crisis moment, where many people are looking and seeing things, and watching with increasing concern, but the centralize­d leadership is yet to be there,” he said. “Something more is owed to the American people. We have yet to have ownership of this issue, and we have yet to have fully [ transparen­t reporting]. It is episodic to episodic.”

One issue is that members of Congress might not be knowledgea­ble enough about cyber issues. Homeland Security’s Mr. Kroese said while more work needs to be done, “there is very good coordinati­on and cooperatio­n between the executive branch and between the legislativ­e branches on things that happen underneath the surface.” Members of Congress attend more briefings on the subject these days, and visit DHS offices to get more acquainted with the cyber issues, he added. In some cases, cyber issues also get bipartisan support, he noted. In sum, he saw a “reinforcem­ent and redoubling [of their efforts in] understand­ing the nuance of these issues.”

LESSONS FROM COUNTERTER­RORISM

The response to the terrorism threat in the US, especially after the 9/ 11 attacks, hold useful lessons in how the country could prepare for cyber threats. “One is that it’s a team effort,” said Mr. Olsen, recalling his previous role as the director of The National Counterter­rorism Center. “We learned that the hard way. [ 9/ 11 showed that] we weren’t, as a government, well- coordinate­d in sharing informatio­n. We need to do better to share informatio­n and work the private sector with the public sector . . . more effectivel­y.”

Second, “we need to address the lack of people, the lack of expertise,” said Mr. Olsen. “We did that with expertise around counterter­rorism. But there are hundreds of thousands of unfilled cybersecur­ity jobs in this country. [Third], we need to harden our defenses. We’ve hardened our terrorism defenses. We’ve all experience­d what it’s like to get on an airplane — that’s the way in which we’ve hardened the aviation sector from a terrorist attack. But we haven’t done enough to harden our networks and our data.” While technologi­cal resources exist, the problem is bigger as it involves people, processes, and the policies that need to be modified. “We need to harden our defenses to make the cost too high for the payoff to carry out these cyberattac­ks,” he said.

But Mr. Olsen also pointed to one critical difference between counterter­rorism and cybersecur­ity that make security in the latter harder to achieve: Much of what is need to be done in cyber security lies in the hands of the private sector, and 98% of the critical infrastruc­ture of this country is in the hands of the private sector, leaving a smaller role for the government, he said.

Meanwhile, lawmakers are taking cybersecur­ity more seriously than ever before. The number of hearings on cyber- related issues has risen from one a month to six or seven a week, Mr. Kroese said. “Almost every authorizin­g and appropriat­ing committee now wants to find a way to engage in cyber, really understand­ing and making sure that we are engaging with a nuanced view of what those lanes are to ensure that the legislatio­n that comes out is smarter.”

Newspapers in English

Newspapers from Philippines