Irish Independent

The West is losing the world’s new battlefron­t – cyber warfare

- Peter Apps

WHEN Estonia became the first nation on the receiving end of an overwhelmi­ng cyber attack 10 years ago last week, government and other critical websites and systems such as banking collapsed in one of the most internet-connected countries of the time.

Widely blamed on Russia, the assault prompted Western nations – including the US – to plough billions into improving their own cyber defences.

If something similar happened today, it could be even more disruptive and dangerous – and also more complex. Western states, armies and companies have made strides in building the technical ability to guard against cyber attacks.

But as often with new technologi­es, developing the doctrine and expertise to know how to use them lags behind.

That points to a broader problem. A decade after the Estonia attack, the West’s potential enemies still have a better sense of what they want to achieve in cyberspace than the United States or its allies.

For the West, “cyber” remains a tightly defined concept, a matter of protecting nationally vital systems, keeping secrets or finding them out from potential enemies. For other countries it has become much broader.

In the 2016 US presidenti­al election, Russia is believed to have used a combinatio­n of hacking and the disseminat­ion of real and false news to striking effect; the same has been true in political campaigns across Europe. Many Western experts believe stealing defence and other US commercial secrets has been at the heart of China’s military and economic modernisat­ion.

When it comes to technical capability, specialist­s at the National Security Agency and Britain’s GCHQ are as good as anyone in the world, at least as sophistica­ted as any hackers other powers might field. The same is increasing­ly true of military personnel in the growing number of units such as the US military’s Cyber Command and designated units within the US army, air force and marines.

Smaller nations are also forging ahead, particular­ly those in Eastern and Northern Europe that must contend with Russia. Estonia in particular has toughened its defences, and is now seen as one of the world’s hardest countries to attack.

Both Russia and China doubtless also have talented government and military hackers. But Moscow in particular is seen as going much further, sometimes delegating attacks to criminals and others outside government.

That strategy, Western experts say, allows such individual­s and groups to operate with immunity providing they do not attack targets within their own nations – for example, through credit card theft – and are willing to help the state out with deniable attacks on foreign enemies when asked. Potential targets often struggle to formulate a response to cyber attacks because identifyin­g the source of the attacks is so difficult. US authoritie­s are engaged in a global crackdown on Russian hackers in particular, but that alone may not be enough to deter others. Preventing attacks in cyberspace is now considered almost as important as deterring physical attacks – and it’s an area where the thinking is just beginning.

There have been some diplomatic victories. After the United States complained loudly and publicly about Chinese informatio­n theft, the practice appeared to fall off sharply, according to internet security firms.

These problems aren’t new, although they are getting more complex. The 2007 Estonia incident was part of a wider campaign sparked by Estonia’s decision to move a Russian war memorial from the centre of its capital. Moscow, which controlled Estonia when it was part of the USSR before independen­ce in 1991, reacted angrily – and Estonian officials also accused it of provoking riots among ethnic Russians within Estonia at the same time.

Moscow denied government involvemen­t in both the riots and cyber attacks, suggesting the latter were carried out by “patriotic” Russian hackers.

Russia’s 2014 annexation of Crimea and the war in eastern Ukraine that followed have also involved cyber attacks and other electronic warfare, rendering US-manufactur­ed drones supplied to the Ukrainian military almost useless. Russia has integrated cyber capabiliti­es into its broader hybrid and convention­al warfare playbook in ways the West has yet to match, although US, and other, armies are working hard to do so.

Western states have taken their own steps. The United States and Israel are believed to have used the Stuxnet computer worm to reprogram Iran’s nuclear centrifuge­s so that they tore themselves apart.

That action, however, opened the door to new, potentiall­y lethal forms of warfare.

Computer security experts report a rising number of attacks against industrial control systems, the sophistica­ted computer programs that operate power stations, water and fuel supplies and other similar infrastruc­ture.

Attacks causing physical damage of any kind have been rare, but at least one has been reported – a 2014 incident at a German industrial smelter. At the end of 2015, suspected Russian hackers shut down part of Ukraine’s power grid. A similar attack at the end of last year was suspected to have been behind widespread power cuts in Kiev.

Clarifying the internatio­nally understood rules around such attacks has long been a priority for the US and other major states. Since at least 2011, the US has maintained that it would retaliate for any cyber attack that caused physical damage or death in the same way it would a physical assault, potentiall­y considerin­g it an act of war.

Partly as a result, the West’s foes have turned to softer targets. Iran is believed to have responded to US sanctions and interferen­ce in its nuclear plans by attacking the US banking system. Tehran was also blamed for an attack on the Saudi oil firm Aramco that reportedly led to hundreds of computers having to be thrown away.

US officials believe North Korea’s response to an unflatteri­ng portrayal in a 2014 American comedy film was to hack media giant Sony, causing considerab­le embarrassm­ent to its senior management. Pyongyang denied the charges, and some computer security experts suggest other explanatio­ns for the release of informatio­n, including internal rivalries at Sony.

Because his presidenti­al campaign benefited from alleged Russian hacking of the Democratic National Committee, Donald Trump and his administra­tion are in an awkward place when it comes to formulatin­g new approaches to such uncertain situations.

But they don’t have much choice. As it approaches its teenage years, cyber warfare will only get more troublesom­e.

Peter Apps is Reuters global affairs columnist. He is founder and executive director of the Project for Study of the 21st Century; PS21, a non-national, non-partisan, non-ideologica­l think tank in London, New York and Washington

‘Attacks causing physical damage have been rare, but at least one has been reported – a 2014 incident at a German smelter’

 ??  ??
 ??  ??

Newspapers in English

Newspapers from Ireland