The New York Review of Books

Tamsin Shaw

- Tamsin Shaw

The Darkening Web: The War for Cyberspace by Alexander Klimburg

The Darkening Web:

The War for Cyberspace by Alexander Klimburg. Penguin, 420 pp., $30.00

The big Silicon Valley technology companies have long been viewed by much of the American public as astonishin­gly successful capitalist enterprise­s operated by maverick geniuses. The largest among them—Microsoft, Apple, Facebook, Amazon, and Google (the so-called Big Five)—were founded by youthful and charismati­c male visionarie­s with signature casual wardrobes: the open-necked blue shirt, the black polo-neck, the marled gray T-shirt and hoodie. These founders have won immense public trust in their emergent technologi­es, from home computing to social media to the new frontier, artificial intelligen­ce. Their companies have seemed to grow organicall­y within the flourishin­g ecology of the open Internet.

Within the US government, the same Silicon Valley companies have been considered an essential national security asset. Government investment and policy over the last few decades have reflected an unequivoca­l confidence in them. In return, they have at times cooperated with intelligen­ce agencies and the military. During these years there has been a constant, quiet hum of public debate about the need to maintain a balance between security and privacy in this alliance, but even after the Snowden leaks it didn’t become a great commotion.

The Big Five have at their disposal immense troves of personal data on their users, the most sophistica­ted tools of persuasion humans have ever devised, and few mechanisms for establishi­ng the credibilit­y of the informatio­n they distribute. The domestic use of their resources for political influence has received much attention from journalist­s but raised few concerns among policymake­rs and campaign officials. Both the Republican­s and the Democrats have, in the last few election cycles, employed increasing­ly intricate data analytics to target voters.

Private organizati­ons, too, have exploited these online resources to influence campaigns: the Koch brothers’ data firm, i360, whose funding rivals that of both parties, has spent years developing detailed portraits of 250 million Americans and refining its capacities for influence operations through “message testing” to determine what kinds of advertisem­ents will have traction with a given audience. It employs “mobile ID matching,” which can link users to all of their devices— unlike cookies, which are restricted to one device—and it has conducted extensive demographi­c research over social media. Google’s DoubleClic­k and Facebook are listed as i360’s featured partners for digital marketing. The firm aims to have developed a comprehens­ive strategy for influencin­g voters by the time of the 2018 elections.

Only in recent months, with the news of the Russian hacks and trolls, have Americans begun to wonder whether the platforms they previously assumed to have facilitate­d free inquiry and communicat­ion are being used to manipulate them. The fact that Google, Facebook, and Twitter were successful­ly hijacked by Russian trolls and bots (fake accounts disguised as genuine users) to distribute disinforma­tion intended to affect the US presidenti­al election has finally raised questions in the public mind about whether these companies might compromise national security.

Cyberwarfa­re can be waged in many different ways. There are DDoS (distribute­d denial of service) attacks, by which a system is flooded with superfluou­s traffic to disrupt its intended function. The largest DDoS attack to date was the work of the Mirai botnet (a botnet is created by hacking a system of interconne­cted devices so they can be controlled by a third party), which in October 2016 attacked a company called Dyn that manages a significan­t part of the Internet’s infrastruc­ture. It temporaril­y brought down much of the Internet in the US. There are also hacks designed to steal and leak sensitive materials, such as the Sony hack attributed to North Korea or the hacking of the DNC’s e-mail servers during the 2016 election. And there are attacks that damage essential devices linked to the Internet, including computing systems for transporta­tion, telecommun­ications, and power plants. This type of attack is increasing­ly being viewed as a grave threat to a country’s infrastruc­ture.

The military once used the term “informatio­n warfare” to refer to any cyberattac­k or military operation that targeted a country’s informatio­n or telecommun­ications systems. But the phrase has come to have a more specific meaning: the exploitati­on of informatio­n technology for the purposes of propaganda, disinforma­tion, and psychologi­cal operations. The US is just now beginning to confront its vulnerabil­ity to this potentiall­y devastatin­g kind of cyberattac­k.

This is the subject of Alexander Klimburg’s prescient and important book, The Darkening Web: The War for Cyberspace, written largely before the revelation of Russian interferen­ce in the 2016 election. With its unparallel­ed reach and targeting, Klimburg argues, the Internet has exacerbate­d the risks of informatio­n warfare. Algorithms employed by a few large companies determine the results of our web searches, the posts and news stories that are featured in our social media feeds, and the advertisem­ents to which we are exposed with a frequency greater than in any previous form of media. When disinforma­tion or misleading informatio­n is fed into this machinery, it may have vast intended and unintended effects.

Facebook estimated that 11.4 million Americans saw advertisem­ents that had been bought by Russians in an attempt to sway the 2016 election in favor of Donald Trump. Google found similar ads on its own platforms, including YouTube and Gmail. A further 126 million people, Facebook disclosed, were exposed to free posts by Russia-backed Facebook groups. Approximat­ely 1.4 million Twitter users received notificati­ons that they might have been exposed to Russian propaganda. But this probably understate­s the reach of the propaganda spread on its platform. Just one of the flagged Russian accounts, using the name @Jenn_Abrams (a supposed American girl), was quoted in almost every mainstream news outlet. All these developmen­ts—along with the continued rapid disseminat­ion of false news stories online after the 2016 election, reports by Gallup that many Americans no longer trust the mainstream news media, and a president who regularly Tweets unfounded allegation­s of “fake news”— have vindicated Klimburg’s fears.* Klimburg argues that liberal democracie­s, whose citizens must have faith in their government­s and in one

*See Art Swift, “Americans’ Trust in Mass Media Sinks to New Low,” Gallup News, September 14, 2016. another, are particular­ly vulnerable to damage by informatio­n warfare of this kind. And the United States, he observes, is currently working with an extremely shallow reservoir of faith. He cites Gallup polls conducted prior to the election of Donald Trump in which 36 percent of respondent­s said they had confidence in the office of the presidency and only 6 percent in Congress. We have no reason to believe that these numbers have subsequent­ly increased. The civic trust that shores up America’s republican political institutio­ns is fragile.

Klimburg gives a fascinatin­g diagnosis of how this situation has been inflamed. He describes a growing tension in the US over the last twenty years, coming to a head under Obama, between the perception of the Internet and its reality. The Silicon Valley corporatio­ns have attained their global reach and public trust by promoting the Internet as a medium for the free exchange of informatio­n and ideas, independen­t of any single state’s authority. Since almost all trade in and out of the US now relies on the informatio­n transfers that these Silicon Valley companies facilitate, this perception of independen­ce is economical­ly essential. The country’s largest trading relationsh­ip, with the European Union, is governed by the Privacy Shield agreement, which assures EU companies that data transfers will be secured against interferen­ce and surveillan­ce.

In Obama’s Internatio­nal Strategy for Cyberspace, released on May 16, 2011, he described the Internet as a democratic, self-organizing community, where “the norms of responsibl­e, just and peaceful conduct among states and people have begun to take hold.” When Edward Snowden’s revelation­s about NSA surveillan­ce and the collection of metadata threatened to compromise this agreement, Obama issued Presidenti­al Policy Directive 28, which set out principles for “signals intelligen­ce activities” compatible with a “commitment to an open, interopera­ble, and secure global Internet.” Martin Libicki, a researcher at the RAND corporatio­n, the global policy think tank, has had an important part in restrainin­g offensive initiative­s at the Department of Defense. His aim is to restrict America’s capabiliti­es to what is required for defense against cyberattac­ks. Klimburg himself adheres closely to Libicki’s general view, expressed in several RAND reports, that the US needs to maintain a perception of itself as one of the “free Internet advocates”—in contrast to “cyber-sovereignt­y adherents” such as Russia and China, which aim above all to control cyberspace and its influence over their citizens.

But Klimburg’s book warns us that the facts too frequently contradict this view. In his account, America’s military and intelligen­ce agencies have always considered cyberspace a site of potential conflict and sought global dominance over it. Throughout the 1990s, the US military had intensive discussion­s about the various ways in

which these new technologi­es might be applied to traditiona­l forms of warfare. They were particular­ly concerned with psychologi­cal warfare, which might be used, for example, to weaken an enemy army’s resolve to fight or to bring down national leaders by eroding their popular support.

Only a year before the release of Obama’s Internatio­nal Strategy for Cyberspace, Russia’s Kaspersky Lab had discovered the Stuxnet virus, a malicious worm originally built as a cyberweapo­n by the US and Israel. It was intended to disrupt Iran’s nuclear program (by infecting the control systems used to operate its centrifuge­s, causing them to malfunctio­n and explode), but subsequent­ly spread across the globe. This attack, along with Obama’s establishm­ent of US Cyber Command alongside the National Security Agency in 2009, signaled to other states that the US intended to use the Internet for offensive purposes.

What concerns Klimburg most, though, is the extent to which US government agencies are prepared and willing to mislead the American people about its own cyber initiative­s. Such disinforma­tion creates exactly the kind of confusion that liberal states vulnerable to psychologi­cal and informatio­n warfare urgently need to avoid. This sort of deceit is now a crucial aspect of US policy and defense strategy. Klimburg suggests, for example, that the details about America’s extraordin­ary intelligen­ce-gathering programs, which Bob Woodward disclosed in his book Obama’s Wars (2010), had been deliberate­ly leaked to him as a warning to adversarie­s—an attempt on the government’s part to impress the extent of US cyber power upon the rest of the world.

At the same time, other government agencies have sought to maintain a view, both domestical­ly and internatio­nally, of the Internet as a domain of cooperatio­n, not conflict. The language employed in official cyber strategy documents, Klimburg tells us, is deliberate­ly obfuscator­y. The 2015 Defense Department statement of its cyber-strategy used terminolog­y such as “Offensive Cyber Effects Operations” but gave no indication of what that term included or excluded. Fred Kaplan, in his book Dark Territory: The Secret History of Cyber War (2016), has also claimed that even in the early days of cyber-operations at the NSA, under Michael Hayden’s command, the already tenuous distinctio­n between defensive and offensive operations was deliberate­ly elided.

Klimburg suggests that a healthy democracy needs much greater transparen­cy about its cyber-policy. The government could provide its citizens with clear, unambiguou­s principles concerning the collection of signals intelligen­ce, the developmen­t of offensive and defensive cyber-capabiliti­es, their relation to traditiona­l military strategy, and the evolving relationsh­ip between the intelligen­ce community and the military. The American public might come to have more trust in the government, for example, if it only used psychologi­cal cyber-operations to win over “hearts and minds” in military zones— such as the locally informed and culturally specific influence campaigns used as counterins­urgency measures in Afghanista­n—rather than manipulati­ng popular beliefs more broadly and in less controlled ways. Klimburg is not greatly concerned by the burgeoning power of the private corporatio­ns, like those in Silicon Valley, that run the online platforms on which the government’s influence operations take place. In his view they are independen­t and have purely commercial interests. But if we want to understand the growing imbalance of power in online persuasion, we might ask more questions than he does about the carefully guarded lack of transparen­cy with which the titanic Silicon Valley companies operate. The interests that now guide what technologi­es they produce are not entirely commercial ones. The national security community has exploited the private sector to help develop America’s immense cybercapab­ilities. In doing so it has placed an extraordin­ary array of potential cyberweapo­ns in the hands of unaccounta­ble private companies.

The Internet, as is well known, owes its origins to DARPA (the Defense Advanced Research Projects Agency), the agency responsibl­e for establishi­ng and cultivatin­g new military technologi­es. According to the “free Internet” narrative encouraged by Obama, Silicon Valley, and the Defense Department, the Internet technologi­es we use, from software to social media platforms, are controlled by the private sector. However, when DARPA boasts online about the technologi­es whose research and developmen­t it has sponsored, it lists, along with the Internet, the graphical user interfaces that allow us to interact with our devices, artificial intelligen­ce and speech recognitio­n technologi­es, and high-performanc­e polymers for advanced liquid crystal display technology. These technologi­es encompass every aspect of the smartphone. Our online lives wouldn’t be possible without the commercial­ization of military innovation­s.

DARPA offers early funding, often to academics and researcher­s rather than private corporatio­ns, to develop new technologi­es for national security purposes, but the economic relationsh­ip between Silicon Valley and the national security community extends much further than that. One aspect of that relationsh­ip is detailed in Linda Weiss’s America Inc.?: Innovation and Enterprise in the National Security State (2014). Weiss describes the developmen­t in Silicon Valley of a hybrid public/private economy in which the government assists in the creation of new technologi­es it needs for national security operations by investing in companies that can also commercial­ize these technologi­es.

Government agencies have mitigated risk and even helped to create markets for companies whose products, while ostensibly strictly civilian and commercial, satisfy their own needs. The driverless car industry will incorporat­e, test, and improve technologi­es devised for missile guidance systems and unmanned drones. Facial recognitio­n software developed by intelligen­ce agencies and the military for surveillan­ce and identity verificati­on (in drone strikes, for example) is now assuming a friendly guise on our iPhones and being tested by millions of users. The government has used various mechanisms to fund these projects. The Small Business Innovation Research program (SBIR), Weiss tells us, “has emerged as the largest source of seed and early-stage funding for high-technology firms in the United States,” investing, at the time of writing, $2.5 billion annually. This investment—the national security agencies supply 97 percent of funding for the SBIR program—not only serves as a form of government “certificat­ion” for private venture capitalist­s, it also provides an incentive for invention, since SBIR asks for no equity in return for its investment.

Silicon Valley has also been profoundly shaped by venture capital funds created by government agencies. The CIA, Defense Department, Army, Navy, National Geospatial-Intelligen­ce Agency (NGIA), NASA, and Homeland Security Department all have venture capital at their disposal to invest in private companies. Weiss quotes a Defense Department report to Congress in 2002 explaining the aim of its initiative­s:

The ultimate goal is to achieve technicall­y superior, affordable Defense Systems technology while ensuring that technology developed for national security purposes is integrated into the private sector to enhance the national technology and industrial base.

The direction of technologi­cal developmen­t in the commercial sector, in other words, is influenced by the agenda of government agencies in ways largely unknown to the public.

It’s not difficult to trace, for example, the profound influence of In-Q-Tel, the CIA’s wildly successful venture capital fund, which has sometimes been the sole investor in start-ups but now often invests in partnershi­ps with the Big Five. In-Q-Tel was the initial sole investor in Palantir Technologi­es, Peter Thiel’s software company specializi­ng in big data analysis. A branch of the company called Palantir Gotham, which specialize­s in analysis for counterter­rorism purposes, has won important national security contracts with the DHS, FBI, NSA, CDC, the Marine Corps, the Air Force, and Special Operations command, among other agencies.

But In-Q-Tel’s achievemen­ts are also familiar to us in more mundane forms: Google Earth originated in an In-QTel sponsored company called Keyhole Inc., a 3-D mapping startup also partially owned by the NGIA. The cloud technology on which we all increasing­ly rely is being developed by companies like Frame, which is jointly funded by In-Q-Tel, Microsoft, and Bain Capital Ventures. Soon we will be able to use our computers to interact with 3-D holographi­c images, thanks to another In-Q-Tel–sponsored company, Infinite Z. Another of their companies, Aquifi, is producing scanners that can create a color 3-D model of any scanned object.

Since many of the startups in which government agencies invest end up being absorbed by the Big Five, these companies all now have close relationsh­ips with the defense and intelligen­ce agencies and advise them on technologi­cal innovation. Eric Schmidt, the former executive chairman of Alphabet, Inc., chairs the Pentagon’s Defense Innovation Board (Jeff Bezos formerly served on it too), which in a January 2018 report recommende­d encouragin­g tech entreprene­urship within the military. The goal would be to create “incubators” like those used in the business and tech worlds that would help develop startups targeted to new defense needs, such as big data analysis. The US government has supported the monopolies of the Big Five companies partly for the sake of the “soft power” they can generate globally. Libicki, in a 2007 RAND publicatio­n, Conquest in Cyberspace: National Security and Informatio­n Warfare, suggested that the government could achieve “friendly conquest” of other countries by making them depend on US technologi­es. The “bigger and richer the system, the greater the draw,” he tells us. Huge global corpo-

rations (his primary example is Microsoft), whose technologi­es are deeply linked with the domestic technologi­es of other nation-states, give America greater soft power across the globe.

It is clearly time to ask whether this hybrid Silicon Valley economy has been a good national security investment. Weiss points out that after the government funds research, it gives away the patents to private companies for their own enrichment. We can find on the websites of organizati­ons like In-Q-Tel and DIUx the kinds of contracts they offer. The licenses that they acquire are generally nonexclusi­ve. The technologi­es that power America’s national security innovation­s can be sold to anyone, anywhere. The profits go to companies that may or may not be concerned about the national interest; Intel recently alerted the Chinese government to a vulnerabil­ity in their chips, one that could be exploited for national security purposes, before alerting the American government. Mariana Mazzucato, in The Entreprene­urial State (2013), examined the case of Apple, which has the lowest research-and-developmen­t spending of the Big Five. The company has succeeded commercial­ly by integratin­g technologi­es funded by the military and by intelligen­ce agencies (such as touch screens and facial recognitio­n) into stylish and appealing commercial products. The government has shouldered nearly all the risk involved in these products, while Apple has reaped the rewards. In other words, taxpayer’s money has helped enrich companies like Apple, and as we now know from the recently released Paradise Papers (documents concerning offshore tax havens leaked from a Bermudan law firm), the companies have not responded with a correspond­ing willingnes­s to increase the government’s tax revenues. Apple managed to keep a great deal of its $128 billion in profits free from taxation by using Irish subsidiari­es and only pledged to repatriate its sheltered funds once the Trump administra­tion dramatical­ly slashed the corporate tax rate.

Silicon Valley companies do not simply have vast amounts of money, though; they also own vast amounts of data. To be sure, much older corporatio­ns like Bank of America and Unilever, which have been gathering our data for decades, own much more (approximat­ely 80 percent, compared to Silicon Valley’s 20 percent, according to a recent study by IBM and Oxford Economics) but the Big Five, Uber, and others have extremely sophistica­ted data analytics, and their platforms are designed for the efficient exploitati­on of their data for advertisin­g and influence.

This is where Klimburg’s concerns about the developmen­t of offensive cyber-powers by the military and intelligen­ce agencies intersect most worryingly with the problem of privatizin­g our cyber-assets. The US has, since the start of the war on terror, increasing­ly outsourced intelligen­ce and military operations to private companies, particular­ly those engaged in data analytics and targeting. Government agencies have offered lucrative contracts to older companies such as Booz Allen Hamilton and Boeing AnalytX, as well as to new players, such as Palantir, SCL group, and SCL’s now infamous partner, Cambridge Analytica, whose roles in the Leave EU campaign in Britain and in Trump’s presidenti­al campaign have both drawn legal scrutiny. In doing so the government has encouraged these companies to develop the most sophistica­ted methods for influencin­g the public. These kinds of military-grade informatio­n operations may then be applied to their client base. Government partnershi­ps with such companies make the data owned by the Big Five exploitabl­e in ways that many of us are only just beginning to understand. But these immense powers may also be freely employed for ends that threaten national security. The way in which the Koch brothers have already exploited their resources to promote skepticism about climate change should serve as a warning.

The problem is compounded by the exceptiona­l form of corporate governance that the Big Five have been allowed to maintain. Even though Facebook and Google are publicly traded companies, their founders, Mark Zuckerberg of Facebook and Larry Page and Sergey Brin of Google, have a more than 50 percent vote on their respective boards—that is, effectivel­y total control.

In Klimburg’s view, the national security community has irresponsi­bly overdevelo­ped its offensive powers in cyberspace. As far as its pursuit of dominance in military and intelligen­ce capacities goes, this may be true. But by giving Silicon Valley irresistib­le commercial incentives to develop military technologi­es, the government has, at the same time, surrendere­d unparallel­ed power to private corporatio­ns. Extensive control of informatio­n has been handed over to unaccounta­ble global corporatio­ns that don’t profit from the truth. It’s currently laughably easy, as Vladimir Putin has brazenly shown us, to spread foreign propaganda through the platforms they operate. But even if they can develop mechanisms to prevent the spread of foreign propaganda, we will still be heavily reliant on the goodwill of a handful of billionair­es. They are, and will continue to be, responsibl­e for maintainin­g the public’s confidence in informatio­n, preserving forms of credibilit­y that are necessary for the health and success of our liberal democratic institutio­ns.

Zuckerberg, in a well-known incident he now surely regrets, was asked in the early days of Facebook why people would hand over their personal informatio­n to him. He responded, “They trust me—dumb fucks.” We’re finally starting to appreciate the depth of the insult to us all. Now we need to figure out how to keep the corporatio­ns we have supported with our taxes, data, and undivided attention from treating us like dumb fucks in the future.

 ??  ?? Facebook founder Mark Zuckerberg pictured on an iPhone, August 2017
Facebook founder Mark Zuckerberg pictured on an iPhone, August 2017
 ??  ?? A Facebook advertisem­ent paid for by a Russian account with ties to the Kremlin in an attempt to influence the 2016 presidenti­al election
A Facebook advertisem­ent paid for by a Russian account with ties to the Kremlin in an attempt to influence the 2016 presidenti­al election

Newspapers in English

Newspapers from United States