Are we talking "cyber war" like the Bush admin talked WMDs?

By Matthew Lasar | Last updated about 10 hours ago
       
http://arstechnica.com/security/news/2011/04/are-we-talking-cyber-war-like-the-bush-admin-talked-wmds.ars

Turn any corner in the complex metropolis that is Internet policy and you'll 
hear about the "cybersecurity" crisis in two nanoseconds. As a consequence, the 
public is treated to a regular diet of draconian fare coming from Sixty Minutes 
and Fresh Air about the "growing cyberwar threat."

Former National Security Adviser Richard A. Clarke suggests a thought exercise 
in his hit book Cyber War: imagine you are the assistant to the president for 
Homeland Security. The National Security Agency has just sent a critical alert 
to your BlackBerry: "Large scale movement of several different zero day malware 
programs moving on Internet in US, affecting critical infrastructure."

As you get to your HQ, one of the DoD's main networks has already crashed; 
computer system failures have caused huge refinery fires around the country; 
the Federal Aviation Administration's air traffic control center in Virginia is 
collapsing, and that's just the beginning.

"The Chairman of the Fed just called," the Secretary of the Treasury tells you. 
"Their data centers and their backups have had some sort of major disaster. 
They have lost all their data." Power blackouts are sweeping the country. 
Thousands of people have already died. "There is more going on," Clarke 
narrates, "but the people who should be reporting to you can't get through."

This sort of scare-the-children prose has become something close to the norm, 
complain George Mason University Mercatus Center researchers Jerry Brito and 
Tate Wakins in a new working paper about what they see as the real 
problem—"threat inflation."

"The rhetoric of 'cyber doom'," Brito and Watkins write, "lacks clear evidence 
of a serious threat that can be verified by the public. As a result, the United 
States may be witnessing a bout of threat inflation similar to that seen in the 
run-up to the Iraq War. Additionally, a cyber-industrial complex is emerging, 
much like the military-industrial complex of the Cold War. This complex may 
serve to not only supply cybersecurity solutions to the federal government, but 
to drum up demand for them as well."

Our past experience

The paper's title is "Loving the Cyber Bomb? The Dangers of Threat Inflation in 
Cybersecurity Policy." As that last paragraph suggests, these authors see a 
clear and present parallel between the cyberwar debate and the rhetoric of the 
Bush administration after September 11, 2001.

First, the paper notes, the White House implied that Iraq's then dictator 
Sadaam Hussein had something to do with the attacks on New York City and the 
Pentagon. Then the government convinced influential newspapers like The New 
York Times to favorably quote administration leaks suggesting that Iraq 
possessed weapons of mass destruction.

Both of these assertions were ultimately debunked, but the damage was done. As 
late as 2006, polls indicated that 40 percent of the US population still 
thought that Hussein was somehow in on 9/11.

As with that story, "there is very little verifiable evidence" to back up the 
cyber threats claimed now, "and the most vocal proponents of a threat engage in 
rhetoric that can only be characterized as alarmist," Brito and Watkins write. 
"Cyber threat inflation parallels what we saw in the run-up to the Iraq War."

Probed daily

The paper is particularly hard on the report of the Commission on Cybersecurity 
for the 44th Presidency. Launched by the Center for Strategic and International 
Studies, it came complete with a distinguished panel of academics, consultants, 
IT industry biggies, and former government officials. What it didn't come with, 
the Mercatus study contends, was much evidence for the dire situation it 
posited—that the protection of cyberspace "is a battle we are losing."

For example, the CSIS report warned that Department of Defense computers are 
"probed hundreds of thousands of times each day." But of course that's true, 
the paper notes. Probing and scanning are the norm in cyberspace, with software 
constantly trying the doors of websites and portals.

Then the blue ribbon document contended that "porous information systems have 
allowed opponents to map our vulnerabilities and plan their attacks."

Depriving Americans of electricity, communications, and financial services may 
not be enough to provide the margin of victory in a conflict, but it could 
damage our ability to respond and our will to resist. We should expect that 
exploiting vulnerabilities in cyber infrastructure will be part of any future 
conflict.

Where, the Mercatus researchers ask, was the evidence that America's opponents 
have "mapped vulnerabilities" and "planned attacks"? These sort of reports 
often imply that they're working from classified sources. But: "If our past 
experience with threat inflation teaches us anything, it is that we cannot 
accept the word of government officials with access to classified information 
as the sole source of evidence for the existence or scope of a threat."

Clarke and the present danger

Richard Clarke's doomsday scenarios are next on the Mercatus paper's takedown 
list. Clarke's book cites the distributed denial of service attacks on Estonian 
and Georgian websites in 2007 and 2008 as particularly ominous. Obviously these 
 assaults were serious and consequential, Brito and Wakins agree. But how do we 
get from botnet-infested computers or networks to the blackout, fire, and 
infrastructure collapse scenarios that Cyber War posits?

We just don't, they insist, and they also take Clarke to task for citing the 
Brazil blackout of 2007 as another Exhibit A for future cyber eschatologies. 
The going thesis for a while was that the disaster was prompted by a criminal 
hacking. But subsequent probes of the crisis by the power company and its 
regulator concluded that dirt on high voltage insulators caused the outage.

Ditto for the Northeast power blackout of 2003, suspected of being part of a 
worm-based cyberattack, found to be no such thing in a subsequent investigation.

It's pretty obvious that these researchers deplore Clarke's book, especially 
speculations that the Russians "are probably saving their best cyber weapons 
for when they really need them, in a conflict in which NATO and the United 
States are involved."

This sort of prose is "eerily reminiscent of the suggestion before the invasion 
of Iraq that although we lacked the type of evidence of WMD that might lead us 
to action, we would not want 'the smoking gun to be a mushroom cloud'," Brito 
and Watkins write.

Cyber pork

The Mercatus authors see very little good in this rhetoric, and many bad 
outcomes. They see unjustified regulation of the Internet as one possibility, 
and as Ars readers know, Congress has considered a bill that at one point would 
have given the president the authority to shut the 'Net down in the event of a 
cyberattack.

They also see corporations ratcheting up the volume on the issue to bring in 
defense contracting dollars, and politicians joining the panic party to deliver 
federal money to their districts. But ultimately what they see is a scare 
mongering discourse that will make it impossible to realistically assess the 
cybersecurity situation.

"Let us be very clear," their essay acknowledges: "although we are skeptical of 
the scope of the threat as presented by the proponents of regulation, we do not 
doubt that cyber threats do exist, nor would we suggest that regulation can 
never be appropriate. What we do propose is that before we rush to regulate 
cyberspace we should first demand verifiable evidence of the threat and its 
scope and, second, we should use any such evidence to conduct a proper analysis 
to determine whether regulation is necessary and if it will do more good than 
harm."
_______________________________________________
Infowarrior mailing list
[email protected]
https://attrition.org/mailman/listinfo/infowarrior

Reply via email to