Myths About Cyberattacks
In an
editorial in the Washington Post last week, Ben Buchanan, the author of The
Hacker and the State: Cyber Attacks and the New Normal of Geopolitics,
debunks five myths about cyberwar.
Myth No. 1: Cyberwar Is Overhyped and Impossible
Myth No. 1: Cyberwar Is Overhyped and Impossible
“One of the
most common myths in cybersecurity,” writes Buchanan, “is that destructive
hacking is a wildly overblown threat, nearly impossible, or incapable of
shaping geopolitical conflicts.” Believers of this myth are fond of pointing
out that squirrels cause more blackouts than hackers.
Buchanan cites
several examples to debunk this myth, including the 2015 and 2016 attacks by
Russian hackers that turned off the power in parts of Ukraine, and the June
2017 Russian cyberattack “NotPetya” that caused more than $10 billion in damage
around the world. The same day that Buchanan’s editorial appeared in the press
last week, United States joined several countries
in accusing Russia of a major cyberattack in the Republic of Georgia in late
2019 that knocked thousands of government and private websites offline and
interrupted television broadcasts. In their 2019 book, The Fifth Domain, Richard A. Clarke and
Robert K. Knake, counter-terrorism officials in several United States
administrations, destroy this common myth. They argue that cyber, the “fifth
domain,” is different from the other four domains – land, sea, air, and space –
traditionally identified by the Pentagon. Intending to provoke government and
corporate leaders into action, the authors predict that the next major war will
be provoked by a cyberattack (Clarke and Knake, 2019, 7).
Myth No. 2:
Cyberwar Is All About Crashing Power Grids and Airplanes
By concentrating
on the consequences of “theatrical” cyberattacks such as refineries on fire,
planes plummeting from the skies, financial systems collapsing, and cities
plunging into darkness, we are missing the threats that matter most, threats
that take the form of military and economic espionage of information systems. A
February 10, 2020 post in this blog, Courts
Vulnerable to Exfiltration of National Security Technology and Sensitive
Intellectual Property Through Bankruptcy Proceedings, highlights a vulnerability which poses an
oversized threat to our national security but has received little attention: bankruptcy proceedings. Courts are vulnerable
in their legal proceedings, especially in the ways cutting-edge technology
information is exposed in open court.
Bankruptcy proceedings have become a unique avenue through which foreign
adversaries are able to acquire sensitive national security technologies and
intellectual property. No physical damage to a single computer or network is
done in these espionage hacks and thefts of intellectual property.
Myth No. 3: The
Purpose of Cyberattacks Is Readily Apparent
Not so says
Buchanan. The purpose of the attacks, as well as the identity and motivations
of the attackers, are often unclear. Foreign adversaries disguise their
involvement in cyberattacks or deny them altogether. The motivations behind the
very destructive NotPetya cyberattacks remain opaque today.
Myth No. 4: Cyberspace
Is Borderless, With No Geography
Buchanan says
that cellphone networks and WiFi communications are invisible and “borderless,”
and seem “someplace else.” This warning hit home as I got ready to post this
blog from a file in the cloud: “File not available. Access denied.” Where is my
file? How can I access it? Buchanan contends that “data zips between countries
easily, with no passport checks or customs inspection, nor any geographic
hurdles” and cyberspace is essentially “borderless.”
That said, Buchanan
acknowledges that geography, borders, and legal jurisdictions still matter a
lot. For example, under the Foreign Intelligence Surveillance Act, the U.S. can
compel telecommunications companies that operate within its borders to cooperate
to address national security threats. It can access some intelligence data from
Google, Apple, and Facebook. China and Russia too can use their sovereignty to block
and study Internet traffic as it enters and exits borders.
Myth No. 5: It’s
Impossible to Know Who Conducted a Cyberattack
Although confirming
who is behind cyberattacks is difficult, the U.S. and other governments use
their own hacking capabilities to figure out who conducted cyberattacks. Much
of this is classified but there exists a growing private sector devoted to identifying
who was responsible for cyberattacks and how they were perpetrated, e.g., Russian
information operations, Chinese economic espionage and theft of intellectual
property; and North Korean bank hacking.
Copyright
CourtMetrics 2020. All rights reserved.