Feeds

Why the Dogs of Cyberwar stay leashed

Can of worms

  • alert
  • submit to reddit

Combat fraud and increase customer satisfaction

Opinion As the U.S. and U.K. campaign to "shock and awe" the Iraqi leadership and population continues, as "bunker buster" bombs hit the Iraqi Presidential palaces and coalition forces attempt to disrupt the command and control of the Iraqi military, one widely-reported offensive capability is nowhere in sight: the United States has not yet officially used the tools of cyberwarfare.

The U.S. military has reportedly developed impressive offensive cyberwar capabilities, including the ability to use microwave or other electronic impulses to disrupt or destroy electronic components. If this is true, why have we not yet seen an all out cyberwar?

That's not to say we haven't seen any action in cyberspace. Sometimes individual citizens use hacker-style techniques to attack accessible sites associated with an opposing country's regime -- like "patriotic" U.S. citizens hacking Iraqi government sites. But a wartime military cyber attack would look completely different from these amateur efforts, and may use entirely different tools.

The goal of a cyber attack might be not mere disruption -- but destruction. It may be massive misinformation. It may be cooption. Thus, a cyber attack may go after DNS servers and spoof official government sites, as a propaganda mechanism. It may take the form of the mythic HERF (High Energy Radio Frequency) guns, or microwave bombs, or truly malicious polymorphic viruses or worms designed to destroy networks. Conventional defenses may not prevent such attacks -- although good backup and disaster recovery practices may minimize damage.

Much of the hand wringing over the legality of these tactics has revolved around their use in the absence of armed conflict. Is a cyber attack an act of war? Is cyber espionage likewise an act in violation of international law? But as the bombs fall, and the shooting war (declared or undeclared) begins, these questions are ultimately left behind, and the same rules for armed conflict govern cyber attacks.

These rules are much clearer, but, paradoxically, they probably make cyber attacks illegal.

This may seem counterintuitive. If it is okay to bomb an infrastructure into the stone age, why can't you "logic bomb" them out of the information age? The answer lies in the nature of the targets and the weapons chosen. Under the law of armed conflict, the use of force -- and all out cyberwar is likely a "use of force" -- must follow particular patterns. A warrior may not deliberately target non-combatants for attack. The use of force must be "proportional" to objectives, and reasonable efforts must be taken to minimize collateral damage.

Glass Houses

For cyberwar, this presents problems. First, the vast majority of the vulnerable infrastructure (electrical generation and distribution, water, transportation, financial services, telecommunications) are likely owned or operated by the private sector -- noncombatants, by definition. And the vast majority of this infrastructure is used by noncombatants as well. The same telecommunications system that carries military command and control communications probably supports civilian emergency medical services as well.

It may not be possible to launch cyber attacks that are effective against the military that don't also have dramatic consequences for noncombatants. Attacks of so-called "SCADA" systems -- those that control things like dams, nuclear power plants, air traffic control systems, and even street traffic lights -- could result in thousands of deaths to civilians.

There are other reasons why the U.S. may forgo a cyber attack in Iraq. It probably serves U.S. and U.K. interests to keep as much of the infrastructure intact for the time being. For tactical reasons, U.S. forces want to maintain lines of communication, and minimize disruption of the civilian population in the opening phases of this conflict. And in the long run, anything that is destroyed will have to be rebuilt.

Finally, it would set a precedent that could come back to haunt the U.S.

The U.S. and Western nations are much more dependent on electronic infrastructures than lesser developed countries, so they are rightly reluctant to establish a legal precedent that permits cyberwarfare. Cyberwar is asymmetric, which means it benefits lesser military powers as much as, or even more than, military goliaths. Nobody expects Iraqi B52's to fly over Washington, D.C., but a handful of Iraqi computer scientists (or scientists bought with Iraqi oil money) could launch a cyber attack -- at least to some degree -- against U.S. targets.

There is an old saying about a can of worms -- the only way to close it, is to use a bigger can. Unleashing a cyberwar anywhere would leave us with a can of worms the size of Texas. ©SecurityFocus Online

SecurityFocus columnist Mark D. Rasch, J.D., is the Senior Vice President and Chief Security Counsel at Solutionary Inc. He lives in McLean, Virginia.

SANS - Survey on application security programs

Whitepapers

Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.