What are some of the tools we will use to defend networks and individuals from future cyber boogie men? Nall looks to ever-smarter, more self-directed cyber defense software systems. “In addition to current methods for thwarting opponents, growing use of strong artificial intelligence to monitor and diagnose itself, and other systems will help as well.”
Vint Cerf, a research pioneer who was instrumental in the creation of the Internet, notes that “systems that observe their own behavior and the behavior of users may be able to detect anomalies and attacks. There may well be some serious damage in the financial sector especially.”
Roboticized cyber-defense is a project that the military is already pursuing through the Defense Advanced Projects Research Agency’s Cyber Grand Challenge, a capture-the-flag style competition to develop “automated security systems,” to defend core cyber assets, in other words— programs that detect and respond to threats with minimal human intervention.
“I hope you start to see automated cyber-defense systems that become commercial,” DARPA director Arati Prabhakar told the crowd at the Post summit. “A lot more work has to happen before we can show that it’s possible.”
The Lack of a Red Line on Cyber-Threats
Regardless of what sorts of good botnets protect us from evil botnets, cyber attacks could have growing geopolitical implications. Sen. Jim Inhofe, R-Okla., the ranking member of the Senate Armed Services Committee, lamented what he perceives as a formal doctrine on when and how to launch offensive cyber operations. Inhofe, at a Senate hearing in March said:
“…I am concerned by the lack of progress by the administration in developing a policy for deterring the growing number of adversaries in cyberspace. This lack of a cyber deterrence policy and the failure to establish meaningful norms that punish bad behavior, have left us more vulnerable and at greater risk of continued cyber aggression.”
Rep. Rogers reiterated the concern that in terms of U.S. policy regarding cyber attacks, there is no firm red line. “You would be surprised at how far we are from a sound policy” to conduct offensive cyber warfare, he said recently while calling for the United States to ramp up its efforts to launch offensive cyber operations.
The next questions become what might those look like and what rules govern their scope?
The Pentagon recently made public a formerly secret, 2013 Joint Chiefs document, (JP 3-12) explaining its doctrinal approach to launching major cyber attacks against nation-state enemies. It limits potential targets to “military” but then goes on to define that broadly as “those objects whose total or partial destruction, capture, or neutralization offers a direct and concrete military advantage.”
In theory, that designation could include corporations or even U.S. corporations, individuals that aren’t on anyone else’s target list, as well as computers or systems hijacked to launch cyber attacks by unseen third parties.
Predicting What Future Cyberwar Will Look Like
Speaking to Pentagon reporters in June, Adm. Michael Rogers, commander of U.S. Cyber Command and director of the NSA, offered his own projection for the future of cyberwar in the year 2025, which would look a lot like regular war with more cyber activities thrown in. Soldiers on the front lines would use cyber-weapons as readily as they use live ammunition.
“In the year 2025, I believe … Army commanders will maneuver offensive and defensive [cyber] capability much today as they maneuver ground forces,” Rogers said. “The ability to integrate cyber into a broader operational concept is going to be key. Treating cyber as something so specialized, … so unique — something that resides outside the broader operational framework — I think that is a very flawed concept.”
For evidence of that, look to the integrated Field Manual for Cyber Electromagnetic Activities, a first of its kind how-to guide that combined cyber operations with jamming and other electromagnetic activities associated more traditionally with combat operations.
Signals Intelligence, CyberWar and You
You may believe that a major cyber attack is likely to occur between now and 2025, or you may view the entire cyber menace as a scheme by security software companies. (The truth may be a mixture of both.) However, one thing that the threat of cyberwar will certainly do is increase the amount of computer, and particularly network government, surveillance to detect “anomalous behaviors,” possibly related to cyber attacks. The same recently released Pentagon paper on offensive cyber operations made a pointed mention of networks and the cloud as a potential source of signals intelligence of relevance to cyber-operators. Networks were “a primary target for signals intelligence (SIGINT), including computer network exploitation (CNE), measurement and signature intelligence, open source intelligence, and human intelligence.”
Make no mistake, signals intelligence collection means watching how individuals behave online.
As for the Pew’s 2025 date, Jason Healey, director of the Cyber Statecraft Initiative of the Atlantic Council, told Defense One that he considered it to be arbitrary. “We just don’t have a clue when it’s going to happen,” he said, adding that a single cyber attack on the scale of Pearl Harbor frightened him less than the prospect of a massive cyber failure, absent of malice but with real-time market implications.
“I’m less concerned about attacks and more about a shock” of the size of a major market collapse, he said and argued that pre-occupation with a “cyber Pearl Harbor” ignores the “larger complexity” of the issue. “What do we do if one of these IT companies that’s too big to fail has a Lehman Brother’s moment? The data was there on Monday and is gone on Friday? If a major cloud provider fails, how do we get our data back?”
While Healey was incredulous that a country like Russia would launch a cyber attack resulting in loss of life, he acknowledged that much has changed between today and 1991 when the electronic Pearl Harbor concept first emerged. And the changes are coming only more rapidly, as are potential vulnerabilities.
“The more that we plug things to the Internet, things of concrete and steel and connect them to the Internet, the more likely we are to get ourselves into the state where this will happen in 2025. The dynamic that will make that more and more true is the Internet of Things,” he said.
Beyond the USA Freedom Act: How Surveillance Still Subverts US Competitiveness
Citation: Castro, Daniel & McQuinn, Alan. (2015). Beyond the USA Freedom Act: How Surveillance Still Subverts US Competitiveness. Informative Technology & Innovation Foundation. Retrieved 12/29/15. https://itif.org/publications/2015/06/09/beyond-usa-freedom-act-how-us-surveillance-still-subverts-us-competitiveness
Castro & McQuinn Article Summary: Foreign investors are currently discouraged from investing in American technology businesses because of concerns about government surveillance. Foreign investors, in order to protect tier own privacy, will chose to invest in companies elsewhere. This could lead to more than $35 Billion leaving the American technology industry by as early as 2016.
Castro & McQuinn Article Strategic Points:
-
This article can be used to answer to Spending Disadvantages or any generic spending bad arguments.
-
This article could be an important piece of a competitiveness, hegemony, and/or economic advantage for an affirmative case.
-
This article can be used to show that there is a tradeoff effect between the technology economy and security threats.
Full Article:
Almost two years ago, ITIF described how revelations about pervasive digital surveillance by the U.S. intelligence community could severely harm the competitiveness of the United States if foreign customers turned away from U.S.-made technology and services. Since then, U.S. policymakers have failed to take sufficient action to address these surveillance concerns; in some cases, they have even fanned the flames of discontent by championing weak information security practices. In addition, other countries have used anger over U.S. government surveillance as a cover for implementing a new wave of protectionist policies specifically targeting information technology. The combined result is a set of policies both at home and abroad that sacrifices robust competitiveness of the U.S. tech sector for vague and unconvincing promises of improved national security.
ITIF estimated in 2013 that even a modest drop in the expected foreign market share for cloud computing stemming from concerns about U.S. surveillance could cost the United States between $21.5 billion and $35 billion by 2016. Since then, it has become clear that the U.S. tech industry as a whole, not just the cloud computing sector, has under-performed as a result of the Snowden revelations. Therefore, the economic impact of U.S. surveillance practices will likely far exceed ITIF’s initial $35 billion estimate. This report catalogues a wide range of specific examples of the economic harm that has been done to U.S. businesses. In short, foreign customers are shunning U.S. companies. The policy implication of this is clear: Now that Congress has reformed how the National Security Agency (NSA) collects bulk domestic phone records and allowed private firms—rather than the government—to collect and store approved data, it is time to address other controversial digital surveillance activities by the U.S. intelligence community.
The U.S. government’s failure to reform many of the NSA’s surveillance programs has damaged the competitiveness of the U.S. tech sector and cost it a portion of the global market share. This includes programs such as PRISM—the controversial program authorized by the FISA Amendments Act, which allows for warrantless access to private-user data on popular online services both in the United States and abroad—and Bullrun—the NSA’s program to undermine encryption standards both at home and abroad. Foreign companies have seized on these controversial policies to convince their customers that keeping data at home is safer than sending it abroad, and foreign governments have pointed to U.S. surveillance as justification for protectionist policies that require data to be kept within their national borders. In the most extreme cases, such as in China, foreign governments are using fear of digital surveillance to force companies to surrender valuable intellectual property, such as source code.
In the short term, U.S. companies lose out on contracts, and over the long term, other countries create protectionist policies that lock U.S. businesses out of foreign markets. This not only hurts U.S. technology companies, but costs American jobs and weakens the U.S. trade balance. To reverse this trend, ITIF recommends that policymakers:
-
Increase transparency about U.S. surveillance activities both at home and abroad.
-
Strengthen information security by opposing any government efforts to introduce backdoors in software or weaken encryption.
-
Strengthen U.S. mutual legal assistance treaties (MLATs).
-
Work to establish international legal standards for government access to data.
-
Complete trade agreements like the Trans Pacific Partnership that ban digital protectionism, and pressure nations that seek to erect protectionist barriers to abandon those efforts.
NSA Spying Directly Harms Internet Companies, Silicon Valley, California…And the Entire US Economy
Citation: Washington’s Blog. (2013). NSA Spying Directly Harms Internet Companies, Silicon Valley, California…And the Entire US Economy. Retrieved 1/1/16. http://www.washingtonsblog.com/2013/07/nsa-spying-directly-harms-internet-companies-silicon-valley-california-and-the-entire-national-economy.html
Washington’s Blog Article Summary: American technology companies are being forced to turn over information to the NSA for purposes of surveillance. However, shareholders and foreign investors are not being told that private information is being given to the NSA. This could place investors at risks and even violate privacy laws in other countries.
Washington’s Blog Strategic Points:
-
This article can be used to show that the global market is losing confidence in American technology companies, which can answer negative economy and hegemony arguments.
-
This article could be an important piece of competitiveness, hegemony, and/or economic advantage for an affirmative case.
-
This article can be used to show how surveillance can possibly damage relations with other countries, because their citizens are also being inadvertently surveilled by the NSA. So, this article can be used against many negative relations good arguments.
Full Article:
Mass surveillance by the NSA may directly harm the bottom of line of Internet companies, Silicon Valley, California … and the entire national economy.
Money News points out:
The company whose shares you own may be lying to you — while Uncle Sam looks the other way.
Let’s step through this. I think you will see the problem.
Fact 1: U.S. financial markets are the envy of the world because we have fair disclosure requirements, accounting standards and impartial courts. This is the foundation of shareholder value. The company may lose money, but they at least told you the truth.
Fact 2: We now know multiple public companies, including Microsoft (MSFT), Google (GOOG), Facebook (FB) and other, gave their user information to NSA. Forget the privacy implications for a minute. Assume for the sake of argument that everything complies with U.S. law. Even if true, the businesses may still be at risk.
Fact 3: All these companies operate globally. They get revenue from China, Japan, Russia, Germany, France and everywhere else. Did those governments consent to have their citizens monitored by the NSA? I think we can safely say no.
Politicians in Europe are especially outraged. Citizens are angry with the United States and losing faith in American brand names. Foreign companies are already using their non-American status as a competitive advantage. Some plan to redesign networks specifically to bypass U.S. companies.
By yielding to the NSA, U.S. companies likely broke laws elsewhere. They could face penalties and lose significant revenue. Right or wrong, their decisions could well have damaged the business.
Securities lawyers call this “materially adverse information” and companies are required to disclose it. But they are not. Only chief executives and a handful of technical people know when companies cooperate with the NSA. If the CEO can’t even tell his own board members he has placed the company at risk, you can bet it won’t be in the annual report.
The government also gives some executives immunity documents, according to Bloomberg. Immunity is unnecessary unless someone thinks they are breaking the law. So apparently, the regulators who ostensibly protect the public are actively helping the violators.
This is a new and different investment landscape. Public companies are hiding important facts that place their investors at risk. If you somehow find out, you will have no recourse because regulators gave the offender a “get out of jail free” card. The regulatory structure that theoretically protects you knowingly facilitates deception that may hurt you, and then silences any witnesses.
This strikes to the very heart of the U.S. financial system. Our markets have lost any legitimate claim to “full and fair disclosure.” Every prospectus, quarterly report and news release now includes an unwritten NSA asterisk. Whenever a CEO speaks, we must assume his fingers are crossed.
Every individual investor or money manager now has a new risk factor to consider. Every disclosure by every company is in doubt. The rule of law that gave us the most-trusted markets in the world may be just an illusion.
In a subsequent article, Money News wrote:
Executives at publicly traded companies are lying to shareholders and probably their own boards of directors. They are exposing your investments to real, material, hard-dollar losses and not telling you.
The government that allegedly protects you, Mr. Small Investor, knows all this and actually encourages more of it.
Who lies? Ah, there’s the problem. We don’t know. Some people high in the government know. The CEOs themselves and a few of their tech people know. You and I don’t get to know. We just provide the money.
Since we don’t know which CEOs are government-approved liars, the prudent course is to assume all CEOs are government-approved liars. We can no longer give anyone the benefit of the doubt.
If you are a money manager with a fiduciary responsibility to your investors, you are hereby on notice. A CEO may sign those Securities and Exchange Commission filings where you get corporate information with his fingers crossed. Your clients pay you to know the facts and make good decisions. You’re losing that ability.
For example, consider a certain U.S. telecommunications giant with worldwide operations. It connects American businesses with customers everywhere. Fast-growing emerging markets like Brazil are very important to its future growth.
Thanks to data-sharing agreements with various phone providers in Brazil, this company has deep access to local phone calls. One day someone from NSA calls up the CEO and asks to tap into that stream. He says OK, tells his engineers to do it and moves on.
A few years later, Edward Snowden informs Brazilian media that U.S. intelligence is capturing these data. They tell the Brazilian public. It is not happy. Nor are its politicians, who are already on edge for entirely unrelated reasons.
What would you say are this company’s prospects for future business in Brazil? Your choices are “slim” and “none.” They won’t be the only ones hurt. If the U.S. government won’t identify which American company cheated its Brazilian partners, Brazil will just blame all of them. The company can kiss those growth plans good-bye.
This isn’t a fantasy. It is happening right now. The legality of cooperating with the NSA within the United States is irrelevant. Immunity letters in the United States do not protect the company from liability elsewhere.
Shouldn’t shareholders get to know when their company’s CEO takes these risks? Shouldn’t the directors who hire the CEO have a say in the matter? Yes, they should. We now know that they don’t.
The trust that forms the bedrock under U.S. financial markets is crumbling. [A theme we frequently explore. ] If we cannot believe CEOs when they swear to tell the truth, if companies can hide material risks, if boards cannot know what the executives they hire are actually doing, any pretense of “fair markets” is gone.
When nothing is private, people and businesses soon cease to trust each other. Without trust, modern financial markets cannot function properly.
If U.S. disclosure standards are no better than those in the third world, then every domestic stock is overvalued. Our “rule of law” premium is gone.
This means a change for stock valuations — and it won’t be bullish.
CNN reports:
Officials throughout Europe, most notably French President Francois Hollande, said that NSA spying threatens trade talks.
For the Internet companies named in reports on NSA surveillance, their bottom line is at risk because European markets are crucial for them. It is too early assess the impact on them, but the stakes are clearly huge. For example, Facebook has about 261 million active monthly European users, compared with about 195 million in the U.S. and Canada, and 22% of Apple’s net income came from Europe in the first quarter of 2013.
In June 2011, Microsoft admitted that the United States could bypass EU privacy regulations to get vast amounts of cloud data from their European customers. Six months later, BAE Systems, based in the United Kingdom, stopped using the company’s cloud services because of this issue.
The NSA scandal has brought tensions over spying to a boil. German prosecutors may open a criminal investigation into NSA spying. On July 3, Germany’s interior minister said that people should stop using companies like Google and Facebook if they fear the U.S. is intercepting their data. On July 4, the European Parliament condemned spying on Europeans and ordered an investigation into mass surveillance. The same day, Neelie Kroes, the EU’s chief telecom and Internet official, warned of “multi-billion euro consequences for American companies” because of U.S. spying in the cloud.
Transparency is an important first step. Its absence only exacerbates a trust deficit that companies already had in Europe. And trust is crucial. Google’s chief legal officer recognized this on June 19 when he said, “Our business depends on the trust of our users,” during a Web chat about the NSA scandal. Some companies have been aggressive in trying to disclose more, and others have not. But unless the U.S. government loosens strictures and allows greater disclosure, all U.S. companies are likely to suffer the backlash.
The Obama administration needs to recognize and mitigate the serious economic risks of spying while trying to rebuild its credibility on Internet freedom. The July 9 hearing of the Privacy and Civil Liberties Oversight Board is a start, but much more is needed. More disclosure about the surveillance programs, more oversight, better laws, and a process to work with allied governments to increase privacy protections would be a start.
The European customers of Internet companies are not all al Qaeda or criminals, but that is essentially how U.S. surveillance efforts treat them. If this isn’t fixed, this may be the beginning of a very costly battle pitting U.S. surveillance against European business, trade, and human rights.
The Atlantic notes:
Most communications flow over the Internet and a very large percentage of key Internet infrastructure is in the United States. Thus, foreigners’ communications are much more likely to pass through U.S. facilities even when no U.S. person is a party to a particular message. Think about a foreigner using Gmail, or Facebook, or Twitter — billions of these communications originate elsewhere in the world but pass through, and are stored on, servers located in the U.S.
Foreigners … comprise a growing majority of any global company’s customers.
From the perspective of many foreign individuals and governments, global Internet companies headquartered in the U.S. are a security and privacy risk. And that means foreign governments offended by U.S. snooping are already looking for ways to make sure their citizens’ data never reaches the U.S. without privacy concessions. We can see the beginnings of this effort in the statement by the vice president of the European Commission, Viviane Reding, who called in her June 20 op-ed in the New York Times for new EU data protection rules to “ensure that E.U. citizens’ data are transferred to non-European law enforcement authorities only in situations that are well defined, exceptional and subject to judicial review.” While we cheer these limits on government access, the spying scandal also puts the U.S. government and American companies at a disadvantage in ongoing discussions with the EU about upcoming changes to its law enforcement and consumer-privacy-focused data directives, negotiations critical to the Internet industry’s ongoing operations in Europe.
Even more troubling, some European activists are calling for data-storage rules to thwart the U.S. government’s surveillance advantage. The best way to keep the American government from snooping is to have foreigners’ data stored locally so that local governments – and not U.S. spy agencies — get to say when and how that data may be used. And that means nations will force U.S.-based Internet giants like Google, Facebook, and Twitter, to store their user data in-country, or will redirect users to domestic businesses that are not so easily bent to the American government’s wishes.
So the first unintended consequence of mass NSA surveillance may be to diminish the power and profitability of the U.S. Internet economy. America invented the Internet, and our Internet companies are dominant around the world. The U.S. government, in its rush to spy on everybody, may end up killing our most productive golden goose.
(Internet companies comprise the most vibrant sector of our economy.)
San Diego Union-Tribune writes:
California and its businesses have a problem. It’s called the National Security Agency.
The problem for California is not that the feds are collecting all of our communications. It is that the feds are (totally unapologetically) doing the same to foreigners, especially in communications with the U.S. California depends for its livelihood on people overseas — as customers, trade partners, as sources of talent. Our leading industries — shipping, tourism, technology, and entertainment — could not survive, much less prosper, without the trust and goodwill of foreigners. We are home to two of the world’s busiest container ports, and we are a leading exporter of engineering, architectural, design, financial, insurance, legal, and educational services. All of our signature companies — Apple, Google, Facebook, Oracle, Intel, Hewlett-Packard, Chevron, Disney — rely on sales and growth overseas. And our families and workplaces are full of foreigners; more than one in four of us were born abroad, and more than 50 countries have diaspora populations in California of more than 10,000.
News that our government is collecting our foreign friends’ phone records, emails, video chats, online conversations, photos, and even stored data, tarnishes the California and American brands.
Will tourists balk at visiting us because they fear U.S. monitoring? Will overseas business owners think twice about trading with us because they fear that their communications might be intercepted and used for commercial gain by American competitors? Most chilling of all: Will foreigners stop using the products and services of California technology and media companies — Facebook, Google, Skype, and Apple among them — that have been accomplices (they say unwillingly) to the federal surveillance?
The answer to that last question: Yes. It’s already happening. Asian governments and businesses are now moving their employees and systems off Google’s Gmail and other U.S.-based systems, according to Asian news reports. German prosecutors are investigating some of the American surveillance. The issue is becoming a stumbling block in negotiations with the European Union over a new trade agreement. Technology experts are warning of a big loss of foreign business.
John Dvorak, the PCMag.com columnist, wrote recently, “Our companies have billions and billions of dollars in overseas sales and none of the American companies can guarantee security from American spies. Does anyone but me think this is a problem for commerce?”
It doesn’t help when our own U.S. Sen. Dianne Feinstein is backing the surveillance without acknowledgment of the huge potential costs to her state.
It’s time for her and House Minority Leader Nancy Pelosi, who has been nearly as tone-deaf on this issue, to be forcefully reminded that protecting California industry, and the culture of openness and trust that is so vital to it, is at least as important as protecting massive government data-mining. Such reminders should take the force not merely of public statements but of law.
California has a robust history of going its own way — on vehicle standards, energy efficiency, immigration, marijuana. Now is the time for another departure — this one on the privacy of communications.
We need laws, perhaps even a state constitutional amendment, to make plain that California considers the personal data and communications of all people, be they American or foreign, to be private and worthy of protection.
Share with your friends: |