America’s Cyber Security Dilemma

A security dilemma occurs when one nation’s efforts to improve its security prompts other nations to take similar actions, often provoking arms races, instability, even war. 

But while such dilemmas have typically led to more-or-less balanced buildups on all sides, today’s US military spending patterns are driving adversaries in a different direction: towards cheaper, cyber-focused means of undermining a network-dependent force and the society it protects.

The way out of this cybersecurity dilemma must be equally unconventional: continue to establish cyberspace rules of engagement, improve and increase government-industry partnerships, and strengthen oversight and regulation of cyber-enabled technologies. 

Among the actors working to exploit new network-enabled technologies and the American dependence on them are the Islamic State, al-Qaida, Russia, and China, but perhaps the archetypal example is Iran. 

Its political and defense leaders realise that they cannot compete militarily against the United States, and stand little chance against Israel, a US ally, in conventional combat. Iran also recognises that it is in many respects outgunned by its regional rival, Saudi Arabia, and has on occasion sought to redress its differences through hostile actions in cyberspace.

With its nuclear program on hold, Iran is trying to bridge the conventional military gap between the country and its competitors by shifting some resources to develop cyber capabilities. Iranian hackers have progressed far beyond defacing websites and disrupting network services. 

They can now develop and use sophisticated software to probe for vulnerabilities, inject malware, and gain control of adversary systems.

The Iranians have targeted public, and private-sector industrial control systems, including the supervisory control and data acquisition (SCADA) systems that drive utilities and industrial automation. 

In a rare move, the United States indicted several Iranian citizens in March that it alleges were working as hackers for the Islamic Revolutionary Guard Corps and the Iranian government. 

These hackers are accused of conducting cyberattacks on myriad entities, including the New York Stock Exchange, NASDAQ, Bank of America, J.P. Morgan Chase, and AT&T. Perhaps even more troubling, Iranian hackers purportedly gained unauthorised remote access to a computer controlling the Bowman Avenue Dam in upstate New York. While no physical damage occurred, the demonstrated capability was extremely concerning.

What can the United States do about this cybersecurity dilemma?

It could try to decrease its military and economic reliance on cyberspace and correspondingly reduce its level of vulnerability. 

However, such a move would likely have enormous economic costs and significant associated losses in business and military productivity. This option is even less palatable when viewed in light of the relative gains that would be realised by competitors who do not likewise reduce their investments in cyberspace.

The United States could also raise the costs to its competitors for engaging in cyberattacks. For instance, it could develop an explicit policy of responding to particularly injurious cyberattacks with significant and visible combinations of cyber and kinetic retaliations and/or diplomatic and economic sanctions. 

Yet the US officials cannot be sure how the execution of declared policy of escalation would be perceived or responded to by others, even if they could reasonably assume that the origin, identity, and intent of an attack or attacker could be ascertained in a timely fashion. If this prescription were followed, mistakes or miscalculations could lead to war.

The risks of these two paths lead us to a third: 

The United States should instead continue to pursue international cooperation in cyberspace, improve its ability to identify and expose the sources of attacks, and improve its oversight of the development and adoption of cyber-related technologies. Although not a panacea, following each step would help ensure that US military investments in cyber capabilities are balanced against the attendant risks.

Most importantly of those three, the United States should continue to help craft international rules of engagement for behavior in cyberspace. Establishing internationally accepted rules for the conduct and legitimacy of engaging in cyberattacks could go a long way toward reducing the risks associated with the relatively unrestricted modes of warfare now occurring in and through cyberspace.

The United States should also continue to work on developing methods for quickly and accurately identifying the source of any attacks launched against its military, businesses or individuals. Although forming partnerships between the government and businesses has proven difficult in the past, such continued partnerships are necessary to this effort. 

Identifying and exposing the actors engaging in cyberattacks could help the United States redress economic losses and improve its ability to defend against future attacks. Increasing awareness of bad actors and their methods of attack also benefits the broader community of interested parties.

The United States should continue to improve its regulation and oversight of the development and adoption of new software and technologies. Networks and many of their components are inherently and increasingly insecure. Their vulnerabilities are exacerbated by the rapid and nearly exponential adoption of new applications and technologies where speed of development and convenience are often prioritized over the mitigation of potential security concerns. 

And while the US military takes security into account when adopting new technologies, the progressive employment of commercially developed cyber-enablers invites the risk of additional vulnerabilities.

Though the United States may have unwittingly created this security dilemma, it is too late to reverse course now. Its best chance of maintaining its military advantage, in both the conventional and cyber domains, requires a sober assessment of the path that it has chosen and deliberate steps to reduce the vulnerabilities it has created.

DefenseOne:       US & Russia Relations: It’s A New Cold War:      US Cybersecurity Strategy In The Trump Era:

Cyberwar: The Smart Person's Guide:         Image: George Creal

 

« German Police Will Squash Fake Online News
Changing Other People's Flight Bookings Is Just Too Easy »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Fuel Recruitment

Fuel Recruitment

Fuel Recruitment is a specialist recruitment company for the IT, Telecoms, Engineering, Consulting and Marketing industries.

Panda Security

Panda Security

Panda Security specializes in the development of endpoint security products and is part of the WatchGuard portfolio of IT security solutions.

Lantronix

Lantronix

Lantronix is a global provider of secure data access and management solutions for Internet of Things (IoT) and information technology assets.

BakerHostetler

BakerHostetler

BakerHostetler is one of the largest law firms in the USA We have five core practice groups including a specialty practice team in Privacy and Data Protection.

Minerva Labs

Minerva Labs

Minerva’s patent pending solution keeps malware in a constant sleep state before it can infiltrate your network and cause any damage.

Appdome

Appdome

Appdome is the industry's first mobile integration as a service company, providing solutions for enterprise mobility and mobile application security.

SecuPi

SecuPi

SecuPi delivers data-centric security with data-flow discovery, real-time monitoring, behavior analytics, and protection across web and enterprise applications and big data environments.

ecsec

ecsec

ecsec is a specialized vendor of security solutions including information security management, smart card technology, identity management, cloud computing and electronic signature technology.

Verodin

Verodin

Verodin is a business platform that provides organizations with the evidence needed to measure, manage and improve their cybersecurity effectiveness.

International Association of Security Awareness Professionals (IASAP)

International Association of Security Awareness Professionals (IASAP)

IASAP provides a members-only virtual sharing platform where security awareness professionals engage in a lively, year-round exchange of information and ideas.

ZARIOT

ZARIOT

ZARIOT's mission is to restore order to what is becoming connected chaos in IoT by bringing unrivalled security, control and quality of service.

Pessimistic Security

Pessimistic Security

The team behind Pessimistic helps blockchain startups meet modern security challenges since 2017.

Castlepoint Systems

Castlepoint Systems

Castlepoint Systems is a pioneer in information governance, risk and compliance as a service. An all-in-one solution offering powerful risk management, built in compliance, cybersecurity and audit.

RAD Security

RAD Security

RAD Security (formerly KSOC) is a cloud native security company that empowers engineering and security teams to drive innovation so they can focus on growth versus security problems.

NuKuDo

NuKuDo

NukuDo redefine the boundaries of cybersecurity talent development. We are dedicated to cultivating top-tier professionals equipped to tackle the complex challenges of cybersecurity.

TELUS

TELUS

TELUS provide Canadian businesses with the services and solutions they need to securely thrive in a digital world. Partner with a cybersecurity leader you can rely on.