There’s A War Being Waged, But Many Are Not Aware Of It – Analysis

By

By Lawrence Husick*

With each new headline, we learn of some new cyber-danger that imperils our privacy, our finances, and our security. We are told that these threats originate from Shanghai, St. Petersrburg, Tehran, Islamabad, and Laurel, Maryland, home to the National Security Agency (NSA). Tens of millions of accounts at retailers, insurance and healthcare companies, and at the Office of Personnel Management have been hacked, and terabytes of information stolen. We have been offered “LifeLock,” told to “think before you click,” and advised just to adopt the mantra of Alfred E. Neuman, “What? Me Worry?” But what is the truth? Are these threats real? Are we at war, and if so, with whom?

According to the website “Hackmageddon” that compiles statistics about publicly disclosed cyberattacks, May 2015 was a very active month . The United States is, not surprisingly, the most prevalent target of worldwide cyberattacks – because the US is highly Internet-integrated, and a large and wealthy economy. As shown in the breakdown, cybercrime is the leading motivation for all attacks world-wide.

The types of organizations targeted by cyber-attackers reflect the prevalence of criminal orientation, as well.

Of continuing concern is the wide variety of techniques used in cyber-mischief.

The take-aways from this snapshot are simple: We have built, in the Internet and our computing systems, an edifice so complex that we are unable to fully understand its operation, or the failure modes that it encompasses. Were the Internet a car, it would be a 1963 Corvair… “unsafe at any speed”.

It is now time, as Vint Cerf, one of the designers of the underlying TCP/IP architecture that operates the Internet has stated, to redesign our systems to be both trusted and trustworthy. This will require Manhattan Project levels of dedication and resources, but it is as critical to our ability to win the cyberwar as that project proved to be to the “kinetic” war of the 1940s. This complex effort, however, will make the intricacies of the atom bomb look like a Lego project.

It should be clear that China, Russia, Iran and non-state as well as state-affiliated actors are hard at work. It should also be clear that our own NSA and the UK’s GCHQ have programs of their own, some of which may have uninitentionally weakened Internet security.  We have not yet met all of the enemies, but some of them are us – our own security agencies, and our unwillingness to invest in our own security. There’s a war on. We should behave like there is.

About the author:
*Lawrence Husick is Co-Chairman of the Foreign Policy Research Institute’s Center for the Study of Terrorism where he concentrates on the study of terrorist tactics and counterterrorism strategies, with a particular focus on technology leverage as a defining characteristic of the modern terrorist. He is also co-director of the FPRI Wachman Center’s Program on Teaching Innovation and a faculty member at the Whiting Graduate School of Engineering and the Zanvyl-Krieger School of Arts and Sciences Graduate Biotechnology Program of the Johns Hopkins University.

Source:
This article was published by FPRI

Published by the Foreign Policy Research Institute

Founded in 1955, FPRI (http://www.fpri.org/) is a 501(c)(3) non-profit organization devoted to bringing the insights of scholarship to bear on the development of policies that advance U.S. national interests and seeks to add perspective to events by fitting them into the larger historical and cultural context of international politics.

Leave a Reply

Your email address will not be published. Required fields are marked *