FROM COLD WAR to CYBERWAR? | #1 | August 2013
Total Page:16
File Type:pdf, Size:1020Kb
A product of Russia Beyond The Headlines EDITOR’s note RUSSIA DIRECT MONTHLY MEMO | #1 | AUGUST 2013 EkatErina Zabrovskaya Editor-in-Chief FROM COLD Russia Direct is pleased to launch the first edition of RD Monthly - a new product available only to subscribers of Russia Direct. Each month, these analytic reports, written by leading WAR TO thinkers and practitioners, will pro- vide background and context on the most important issues facing U.S. and Russian policy makers. The topic this month could not be more timely - the threats and op- portunities involving cybersecurity. CYBERWAR? Modern battlefields may already have shifted to keyboards and serv- ers, but is this any less destabilizing and costly than the weapons used in previous conflicts? This report, written by Pavel Sharik- ov, the head of the Applied Studies Center at the Russian Academy of Sciences’ Institute for U.S. and Cana- dian Studies, delves deeper into how different governments are facing this challenge. It also provides a great re- source on important books, articles and Twitter feeds you need to stay abreast of this emerging field. RD will feature a Q&A with the author soon, so please send any questions you want us to ask Pavel Sharikov via email, Twitter and Face- book and we will highlight as many of them as we can. Also, stay tuned for the September debut of RD Quarterly, an exclusive white paper series that will focus in even more in-depth on the key trends and topics resonating in the U.S.- Russia relationship. Next month’s topic will be on public diplomacy and how best to project soft power overseas. tassphoto.com www.russia-direct.org FROM COLD WAR TO CYBERWAR? | #1 | August 2013 FROM COLD WAR TO CYBERWAR? by Pavel Sharikov Head of the Center for Applied Research Institute for U.S. and Canadian Studies Russian Academy of Sciences EXECUTIVE SUMMARY The threat of a cyberwar between the world’s great powers has transformed from myth into reality. While the U.S. was originally the leader in understanding the unique threats posed by cyberattacks, other nations – including both Russia and China – are now deploying new mili- tary and political resources to create strategic cyberwar capabilities. Against a backdrop of rapid technological change, both the U.S. and Russia are developing different frameworks for understanding and responding to the threat in cyberspace. The potential for divergence in views on cyberspace has placed more importance than ever before on establishing new levels of bilateral cooperation between the U.S. and Russia, especially when it comes to responding to the threats posed by non-state actors. If the Cold War was defined by a drive for numerical superiority in nuclear strike capacity, a future cyberwar will be defined by innovation and the ability to create new, undetectable cyberweapons specifically targeted at a nation’s infra- structure grid and telecommunications network. Introduction If nuclear security provided a framework for under- whether national security concerns – such as the standing U.S.-Russia relations during the Cold War threat of a cross-border cyberattack launched by a era, then cybersecurity may end up providing a new terrorist group abroad – can supersede issues of pri- framework for understanding U.S.-Russia relations vacy and human rights for a nation’s citizens. in the digital era. Recognizing this fact, the leaders of For cybersecurity experts, there are a number of the U.S. and Russia are now actively working to form important questions to answer. Do nations have cybersecurity command centers. the right to use computer malware to unilaterally They are also creating comprehensive national cy- take out the nuclear weapons facilities of another bersecurity strategies that define the appropriate re- nation-state, as the U.S. is thought to have done sponses to emerging threats in cyberspace. In June, with Iran? Will the revelation of the USA’s broad the U.S. and Russia put into place a broad agreement surveillance program against its own citizens give on cybersecurity that could play an important role in Russia a broader hand to monitor cyberactivists bringing their competing views of cyberspace into within its own borders? At what point does Chinese greater alignment. surveillance of U.S. corporate and government en- In a multipolar world where rogue non-state actors tities trigger a cyberattack or other response from can launch unprovoked attacks on another nation’s the U.S.? infrastructure and telecommunications networks, What follows is a comprehensive survey of how the emerging field of cybersecurity raises a number the U.S., Russia, Europe and China are responding of important questions about international law. to this new cybersecurity reality. To understand the Within the U.S. there are already warnings of a digi- next steps forward in the global debate over cyber- tal “Pearl Harbor” that could take out the nation’s security, it is important to understand how each of infrastructure with little or no warning. As a result, these geopolitical players views their own respec- cybersecurity also raises the important question of tive place within cyberspace. 2 / 1 1 Russia DiRect monthly memo www.russia-direct.org FROM COLD WAR TO CYBERWAR? | #1 | August 2013 Cybersecurity and national sovereignty bersecurity issues. However, serious differences have emerged between countries in the specific approach THE MOST More than 30 years have passed since the creation to this problem. DANGEROUS of the modern Internet. During this time period, the One approach, adhered to by Russia, China, their al- CYBERWEAPONS threat to information security has evolved from prob- lies in the Shanghai Cooperation Organisation and OF 2013 lems of fraud and theft to strategic threats to national the Commonwealth of Independent States, as well as security posed by both state and non-state actors. some Latin American countries, would see the devel- RED OCTOBER The targets of this Many states today are establishing special units opment of common international legal norms that attack were various within their national armed forces that are respon- make it mandatory for all national governments to government bodies sible for the conduct of information operations and introduce them at the internal political level. In their and diplomatic are capable of using information technologies to opinion, because the information network is a com- organizations. strike civil infrastructure elements in other states. mon good, ensuring information security should be MINIDUKE The United States tops the list of countries that are analogous to the approach to environmental prob- Its victims included implementing such organizational and technological lems or regulations concerning outer space. government changes. Similar reforms are reportedly being con- entities in Ukraine, ducted in China, Russia and North Korea [1]. Serious differences have emerged Belgium, and Ireland. It is not by chance that the problems of information between countries regarding security have come to be viewed as related to threats a universal international legal APT1 to national sovereignty. stole terabytes of Recent history offers quite a few examples of cyber- framework data from at least attacks causing considerable damage to the economic 141 organizations potential of states. One of the most salient examples The other approach, reflected in the cyberpolicies around the world. was the infection of Iranian nuclear facilities with of the United States, the United Kingdom and their the Stuxnet virus, which threw Iran’s nuclear pro- NATO allies, rules out internal state regulation that TEAMSPY Its targets were gram back several years [2]. Pulitzer Prize-winning limits free development of information resources. The top-level politicians journalist David Sanger, author of the book Confront advocates of this approach are convinced that each and human rights and Conceal: Obama’s Secret Wars and Surprising Use of state has sovereignty over its information resources. advocates. American Power, claims that the Stuxnet virus was Accordingly, each state reserves the right to react to born as part of a secret US program aimed at develop- cyberthreats as it sees fit. STUXNET ing cyberweapons against hostile states. It is strategically important to resolve these differ- is believed to be targeted against Today, practically all countries and international or- ences considering the proliferation of cyberthreats, Iran’s nuclear ganizations have come out in favor of creating a uni- and cooperation between Russia and the United projects. versal international legal framework regulating cy- States is a precondition for achieving a compromise. Countries most likely to be affected by viruses downloaded from the Internet (data from the first quarter of 2013) 12-20% 20-28% 28-36% 36-46% 46-61% sourse: Kaspersky Lab, 2013 [1] DOD Report: North Korea Still Critical US Security Threat. Cheryl Pellerin. Washington. 2 May 2013. www.defense.gov/news/newsarticle.aspx?id=119924 [2] Mark Clayton, Stuxnet malware is ‘weapon’ out to destroy ... Iran’s Bushehr nuclear plant? Christian Science Monitor. 21 September 2010. www.csmonitor.com/USA/2010/0921/Stuxnet-malware-is-weapon-out-to-destroy-Iran-s-Bushehr-nuclear-plant 3 / 1 1 Russia DiRect monthly memo www.russia-direct.org FROM COLD WAR TO CYBERWAR? | #1 | August 2013 The US becomes the world’s leader in developing offensive cyberweapons The ‘special status’ of the United States in cyberspace stems from several factors. The Internet was invented in the United States and, accordingly, American soci- ety received access to the benefits of cyberspace ear- lier than other countries. The United States was also the first to face the threats coming from cyberspace. Today, the Obama Administration attaches special significance to information technology policy, put- ting its stake on information technology resources in maintaining the competitiveness of the national economy. A significant amount of work accomplished by a special commission for the study of America’s cyber- security policy has produced two documents regulat- ing the development of cyberspace: the International Strategy For Cyberspace [3] and the Department of Defense Strategy for Operating in Cyberspace [4].