Response to Jon Lindsay. Joel Brenner 1



Similar documents
Statement for the Record. Richard Bejtlich. Chief Security Strategist. FireEye, Inc. Before the. U.S. House of Representatives

Cyber-Crime, Cyber-Espionage, Cyber-War, & Cyber-Threats: An Exploration of Illegal Conduct & Warfare in the Cyber-World

Research Note Engaging in Cyber Warfare

Cyber security Building confidence in your digital future

Middle Class Economics: Cybersecurity Updated August 7, 2015

Answering your cybersecurity questions The need for continued action

Cyber Security for the Private Sector: What Companies and Their Lawyers Need to Know

Cyber Security and Science

Cyber Security Summit China and Cyber Warfare Desmond Ball 25 July 2011

Comparison of Information Sharing, Monitoring and Countermeasures Provisions in the Cybersecurity Bills

Exercising Your Enterprise Cyber Response Crisis Management Capabilities

Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA)

STATEMENT OF MR. THOMAS ATKIN ACTING ASSISTANT SECRETARY OF DEFENSE FOR HOMELAND DEFENSE AND GLOBAL SECURITY OFFICE OF THE SECRETARY OF DEFENSE;

Cyber Risks Connect With Directors and Officers

cyber Threat Intelligence - A Model for the 21st Century

Identifying Cyber Risks and How they Impact Your Business

Cybersecurity: What Does a Breach Mean to

Anatomy of a Hotel Breach

How GCs And Boards Can Brace For The Cybersecurity Storm - Law360

WRITTEN TESTIMONY OF

CSIS/DOJ Active Cyber Defense Experts Roundtable March 10, 2015

DETECT. LEARN. ADAPT. DEFEND. WIN EVERY ATTACK.

The main object of my research is :

James R. Clapper. Director of National Intelligence

Ten Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder

MISSION-ESSENTIAL INTELLIGENCE AND CYBER SOLUTIONS

Sponsored by. A REPORT BY HARVARD BUSINESS REVIEW ANALYTIC SERVICES Aggressive and Persistent: Using Frameworks to Defend Against Cyber Attacks

Defining the Gap: The Cybersecurity Governance Study

A Detailed Strategy for Managing Corporation Cyber War Security

Cyber-Security Risk- IP Theft and Data Breaches Protecting your Crown Jewels Internally and with Your Key Third Parties

The Landscape of Cyber, critical infrastructure and how Regulation fits in

Cybersecurity & International Relations. Assist. Prof. D. ARIKAN AÇAR, Ph.D. Department of International Relations, Yaşar University, Turkey.

IT SECURITY RISKS SURVEY 2014: A BUSINESS APPROACH TO MANAGING DATA SECURITY THREATS

Security Architecture: From Start to Sustainment. Tim Owen, Chief Engineer SMS DGI Cyber Security Conference June 2013

Collateral Effects of Cyberwar

Corporate Perspectives On Cybersecurity: A Survey Of Execs

AN INSIGHT TO CYBER WORLD WITH PROF. MICHAEL E.SMITH

A conversation with Allan Friedman about cybersecurity issues

January IIA / ISACA Joint Meeting Pre-meeting. Cybersecurity Update for Internal Auditors. Matt Wilson, PwC Risk Assurance Director

United States Cyber Security in the 21st Century

Assessing the strength of your security operating model

working group on foreign policy and grand strategy

Cybersecurity: Considerations for Internal Audit. IIA Atlanta Chapter Meeting January 9, 2015

Evolution of Cyber Security and Cyber Threats with focus on Cloud Computing

THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS

The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco.

PRIORITIZING CYBERSECURITY

THE CYBER SECURITY PLAYBOOK WHAT EVERY BOARD OF DIRECTORS SHOULD KNOW BEFORE, DURING, AND AFTER AN ATTACK SECURITY REIMAGINED

The data breach lifecycle: From prevention to response IAPP global privacy summit March 6, 2014 (4:30-5:30) Draft v

PROJECT BOEING SGS. Interim Technology Performance Report 1. Company Name: The Boeing Company. Contract ID: DE-OE

UN Emergency Summit on Cyber Security Topic Abstract

AT A HEARING ENTITLED THREATS TO THE HOMELAND

Cyber Security Related Excerpts from the Global Risk Forum Berlin September 25-26, 2013 Draft 10/24/13

Big Data Analytics in Network Security: Computational Automation of Security Professionals

Cyberterror. Cyberspace computer-mediated communication systems has become a battleground between states and terrorists, and among nation states.

Sharing Cybersecurity Threat Info With the Government -- Should You Be Afraid To Do So?

Big 4 Information Security Forum

Cybersecurity and United States Policy Issues

Cybersecurity and Hospitals. What Hospital Trustees Need to Know About Managing Cybersecurity Risk and Response

FBI AND CYBER SECURITY

Confrontation or Collaboration?

IAPP Global Privacy Summit 2014 The SEC and Cybersecurity: What Every Publicly Traded Company Must Know

2 Gabi Siboni, 1 Senior Research Fellow and Director,

Cybersecurity: A View from the Boardroom

Statement for the Record. Richard Bejtlich. Chief Security Strategist. FireEye, Inc. Before the. U.S. House of Representatives

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

DON T BE A VICTIM! IS YOUR INVESTMENT PROGRAM PROTECTED FROM CYBERSECURITY THREATS?

FBI CHALLENGES IN A CYBER-BASED WORLD

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015

By Daniel E. Frank and Don Borelli

Federal Bureau of Investigation

WHITE PAPER. Attack the Attacker HOW A MANAGED SECURITY SERVICE IMPROVES EFFICIENCY AND SAVES COST

GAO. INFORMATION SECURITY Persistent Weaknesses Highlight Need for Further Improvement

UTCS CyberSecurity. Educating Cyber Professionals. Dr. Bill Young Department of Computer Sciences University of Texas at Austin. Spring Semester, 2015

Cybersecurity Kill Chain. William F. Crowe, CISA, CISM, CRISC, CRMA September 2015 ISACA Jacksonville Chapter Meeting August 13, 2015

DEPARTMENT OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTON, D.C

CYBER SECURITY THREATS AND RESPONSES

THE HUMAN FACTOR AT THE CORE OF FEDERAL CYBERSECURITY

STATEMENT OF JOSEPH M. DEMAREST, JR. ASSISTANT DIRECTOR CYBER DIVISION FEDERAL BUREAU OF INVESTIGATION

S. ll IN THE SENATE OF THE UNITED STATES

Chairman Johnson, Ranking Member Carper, and Members of the committee:

Advanced & Persistent Threat Analysis - I

DEPARTMENT OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTON, D.C

EY Cyber Security Hacktics Center of Excellence

DISCLAIMER AND NOTICES

THE CURRENT GLOBAL THREATS TO CYBERSPACE SECURITY

The virtual battle. by Mark Smith. Special to INSCOM 4 INSCOM JOURNAL

Cyber Security. CYBER SECURITY presents a major challenge for businesses of all shapes and sizes. Leaders ignore it at their peril.

THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS

Statement for the Record. Martin Casado, Senior Vice President. Networking and Security Business Unit. VMware, Inc. Before the

How Boards of Directors Really Feel About Cyber Security Reports. Based on an Osterman Research survey

NATIONAL DEFENSE AND SECURITY ECONOMICS

Agenda. Introduction to SCADA. Importance of SCADA security. Recommended steps

Statement for the Record. Richard Bejtlich. Chief Security Strategist. FireEye, Inc. Before the

Increased Regulatory Focus on Cybersecurity Underscores Need for Public Companies to Review Cybersecurity-Related Disclosures

A Community Position paper on. Law of CyberWar. Paul Shaw. 12 October Author note

Preface to the Fourth Edition

Presidential Summit Reveals Cybersecurity Concerns, Trends

U.S. NAVAL WAR COLLEGE PROCEEDINGS. Can Business, Academia and Government Be Partners in National Security?

Transcription:

This response will appear in slightly modified form in the forthcoming issue of International Security, and is published here with their permission. Response to Jon Lindsay Joel Brenner 1 Jon R. Lindsay ( The Impact of China on Cybersecurity: Fact and Friction, International Security, Vol. 39, no. 3 [Winter 2014/15], pp. 7-47) asserts that the threat of Chinese cyber operations, while relentlessly irritating, is greatly exaggerated; that China has more to fear from U.S. cyber operations than the other way round; and that U.S.-China relations are reasonably stable. He worries that [o]verlap across political, intelligence, military, and institutional threat narratives can lead to theoretical confusion. By focusing almost exclusively on military-to-military operations, however, where he persuasively argues that the U.S. retains a significant qualitative advantage, Lindsay mischaracterizes the state of affairs in civilian networks and draws broad conclusions that have doubtful application in circumstances short of a full-out armed conflict with China. At the same time he pays no attention to subthreshold conflicts that characterize, and are likely to continue to characterize, this symbiotic but strife-ridden relationship. The proposition that American infrastructure is safe from nation-state attack would astonish any group of corporate security officers. To support it, Lindsay cites a similar conclusion by Desmond Ball, who relies on the supposed sophistication of the anti-virus and network security programs available in advanced Western countries. The notion that Western-made anti-virus and 2 network security programs are effective against sophisticated attacks is nonsense. Anti-virus programs are flimsy filters designed to catch only some of what their designers know about. They miss a great deal. New malware enters 1 Joel Brenner is a Robert Wilhelm Fellow at MIT s Center for International Studies and a lawyer and consultant specializing in information security. He is a former inspector general and senior counsel of the National Security Agency and a former National Counterintelligence Executive in the Office of the Director of National Intelligence. 2 Lindsay, Impact of China, p. 35, n. 94, quoting Desmond Ball, China s Cyber Warfare Capabilities, Security Affairs, Vol. 17, No. 2 (Winter 2011), p. 101.

2 the market at the rate of about 160,000 per day. Filters, whether employed by the 3 military or not, cannot keep up. Network security programs vary in quality, are insufficiently staffed, and are often not implemented at all across the economy. The Pentagon is expending huge sums to build its own power grids, even as its budget shrinks, precisely because the civilian grid cannot be relied upon in a crisis. On this subject Lindsay says only that Chinese ability to attack our grid cannot be discounted. In contrast, Admiral Mike Rodgers, director of the National Security Agency and commander, U.S. Cyber Command, recently testified that China and one or two other countries could shut down the power grid and other critical systems in the United States. 4 The joint operations, military-on-military perspective from which Lindsay writes is important. But it is too narrow a perspective from which to draw broad conclusions about The Impact of China on Cybersecurity. It also fails to address the relationship between non-military vulnerabilities and the exercise of national power. For example, when Russian intruders penetrated Chase Bank last year during tensions over Ukraine, no one could tell President Obama whether Putin was sending him a an implied threat. Taking down a major bank 5 would have enormous economic repercussions, and the bank s vulnerability was there for all to see. When evaluating his options, could the President ignore the possibility that exercising one of them carried the palpable risk that a major U.S. bank could be taken down? Whatever the source and intention of the intrusion in that case, the incident demonstrated the way in which a critical vulnerability in the civilian economy could constrain the exercise of national power, including military power, in a crisis. 3 Luis Corrons, Malware still generated at a rate of 160,000 new samples a day in Q2 2014, Panda News, August 29, 2014, at http://www.pandasecurity.com/mediacenter/press-releases/malware-still-generatedrate-160000-new-samples-day-q2-2014/. 4 Ken Dilanian, NSA Director: Yes, China Can Shut Down Our Power Grids, AP, November 20, 2014, at http://www.businessinsider.com/nsa- director- yes- china- can- shut- down- our- power- grids- 2014-11. 5 See Joel Brenner, Nations Everywhere, supra, note 1.

3 Lindsay speculates skeptically about the increase in the reporting of commercial network exploitation since 2010 and wonders whether it may be spurred by self-interested disclosures by network defense firms seeking to scare up demand for their services. He does not mention that the Securities and Exchange Commission issued guidance in 2011 stating that public companies should review, on an ongoing basis, the adequacy of their disclosure relating to cybersecurity risks and cyber incidents. Rather than being over-reported, as he 6 suggests, and in spite of SEC guidance, virtually every private-sector lawyer and consultant I know in this field believes that publicly disclosed information understates the severity and frequency of attacks on corporate networks. The reasons are well known: Companies resist disclosure for fear of harm to their brands and stock prices and to avoid shareholder derivative class action lawsuits and regulatory action by the Federal Trade Commission. Lindsay is on better footing when he denies that a network penetration, even when it results in the theft of intellectual property (IP), necessarily results in lost profit or market share. The absorption and application of stolen intellectual property (IP) are complicated; they require know-how as well as a recipe. This is one reason why IP theft and reverse engineering do not necessarily produce market share for the thief and the copy-cat. Thus China still cannot produce a jet engine even though it has plenty of American and Russian engines to study, because it cannot master the fabrication process. But these are not contested propositions. Insurance carriers certainly understand them which is largely why IP cannot be insured against theft. It is a non sequitur, however, to conclude from this, as Lindsay implies, that IP theft is not a significant issue for many of its victims. China has no difficulty using stolen IP about, say, oil and gas exploration data and materials testing research. Both are prime targets. Chinese intruders have also stolen negotiation strategies to good effect, as more than a few companies could testify (but won t). And in the case of solar-power technology, Chinese IP thieves had no trouble absorbing stolen secrets and 6 U.S. Securities and Exchange Commission, Corporate Finance Division, CF Disclosure Guidance: Topic No. 2: Cybersecurity, October 13, 2011, at http://www.sec.gov/divisions/corpfin/guidance/cfguidance-topic2.htm.

4 penetrating western markets. Some descriptions of the economic losses have 7 been hyperbolic, no doubt; and the losses have eluded persuasive quantification. But the problem is real and substantial. The overall state of our networks and of private-sector capabilities simply looks drastically different from the picture Lindsay paints of our military. Take attribution. Public reports that NSA can often not always do very good attribution does not mean that private companies can do it. Attribution has three levels: (1) identifying the device from which an intrusion was both launched and commanded; (2) identifying the actor at the keyboard; and (3) identifying the actor s affiliation. Even NSA can t always get to the second and third levels, as the Chase Bank incident demonstrated. The most basic difference between the military-to-military situation and the corporate reality, however, is that militaries and intelligence agencies fight back. In contrast, companies are exposed to attack without the legal right to retaliate (for mostly good reasons) even when they have, or could buy, the ability to do so. In this environment, offense is unquestionably dominant. According to Lindsay, since 2010, Western cybersecurity defenses, technical expertise, and government assistance to firms have improved. In fact, very few companies receive government help with intrusions. If he means that private sector defenses have gotten better when measured against themselves, that s right but irrelevant. Attacks have also increased in sophistication, and when measured against the offense, defenses have not improved. All our defenses are version of Whac-a-Mole, and there are too many moles to whack them all. 8 All this leaves us with a lumpy landscape, not subject to cheerful generalizations about China s impact on U.S. cybersecurity, or vice versa. In this landscape, Lindsay and I agree that the current and foreseeable state of technology enables numerous instances of friction to emerge below the threshold of violence. This is what I have called the gray space between war 7 See United States v. Dong, Crim. No. 14-118 (W.D. Pa., filed May 1, 2014), at http://www.justice.gov/iso/opa/resources/5122014519132358461949.pdf. 8 For a brief statement of the defense conundrum, see Joel Brenner, How Obama Fell Short on Cyber Security, Politico, January 21, 2015, at http://www.politico.com/magazine/story/2015/01/state-of-the-union-cybersecurityobama-114411.html?ml=m_u1_1#.vpi6c0lky9d.

5 and peace. If this environment is showing signs of strategic stability, it is partly, as he argues, because mutual vulnerability is creating mutual restraint. But the vulnerabilities remain, and they could be exploited by China (or Russia) in a crisis and by a growing number of second-tier cyber players that are not so constrained.