10.07.2015 Views

On the Use of Offensive Cyber Capabilities - Belfer Center for ...

On the Use of Offensive Cyber Capabilities - Belfer Center for ...

On the Use of Offensive Cyber Capabilities - Belfer Center for ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

careful decisions regarding: declassification, operational impacts <strong>of</strong> in<strong>for</strong>mationsharing, <strong>the</strong> avoidance <strong>of</strong> any sort <strong>of</strong> market distorting impact (such asestablishing favored organizations), and <strong>the</strong> adverse potential <strong>for</strong> <strong>for</strong>ming adependency in U.S. network operators who may perceive a governmentcertification as a guarantee <strong>of</strong> security.Beyond <strong>the</strong> potential privacy concerns <strong>the</strong>re are few domestic political orpublic concerns that seem likely to be raised by scanning.InternationalGiven <strong>the</strong> high level <strong>of</strong> scanning going on by criminal and o<strong>the</strong>r actors itseems unlikely that <strong>for</strong>eign governments would raise concern regardingscanning. It seems likely that such activity is already being conducted at a highvolume by state intelligence services, so it is hard to imagine substantialinternational consequences to scanning.S<strong>of</strong>t PowerThe principle s<strong>of</strong>t power consideration is similar to <strong>the</strong> domesticconsiderations concerning a perceived infringement on privacy, and a resultingloss <strong>of</strong> esteem <strong>for</strong> <strong>the</strong> United States. But again, <strong>the</strong> high amount <strong>of</strong> scanningactivity already being conducted, and without much notice, suggests that itwould both be easy to mask any government scanning and <strong>the</strong>re would not besevere concern if it became known. Indeed <strong>the</strong>re is already such a perception <strong>of</strong>powerful U.S. surveillance capabilities in much <strong>of</strong> <strong>the</strong> world; it is hard to see asubstantial shift caused by external scanning ef<strong>for</strong>ts.SystemicMore scanning <strong>for</strong> security vulnerabilities is likely to have a positivesystemic effect on <strong>the</strong> internet, making it more secure in general. As more47

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!