On the Use of Offensive Cyber Capabilities - Belfer Center for ...
On the Use of Offensive Cyber Capabilities - Belfer Center for ...
On the Use of Offensive Cyber Capabilities - Belfer Center for ...
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
careful decisions regarding: declassification, operational impacts <strong>of</strong> in<strong>for</strong>mationsharing, <strong>the</strong> avoidance <strong>of</strong> any sort <strong>of</strong> market distorting impact (such asestablishing favored organizations), and <strong>the</strong> adverse potential <strong>for</strong> <strong>for</strong>ming adependency in U.S. network operators who may perceive a governmentcertification as a guarantee <strong>of</strong> security.Beyond <strong>the</strong> potential privacy concerns <strong>the</strong>re are few domestic political orpublic concerns that seem likely to be raised by scanning.InternationalGiven <strong>the</strong> high level <strong>of</strong> scanning going on by criminal and o<strong>the</strong>r actors itseems unlikely that <strong>for</strong>eign governments would raise concern regardingscanning. It seems likely that such activity is already being conducted at a highvolume by state intelligence services, so it is hard to imagine substantialinternational consequences to scanning.S<strong>of</strong>t PowerThe principle s<strong>of</strong>t power consideration is similar to <strong>the</strong> domesticconsiderations concerning a perceived infringement on privacy, and a resultingloss <strong>of</strong> esteem <strong>for</strong> <strong>the</strong> United States. But again, <strong>the</strong> high amount <strong>of</strong> scanningactivity already being conducted, and without much notice, suggests that itwould both be easy to mask any government scanning and <strong>the</strong>re would not besevere concern if it became known. Indeed <strong>the</strong>re is already such a perception <strong>of</strong>powerful U.S. surveillance capabilities in much <strong>of</strong> <strong>the</strong> world; it is hard to see asubstantial shift caused by external scanning ef<strong>for</strong>ts.SystemicMore scanning <strong>for</strong> security vulnerabilities is likely to have a positivesystemic effect on <strong>the</strong> internet, making it more secure in general. As more47