27.12.2012 Views

Challenges in Cybersecurity Risks, Strategies, and ... - Unidir

Challenges in Cybersecurity Risks, Strategies, and ... - Unidir

Challenges in Cybersecurity Risks, Strategies, and ... - Unidir

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

As we see it, regional organizations <strong>and</strong> forums concerned with security issues are go<strong>in</strong>g to play<br />

an <strong>in</strong>creas<strong>in</strong>gly important role here. Experience with transparency-build<strong>in</strong>g <strong>and</strong> confidencebuild<strong>in</strong>g<br />

mechanisms <strong>in</strong> the area of conventional arms control is a good basis for attempts to<br />

develop similar measures for cyberspace. Germany has consistently supported the efforts of the<br />

OSCE to achieve tangible results <strong>in</strong> the area of confidence-build<strong>in</strong>g measures.<br />

To this end we have put forward concrete proposals on, for example:<br />

- early warn<strong>in</strong>g;<br />

- transparency through <strong>in</strong>formation-shar<strong>in</strong>g on cybersecurity policy <strong>and</strong> strategy;<br />

- establish<strong>in</strong>g national focal po<strong>in</strong>ts;<br />

- sett<strong>in</strong>g up dedicated communication channels for use <strong>in</strong> the event of a crisis;<br />

- develop<strong>in</strong>g technical recommendations, <strong>and</strong> assistance with capacity-build<strong>in</strong>g.<br />

We should not allow ourselves to be discouraged by the failure last week of the OSCE<br />

M<strong>in</strong>isterial Council to take any decision <strong>in</strong> this regard. It underl<strong>in</strong>ed once aga<strong>in</strong> how difficult it<br />

is for countries with different st<strong>and</strong>po<strong>in</strong>ts to agree on a common approach.<br />

We commend what the OSCE is do<strong>in</strong>g <strong>in</strong> this field <strong>and</strong> hope successful confidence-build<strong>in</strong>g<br />

under the auspices of regional organizations can be a model for similar endeavours at UN level.<br />

Digitization has not only had a profound impact on the way military operations are conducted,<br />

how weapons are used <strong>and</strong> what military personnel actually experience on the ground. It also<br />

means that data networks used by the military are far more vulnerable now than they ever were<br />

<strong>in</strong> the past. In many of today’s armed forces what began as efforts to protect their data networks<br />

from cyber attacks has now exp<strong>and</strong>ed <strong>in</strong>to actual cyber comm<strong>and</strong>s with a remit to safeguard<br />

their country’s capacity to conduct the full spectrum of military operations.<br />

Nevertheless, I do not share the hysteria about a loom<strong>in</strong>g cyberwar fuelled by those such as<br />

journalists or security firms with a vested <strong>in</strong>terest <strong>in</strong> boost<strong>in</strong>g sales. In the foreseeable future we<br />

are unlikely to see anyth<strong>in</strong>g of that k<strong>in</strong>d.<br />

However, we do need to confront the threats aris<strong>in</strong>g from the military use of cyberspace. That<br />

such use is, <strong>in</strong> the case of a number of countries, now an <strong>in</strong>tegral part of their national defence<br />

strategies re<strong>in</strong>forces the impression elsewhere that offensive capabilities are be<strong>in</strong>g developed <strong>in</strong><br />

this area, from which other countries must protect themselves. This may set off a dangerous<br />

spiral, which along with martial rhetoric could fuel serious tensions <strong>and</strong> ultimately even lead to<br />

an outbreak of cyber hostilities.<br />

The difficulty of identify<strong>in</strong>g the source of any cyber attack obviously makes such scenarios<br />

even more dangerous. When there is no reliable way to identify the attacker or gauge the<br />

motives beh<strong>in</strong>d the attack, speculation, conjecture <strong>and</strong> suspicion have free re<strong>in</strong>. By means of<br />

subterfuge <strong>and</strong> deception, a really high-tech cyber attack can make an attack appear to come<br />

from a country that has noth<strong>in</strong>g at all to do with it – which may then f<strong>in</strong>d itself the target of a<br />

reprisal attack.<br />

Under such circumstances the doctr<strong>in</strong>e of deterrence, which <strong>in</strong> the nuclear context has<br />

functioned well to date, is simply obsolete. We need to realize that here we have to do with a<br />

completely new type of asymmetry. Whether brilliant hackers, cyber mercenaries act<strong>in</strong>g at<br />

others’ behest or countries with weak data network <strong>in</strong>frastructure: all of them are capable of<br />

launch<strong>in</strong>g successful cyber attacks, without fear of reprisals, on countries with advanced data<br />

networks.<br />

In the light of such risks as well as the danger of escalation I have outl<strong>in</strong>ed, there are three<br />

priorities the <strong>in</strong>ternational community should focus on above all else.<br />

- Firstly, we need to tone down the rhetoric.<br />

- Secondly, we need transparency with regard to national defence strategies <strong>in</strong> the area of<br />

cyberspace.<br />

- Thirdly, we need an <strong>in</strong>ternationally recognized rule book which lays down when <strong>and</strong> how<br />

the target country of a cyber attack may respond.<br />

26

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!