Challenges in Cybersecurity Risks, Strategies, and ... - Unidir
Challenges in Cybersecurity Risks, Strategies, and ... - Unidir
Challenges in Cybersecurity Risks, Strategies, and ... - Unidir
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
As we see it, regional organizations <strong>and</strong> forums concerned with security issues are go<strong>in</strong>g to play<br />
an <strong>in</strong>creas<strong>in</strong>gly important role here. Experience with transparency-build<strong>in</strong>g <strong>and</strong> confidencebuild<strong>in</strong>g<br />
mechanisms <strong>in</strong> the area of conventional arms control is a good basis for attempts to<br />
develop similar measures for cyberspace. Germany has consistently supported the efforts of the<br />
OSCE to achieve tangible results <strong>in</strong> the area of confidence-build<strong>in</strong>g measures.<br />
To this end we have put forward concrete proposals on, for example:<br />
- early warn<strong>in</strong>g;<br />
- transparency through <strong>in</strong>formation-shar<strong>in</strong>g on cybersecurity policy <strong>and</strong> strategy;<br />
- establish<strong>in</strong>g national focal po<strong>in</strong>ts;<br />
- sett<strong>in</strong>g up dedicated communication channels for use <strong>in</strong> the event of a crisis;<br />
- develop<strong>in</strong>g technical recommendations, <strong>and</strong> assistance with capacity-build<strong>in</strong>g.<br />
We should not allow ourselves to be discouraged by the failure last week of the OSCE<br />
M<strong>in</strong>isterial Council to take any decision <strong>in</strong> this regard. It underl<strong>in</strong>ed once aga<strong>in</strong> how difficult it<br />
is for countries with different st<strong>and</strong>po<strong>in</strong>ts to agree on a common approach.<br />
We commend what the OSCE is do<strong>in</strong>g <strong>in</strong> this field <strong>and</strong> hope successful confidence-build<strong>in</strong>g<br />
under the auspices of regional organizations can be a model for similar endeavours at UN level.<br />
Digitization has not only had a profound impact on the way military operations are conducted,<br />
how weapons are used <strong>and</strong> what military personnel actually experience on the ground. It also<br />
means that data networks used by the military are far more vulnerable now than they ever were<br />
<strong>in</strong> the past. In many of today’s armed forces what began as efforts to protect their data networks<br />
from cyber attacks has now exp<strong>and</strong>ed <strong>in</strong>to actual cyber comm<strong>and</strong>s with a remit to safeguard<br />
their country’s capacity to conduct the full spectrum of military operations.<br />
Nevertheless, I do not share the hysteria about a loom<strong>in</strong>g cyberwar fuelled by those such as<br />
journalists or security firms with a vested <strong>in</strong>terest <strong>in</strong> boost<strong>in</strong>g sales. In the foreseeable future we<br />
are unlikely to see anyth<strong>in</strong>g of that k<strong>in</strong>d.<br />
However, we do need to confront the threats aris<strong>in</strong>g from the military use of cyberspace. That<br />
such use is, <strong>in</strong> the case of a number of countries, now an <strong>in</strong>tegral part of their national defence<br />
strategies re<strong>in</strong>forces the impression elsewhere that offensive capabilities are be<strong>in</strong>g developed <strong>in</strong><br />
this area, from which other countries must protect themselves. This may set off a dangerous<br />
spiral, which along with martial rhetoric could fuel serious tensions <strong>and</strong> ultimately even lead to<br />
an outbreak of cyber hostilities.<br />
The difficulty of identify<strong>in</strong>g the source of any cyber attack obviously makes such scenarios<br />
even more dangerous. When there is no reliable way to identify the attacker or gauge the<br />
motives beh<strong>in</strong>d the attack, speculation, conjecture <strong>and</strong> suspicion have free re<strong>in</strong>. By means of<br />
subterfuge <strong>and</strong> deception, a really high-tech cyber attack can make an attack appear to come<br />
from a country that has noth<strong>in</strong>g at all to do with it – which may then f<strong>in</strong>d itself the target of a<br />
reprisal attack.<br />
Under such circumstances the doctr<strong>in</strong>e of deterrence, which <strong>in</strong> the nuclear context has<br />
functioned well to date, is simply obsolete. We need to realize that here we have to do with a<br />
completely new type of asymmetry. Whether brilliant hackers, cyber mercenaries act<strong>in</strong>g at<br />
others’ behest or countries with weak data network <strong>in</strong>frastructure: all of them are capable of<br />
launch<strong>in</strong>g successful cyber attacks, without fear of reprisals, on countries with advanced data<br />
networks.<br />
In the light of such risks as well as the danger of escalation I have outl<strong>in</strong>ed, there are three<br />
priorities the <strong>in</strong>ternational community should focus on above all else.<br />
- Firstly, we need to tone down the rhetoric.<br />
- Secondly, we need transparency with regard to national defence strategies <strong>in</strong> the area of<br />
cyberspace.<br />
- Thirdly, we need an <strong>in</strong>ternationally recognized rule book which lays down when <strong>and</strong> how<br />
the target country of a cyber attack may respond.<br />
26