Risk
8/23/2012
11:22 AM
Connect Directly
RSS
E-Mail
50%
50%

The Case For A Cyber Arms Treaty

In the wake of Stuxnet, could an international 'cyber arms' agreement forestall U.S. cyber warfare with China and other countries?

11 Security Sights Seen Only At Black Hat
11 Security Sights Seen Only At Black Hat
(click image for larger view and for slideshow)
Malware attacks: can't live with them, can't live without them?

That's the curious situation now facing the U.S. government--and by extension, America--which on the one hand finds its networks being attacked more than ever before and, on the other hand, recently claimed credit for launching at a foreign nation some of the most advanced malware attacks in history.

Can this disconnect be resolved? To answer that question, it helps to understand the defensive side of the equation, as the Pentagon reports that it's having a harder time than ever blocking the increasing volume of attacks being launched at U.S. government networks. It's also been sounding the alarm over an increase in attacks against critical infrastructure systems controlled by the private sector.

Accordingly, elements of the Department of Defense (DOD) have been petitioning the Secretary of Defense to allow the military to not just defend its own systems and block malware, as it's currently authorized to do, but also defend critical systems running outside government-controlled networks, the Washington Post recently reported. Currently, the DOD isn't allowed to touch civilian networks in any way, although it does share threat intelligence with some defense contractors and service providers.

[ Are you paying attention to the right things? Read 6 Password Security Essentials For Developers. ]

Gen. Keith Alexander, who's both director of the NSA as well as Cyber Command--which protects DOD networks and oversees federal cyber warfare activities--argued at a recent conference that the government's cyber specialists "need standing rules of engagement and execute orders that allow the government to do defense that is reasonable and proportionate." In the event of a national-level attack, the DOD wants to be able to respond quickly, effectively, and legally.

The Pentagon also wants approval to use more aggressive defenses, such as sinkholing, which involves forcibly rerouting a botnet's command-and-control servers so that malicious code on infected PCs can't be used to launch attacks. Sinkholing is in widespread use by information security researchers, sometimes working in conjunction with technology vendors, including Microsoft.

But as the DOD seeks approval to get more defensive, the White House earlier this year revealed that the "Olympic Games" program begun by President George W. Bush, and continued at his urging by President Obama, launched Stuxnet, Flame, Duqu, Gauss, and no doubt other malware meant to disable parts foreign countries' critical infrastructure, or eavesdrop on people and information of interest.

That program was detailed by David E. Sanger in his recently published Confront and Conceal: Obama's Secret Wars and Surprising Use of American Power. In light of that program, "the United States lost a bit of the moral high ground when it comes to warning the world of the danger of cyberattacks," writes Sanger, in a bit of understatement. Furthermore, the generals sounding alarms over the rise of advanced persistent threats being launched en masse against Pentagon systems by China and other countries work for the same government that's been launching its own malware attacks against other countries.

Previous
1 of 2
Next
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Andrew Hornback
50%
50%
Andrew Hornback,
User Rank: Apprentice
8/28/2012 | 2:03:26 AM
re: The Case For A Cyber Arms Treaty
By developing the most advanced weapons in the world, one can develop the most advanced defenses in the world - I think that's a pretty fair statement.

All throughout history, there have been things going on that the average Joe or Jane on the street don't know about but should be thankful for - things that their country is doing to protect them, whether they approve or disapprove of it.

Kaspersky's a funny guy here - sure, go ahead, ban malware. Doesn't that put him out of business? And as other posters have mentioned, sure, you can have every country on the face of the planet sign a treaty saying that they won't develop or use malware - but that doesn't keep a 14 year old kid from sitting down and learning assembly, C, or any other language and building something that could obliterate a network. No, a treaty, while nice on paper... exists only on paper.

Having malware banned leads to a false sense of security - sure, let's ban it... and forget how to defend against it. Then when the next attack happens, it's magnitudes worse. And the next attack will happen, it's just a matter of when. You have to be ready for it... and a treaty is not going to do much to help prevent an attack or clean up after one.

Andrew Hornback
InformationWeek Contributor
MyW0r1d
50%
50%
MyW0r1d,
User Rank: Apprentice
8/27/2012 | 3:10:46 PM
re: The Case For A Cyber Arms Treaty
Article states, "Having been the first nation to use it purposefully against the weapons program of another state--to have 'crossed the Rubicon,' as General Michael Hayden, the former Bush intelligence chief, put it--will we eventually be judged to have hastened its spread?"

Has that ever stopped the US Govt or any nation of developing and using a system to its advantage either strategically or operationally? They used firearms against native americans and were the first to use/introduce nuclear weapons. An unknown or unproven weapon system serves little as a detterrent. Treaties are nice, but as others have stated, wholly reliable on the good faith of the parties. As with regulatory guidance and laws, sometimes the value gained may just be worth the penalty imposed for non adherence.
moarsauce123
50%
50%
moarsauce123,
User Rank: Apprentice
8/26/2012 | 1:20:36 PM
re: The Case For A Cyber Arms Treaty
Treaties are only worth something when the partners adhere to them. Just look at the reports about human rights violations and you will see that a treaty for cyber security between US and China is just a waster of paper and resources.
Leo Regulus
50%
50%
Leo Regulus,
User Rank: Apprentice
8/25/2012 | 5:45:18 PM
re: The Case For A Cyber Arms Treaty
GET THIS TO YOUR EDITOR:
You have made some client-unfriendly changes.
When we hit the 'Print' Icon, we expect to see the entire article as one page and relatively 'free' of garbage.
On this article, it was necessary to go to page 2 to get the whole article.
The result was also littered with garbage.
I will not insult your intelligence by specifically what I define as 'garbage'.
TreeInMyCube
50%
50%
TreeInMyCube,
User Rank: Apprentice
8/24/2012 | 6:11:30 PM
re: The Case For A Cyber Arms Treaty
A treaty is a nice idea, but ineffective, since there are too many non-nation-state actors. Building nuclear weapons requires fissile material, which is not sold in every Best Buy or Walmart. Building malware can be done on a laptop, and launched from an Internet cafe.
Perhaps the only effective defense for the US military is to build out private networks that are not visible to other parties, friends or foes.
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0103
Published: 2014-07-29
WebAccess in Zarafa before 7.1.10 and WebApp before 1.6 stores credentials in cleartext, which allows local Apache users to obtain sensitive information by reading the PHP session files.

CVE-2014-0475
Published: 2014-07-29
Multiple directory traversal vulnerabilities in GNU C Library (aka glibc or libc6) before 2.20 allow context-dependent attackers to bypass ForceCommand restrictions and possibly have other unspecified impact via a .. (dot dot) in a (1) LC_*, (2) LANG, or other locale environment variable.

CVE-2014-2226
Published: 2014-07-29
Ubiquiti UniFi Controller before 3.2.1 logs the administrative password hash in syslog messages, which allows man-in-the-middle attackers to obtains sensitive information via unspecified vectors.

CVE-2014-3541
Published: 2014-07-29
The Repositories component in Moodle through 2.3.11, 2.4.x before 2.4.11, 2.5.x before 2.5.7, 2.6.x before 2.6.4, and 2.7.x before 2.7.1 allows remote attackers to conduct PHP object injection attacks and execute arbitrary code via serialized data associated with an add-on.

CVE-2014-3542
Published: 2014-07-29
mod/lti/service.php in Moodle through 2.3.11, 2.4.x before 2.4.11, 2.5.x before 2.5.7, 2.6.x before 2.6.4, and 2.7.x before 2.7.1 allows remote attackers to read arbitrary files via an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) is...

Best of the Web
Dark Reading Radio