Forum on the Arms Trade
  • Home
  • Experts
    • View all - by location
    • A to B >
      • Rasha Abdul Rahim
      • Jeff Abramson
      • Ray Acheson
      • Adotei Akwei
      • Peter Asaro
      • David Atwood
      • Deepayan Basu Ray
      • Brittany Benowitz
      • Seth Binder
      • Cole Bockenfeld
      • Subindra Bogati
      • Laura Boillot
      • Matthew Bolton
      • Mark Bromley
      • Martin Butcher
    • C to G >
      • Amelie Chayer
      • Maria Pia Devoto
      • Shannon Dick
      • Bonnie Docherty
      • Nils Duquet
      • Andrew Feinstein
      • Aude Fleurant
      • Denise Garcia
      • Dan Gettinger
      • Natalie Goldring
      • Colby Goodman
      • Kate Gould
      • Hector Guerra
    • H to L >
      • William Hartung
      • Lisa Haugaard
      • Erin Hunt
      • Adam Isacson
      • Roy Isbister
      • Cesar Jaramillo
      • N.R. Jenzen-Jones
      • Kate Kizer
      • Edward J. Laurance
      • John Lindsay-Poland
    • M to R >
      • Daniel Mack
      • Daniel Mahanty
      • Nicholas Marsh
      • Stephen Miles
      • Elizabeth Minor
      • Robert Muggah
      • Folade Mutota
      • Yeshua Moser-Puangsuwan
      • Jasmin Nario-Galace
      • Amy Nelson
      • Iain Overton
      • Scott Paul
      • Robert Perkins
      • Samuel Perlo-Freeman
      • Cédric Poitevin
      • Allison Pytlak
      • Todd Ruffner
      • Josh Ruebner
    • S to Z >
      • Alejandro Sanchez
      • Theo Sitther
      • Frank Slijper
      • Anna Stavrianakis
      • Rachel Stohl
      • Francesco Vignarca
      • Mary Wareham
      • Leah Wawro
      • Patrick Wilcken
      • Anne-Charlotte Merrell Wetterwik
      • Wim Zwijnenburg
  • Emerging Experts
    • View all
    • Christina Arabia
    • Jefferson (Jeff) Brehm
    • Caroline Dorminey
    • Marta Kosmyna
    • Danielle Preskitt
    • Stephen Semler
    • Nate Smith
    • Maggie Tennis
  • Major Arms Sales Notifications Tracker
  • Events
  • Journalists
    • Journalists by Name
    • Journalists by Topic
    • "Exemplary Reporting" Winners
    • Media Spotlights
  • Resource Page - Arms Transfer Initiative
  • Resource Page - USML Cat I-III to Commerce
  • Resource Page - Trump & Saudi Arms Sales
  • Arms Trade News(letter)
  • Get on the list
  • Support
  • About
  • Archives
    • Issues >
      • View all
      • US Policy and Practice >
        • Arms sales
        • Security assistance
        • Export control
        • Defense industry
      • International Instruments >
        • Arms Trade Treaty
        • CCW
        • Other instruments
      • Weapons >
        • small arms/light weapons
        • drones
        • landmines/cluster munitions
        • killer robots
        • cyber
        • explosive weapons
        • F-35
      • International Trade >
        • Global trade data/trends
        • Strategic trade control
        • Africa
        • Latin America
        • Middle East
        • Europe
        • Asia
      • After the Trade >
        • Harm to civilians
        • Gender
        • Child soldiers
        • Arms trafficking
        • Corruption
        • Environment
    • Resource Page - Yemen War Powers Resolution
    • Resource Page - (House) Yemen War Powers Resolution
    • Resource Page - US F-16s to Bahrain
    • Resource Page - US-Nigeria Arms Sales
    • Resource Page - Senate Vote on PGM Sale
    • Looking Ahead Blog
    • Looking Ahead 2018 Blog
    • Looking Ahead 2017 Blog
    • First 100 Days Blog
    • US Presidential Race - Candidate Positions >
      • Overview
      • Arms Trade Treaty
      • Mine Ban Treaty
      • Security Assistance Middle East
      • Security Assistance Latin America
      • Drones
    • Experts Publications

Cyber Insecurity Under Trump

4/29/2017

1 Comment

 
This is the seventh entry in a series examining actions during the first 100 days of the new Trump administration and their possible implications on the arms trade, security assistance and weapons use in the future.
Pytlak
Allison Pytlak
Russia’s interference in the 2016 U.S. election was one of the biggest stories in recent history. "Cyberwar"’ and "cyber security" dominated headlines at the outset of Donald Trump’s presidency, even before his inauguration. Yet despite the unprecedented media chatter and controversy, the President’s response to cyber issues has been underwhelming. Key deadlines on publicly articulated deliverables have been missed entirely and other initiatives are lagging.  While there are inklings of plans to strengthen America’s online infrastructure and systems, including through partnership with the private sector, technology moves notoriously faster than politics. If President Trump doesn’t act soon, it will continue to be dangerously vulnerable.  

Much of the story about Trump’s first 100 days in the cyber context is rooted in the
scandal over whether or not the Russian government played a role in determining the outcome of the U.S. elections, through various hacking and doxing schemes, and by extension, if the then-presidential candidate had a role in any of it.  To refresh our memories, this first began in June 2016 when the Democratic National Committee reported an intrusion into its computer network and the cyber security firm CrowdStrike publicly blamed Russian hackers, following their investigation. As stolen emails from the committee began to appear on public sites, there were other voices – from the government and the intelligence community – reinforcing the view that the attacks originated from the Russian government.

In December the already suspected motive for these actions gained credence when the Washington Post
disclosed a secret CIA assessment that declared it “quite clear” that a Trump presidency was the ultimate goal of the hacks. In January, the CIA, FBI and NSA – referring to themselves collectively as the “intelligence community” – publicly concluded that Russia had used cyber methods in pursuit of “undermining public faith in the U.S. democratic process, denigrate Secretary [Hillary] Clinton, and harm her electability and potential presidency”.

While attribution in cyber space is
complex and difficult, it is not impossible. Good forensics can uncover digital fingerprints. Ascribing such a clear and conclusive motivation to a cyber operation is more unusual, often because the evidence is circumstantial at best. Not surprisingly, the intelligence report prompted a maelstrom of finger pointing, accusations and reactions from President Obama before leaving office.

The response from then President-elect Trump was quite clear, in that he said he would appoint a team to
provide an anti-hacking plan within 90 days of taking office. This was reinforced by a tweet on January 13 and followed up by an event on cyber security in late January that featured former New York City mayor Rudy Giuliani, who now leads a group tasked with building private sector partnerships on cyber security. At the time Trump said, “We must protect federal networks and data. We operate these networks on behalf of the American people and they are very important.”

The 90-day mark for this plan has now come and gone with nothing in sight nor any updates on its status.  As we now hit the 100-day milestone, most in the community are wondering if this plan will ever emerge.

Also languishing is the Senate Intelligence Committee’s probe into the election interference, including whether there was any coordination between the Kremlin and Trump. The Committee announced it had agreed on the scope of its investigation more than three months ago, and claims it has done some initial work. But it is significantly hampered by lack of capacity, recently
promising to add more staffers after being criticized for lacking full-time dedicated staff, and those working on it part-time said to lack investigative experience.

On the international front, the State Department recently
argued that a proposed new treaty to govern cyberspace would be “misguided” and “misses the mark.” Microsoft has recently begun to call for such an agreement, referring to it as a “Digital Geneva Convention." There are various multilateral discussion fora in which states meet to discuss behavioral norms in cyberspace that the United States participates in; some wonder if this will change.

The one bright spot is a pending
executive order on cyber security that is expected any day. Leaked drafts indicate that it could mandate agency-by-agency reviews of security practices and requiring agency compliance with the National Institute for Standards and Technology cyber security framework. It might also make it a policy to modernize information technology or encourage the expansion of the cyber workforce. Overall, the emphasis would be on improvement and modernization; which could lay the groundwork for related legislation.

This would be positive. Research shows us that that the more developed and technologically sophisticated a country is, the more vulnerable it becomes to hacking and other malicious cyber operations because so much of how it functions involves digital networks. This vulnerability is true for both foreign and domestic cyber attacks. As Symantec
recently noted, the 2015 hack of the Office of Personnel Management continues to impact the federal government technologically and financially, while state and local governments, as well as universities, find themselves under constant attack and struggling to defend the safety of the vast amount of information they keep.

It’s also clear that this is not a problem that will go away anytime soon. To date, most cyber "conflict" actually entails
low-level antagonistic actions like hacking, distributed denial of service (DDoS) attacks or similar. But what is very much on the minds of many governments is how to protect their critical infrastructure, which could range from electrical grids to, in the case of the United States, nuclear or other weapons systems. 

At what point does software become a weapon, and how can the arms control community, in the United States and elsewhere, address this? Experts believe it’s unlikely that a nuclear weapon could be detonated through a cyber operation or attack, but is a possibility not to be dismissed. More likely is that nuclear weapons software and associated systems could be altered as they are being built, or electronic signals might somehow be sent to nuclear weapons. Hackers could also wreak havoc through manipulating information that these systems depend on. The methods and means by which something like this, or other malicious operations, would occur require more thought.

Allison Pytlak is a Program Manager in the disarmament program (Reaching Critical Will) of the Women’s International League for Peace and Freedom
1 Comment
http://www.australianwritings.biz/ link
10/23/2017 06:49:04 pm

Cybercrimes are spreading under such an enormous rate that almost all the major and minor organizations are getting affected by this crime. I was firstly unable to make any connection between cybersecurity and Trump but this blog helped me do so.

Reply



Leave a Reply.

    About

    The "Looking Ahead" series features comments concerning short- to medium-term trends related to the arms trade, security assistance, and weapons use. Typically about 500-1000 words, each comment is written by an expert listed on the Forum on the Arms Trade related to topics of each expert's choosing. 

    Inclusion on the Forum on the Arms Trade expert list does not indicate agreement with or endorsement of the opinions of others. Institutional affiliation is indicated for identification purposes only.

    Archives

    December 2017
    May 2017
    April 2017
    January 2017
    December 2016
    October 2016
    June 2016
    May 2016
    April 2016
    June 2015
    May 2015
    March 2015

    Pdf's

    March 11 (2015)

    Categories

    All
    Adam Isacson
    Africa
    Alejandro Sanchez
    Allison Pytlak
    Amy Nelson
    Arms Sales
    Arms Trade Treaty
    Arms Trafficking
    Aude Fleurant
    Colby Goodman
    Corruption
    Cyber
    Dan Gettinger
    Danielle Preskitt
    Drones
    Environment
    Erin Hunt
    Europe
    Explosive Weapons
    First 100 Days
    Frank Slijper
    Global Trade Trends
    Harm To Civilians
    Iain Overton
    Jeff Abramson
    John Lindsay Poland
    John Lindsay-Poland
    Kate Kizer
    Killer Robots
    Landmines/cluster Munitions
    Latin America
    Laura Boillot
    Looking Ahead 2017
    Looking Ahead 2018
    Martin Butcher
    Matthew Bolton
    Middle East
    Military Expenditures
    Natalie Goldring
    Nicholas Marsh
    Paul Holtom
    Rachel Stohl
    Robert Muggah
    Robert Watson
    Roy Isbister
    SALW
    Samuel Perlo-Freeman
    Security Assistance
    Shannon Dick
    Sustainable Development
    Tobias Bock
    Transparency
    UN Register
    William Hartung
    Wim Zwijnenburg

    RSS Feed

Proudly powered by Weebly
✕