{"id":65275,"date":"2021-06-24T11:19:48","date_gmt":"2021-06-24T01:19:48","guid":{"rendered":"https:\/\/www.aspistrategist.ru\/?p=65275"},"modified":"2021-06-24T11:19:48","modified_gmt":"2021-06-24T01:19:48","slug":"taming-the-cyber-wild-west","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/taming-the-cyber-wild-west\/","title":{"rendered":"Taming the cyber wild west"},"content":{"rendered":"
<\/figure>\n

During the Cold War, summit meetings between the United States and the Soviet Union were often dominated by agreements to set limits on nuclear weapons and the systems built to deliver them. The US and Russia still discuss these topics, but at their recent meeting in Geneva, US President Joe Biden and Russian President Vladimir Putin focused in no small part on how to regulate behaviour in a different realm: cyberspace. The stakes are every bit as high.<\/p>\n

It\u2019s not hard to see why. Cyberspace and the internet are central to the workings of modern economies, societies, political systems, militaries and just about everything else, which makes digital infrastructure a tempting target for those seeking to cause extraordinary disruption and damage at minimal cost.<\/p>\n

Moreover, states and non-state actors can carry out cyberattacks with a high degree of deniability, which adds to the temptation to develop and use these capabilities. We know when and from where a missile is launched, but it can take a long time to discover that a cyberattack has occurred and figuring out who\u2019s responsible can take even longer. Such a slow and uncertain attribution process can render the threat of retaliation, which is at the heart of deterrence, beyond reach.<\/p>\n

What put this issue squarely on the agenda of the Biden\u2013Putin meeting is that Russia has grown increasingly aggressive in cyberspace, whether by creating false accounts on social media to influence American politics or by gaining access to critical infrastructure, such as power plants. Reinforcing the issue\u2019s salience is the reality that Russia is not alone: China reportedly gained access<\/a> in 2015 to 22 million US government personnel files\u2014which included information that could have helped it determine who was or is working for the US intelligence community.<\/p>\n

Likewise, in 2014, North Korea attacked Sony (and compromised all sorts of private communications) in an effort to block distribution of a satirical film that depicted the assassination of the country\u2019s leader. This all adds up to a latter-day Wild West, with many armed people operating in a space governed by few laws or sheriffs to enforce them.<\/p>\n

Traditionally, the US has favoured a largely unstructured internet\u2014\u2018open, interoperable, secure, and reliable\u2019, according to a policy<\/a> set a decade ago\u2014in order to promote the free flow of ideas and information. But US enthusiasm for such an internet is waning as foes exploit this openness to undermine its democracy and steal intellectual property important to the functioning and comparative advantage of its economy.<\/p>\n

The question\u2014easier to pose than to answer\u2014is where to draw lines and how to get others to accept them. For one thing, the US is not without its contradictions, as it, too, carries out espionage in cyberspace (think of it as the modern equivalent of steaming open envelopes to read someone else\u2019s mail) and reportedly, along with Israel, installed malware to sabotage Iran\u2019s nuclear weapons program. So, any ban on activities in cyberspace would presumably be partial.<\/p>\n

One promising idea would be to follow up on what Biden and Putin discussed, namely, to ban the targeting of critical infrastructure, including but not limited to dams, oil and gas production facilities, electrical grids, healthcare facilities, nuclear power plants and nuclear weapons command and control systems, airports, and major factories. Cyber capability can become a weapon of mass destruction when such important sites are compromised.<\/p>\n

Even with such an agreement, verifying compliance could prove impossible, so the US would also want to introduce a degree of deterrence to ensure that parties to such a pledge honour it. Deterrence could involve the declared willingness to carry out symmetrical responses: if you target or attack our critical infrastructure, we will do the same to yours. Deterrence could also be asymmetrical: if you target or attack our facilities, we will sanction you or target your interests elsewhere.<\/p>\n

Any such agreement would also need to be buttressed by unilateral action, given the stakes and the reality that other agreements (such as China\u2019s 2015 pledge not to steal intellectual property<\/a>) have been violated. For example, the US would want to take steps to reduce the vulnerability of its high-value systems.<\/p>\n

It would also be necessary to declare or negotiate that claims of ignorance or denials of government involvement in aggressive cyber activity, such as when Putin said<\/a> his government had nothing to do with Russian ransomware attacks, will not be accepted. The analogy here is to terrorism: in the wake of the 9\/11 attacks, the US made clear that it would not distinguish between terrorist groups or governments that provided them support or sanctuary. Russia would therefore be held accountable for the actions of groups acting from its territory. Insisting on accountability should increase Russia\u2019s incentive to rein in such behaviour.<\/p>\n

Over time, a US\u2013Russia pact could serve as a model that could be joined by China, Europe and others. If it were extended to China, prohibitions on the theft of intellectual property (and penalties for violating the ban) could be added. None of this adds up to disarmament, but it is the cyber equivalent of arms control, which is as good a place to start as any.<\/p>\n","protected":false},"excerpt":{"rendered":"

During the Cold War, summit meetings between the United States and the Soviet Union were often dominated by agreements to set limits on nuclear weapons and the systems built to deliver them. The US and …<\/p>\n","protected":false},"author":382,"featured_media":65279,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[1],"tags":[2330,391,713,2138],"class_list":["post-65275","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general","tag-arms-control","tag-cyber","tag-cyberattack","tag-cybersecurity"],"acf":[],"yoast_head":"\nTaming the cyber wild west | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/taming-the-cyber-wild-west\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Taming the cyber wild west | The Strategist\" \/>\n<meta property=\"og:description\" content=\"During the Cold War, summit meetings between the United States and the Soviet Union were often dominated by agreements to set limits on nuclear weapons and the systems built to deliver them. The US and ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/taming-the-cyber-wild-west\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2021-06-24T01:19:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2021\/06\/GettyImages-1233483646.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"683\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Richard N. Haass\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Richard N. Haass\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/taming-the-cyber-wild-west\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2021\/06\/GettyImages-1233483646.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2021\/06\/GettyImages-1233483646.jpg\",\"width\":1024,\"height\":683,\"caption\":\"TOPSHOT - Russian President Vladimir Putin (L) shakes hands with US President Joe Biden prior to the US-Russia summit at the Villa La Grange, in Geneva on June 16, 2021. (Photo by Brendan Smialowski \/ AFP) (Photo by BRENDAN SMIALOWSKI\/AFP via Getty Images)\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/taming-the-cyber-wild-west\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/taming-the-cyber-wild-west\/\",\"name\":\"Taming the cyber wild west | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/taming-the-cyber-wild-west\/#primaryimage\"},\"datePublished\":\"2021-06-24T01:19:48+00:00\",\"dateModified\":\"2021-06-24T01:19:48+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/473fcc20c2f372455375cd0d117efda8\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/taming-the-cyber-wild-west\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/taming-the-cyber-wild-west\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/taming-the-cyber-wild-west\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Taming the cyber wild west\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/473fcc20c2f372455375cd0d117efda8\",\"name\":\"Richard N. Haass\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5e9f107cb0fedc334827be07ac813ba5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5e9f107cb0fedc334827be07ac813ba5?s=96&d=mm&r=g\",\"caption\":\"Richard N. Haass\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/richard-n-haass\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Taming the cyber wild west | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/taming-the-cyber-wild-west\/","og_locale":"en_US","og_type":"article","og_title":"Taming the cyber wild west | The Strategist","og_description":"During the Cold War, summit meetings between the United States and the Soviet Union were often dominated by agreements to set limits on nuclear weapons and the systems built to deliver them. The US and ...","og_url":"https:\/\/www.aspistrategist.ru\/taming-the-cyber-wild-west\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2021-06-24T01:19:48+00:00","og_image":[{"width":1024,"height":683,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2021\/06\/GettyImages-1233483646.jpg","type":"image\/jpeg"}],"author":"Richard N. Haass","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"Richard N. Haass","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/taming-the-cyber-wild-west\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2021\/06\/GettyImages-1233483646.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2021\/06\/GettyImages-1233483646.jpg","width":1024,"height":683,"caption":"TOPSHOT - Russian President Vladimir Putin (L) shakes hands with US President Joe Biden prior to the US-Russia summit at the Villa La Grange, in Geneva on June 16, 2021. (Photo by Brendan Smialowski \/ AFP) (Photo by BRENDAN SMIALOWSKI\/AFP via Getty Images)"},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/taming-the-cyber-wild-west\/","url":"https:\/\/www.aspistrategist.ru\/taming-the-cyber-wild-west\/","name":"Taming the cyber wild west | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/taming-the-cyber-wild-west\/#primaryimage"},"datePublished":"2021-06-24T01:19:48+00:00","dateModified":"2021-06-24T01:19:48+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/473fcc20c2f372455375cd0d117efda8"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/taming-the-cyber-wild-west\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/taming-the-cyber-wild-west\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/taming-the-cyber-wild-west\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"Taming the cyber wild west"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/473fcc20c2f372455375cd0d117efda8","name":"Richard N. Haass","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/5e9f107cb0fedc334827be07ac813ba5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5e9f107cb0fedc334827be07ac813ba5?s=96&d=mm&r=g","caption":"Richard N. Haass"},"url":"https:\/\/www.aspistrategist.ru\/author\/richard-n-haass\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/65275"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/382"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=65275"}],"version-history":[{"count":4,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/65275\/revisions"}],"predecessor-version":[{"id":65277,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/65275\/revisions\/65277"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/65279"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=65275"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=65275"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=65275"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}