Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cybersecurity
    • Cybersecurity
    • Database
    • IT Management

    RSA Conference: The Fog of Cyber-War

    Written by

    Brian Prince
    Published February 17, 2011
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      What exactly is a cyber-war, and are we in the middle of it?

      Here at the RSA Conference, it depends whom you ask. A panel-featuring former Department of Homeland Security Secretary Michael Chertoff, security guru Bruce Schneier, former National Security Agency Director John Michael McConnell, and James Lewis, director and senior fellow of the Center for Strategic and International Studies’ Technology and Public Policy Program-discussed Wednesday the murkiness of determining what constitutes cyber-war and how the government should respond was laid bare.

      More than just mere wordplay, the meaning behind the metaphor of a cyber-war is relevant because it shapes thought processes about security and the proper response, Schneier contended.

      “But when you invoke the war metaphor, you invoke a set of ways to think about security,” he said. “When you invoke the crime metaphor, it’s a different [one]. To the police, we are the public to protect; to the military, we are civilians to stay out of the way. And things you’d accept during a war, you wouldn’t accept from the police. The police have more constraints. So whether it’s warrantless eavesdropping or giving the president an Internet kill switch, whether we’re at war or whether it’s a police problem, you have different answers to those questions.”

      Cyber-war, he added, is a “sexier term” than cyber-attack, and in an age when cyber-commands are being created all over the world, the term can generate enough public concern to justify bigger budgets.

      It helps to think of the issue in terms of a spectrum of consequences, Chertoff said.

      “The reality is we are probably prepared to tolerate different levels of intrusion depending on the consequences,” he said. “Now it’s really bad when your IP (intellectual property) is stolen, but we, as Mike (McConnell) pointed out, we lived through the Cold War; we had spies. When we caught spies, we didn’t treat it as if it required response with nuclear weapons.”

      At the other end of the scale, however, is an attack on the country’s electric grid that results in a loss of life and serious damage to the American economy, he said. Preventing or mitigating that may take a higher level of government involvement, he said.

      “So to me, you almost have to look at it as a spectrum of consequences, and then decide where the balance needs to shift in terms of the degree of government energy and perhaps changing some of the balances with other considerations,” Chertoff said.

      There doesn’t have to be total consensus on cyber-war, McConnell said.

      “We had a Cold War that allowed us to build a deterrence policy and relationships with allies and so on, and we prevailed in that war,” he said. “But the idea is the nation debated the issue and made some policy decisions through its elected representatives, and we got to the right place. So rather than say hyping it for a particular personal benefit, or economic benefit, I would say it’s a part of the discussion.”

      “I would like to think we are an informed society, [and] with the right debate, we can get to the right place, but if you look at our history, we wait for a catastrophic event,” he said. “I’m hoping that doesn’t happen. But if we have the right debate and the right dialogue with our representatives and make our case, we might get the right legislation, but the odds are, we’ll wait for a catastrophic event and overreact.”

      To Chertoff, the government needs to lay out the basic legal and policy architecture to provide a framework to enable organizations to innovate securely. Regulation and liability concerns have gotten organizations to take security more seriously, the panelists agreed, but the right harmony must be found between government and private-sector efforts.

      “I think the U.S. government today treats a clearance as a privilege when in my view it should be a commodity, if you are willing to subject yourself to a review and an oath and you’re going to protect the information,” McConnell said. “The government needs to share the information it has about the vulnerabilities that it understands. I think if we have more people cleared and more people involved in sharing that information and understanding it…I think it will cause companies to invest in capabilities that we’re going to need.”

      There’s no doubt cyber-war is going to be a domain of conflict in a war between nation states, and it may get to the level of terrorists being sophisticated enough to be involved, Chertoff said. Cyber-war, he said, is something that destroys major systems.

      “That’s not going to be dealt with by market regulation,” he said, “and that poses the harder problem for everybody, which is: When you are facing an attack and it’s under way and everybody turns to the U.S. government and says stop it, what is the U.S. government authorized to do, and what is the U.S. government capable of doing?”

      Those capabilities, he said, must be built in advance, and that is “probably where we are going to have a little bit more controversy.”

      Brian Prince
      Brian Prince

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.