This article is from the source 'guardian' and was first published or seen on . It last changed over 40 days ago and won't be checked again for changes.
You can find the current article at its original source at http://www.theguardian.com/commentisfree/2018/jan/22/the-guardian-view-on-cyberwar-an-urgent-problem
The article has changed 5 times. There is an RSS feed of changes available.
Version 0 | Version 1 |
---|---|
The Guardian view on cyberwar: an urgent problem | The Guardian view on cyberwar: an urgent problem |
(about 2 hours later) | |
The internet is now used as a low-level weapon of war. How should Britain best defend itself? | |
Mon 22 Jan 2018 17.42 GMT | Mon 22 Jan 2018 17.42 GMT |
Last modified on Mon 22 Jan 2018 19.56 GMT | |
Share on Facebook | Share on Facebook |
Share on Twitter | Share on Twitter |
Share via Email | Share via Email |
View more sharing options | View more sharing options |
Share on LinkedIn | Share on LinkedIn |
Share on Pinterest | Share on Pinterest |
Share on Google+ | Share on Google+ |
Share on WhatsApp | Share on WhatsApp |
Share on Messenger | Share on Messenger |
Close | Close |
In the desperate scramble to rearm before the second world war there was always an undercurrent of pessimism. “The bomber will always get through,” Stanley Baldwin warned. In his dark fantasies, destruction and poison gas rained from the skies and obliterated civilisation. That isn’t quite what happened, though the bombers did their best. Today’s equivalent is the feeling that the hacker will always get through, and that attacks on computer networks will become the most devastating form of future warfare. | In the desperate scramble to rearm before the second world war there was always an undercurrent of pessimism. “The bomber will always get through,” Stanley Baldwin warned. In his dark fantasies, destruction and poison gas rained from the skies and obliterated civilisation. That isn’t quite what happened, though the bombers did their best. Today’s equivalent is the feeling that the hacker will always get through, and that attacks on computer networks will become the most devastating form of future warfare. |
There are certainly grounds for fear. Technological civilisation is now built on software, much of it desperately insecure. Even when the software itself is secure – and you’d assume that the CIA at least would use properly secured software – the human parts of a bureaucracy can fail, as is shown by the extraordinary case of a teenage hacker, Kane Gamble, operating from his bedroom in Leicestershire, who managed to impersonate the director of the CIA and the deputy director of the FBI and gain access to part of their emails, which included a great deal of classified material. | There are certainly grounds for fear. Technological civilisation is now built on software, much of it desperately insecure. Even when the software itself is secure – and you’d assume that the CIA at least would use properly secured software – the human parts of a bureaucracy can fail, as is shown by the extraordinary case of a teenage hacker, Kane Gamble, operating from his bedroom in Leicestershire, who managed to impersonate the director of the CIA and the deputy director of the FBI and gain access to part of their emails, which included a great deal of classified material. |
And it’s nearly 10 years since the computers of the Tibetan government in exile were found to be infested with sophisticated spyware, presumably Chinese. But espionage like that is only a new front in an age old struggle. This is also the way to look at the exploitation of social media by Russian hacking groups to the benefit of Donald Trump. It was imaginative but not entirely unprecedented. States have used propaganda and disinformation to weaken their adversaries for centuries. What is almost entirely new is the use of computer networks for physical sabotage by state actors. The first known, and perhaps the most successful of these, was the joint US/Israeli Stuxnet attack on the Iranian nuclear programme in 2009. Since then there has been increasing evidence of attacks of this sort by Russia – against Estonia in 2009, and then against Ukraine, where tens of thousands of attacks on everything from power supplies to voting machines have opened an under-reported front in an under-reported war. Across the Baltic, the Swedish government has just announced a beefed-up programme of civil defence, of which the most substantial part will be an attempt to protect its software and networks from attacks. Meanwhile, North Korean state hackers are blamed by western intelligence services for the WannaCry ransomware attacks which last year shut down several NHS hospitals in the UK. Persistent reports suggest the US has interfered in this way with North Korea’s nuclear missile programme. | And it’s nearly 10 years since the computers of the Tibetan government in exile were found to be infested with sophisticated spyware, presumably Chinese. But espionage like that is only a new front in an age old struggle. This is also the way to look at the exploitation of social media by Russian hacking groups to the benefit of Donald Trump. It was imaginative but not entirely unprecedented. States have used propaganda and disinformation to weaken their adversaries for centuries. What is almost entirely new is the use of computer networks for physical sabotage by state actors. The first known, and perhaps the most successful of these, was the joint US/Israeli Stuxnet attack on the Iranian nuclear programme in 2009. Since then there has been increasing evidence of attacks of this sort by Russia – against Estonia in 2009, and then against Ukraine, where tens of thousands of attacks on everything from power supplies to voting machines have opened an under-reported front in an under-reported war. Across the Baltic, the Swedish government has just announced a beefed-up programme of civil defence, of which the most substantial part will be an attempt to protect its software and networks from attacks. Meanwhile, North Korean state hackers are blamed by western intelligence services for the WannaCry ransomware attacks which last year shut down several NHS hospitals in the UK. Persistent reports suggest the US has interfered in this way with North Korea’s nuclear missile programme. |
Parliament’s intelligence and security committee concluded in its most recent report that China and Iran should be added to Russia and North Korea as countries that could threaten the infrastructure of the UK in this way. These attacks are hard to defend against. It is almost impossible to prove beyond doubt who the perpetrators are. International law provides little protection and there is no realistic prospect of general disarmament. Britain’s GCHQ has developed a deterrent capacity of its own for use against other states, although the cost has been redacted in the intelligence and security committee’s report. Cyber-attacks are far more urgent than the spectre of Russian tanks rolling towards underequipped British troops that has been raised by General Sir Nick Carter. Whatever GCHQ spends deterring or defending against them is better value than the billions on aircraft carriers or Trident, which we must all hope will never be used. | Parliament’s intelligence and security committee concluded in its most recent report that China and Iran should be added to Russia and North Korea as countries that could threaten the infrastructure of the UK in this way. These attacks are hard to defend against. It is almost impossible to prove beyond doubt who the perpetrators are. International law provides little protection and there is no realistic prospect of general disarmament. Britain’s GCHQ has developed a deterrent capacity of its own for use against other states, although the cost has been redacted in the intelligence and security committee’s report. Cyber-attacks are far more urgent than the spectre of Russian tanks rolling towards underequipped British troops that has been raised by General Sir Nick Carter. Whatever GCHQ spends deterring or defending against them is better value than the billions on aircraft carriers or Trident, which we must all hope will never be used. |
Cyberwar | Cyberwar |
Opinion | Opinion |
Defence policy | Defence policy |
Hacking | Hacking |
GCHQ | GCHQ |
Internet | Internet |
Espionage | Espionage |
comment | comment |
Share on Facebook | Share on Facebook |
Share on Twitter | Share on Twitter |
Share via Email | Share via Email |
Share on LinkedIn | Share on LinkedIn |
Share on Pinterest | Share on Pinterest |
Share on Google+ | Share on Google+ |
Share on WhatsApp | Share on WhatsApp |
Share on Messenger | Share on Messenger |
Reuse this content | Reuse this content |