[liberationtech] Cyber Security: Canada Is Failing The World
Masashi Nishihata
masashi at kmdi.utoronto.ca
Thu May 26 12:04:53 PDT 2011
Cyber Security: Canada Is Failing The World
By Ron Deibert Director, the Canada Centre for Global Security Studies
and the Citizen Lab, Munk School of Global Affairs, University of
Toronto.
Huffington Post Canada. May 26, 2011
http://www.huffingtonpost.ca/2011/05/26/cyber-security-canada-stephen-harper-g8_n_867136.html
Cyberspace has become an all-immersive domain, and the global
communications environment in which all of society, economics, and
politics are now embedded. Its constituent parts are widely conceived
of as critical national infrastructure.
But the domain of cyberspace is entering a potentially chaotic and
very dangerous phase of its evolution, which is why it has become a
key issue for consideration at today's G8 summit in Deauville, France.
The Canadian government is late to the cyber security arena, and only
recently released a cyber security strategy last fall that pales in
comparison to the scope of the challenges, or to equivalent strategies
released by our allies, like the United States.
It devotes far too few resources to the problem, does not fully
address the division of appropriate institutional responsibilities,
and only barely nods at the importance of a foreign policy for
cyberspace. A recent investigation revealed our public sector
infrastructure was so thoroughly infiltrated with malicious activity
emanating from foreign jurisdictions that the entire Treasury Board
was taken offline for weeks. Embarrassingly, a recent security study
ranked Canada among the highest of countries for the hosting of
malicious content.
Not surprisingly, our government's capacity to engage forcefully and
strategically on these issues has been muted. We are absent in the
international arenas where cyberspace governance is debated and
territorialized controls are being normalized by China, Russia and
other democratically challenged states.
Although the G8 summit will cover a range of issues, President Nicolas
Sarkozy has signaled that cyber security issues will rank high on the
agenda. What will be Canada's contribution to the discussions? What
will Prime Minister Stephen Harper bring to the table?
Cyberspace has always been characterized by change, but there has been
a major architectonic shift in the nature of the medium with the rise
of social networking, the shift to cloud computing, and the rapid
emergence of mobile forms of constant connectivity.
While convenient and fun, these new modes of communicating have
emerged so fast that they have created unforeseen security and privacy
liabilities and unintended consequences for individuals and
organizations alike.
Mobile communications operate along an entirely different ecosystem
than desktop PC infrastructures. Among other respects, they lend
themselves to much more precise geolocation tracking, the information
for which may be shared with third parties in ways that are not
necessarily transparent to users.
Meanwhile, social networking and cloud computing services have
produced an exponential increase in the sharing and networking of once
discrete data sources. We click on documents, links, and attachments
with carefree abandon as we move from the office to the internet cafe
to the airport lounge. Personal photographs, sensitive documents,
business spreadsheets, classified reports are entrusted to server
farms of privately owned infrastructures that can span multiple
political jurisdictions.
Any epidemiologist studying such a dynamically growing ecosystem would
not be surprised to find a huge expansion in the cyber equivalent of
disease: although cybercrime has formed a hidden shadow along every
step of the Internet's history, its growth has suddenly become so
explosive in recent years by virtually any estimate that it is beyond
control, and perhaps even beyond estimation.
According to security companies there are around 60,000 new malicious
software (malware) samples discovered every day, with the number
rising steadily. Massive botnets - global networks of infected
computers - now routinely count in the tens of thousands worldwide.
A huge black market for cybercrime tools and products thrives as a
kind of hidden underbelly of globalization, driving everything from
petty identity theft to high-stakes political and commercial
espionage. If precise estimates could be obtained, it would surely
rank as one of the world's largest economic growth sectors, as
millions of new digital natives from the developing world find a
rewarding and elegant means to personal enrichment.
Not surprisingly, governments have begun to react, but in doing so may
be contributing more to the problem than creating solutions.
Generally speaking, there has been a sea-change the world over in the
way governments approach cyberspace. Whereas 10 years ago, states were
either oblivious to the Internet or took a laissez-faire approach,
today they are moving swiftly to assert their power and shape the
domain in ways that suit their strategic domestic and foreign policy
interests. Whether for purposes of copyright control, anti-terrrorism,
or to shore up regimes from meddlesome human rights and opposition
networks, governments are building up an advanced suite of cyberspace
controls, ranging from filtering and surveillance to the black arts of
computer network exploitation.
Alarmed by consistent high-level penetrations of its own critical
infrastructures, the United States has led the way with numerous cyber
strategy documents, legislation, and institutional reform. The most
significant of these was the establishment of the U.S. Cyber Command
in 2010, which helped trigger a major industrial shift in the defense
industry and a fundamental force restructuring among allies that is
still unfolding.
It has also triggered a global cyber arms race. Unable to compete on
the same level, adversaries of the United States seek comparative
advantage by exploiting criminals and patriotic hackers to do their
bidding instead. Major incidents of computer network attacks and
espionage have been traced back to the Chinese and Russian criminal
underworld, or to pro-regime sympathizers of Iran, Burma, Libya,
Syria, and others. Others have followed the US lead and set up "cyber
commands" of their own.
Meanwhile, the private sector that owns and operates the vast majority
of cyberspace is caught in the cross-hairs, continuously blitzed by
mounting assaults on its networks while simultaneously being pressured
by governments looking to download their responsibilities to police
cyberspace.
Research In Motion, the Canadian maker of BlackBerry products, has
been dogged by such demands to the point of seeming frustration. When
asked by the BBC whether RIM had made deals to hand over its encrypted
data to security services, CEO Mike Lazaridis cut short the interview.
Some companies have seized on the commercial opportunity opened up by
cyberspace contests; a massive cyber security market, now measured to
be anywhere between $80- and $150-billion annually, provides
filtering, data mining and fusion, and computer attack capabilities to
security services worldwide. One of our research projects, the OpenNet
Initiative, has documented how a Canadian company, Netwsweeper,
provides services to the regimes of UAE, Bahrain, Qatar, and Yemen -
countries known for pervasive censorship - so that they can "block
inappropriate content ... based on social, religious or political
ideals," according to a page on their website which has since been
changed.
As one of the world's largest economies and home to some of the
greatest thinkers of communications, from Harold Innis and Marshall
McLuhan to William Gibson, Canada should be leading the way instead of
muddling along. We certainly stand among those to lose the most should
cyberspace continue its spiral into censorship, militarization, and
crime. What should be done?
First, a comprehensive strategy to protect the cyber commons should
begin by linking the international consequences of domestic policies.
If liberal democratic countries pass legislation that permits access
to data for state security services without judicial oversight, as the
Harper government is reportedly set to do with lawful access
provisions of the forthcoming Omnibus Crime bill, then there is no
moral basis for condemning those actions when they occur in places
like China, Iran, or Belarus.
It is certainly true that law enforcement is overwhelmed with the
surge of cyber crime, but the case has not been made that to deal with
it effectively requires access to private data and a major dilution of
civil liberties that are basic to a liberal democratic society. In
fact the opposite may be more the case.
The problem for law enforcement and intelligence today is not the lack
of information; it is the deluge of it. We need to give law
enforcement new resources, capabilities, proper training and equipment
to sort through voluminous flows of existing data. But alongside those
resources, Canada should be setting the highest standard of judicial
oversight and public accountability. New resources, yes, but the same
if not more rigorous checks and constraints on powers.
The same principle holds true for Canadian companies operating abroad.
Rather than catering to regimes that violate human rights, or
colluding with security services with dubious track records, Canadian
companies should be held to the same basic minimum standards that we
expect in Canada when offering services abroad. Regulatory measures
should be introduced that set standards for the private sector around
mandatory disclosures of security breaches, strong privacy protections
built by design, and restrictions on the sale of products and services
that contribute to violations of human rights abroad.
Part of Canada's cyberspace strategy needs to focus outward. Our
Foreign Affairs department should be at the forefront of the promotion
of decentralized and distributed security mechanisms, while actively
resisting proposals that seek to alter the constitution of cyberspace
through top-down, heavy-handed government controls.
Diplomatically, we should work to build a broad community of like
minded-states who share this common vision, and have an interest in a
secure and open cyber commons across the many different venues of
cyberspace governance. Such rules should include the promotion of
norms of mutual restraint in cyberspace, protections for privacy and
civil liberties, joint vigilance against cyber crime networks, and
respect for the free flow of information. We should also work as a
liaison between our allies and the governments of China, Russia and
others to limit the dangerously escalating tensions that exist in
cyberspace.
It is unlikely that such an ambitious agenda will emerge from Canada
to influence this year's meeting of the G8. But hopefully the meeting
will set in motion a process of urgent reflection on the scope of the
challenges that lay ahead.
This article was originally featured at the Huffington Post Canada ---
you can view it here: http://www.huffingtonpost.ca/2011/05/26/cyber-security-canada-stephen-harper-g8_n_867136.html
Ron Deibert is Director, the Canada Centre for Global Security Studies
and the Citizen Lab, Munk School of Global Affairs, University of
Toronto.
More information about the liberationtech
mailing list