Taming the New Wild West

Taming the New Wild West

A poster showing six wanted Russian military intelligence officers is displayed with FBI Deputy Director David Bowdich in the background
A poster showing six wanted Russian military intelligence officers is displayed with FBI Deputy Director David Bowdich in the background Andrew Harnik - Pool/Getty Images

The current cybersecurity landscape is a latter-day Wild West that calls for a new US policy of deterrence, diplomacy, and defense.

Originally published at Project Syndicate

June 23, 2021 11:35 am (EST)

A poster showing six wanted Russian military intelligence officers is displayed with FBI Deputy Director David Bowdich in the background
A poster showing six wanted Russian military intelligence officers is displayed with FBI Deputy Director David Bowdich in the background Andrew Harnik - Pool/Getty Images
Article
Current political and economic issues succinctly explained.

During the Cold War, summit meetings between the United States and the Soviet Union were often dominated by agreements to set limits on nuclear weapons and the systems built to deliver them. The US and Russia still discuss these topics, but at their recent meeting in Geneva, US President Joe Biden and Russian President Vladimir Putin focused in no small part on how to regulate behavior in a different realm: cyberspace. The stakes are every bit as great.

More From Our Experts

It’s not hard to see why. Cyberspace and the internet are central to the workings of modern economies, societies, political systems, militaries, and just about everything else, which makes digital infrastructure a tempting target for those seeking to cause extraordinary disruption and damage at minimal cost.

More on:

Cybersecurity

Moreover, states and nonstate actors can carry out cyberattacks with a high degree of deniability, which adds to the temptation to develop and use these capabilities. We know when and from where a missile is launched, but it can take a long time to discover that a cyberattack has occurred, and figuring out who is responsible can take even longer. Such a slow and uncertain attribution process can render the threat of retaliation, which is at the heart of deterrence, beyond reach.

What put this issue squarely on the agenda of the Biden-Putin meeting is that Russia has grown increasingly aggressive in cyberspace, whether by creating false accounts on social media to influence American politics or by gaining access to critical infrastructure, such as power plants. Reinforcing the issue’s salience is the reality that Russia is not alone: China reportedly gained access in 2015 to 22 million US government personnel files – which include information that could help determine who was or is working for the US intelligence community.

Likewise, North Korea attacked Sony (and compromised all sorts of private communications) in an effort to block distribution of a satirical film that depicted the assassination of the country’s leader. This all adds up to a latter-day Wild West, with many armed people operating in a space governed by few laws or sheriffs to enforce them.

More From Our Experts

Traditionally, the US has favored a largely unstructured internet – “open, interoperable, secure, and reliable,” according to a policy set a decade ago – in order to promote the free flow of ideas and information. But US enthusiasm for such an internet is waning as foes exploit this openness to undermine its democracy and steal intellectual property important to the functioning and comparative advantage of its economy.

The question – easier to pose than to answer – is where to draw lines and how to get others to accept them. For one thing, the US is not without its contradictions, as it, too, carries out espionage in cyberspace (think of it as the modern equivalent of steaming open envelopes to read someone else’s mail) and reportedly, along with Israel, installed malware to sabotage Iran’s nuclear weapons program. So, any ban on activities in cyberspace would presumably be partial.

More on:

Cybersecurity

One promising idea would be to follow up on what Biden and Putin discussed, namely, to ban the targeting of critical infrastructure, including but not limited to dams, oil and gas production facilities, electrical grids, health-care facilities, nuclear power plants and nuclear weapon command and control systems, airports, and major factories. Cyber capability can become a weapon of mass destruction when such important sites are compromised.

Even with such an agreement, verifying compliance could prove impossible, so the US would also want to introduce a degree of deterrence to ensure that parties to such a pledge honor it. Deterrence could involve the declared willingness to carry out symmetrical responses: if you target or attack our critical infrastructure, we will do the same to yours. Deterrence could also be asymmetrical: if you target or attack our facilities, we will sanction you or target your interests elsewhere.

Any such agreement would also need to be buttressed by unilateral action, given the stakes and the reality that other agreements (such as China’s 2015 pledge not to steal intellectual property) have been violated. For example, the US would want to take steps to reduce the vulnerability of its high-value systems.

It would also be necessary to declare or negotiate that claims of ignorance or denials of government involvement in aggressive cyber activity, such as when Putin said his government had nothing to do with Russian ransomware attacks, will not be accepted. The analogy here is to terrorism: in the wake of the September 11, 2001, attacks, the US made clear that it would not distinguish between terrorist groups or governments that provided them support or sanctuary. Russia would therefore be held accountable for the actions of groups acting from its territory. Insisting on accountability should increase Russia’s incentive to rein in such behavior.

Over time, a US-Russia pact could serve as a model that could be joined by China, Europe, and others. If it were extended to China, prohibitions on the theft of intellectual property (and penalties for violating the ban) could be added. None of this adds up to disarmament, but it is the cyber equivalent of arms control, which is as good a place to start as any.

Creative Commons
Creative Commons: Some rights reserved.
Close
This work is licensed under Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International (CC BY-NC-ND 4.0) License.
View License Detail
Close

Top Stories on CFR

Iran

Steven Cook, the Eni Enrico Mattei Senior Fellow for Middle East and Africa Studies at CFR, and Ray Takeyh, the Hasib J. Sabbagh senior fellow for Middle East studies at CFR, sit down with James M. Lindsay to discuss Iran’s unprecedented attack on Israel and the prospects for a broader Middle East war.

Economics

CFR experts preview the upcoming World Bank and International Monetary Fund (IMF) Spring Meetings taking place in Washington, DC, from April 17 through 19.   

Sudan

A year into the civil war in Sudan, more than eight million people have been displaced, exacerbating an already devastating humanitarian crisis.