Skip to main content

Cyber arms control? Forget about it

By Christopher Bronk and Dan Wallach, Special to CNN
March 26, 2013 -- Updated 1243 GMT (2043 HKT)
Monitors display the hacked Greek ministry of justice website on February 3, 2012.
Monitors display the hacked Greek ministry of justice website on February 3, 2012.
STORY HIGHLIGHTS
  • Christopher Bronk, Dan Wallach: Cyber arms control is unlikely to happen soon
  • Bronk, Wallach: Cyberattacks can be crafted and launched by individuals, groups
  • They say nations don't even have to be involved for an attack to have impact
  • Bronk, Wallach: It's hard to get rid of cyberattacks, but they can be curbed with diplomacy

Editor's note: Christopher Bronk and Dan Wallach teach and research computer security issues at Rice University.

(CNN) -- With the advent of "cyberwar," a poorly defined term that seems to be used as a catch-all phrase for all manners of computer-related attacks, it's natural to ask about cyber arms control. Richard Clarke, former cybersecurity adviser to President Obama, has advocated along with others for cyber arms control or new legal rules for war in cyberspace.

If governments have the ability to build the tools of cyberwarfare, then presumably, they can regulate and control them. But realistically, it's unlikely that cyber arms control will happen anytime soon.

When we think of arms control, we consider the efforts of the Cold War, which dramatically cut the number of nuclear weapons and other strategic armaments, from the period of detente to the eventual collapse of the Soviet Union. Arms control works fairly well for managing the arsenals of weapons that are large and complex.

Christopher Bronk
Christopher Bronk

However, cyberweapons are of a different league. All you need is training in computer software engineering and some talent. On the Internet, there is readily available literature on coding and hacking, and of course, a plethora of open source tools. Just as easy as it is to be an effective cyberdefender, you can learn to be an effective offensive cyber-operator.

Dan Wallach
Dan Wallach

Cyber attacks can be crafted and used by individuals or groups. Importantly, they can make impact even without significant involvement from a nation.

For example, the Anonymous hacker group is able to disrupt major corporations and even countries with its campaigns for transparency. Furthermore, when Anonymous is unable to disrupt a target, it typically resorts to overtaking websites with massive denial of service attacks.

Become a fan of CNNOpinion
Stay up to date on the latest opinion, analysis and conversations through social media. Join us at Facebook/CNNOpinion and follow us @CNNOpinion on Twitter. We welcome your ideas and comments.



Despite the role of nonstate players, it is the brinkmanship between countries in cyberspace that make the big headlines.

Mandiant, a cybersecurity company, reported a series of cyber attacks on U.S. companies that was traced to China's People's Liberation Army unit 61398 based in Shanghai. One of the lessons in the analysis is how remarkably effective the Chinese attackers were despite a stunning lack of sophistication and sloppiness in their tradecraft.

In contrast, our biggest and most innovative corporations have developed and deployed sophisticated defense systems that still seem to be regularly breached, despite the efforts of their comically inept adversaries. If the Chinese PLA ever gets its act together, we're in real trouble.

Meet South Korea's 'cyber warriors'

How might this get worse? We already know that cyber-espionage can harm companies. The risks of cybersabotage can be worse.

For example, industrial control systems are largely computer controlled and they can be reached in some cases from the Internet. Future terrorist organizations could cause spectacular physical and economic damage to our refineries, power plants, water systems, pipelines and other important systems without leaving a marked trail or suffering significant personal risk.

In the wake of the Stuxnet attacks on Iran's uranium-refinement centrifuges or the Shamoon attack on Saudi Aramco's computers, cybersabotage can no longer be considered theoretical. It is happening now.

It's not difficult to imagine a future in which cyber attacks become more frequent or serious. In such a world, there will be a need for diplomacy and norm-setting among the international community.

But if we ever wanted to consider treaties on cyber disarmament, or regulations on the use of hacking tools by those wishing to do more than simply spy or steal, we would become immediately stymied by how to enforce the rules.

Barring a radical change in the technological playing field, there will never be an effective cyber equivalent of the International Atomic Energy Agency despite all the aspirations of organizations like the International Telecommunications Union to serve such a function. The very idea that an international organization could enforce rules on the misuse of computers is ludicrous.

The problem of cyber arms control is akin to the greatest arms control failure of the Cold War, which still persists: the mass distribution of the most produced firearm in human history, the Kalashnikov AK-47.

According to the World Bank, as many as 100 million of these brutally simple weapons are scattered across the globe (roughly one for every 70 people on the planet, and that excludes the millions of Western military rifles out there, too). From every major trouble spot, we see footage of Kalashnikov-wielding soldiers, terrorists and rebels.

Global attempts to sweep up such weapons, as well as their bigger and more volatile relatives -- rocket-propelled grenades -- have been mostly ineffective. The U.N. has worked for more than a decade on an Arms Trade Treaty designed to limit the illicit trade of such weapons, but a final draft of the treaty is stalled.

For better or for worse, the Internet has become one more field upon which the game of nations is played.

Just as the Internet can be used for sharing information and enabling commerce, it can also be used to steal secrets and to cause damage. In the short term, we might see private industry adopt defensive practices. In the long term, while we may never be able to eliminate electronic espionage, we may be able to reduce its reach through vigilance and diplomacy. As for cyber arms control, forget about it.

Follow us on Twitter @CNNOpinion

Join us on Facebook/CNNOpinion

The opinions expressed in this commentary are solely those of Christopher Bronk and Dan Wallach.

ADVERTISEMENT
Part of complete coverage on
November 24, 2014 -- Updated 2310 GMT (0710 HKT)
If Obama thinks pushing out Hagel will be seen as the housecleaning many have eyed for his national security process, he'll be disappointed, says David Rothkopf.
November 25, 2014 -- Updated 1311 GMT (2111 HKT)
The decision by the St. Louis County prosecuting attorney to announce the Ferguson grand jury decision at night was dangerous, says Jeff Toobin.
November 25, 2014 -- Updated 0857 GMT (1657 HKT)
China's influence in Latin America is nothing new. Beijing has a voracious appetite for natural resources and deep pockets, says Frida Ghitis.
November 24, 2014 -- Updated 2151 GMT (0551 HKT)
Iranian President Hassan Rouhani speaks during a press conference in the capital Tehran on June 14, 2014.
The decision to extend the deadline for talks over Iran's nuclear program doesn't change Tehran's dubious history on the issue, writes Michael Rubin.
November 21, 2014 -- Updated 1925 GMT (0325 HKT)
Maria Cardona says Republicans should appreciate President Obama's executive action on immigration.
November 21, 2014 -- Updated 1244 GMT (2044 HKT)
Van Jones says the Hunger Games is a more sweeping critique of wealth inequality than Elizabeth Warren's speech.
November 20, 2014 -- Updated 2329 GMT (0729 HKT)
obama immigration
David Gergen: It's deeply troubling to grant legal safe haven to unauthorized immigrants by executive order.
November 21, 2014 -- Updated 0134 GMT (0934 HKT)
Charles Kaiser recalls a four-hour lunch that offered insight into the famed director's genius.
November 20, 2014 -- Updated 2012 GMT (0412 HKT)
The plan by President Obama to provide legal status to millions of undocumented adults living in the U.S. leaves Republicans in a political quandary.
November 21, 2014 -- Updated 0313 GMT (1113 HKT)
Despite criticism from those on the right, Obama's expected immigration plans won't make much difference to deportation numbers, says Ruben Navarette.
November 21, 2014 -- Updated 0121 GMT (0921 HKT)
As new information and accusers against Bill Cosby are brought to light, we are reminded of an unshakable feature of American life: rape culture.
November 20, 2014 -- Updated 2256 GMT (0656 HKT)
When black people protest against police violence in Ferguson, Missouri, they're thought of as a "mob."
November 19, 2014 -- Updated 2011 GMT (0411 HKT)
Lost in much of the coverage of ISIS brutality is how successful the group has been at attracting other groups, says Peter Bergen.
November 19, 2014 -- Updated 1345 GMT (2145 HKT)
Do recent developments mean that full legalization of pot is inevitable? Not necessarily, but one would hope so, says Jeffrey Miron.
November 19, 2014 -- Updated 1319 GMT (2119 HKT)
We don't know what Bill Cosby did or did not do, but these allegations should not be easily dismissed, says Leslie Morgan Steiner.
November 19, 2014 -- Updated 1519 GMT (2319 HKT)
Does Palestinian leader Mahmoud Abbas have the influence to bring stability to Jerusalem?
November 19, 2014 -- Updated 1759 GMT (0159 HKT)
Even though there are far fewer people being stopped, does continued use of "broken windows" strategy mean minorities are still the target of undue police enforcement?
November 18, 2014 -- Updated 0258 GMT (1058 HKT)
The truth is, we ran away from the best progressive persuasion voice in our times because the ghost of our country's original sin still haunts us, writes Cornell Belcher.
November 18, 2014 -- Updated 2141 GMT (0541 HKT)
Children living in the Syrian city of Aleppo watch the sky. Not for signs of winter's approach, although the cold winds are already blowing, but for barrel bombs.
November 17, 2014 -- Updated 1321 GMT (2121 HKT)
We're stuck in a kind of Middle East Bermuda Triangle where messy outcomes are more likely than neat solutions, says Aaron David Miller.
November 17, 2014 -- Updated 1216 GMT (2016 HKT)
In the midst of the fight against Islamist rebels seeking to turn the clock back, a Kurdish region in Syria has approved a law ordering equality for women. Take that, ISIS!
November 17, 2014 -- Updated 0407 GMT (1207 HKT)
Ruben Navarrette says President Obama would be justified in acting on his own to limit deportations
ADVERTISEMENT