Cybersecurity
Authors
Herbert Lin
News Type
Commentary
Date
Paragraphs

In a Lawfare post earlier this year, I questioned the wisdom of referring to cyber operations as psychological operations. These campaigns are the bread and butter of U.S. Cyber Command’s operational activities. My interest in this question stemmed from two recent articles, one on NPR and one in the Washington Post. The former discussed past activities of U.S. Cyber Command and the latter discussed possible future activities. Taken together, both articles used terms such as “information warfare,” “information operations,” “psychological operations” and “influence operations” to describe these activities.

I closed that post with a promise to comment on the doctrinal and conceptual confusions within Defense Department policy regarding all of these concepts. This post makes good on that promise.

 

Read the rest at Lawfare Blog

Hero Image
All News button
1
Authors
Herbert Lin
News Type
Commentary
Date
Paragraphs

On Feb. 12, White House National Security Adviser Robert O’Brien announced that the U.S. government has “evidence that Huawei has the capability secretly to access sensitive and personal information in systems it maintains and sells around the world.” This represents the latest attempt by the Trump administration to support an argument that allied governments—and the businesses they oversee—should purge certain telecommunications networks of Huawei equipment. The position reflects the preferred approach in the United States, which is to issue outright bans against select companies (including Huawei) that meet an as-yet-unknown threshold of risk to national security.

 

Read the rest at Lawfare Blog

 

 

Hero Image
All News button
1
Authors
Steven Pifer
News Type
Commentary
Date
Paragraphs

The Trump administration’s proposal for trilateral arms control negotiations appears to be gaining little traction in Moscow and Beijing, and the era of traditional nuclear arms control may be coming to an end just as new challenges emerge. This is not to say that arms control should be an end in it itself. It provides a tool that, along with the right combination of deterrence and defense forces and proper doctrine, can enhance U.S. and allied security and promote stability.

Applying that tool will require overcoming a variety of challenges, not just regarding nuclear weapons but related issues, such as missile defense and conventional strike systems. Policymakers face some hard choices.

NUCLEAR ARMS

In August 2019, the United States withdrew from the 1987 Intermediate-range Nuclear Forces (INF) Treaty following Russia’s violation. (More broadly, Moscow’s selective compliance with arms control agreements poses a problem.) The 2010 New Strategic Arms Reduction Treaty (New START) remains as the sole agreement constraining U.S. and Russian nuclear weapons. New START expires in February 2021, but can be extended for up to five years.

For the United States, New START extension should be a no-brainer. Russia is in compliance with the treaty. Extension would continue limits on Russian strategic forces, as well as the flow of information on those forces provided by the treaty’s verification measures, until 2026. Extension would not require that the Pentagon change its strategic modernization plans, as those plans were designed to fit within New START’s limits.

Moscow has offered to extend New START, but the Trump administration has been reluctant. In 2017, U.S. officials said that, before considering the extension issue, they wanted to: 1) see if Russia met the New START limits, which took full effect in February 2018, and 2) complete the nuclear posture review, which was released the same month. Two years later, however, the administration still lacks a position on extension.

Instead, President Trump has set an unachievable objective — a trilateral negotiation with China and Russia covering all their nuclear arms. As I recently wrote in more detail, Chinese officials have repeatedly said no to such a negotiation, citing the large difference in nuclear weapons levels. The Trump administration thus far has offered nothing to entice Beijing to change its position.

Moreover, almost a year after the president set his goal, his administration has yet to offer a proposal — or even an outline — for what such a negotiation would seek to achieve. Neither Washington nor Moscow is ready to agree to have the same number of nuclear weapons as China, but it is unrealistic to think that Beijing would accept unequal limits.

Setting aside China, Russia is not ready to discuss all nuclear arms unless certain conditions are met (more on that below). The Obama administration sought a new negotiation after New START’s conclusion with the goal of including all U.S. and Russian nuclear weapons. That idea never gained traction in Moscow.

If New START expires in 2021, the United States and Russia likely would not launch major new build-ups, as both face real defense budget constraints. But their deployed strategic warhead levels could “creep up” above the number allowed by New START if the sides add warheads to intercontinental ballistic missiles (ICBMs) and/or submarine-launched ballistic missiles (SLBMs) that currently carry fewer warheads than their capacity. With the demise of New START’s verification regime, the sides would have little visibility into the other’s actions regarding adding warheads or total warhead numbers.

Some appear to believe that holding back on agreeing to the extension of New START and/or starting from scratch in a new negotiation might increase U.S. leverage to include all nuclear arms, including non-strategic nuclear weapons. That does not appear to be the case. It is more likely that the end of New START’s constraints on deployed strategic weapons would make bringing non-strategic or non-deployed nuclear weapons under control more difficult.

MISSILE DEFENSE

Russian conditions for discussing a broader agreement focus first on missile defense. Differences over missile defense pose a challenge for arms control.

Current U.S. missile defenses hardly constitute a threat to Russian ICBM and SLBM warhead numbers. Moscow, however, has long seemed to fear the potential of U.S. technology and prospective missile defenses. The United States and Russia came close in spring 2011 to an arrangement on a cooperative missile defense for Europe, but they failed to reach agreement, after which the Russian position on limiting missile defenses hardened. Moscow showed no interest in a 2013 U.S. proposal for an executive agreement on missile defense transparency, under which the sides would have exchanged information each year on their current missile defense numbers and prospective numbers looking out each year for 10 years.

Moscow appears to want legally-binding limits on missile defenses. However, the Trump administration’s 2019 missile defense posture review stressed that there should be no negotiated limits on missile defense. Missile defense has a strong constituency in the U.S. Senate, impeding the chance that a treaty limiting missile defenses would get the necessary two-thirds approval.

The missile defense issue will become more complex in coming years. As part of its ground-based mid-course defense, the U.S. military maintains 44 ground-based interceptors in Alaska and California capable of intercepting strategic ballistic missile warheads, with another 20 interceptors planned. In a separate program, the Pentagon is now developing a new variant of the SM-3 missile interceptor. Whereas current variants (the SM-3 IA and SM-3 IB) can engage intermediate-range ballistic missile warheads, the Pentagon intends to test the new SM-3 IIA variant against an ICBM warhead.

If the SM-3 IIA proves capable of intercepting strategic ballistic missile warheads, that will raise concern in Moscow (and Beijing) about the proliferation of those interceptors on U.S. warships, at Aegis Ashore sites in Romania and Poland, and elsewhere. Russia’s interest in limits on missile defenses would only intensify as would Moscow’s linkage of future nuclear arms reduction negotiations to a negotiation on missile defense.

LONG-RANGE PRECISION-GUIDED CONVENTIONAL STRIKE

Sea-launched cruise missiles (SLCMs) and air-launched cruise missiles (ALCMs) carrying conventional warheads have never been constrained by arms control agreements. As their precision has increased, Russian officials and experts have expressed concern that they could destroy targets that previously would have required a nuclear weapon and that the United States might consider a “conventional strategic” attack on Russia. It is unclear how realistic this concern is; would, for example, a conventionally-armed U.S. SLCM warhead be powerful enough to disable a hardened Russian ICBM silo?

Russian officials in 2011 began linking long-range precision-guided conventional strike systems to the issue of further nuclear arms cuts. The Pentagon has shown little enthusiasm for limits on these conventional systems, which are a key component of U.S. power projection capabilities. Russia may be starting to catch up, having demonstrated conventionally-armed ALCMs and SLCMs in Syria, but the U.S. military holds a significant numerical advantage.

As with missile defense, the situation with conventional strike may become even more complex. With the demise of the INF Treaty, the Pentagon is now developing or planning several conventionally-armed ground-launched missiles that would have been prohibited by the treaty. Two missiles — the Precision Strike Missile with a possible range of 700 kilometers and a ground-launched cruise missile with a range of 1,000 kilometers — almost certainly are being developed with European contingencies in mind. The Pentagon’s planned ballistic missile with a range of 3,000-4,000 kilometers is intended for the Asia-Pacific region, primarily as a counter to the large number of Chinese intermediate-range missiles (most of which are believed to be conventionally-armed).

Developing and deploying these U.S. missiles — along with Russia’s continued deployment of the 9M729 intermediate-range ground-launched cruise missile plus other missiles that Russia may develop and deploy as “counters” to new U.S. missiles — would further complicate the long-range precision-guide conventional strike picture. That, if in turn linked to nuclear arms control, would impede negotiation of a new agreement reducing and limiting nuclear weapons.

HYPERSONIC, CYBER, AND SPACE

Hypersonic weapons pose another complex factor for arms controllers. Both the United States and Russia (as well as China) are developing hypersonic weapons, including hypersonic glide vehicles to mount on ballistic missiles and hypersonic cruise missiles. Russia has deployed a small number of Avangard hypersonic glide vehicles atop ICBMs to enhance their ability to overcome U.S. missile defenses. Those fall under New START’s limits, but future hypersonic weapons, such as Russia’s Kinzhal air-launched ballistic missile, do not.

A negotiation to limit nuclear arms or long-range precision-guided conventional strike systems would have to take account of hypersonic weapons. That could be difficult, as the United States, Russia, and China appear to be focusing on different types of hypersonic systems.

Cyber and space domains can also have important effects on the nuclear arms relationship. Cyber raises concern about the possibility that a side’s nuclear command, control, and communication systems might be compromised in ways that would allow an intruder either to disrupt communications, including an authorized launch order, or to spoof the system with an unauthorized instruction. The cyber domain does not lend itself readily to traditional arms control-type arrangements.

As for space, Moscow has long advanced proposals to ban the weaponization or militarization of space. Washington has resisted those proposals, in part out of concern that they might affect the ability of the U.S. military to operate space-based assets for command and control, early warning, and intelligence, surveillance, and reconnaissance purposes. It is unclear whether more limited proposals, such as a ban on anti-satellite tests that generate orbital debris or a ban on deploying strike weapons in space, might be negotiable.

DIFFICULT TRADE-OFFS

Traditional nuclear arms control is in trouble. If the United States and Russia — and perhaps other countries in the future — wish to continue to use it as a tool to promote a more stable, secure, and transparent nuclear relationship, they will have to deal with challenges that did not arise or that they could agree to set aside during past negotiations.

Washington faces a fundamental choice: Is it prepared to countenance some constraints on missile defense and possibly long-range precision-guided conventional strike systems in order to get Russia to agree to further reduce and limit nuclear arms, including non-strategic nuclear weapons? Moscow faces something of the reverse choice: Will it hold to its insistence on limiting missile defenses and conventional strike systems even if that blocks a future nuclear arms agreement with the United States?

There remains the question of China, and Russia almost certainly would seek to include Britain and France. Would those third countries be willing to consider an approach other than a full negotiation with the United States and Russia, perhaps by offering a degree of transparency regarding their nuclear forces and committing unilaterally not to increase their nuclear weapons numbers so long as U.S. and Russian nuclear forces were reducing?

It would make sense for U.S. and Russian officials to conduct regular, intense bilateral strategic stability talks on the full range of issues — nuclear arms, missile defense, conventional strike systems, hypersonic weapons, third-country nuclear forces, cyber, and space — and their various interactions. Such discussions, if they go beyond mere recital of talking points, might allay some concerns the sides hold about the other while helping U.S. and Russian officials to decide whether specific negotiations might make sense.

None of these questions will be easy, and sorting them out will take time. That bolsters the already strong argument for extending New START. Doing so would give Washington and Moscow five more years to figure out what role, if any, arms control should play in managing their nuclear relationship with one another and, perhaps, with third countries.

 

Originally for Brookings

 

 

 

All News button
1
News Type
News
Date
Paragraphs

The headlines about the United States and China have been dominated by the spread of COVID-19 and trade deal negotiations. Experts in U.S.-China relations have warned against preemptive disengagement in a time of increased need for international cooperation and coordination, even as tensions between the two countries continue to escalate in the media.

From Adam Segal's perspective, as an expert in security issues, technology development, and Chinese domestic and foreign policy at the Council on Foreign Relations, one of the emerging considerations that will prominently affect the tone and timbre of the relationship between the United States and China in the coming years is how the two nations compete with one another in technological and scientific research and innovation. He delved further into this topic in a lecture as part of the China Program's winter/spring colloquia series.

[To get more stories like this delivered to your inbox, sign up for our newsletters]

As Segal and others describe, both the United States and China benefitted immensely from the globalization of scientific research and collaboration, but in recent years, both have also become wary of sharing talent and resources too broadly or across too many sectors. As a result, each country has taken various measures in an attempt to gain and regain perceived advantages over the other.

As China has tried to move up the so-called economic value chain from being an overwhelmingly manufacturing and heavy industry-based economy to being a leader in tech and digital economies, it has simultaneously tried to wean itself from a dependence on foreign technological infrastructure. In its efforts to create indigenous innovation and technological growth, it has openly tried to court talent and intelligence from overseas. To the United State's rising concern, however, the Chinese government has been less open about the means used to accomplish this aim.

On its part, the United States has upped its efforts to expand cybersecurity research and initiatives. The Trump administration has very vocally critiqued companies such as Huawei and urged allies to step back from business with the telecom and networking giant. Similarly, allegations of espionage against native Chinese and Chinese-American scientists and academics have escalated in recent months.

Segal argues that these simmering tensions signify the growing awareness each country has of the other's increasing capabilities in the cybersphere, as well as a heightened understanding and awareness of the shortcomings of their own systems.

"I think technology, which had usually been a fifth, sixth, seventh on the agenda in the U.S.-China relationship, is going to continue to be one of the defining issues that structure the relationship, and increasingly is one not just about concerns about national security, but about values and how we think about how technology is applied, and governance issues."

To watch Segal's full lecture, click the video below or find it on our YouTube channel. A transcript of his remarks is available

Hero Image
All News button
1
News Type
News
Date
Paragraphs

The Great Wall of China is one of Asia’s most photographed and visited landmarks. Built over thousands of years and winding through a total of 13,170 miles, this wide-reaching network of defenses was constructed as a barrier against China’s northern neighbors. But within the digital landscape of China is a much less conspicuous yet far more pervasive set of fortifications: the Great Firewall. China’s state-operated internet is carefully controlled, heavily censored, and designed to keep its own citizens away from information that might damage the power and perception of the Communist Party.

Image
Portrait of Margaret Roberts
Margaret Roberts, an assistant professor in political science at the University of California San Diego, has spent most of her career trying to unravel the puzzlements and intricacies of China’s Great Firewall and how this kind of calculated, pervasive internet censorship is used strategically to divide the public and target influencers. In a recent presentation at the China Program’s 2020 winter/spring colloquia series, she unpacked some of her findings.

In Robert’s assessment, the Great Firewall is an example of censorship via what she terms “friction.” Rather than centering on fear, this type of censorship acts as a tax on information, creating small inconveniences that are easy to explain away and requiring those seeking information to spend more time and money if they want access to it. Censorship thus “works through distraction and diversion. It nudges — but does not force — most users away from unsavory material.”

This framing of censorship, Robert says, helps explain why, even though China’s Great Firewall is porous and can be circumvented, the number of people who “jump the wall” using a virtual private network (VPN) remains relatively low. People are not necessarily afraid of legal or political consequences of using a VPN, but rather the process of doing so is deemed too bothersome or offers too little value for the effort in most people’s day-to-day lives.

This friction-driven censorship is, therefore, effective on two levels: it keeps the majority of citizens away from sensitive material by making it too labor-intensive for them to access, and it naturally filters for outlier individuals the government has an interest in monitoring. According to Robert’s data, VPN users are overwhelmingly 35-year-old and younger, tend to be college degree holders, have fluency in English, have traveled or studied outside of China, and are interested in international politics — precisely the kinds of cohorts the Communist Party would benefit from managing more closely.

However, these digital demographics shift dramatically to include much broader groups of people during crises and following abrupt interruptions to citizen’s daily lives. Through analysis of Chinese social media data, online experiments, and nationally representative surveys, Roberts shows how the number of VPN  downloads spiked during the devastating Tianjin chemical explosion in 2015 as people scrambled to find information on the disaster. VPN downloads also increased after the shutdown of Instagram on September 29, 2014, following protests in Hong Kong. The Chinese government barred access to the platform to contain posts about the protests, but Roberts says that it was the sudden loss of access to the social media platform’s draw of entertainment that pulled many more “everyday” citizens over the firewall than would be typical. Once over, these new users quickly moved from accessing pictures of pop stars to exploring banned websites and censored information in more political spaces.

This is one of the important takeaways Roberts sees in her work. “This porous nature of censorship . . . means that there’s an Achilles heel of friction, which is that during crises, or sudden, more visible [moments of] censorship, people are willing to seek out that type of information and that can undermine some of these other strategies.”

With the Great Firewall only a few decades old, the full effects of its friction-based barricades remain to be seen, but Roberts is certain that in the coming years, the control of access to and accuracy of online information will have important effects not only on modern China but the future digital world as a whole.

You can learn more about Margaret Robert’s work in her book, Censored: Distraction and Diversion Inside China’s Great Firewall.

All News button
1
Authors
Herbert Lin
News Type
Commentary
Date
Paragraphs

While everyone was distracted with Justice Department controversies and the New Hampshire primary, a senior Huawei official has conceded that the company can clandestinely access users’ mobile networks. 

On Feb. 11, the Wall Street Journal ran a story citing U.S. officials who claimed that Huawei can “covertly access mobile-phone networks around the world through ‘back doors’ designed for use by law enforcement.” In other words, these officials claimed that Huawei can exploit backdoors intended for law enforcement in order to access user data without the permission of either users or the network operator. The Journal also quoted National Security Adviser Robert O’Brien as saying, “We have evidence that Huawei has the capability secretly to access sensitive and personal information in systems it maintains and sells around the world.”

 

Read the Rest at Lawfare

 

All News button
1
-

This event is co-sponsored with the Project on Russian Power and Purpose in the 21st Century

 

Seminar Recording:   https://youtu.be/5gWmnsTD0MA

 

About this Event: Russia has deployed cyber operations to interfere in foreign elections, launch disinformation campaigns, and cripple neighboring states—yet the regime has also maintained a thin veneer of deniability and avoided strikes that cross the line into acts of war. How should a targeted nation respond? The international effort to counter Russian cyber operations by imposing sanctions and indictments, in combination with a new defend forward approach, has done little to alter Moscow’s behavior.  Therefore, in his new book on Russian Cyber Operations, Scott Jasper takes a deep dive into the legal and technical maneuvers that are used to avoid consequences, proposing that nations develop robust solutions for resilience to withstand future attacks.

 

About the Speaker: Scott Jasper, CAPT, USN (ret) is a Lecturer at the National Security Affairs Department and the Institute for Security Government at the Naval Postgraduate School, specializing in defense strategy, hybrid warfare, and cyber policy. Scott has published chapters in various handbooks related to cybersecurity and articles in Strategic Studies Quarterly, the International Journal of Intelligence and CounterIntelligence, United States Cybersecurity Magazine, The National InterestSmall Wars Journal, and The Diplomat. He is the author of Russian Cyber Operations: Coding the Boundaries of ConflictStrategic Cyber Deterrence: The Active Cyber Defense Option and editor of Conflict and Cooperation in the Global Commons, Security Freedom in the Global Commons, and Transforming Defense Capabilities: New Approaches for International Security. He received his Ph.D. from the University of Reading, U.K. 

Virtual Seminar

Scott Jasper Naval Postgraduate School
Seminars
Authors
Herbert Lin
News Type
Commentary
Date
Paragraphs

“As the confusion that was the Iowa caucuses unfolds, there will be a lot of questions about what happened and how to avoid it in the future. But the results, ultimately, will be clear and undisputed because, amid everything they did wrong, the Iowa Democratic Party did one thing right: It required that votes be counted on paper, and then tallied electronically,” writes Herb Lin in the Conversation. To those of us who study cybersecurity carefully, that’s crucial."

 

Read the Rest at The Conversation

All News button
1
-

IMPORTANT EVENT UPDATE: 

In keeping with Stanford University's March 3 message to the campus community on COVID-19 and current recommendations of the CDC, the Asia-Pacific Research Center is electing to postpone this event until further notice. We apologize for any inconvenience this may cause, and appreciate your understanding and cooperation as we do our best to keep our community healthy and well. 

 

Data-intensive technologies such as AI may reshape the modern world. We propose that two features of data interact to shape innovation in data-intensive economies: first, states are key collectors and repositories of data; second, data is a non-rival input in innovation. We document the importance of state-collected data for innovation using comprehensive data on Chinese facial recognition AI firms and government contracts. Firms produce more commercial software and patents, particularly data-intensive ones, after receiving government public security contracts. Moreover, effects are largest when contracts provide more data. We then build a directed technical change model to study the state's role in three applications: autocracies demanding AI for surveillance purposes, data-driven industrial policy, and data regulation due to privacy concerns. When the degree of non-rivalry is as strong as our empirical evidence suggests, the state's collection and processing of data can shape the direction of innovation and growth of data-intensive economies.

Image
Portrait of David Yang
David Yang’s research focuses on political economy, behavioral and experimental economics, economic history, and cultural economics. In particular, David studies the forces of stability and forces of changes in authoritarian regimes, drawing lessons from historical and contemporary China. David received a B.A. in Statistics and B.S. in Business Administration from University of California at Berkeley, and PhD in Economics from Stanford. David is currently a Prize Fellow in Economics, History, and Politics at Harvard and a Postdoctoral Fellow at J-PAL at MIT. He also joined Harvard’s Economics Department as an Assistant Professor as of 2020.

David Yang Prize Fellow in Economics, History, and Politics; Department of Economics, Harvard University
Seminars
Authors
Herbert Lin
News Type
Commentary
Date
Paragraphs

In a story released on Christmas Day, 2019, the Washington Post reported that U.S. Cyber Command is “developing information warfare tactics that could be deployed against senior Russian officials and oligarchs if Moscow tries to interfere in the 2020 U.S. elections through hacking election systems or sowing widespread discord.” According to this story, one option being explored is the targeting of “senior leadership and Russian elites (though probably not President Vladimir Putin, which would be considered too provocative)” to demonstrate that the “sensitive personal data” of these individuals could be hit if the election interference did not stop. The Post article also quotes Lawfare’s Bobby Chesney saying that such actions would send “credible signals to key decision-makers that they are vulnerable if they take certain adversarial actions.” Photo: U.S. Cyber Command Public Affairs

 

Read the Rest at The LawFare Blog

All News button
1
Subscribe to Cybersecurity