Dr Herb Lin, Senior Research Scholar,
Stanford University, is speaking on "Cyber-enabled information warfare and the end of the Enlightenment" at the Australian National University in Canberra. He argues that Information Warfare and Influence Operations (IWIO) is a hostile act, but not "warfare" under the UN Charter and laws of war. I agree that using the Internet to influence an enemy is just an extension of previous analog information techniques, but I am not sure those being targeted would not see it as warfare.
Dr Lin's characterizes IWIO operations as being effective, with the use of violence. However, the doctrine of the USA (and Australia) is to respond to cyber attacks based on the effect the attack has, not the nature of the weapons used:
"When warranted, the United States will respond to hostile acts in cyberspace as we would to any other threat to our country. ... We reserve the right to use all necessary means—diplomatic, informational, military, and economic—as appropriate and consistent with applicable international law, in order to defend our Nation, our allies, our partners, and our interests.”I suggest that if IWIO has a damaging effect on a nation, that nation will respond accordingly. If the attacked nation has a IWIO capability, then they may use that to respond, but reciprocity doesn't require that.
From: International Strategy for Cyberspace, The Whitehouse, May 2011
Conventional military forces could be used to respond to IWIO, despite the problem that this may play into the information agenda of the attacker. For this reason a nation may use a covert kinetic military response to IWIO.
Dr Lin discussed ways to disarm a information warfare attack, by carefully identifying the attacker and their motives, as well as debunking false claims made. However, this task may be made more difficult, I suggest, by the nation's own politicians and organizations using the same IW techniques for political campaigning and marketing.
Dr Lin asserted cyber warfare is not a threat to civilization. I don't agree. Conventional and nuclear weapons can only kill people, but cyber war can kill an idea.
Dr Lin used the example of the Russian Government allegedly funding both "black lives matter" and "while lives matter" campaigns in social media in the USA, to spread discontent. These he characterized as chaos-producing operations. While such attacks existed before the Internet, they can now be carried out much easier on-line.
As an example, the technique of fuzzing with AI (Rajpal, Blum & Singh, 2017) might be applied to IW. With fuzzing is used to test the security of computer systems by generating a large number of sets of test data. AI can be used to see which sets are most effective for breaking into a system. The same could be (and may already be) applied to IW: the attacker would generate a large number of variations on a message, such as "black lives matter" and AI would be used to refine the versions of the message which are most effective at creating discontent. On-line marketers already use similar techniques to measure the effectiveness of advertising, by sending slightly different advertisements to individual consumers. However the use of AI could speed up the process. It may that social media is itself is a form of inadvertent IW attack, with a reports linking social media use and depression in teenagers.
One one the more amusing parts of Dr Lin's entertaining presentation was a clip from Star Trek Deep Space Nine:
As an example, the technique of fuzzing with AI (Rajpal, Blum & Singh, 2017) might be applied to IW. With fuzzing is used to test the security of computer systems by generating a large number of sets of test data. AI can be used to see which sets are most effective for breaking into a system. The same could be (and may already be) applied to IW: the attacker would generate a large number of variations on a message, such as "black lives matter" and AI would be used to refine the versions of the message which are most effective at creating discontent. On-line marketers already use similar techniques to measure the effectiveness of advertising, by sending slightly different advertisements to individual consumers. However the use of AI could speed up the process. It may that social media is itself is a form of inadvertent IW attack, with a reports linking social media use and depression in teenagers.
One one the more amusing parts of Dr Lin's entertaining presentation was a clip from Star Trek Deep Space Nine:
"The truth is usually just an excuse for lack of imagination ...".
From "The Wire", script by Robert Hewitt Wolfe, Episode 2x22, Production number: 40512-442, First aired: 8 May 1994).
Start Trek presented an idealized image of a united world where a western (mostly US) world view had prevailed. This form of soft-power perhaps should not be underestimated.
Dr Lin's "On Cyber-Enabled Information/Influence Warfare and Manipulation" with Jackie Kerr is to be published in the Oxford Handbook of Cybersecurity (2018).
Dr Lin's "On Cyber-Enabled Information/Influence Warfare and Manipulation" with Jackie Kerr is to be published in the Oxford Handbook of Cybersecurity (2018).
"The West has no peer competitors in conventional military power. But its adversaries are increasingly turning to asymmetric methods for engaging in conflict. In this public seminar, Dr Herb Lin will address cyber-enabled information warfare (CEIW) as a form of conflict or confrontation to which the Western democracies are particularly vulnerable.CEIW applies the features of modern information and communications technology to age-old techniques of propaganda, deception, and chaos production to confuse, mislead, and perhaps to influence the choices and decisions that the adversary makes. A recent example of CEIW can be seen in the Russian hacks on the US presidential election in 2016. CEIW is a hostile activity, or at least an activity that is conducted between two parties whose interests are not well-aligned, but it does not constitute warfare in the sense that international law or domestic institutions construe it. Some approaches to counter CEIW show some promise of having some modest but valuable defensive effect. If better solutions for countering CEIW waged against free and democratic societies are not forthcoming, societal discourse will no longer be grounded in reason and objective reality – an outcome that can fairly be called the end of the Enlightenment."
References
Rajpal, M., Blum, W., & Singh, R. (2017). Not all bytes are equal: Neural byte sieve for fuzzing. arXiv preprint arXiv:1711.04596. URL https://arxiv.org/abs/1711.04596
No comments:
Post a Comment