Page 2 of
2 Will the
Apocalypse arrive online? By
Karen J Greenberg
Once the information has
been shared within the government, who's to say
how long it will be held and how it will be used
in the future? Or what agency guidelines exist, if
any, to ensure that it won't be warehoused for
future uses of quite a different sort? As former
Department of Homeland Security head Michael
Chertoff put it, "You need to have a certain
amount of accountability so government doesn't run
roughshod [over people's right to privacy], and
that's been a hard thing to architect."
Enemy creep. If you think it has
been difficult to distinguish enemies reliably
from the rest of us in the "war on terror" (as in
the 600 Guantanamo detainees that the Bush
administration
finally declared "no
longer enemy combatants" and sent home), try
figuring it out in cyberspace. Sorting out just
who launched an attack and in whose name can be
excruciatingly difficult. Even if, for example,
you locate the server that introduced the virus,
how do you determine on whose behalf such an
attack was launched? Was it a state or non-state
actor? Was it a proxy or an original attack?
The crisis of how to determine the enemy
in virtual space opens up a host of disturbing
possibilities, not just for mistakes, but for
convenient blaming. After all, George W Bush's top
officials went to war in Iraq labeling Saddam
Hussein an ally of al-Qaeda, even when they knew
it wasn't true. Who is to say that a US president
won't use the very difficulty of naming an online
enemy as an excuse to blame a more convenient
target?
War or crime? And what if
that enemy is domestic rather than international?
Will its followers be deemed "enemy combatants" or
"lawbreakers"? If this doesn't already sound
chillingly familiar to you, it should. It was an
early theme of the "war on terror" where,
beginning with its very name, "war" won out over
crime.
Cyberattacks will raise similar
questions, but the stakes will be even higher. Is
a hacker attempting to steal money working on his
own or for a terrorist group, or is he in essence
a front for an enemy state eager to take down the
US? As Kelly Jackson Higgins, senior editor at the
information security blog Dark Reading, reminds
us, "Hackers posing as other hackers can basically
encourage conflict among other nations or
organizations, experts say, and sit back and
watch."
Expanding presidential
fiat. National-security professionals like
Defense Secretary Panetta are already encouraging
another cyber-development that will mimic the "war
on terror". Crucial decisions, they argue, should
be the president's alone, leaving Congress and the
American people out in the cold. President Bush,
of course, reserved the right to determine who was
an enemy combatant. President Obama has reserved
the right to choose individuals for drone
assassination on his own.
Now, an ever
less checked-and-balanced executive is going to be
given war powers in cyberspace. In fact, we know
that this is already the case, that the last two
US administrations have launched the first state
cyberwar in history - against Iran and its nuclear
program. Going forward, the White House is likely
to be left with the power of deciding who is a
cyberattacker, and when and how such enemies
should be attacked.
In Panetta's words,
"If we detect an imminent threat of attack that
will cause significant, physical destruction in
the United States or kill American citizens, we
need to have the option to take action against
those who would attack us to defend this nation
when directed by the president."
Given the
complex and secretive world of cyberattacks and
cyberwar, who is going to cry foul when the
president alone makes such a decision? Who will
even know?
Secrecy creep. While
government officials are out in full force warning
of the incipient cyber-threat to our way of life,
it's becoming ever clearer that the relationship
between classified information, covert activities,
and what the public can know is being further
challenged by the new cyber-world. In the "war on
terror" years, a cult of government secrecy has
spread, while Obama administration attacks on
government leakers have reached new heights. On
the other hand, Julian Assange and WikiLeaks made
the ability to access previously classified
information a household premise.
So the
attempt to create an aura of secrecy around
governmental acts is on the rise and yet
government secrets seem ever more at risk. For
example, the US intended to keep the Stuxnet
virus, launched anonymously against Iranian
nuclear facilities, a secret. Not only did the
attacks themselves become public knowledge, but
eventually the US-Israeli ownership of the attack
leaked out as well. The old adage "the truth will
out" certainly seems alive today, and yet the
governmental urge for secrecy still remains
ascendant.
The question is: Will there be
a heightened call - however futile - for increased
secrecy and the ever more draconian punishment of
leakers, as has been the case in the "war on
terror"? Will the strong arm of government
threaten, in an ever more draconian manner, the
media, leakers, and those demanding transparency
in the name of exposing lawless policies - as has
happened with Central Intelligence Agency leaker
John Kiriakou, New York Times reporter James
Risen, and others?
Facing the
cyber-age When it comes to issues like
access to information and civil-liberties
protections, it could very well be that the era of
Big Brother is almost upon us, whether we like it
or not, and that fighting against it is obsolete
behavior. On the other hand, perhaps we're heading
into a future in which the government will have to
accept that it cannot keep secrets as it once did.
Whatever the case, most of us face enormous
unknowns when it comes to how the cyber-world,
cyber-dangers, and also heightened cyber-fears
will affect both America's security and Americans'
liberties.
On the eve of the US
presidential election, it is noteworthy that
neither candidate has had the urge to discuss
cyber-security lately. And yet the US has launched
a cyberwar and has seemingly recently experienced
the first case of cyber-blowback. The websites of
several of the major banks were attacked last
month, presumably by Iran, interrupting online
access to accounts.
With so little
reliable information in the public sphere and so
many potential pitfalls, both Obama and his
challenger Mitt Romney seem to have decided that
it's just not worth their while to raise the
issue. In this, they have followed Congress'
example. The failure to pass regulatory
legislation this year on the subject revealed a
bipartisan unwillingness of US representatives to
expose themselves to political risk when it comes
to cyber-legislation.
Whether officials
and policymakers are willing to make the tough
decisions or not, cyber-vulnerabilities are more
of a reality than was the threat of sleeper cells
after September 11, 2001. It may be a stretch to
go from cynicism and distrust in the face of
color-coded threat levels to the prospect of
cyberwar, but it's one that needs to be taken.
Given what we know about fear and the
destructive reactions it can produce, it would be
wise to jump-start the protections of law,
personal liberties and governmental
accountability. Whoever the next US president may
be, the cyber-age is upon us, carrying with it a
new threat to liberty in the name of security.
It's time now - before either an actual attack or
a legitimate fear of such an attack - to protect
what's so precious in American life, its
liberties.
Karen Greenberg is
the director of the Center on National Security at
Fordham Law School, a TomDispatch regular, and the
author of The Least Worst Place: Guantanamo's
First One Hundred Days, as well as the editor
of The Torture Debate in America. Research
assistance for this article was provided by Jason
Burke and Martin West.
Head
Office: Unit B, 16/F, Li Dong Building, No. 9 Li Yuen Street East,
Central, Hong Kong Thailand Bureau:
11/13 Petchkasem Road, Hua Hin, Prachuab Kirikhan, Thailand 77110