From Tunisia to Wikileaks to the Stuxnet worm, a cascade of cyberevents
The number of major 鈥渃yberevents,鈥 to use a new term, seems to be accelerating with the speed of a cyclotron. Consider just these recent few:
1. The popularity of Facebook and Twitter in Tunisia helped rally the people in that Arab country this month to overthrow a police state 鈥 one of many revolutions driven by the Internet鈥檚 rapid connectivity, including social media.
2. With a small memory card, a low-level soldier was allegedly able to download classified US documents and give them to the website WikiLeaks, exposing embarrassing diplomatic secrets.
3. A computer worm known as Stuxnet has reportedly destroyed many Iranian centrifuges enriching uranium. The cyber-attack may have delayed that country鈥檚 nuclear ambition by years.
The world can expect more such digital tipping points in the future. Cyberevents will be capable of altering the course of history, some for good, some for ill. They may often be unseen, often without anyone taking credit, often the tool of the weak against the strong.
They can be driven by governments, human rights groups, criminal cartels, or anyone on top of the latest software advances. These events also come with their own terms of art: hactivists, Internet off-switch, malware, logic bombs, botnets, zero-day exploits, and so on.
The phenomenon is so relatively new that it is difficult to comprehend in all its aspects. It鈥檚 also difficult to predict the next big 鈥渆vent.鈥 And it鈥檚 difficult to guard against or to guide these immense capabilities.
鈥淭he remarkable speed of change in the cyberworld 鈥 hardware, software, interconnectivity 鈥 and the ever-new social, cultural and economic structures being created 鈥 makes it essential that there is frequent re-assessment of the associated patterns of threat,鈥 concludes , a group of 34 wealthy nations.
The report also makes this warning: 鈥淯nfortunately too many published assessments have favored sensationalism over careful analysis.鈥
Indeed, a less-sensational approach is needed to counter the new fears over negative cyberevents: cyberwar, cybercrime, cyberanarchy, or cyberterrorism. Individual users of electronic products and the Internet need calm directions on how to safeguard their privacy. Businesses need accurate information on the risks of cyberattacks, and how to manage them.
Governments are only beginning to act. President Obama set up a Cyber Command in the Pentagon. Britain has a Cyber Security Operations Centre.
The issue of cyberwarfare was on the agenda last week during a Chinese-US summit. It appears the two leaders made little progress. Instead, they may need to take their respective concerns to the United Nations, where steps toward negotiations on a computer security treaty began only last year.
One difficulty lies in balancing the benefits of the digital age with its abuses. Pushing openness on the Internet 鈥 such as allowing free use of social media in closed countries 鈥 must be weighed against concerns about privacy, crime, even warfare that can knock out a nation鈥檚 electronic infrastructure.
Internet freedom lies at the heart of US diplomacy to promote freedom, says Secretary of State Hillary Rodham Clinton. And yet, US Secretary of Defense Robert Gates stated in a Jan. 17 speech: 鈥淛ust as no one in 1960 could have predicted the need for cyber-security or the challenges of a truly global economic order, we can鈥檛 know with certainty what next threats and opportunities our nations will face.鈥
Cyberspace, warns Adm. Mike Mullen, chairman of the Joint Chiefs of Staff, has no rules and no boundaries. 鈥淚t鈥檚 an enormously complex and critical area that all of us need to understand a lot better and do a lot more about.鈥
The machine age of the 19th and 20th centuries produced both good and bad results 鈥 disastrous wars but better standards of living. How will mankind direct the digital age of the 21st century to avoid the negative consequences of cyberevents?