Skip to main content

Cyber arms control? Forget about it

By Christopher Bronk and Dan Wallach, Special to CNN
March 26, 2013 -- Updated 1243 GMT (2043 HKT)
Monitors display the hacked Greek ministry of justice website on February 3, 2012.
Monitors display the hacked Greek ministry of justice website on February 3, 2012.
STORY HIGHLIGHTS
  • Christopher Bronk, Dan Wallach: Cyber arms control is unlikely to happen soon
  • Bronk, Wallach: Cyberattacks can be crafted and launched by individuals, groups
  • They say nations don't even have to be involved for an attack to have impact
  • Bronk, Wallach: It's hard to get rid of cyberattacks, but they can be curbed with diplomacy

Editor's note: Christopher Bronk and Dan Wallach teach and research computer security issues at Rice University.

(CNN) -- With the advent of "cyberwar," a poorly defined term that seems to be used as a catch-all phrase for all manners of computer-related attacks, it's natural to ask about cyber arms control. Richard Clarke, former cybersecurity adviser to President Obama, has advocated along with others for cyber arms control or new legal rules for war in cyberspace.

If governments have the ability to build the tools of cyberwarfare, then presumably, they can regulate and control them. But realistically, it's unlikely that cyber arms control will happen anytime soon.

When we think of arms control, we consider the efforts of the Cold War, which dramatically cut the number of nuclear weapons and other strategic armaments, from the period of detente to the eventual collapse of the Soviet Union. Arms control works fairly well for managing the arsenals of weapons that are large and complex.

Christopher Bronk
Christopher Bronk

However, cyberweapons are of a different league. All you need is training in computer software engineering and some talent. On the Internet, there is readily available literature on coding and hacking, and of course, a plethora of open source tools. Just as easy as it is to be an effective cyberdefender, you can learn to be an effective offensive cyber-operator.

Dan Wallach
Dan Wallach

Cyber attacks can be crafted and used by individuals or groups. Importantly, they can make impact even without significant involvement from a nation.

For example, the Anonymous hacker group is able to disrupt major corporations and even countries with its campaigns for transparency. Furthermore, when Anonymous is unable to disrupt a target, it typically resorts to overtaking websites with massive denial of service attacks.

Become a fan of CNNOpinion
Stay up to date on the latest opinion, analysis and conversations through social media. Join us at Facebook/CNNOpinion and follow us @CNNOpinion on Twitter. We welcome your ideas and comments.



Despite the role of nonstate players, it is the brinkmanship between countries in cyberspace that make the big headlines.

Mandiant, a cybersecurity company, reported a series of cyber attacks on U.S. companies that was traced to China's People's Liberation Army unit 61398 based in Shanghai. One of the lessons in the analysis is how remarkably effective the Chinese attackers were despite a stunning lack of sophistication and sloppiness in their tradecraft.

In contrast, our biggest and most innovative corporations have developed and deployed sophisticated defense systems that still seem to be regularly breached, despite the efforts of their comically inept adversaries. If the Chinese PLA ever gets its act together, we're in real trouble.

Meet South Korea's 'cyber warriors'

How might this get worse? We already know that cyber-espionage can harm companies. The risks of cybersabotage can be worse.

For example, industrial control systems are largely computer controlled and they can be reached in some cases from the Internet. Future terrorist organizations could cause spectacular physical and economic damage to our refineries, power plants, water systems, pipelines and other important systems without leaving a marked trail or suffering significant personal risk.

In the wake of the Stuxnet attacks on Iran's uranium-refinement centrifuges or the Shamoon attack on Saudi Aramco's computers, cybersabotage can no longer be considered theoretical. It is happening now.

It's not difficult to imagine a future in which cyber attacks become more frequent or serious. In such a world, there will be a need for diplomacy and norm-setting among the international community.

But if we ever wanted to consider treaties on cyber disarmament, or regulations on the use of hacking tools by those wishing to do more than simply spy or steal, we would become immediately stymied by how to enforce the rules.

Barring a radical change in the technological playing field, there will never be an effective cyber equivalent of the International Atomic Energy Agency despite all the aspirations of organizations like the International Telecommunications Union to serve such a function. The very idea that an international organization could enforce rules on the misuse of computers is ludicrous.

The problem of cyber arms control is akin to the greatest arms control failure of the Cold War, which still persists: the mass distribution of the most produced firearm in human history, the Kalashnikov AK-47.

According to the World Bank, as many as 100 million of these brutally simple weapons are scattered across the globe (roughly one for every 70 people on the planet, and that excludes the millions of Western military rifles out there, too). From every major trouble spot, we see footage of Kalashnikov-wielding soldiers, terrorists and rebels.

Global attempts to sweep up such weapons, as well as their bigger and more volatile relatives -- rocket-propelled grenades -- have been mostly ineffective. The U.N. has worked for more than a decade on an Arms Trade Treaty designed to limit the illicit trade of such weapons, but a final draft of the treaty is stalled.

For better or for worse, the Internet has become one more field upon which the game of nations is played.

Just as the Internet can be used for sharing information and enabling commerce, it can also be used to steal secrets and to cause damage. In the short term, we might see private industry adopt defensive practices. In the long term, while we may never be able to eliminate electronic espionage, we may be able to reduce its reach through vigilance and diplomacy. As for cyber arms control, forget about it.

Follow us on Twitter @CNNOpinion

Join us on Facebook/CNNOpinion

The opinions expressed in this commentary are solely those of Christopher Bronk and Dan Wallach.

ADVERTISEMENT
Part of complete coverage on
April 17, 2014 -- Updated 1845 GMT (0245 HKT)
Michael Bloomberg and Shannon Watts say Americans are ready for sensible gun laws, but politicians are cowed by the NRA. Everytown for Gun Safety will prove the NRA is not that powerful.
April 17, 2014 -- Updated 1328 GMT (2128 HKT)
Ruben Navarrette says Steve Israel is right: Some Republicans encourage anti-Latino prejudice. But that kind of bias is not limited to the GOP.
April 16, 2014 -- Updated 2323 GMT (0723 HKT)
Peggy Drexler counts the ways Phyllis Schlafly's argument that lower pay for women helps them nab a husband is ridiculous.
April 16, 2014 -- Updated 1642 GMT (0042 HKT)
Rick McGahey says Rep. Paul Ryan is signaling his presidential ambitions by appealing to hard core Republican values
April 16, 2014 -- Updated 1539 GMT (2339 HKT)
Paul Saffo says current Google Glasses are doomed to become eBay collectibles, but they are only the leading edge of a surge in wearable tech that will change our lives
April 15, 2014 -- Updated 1849 GMT (0249 HKT)
Kathleen Blee says the KKK and white power or neo-Nazi groups give haters the purpose and urgency to use violence.
April 16, 2014 -- Updated 1156 GMT (1956 HKT)
Sen. Sheldon Whitehouse and Rep. Henry Waxman say read deep, and you'll see the federal Keystone pipeline report spells out the pipeline is bad news
April 16, 2014 -- Updated 1153 GMT (1953 HKT)
Frida Ghitis says President Obama needs to stop making empty threats against Russia and consider other options
April 15, 2014 -- Updated 2129 GMT (0529 HKT)
Peter Bergen and David Sterman say the Kansas Jewish Center killings are part of a string of lethal violence in the U.S. that outstrips al Qaeda-influenced attacks. Why don't we pay more attention?
April 15, 2014 -- Updated 1641 GMT (0041 HKT)
Danny Cevallos says families of the passengers on Malaysian Airlines Flight 370 need legal counsel
April 14, 2014 -- Updated 1523 GMT (2323 HKT)
David Frum says Russia is on a rampage of mischief while Western leaders and Western alliances charged with keeping the peace hem and haw
April 14, 2014 -- Updated 1156 GMT (1956 HKT)
Most adults make the mistakes of hitting the snooze button and of checking emails first thing in the morning, writes Mel Robbins
April 14, 2014 -- Updated 1754 GMT (0154 HKT)
David Wheeler says as middle-class careers continue to disappear, we need a monthly cash payment to everyone
April 14, 2014 -- Updated 1155 GMT (1955 HKT)
Democrats need to show more political spine when it comes to the issue of taxes.
April 14, 2014 -- Updated 1555 GMT (2355 HKT)
Donna Brazile recalls the 50th Anniversary of the Civil Rights Act as four presidents honored the heroes of the movement and Lyndon Johnson, who signed the law
April 14, 2014 -- Updated 1317 GMT (2117 HKT)
Elmer Smith remembers Chuck Stone, the legendary journalist from Philadelphia who was known as a thorn in the side of police and an advocate for the little guy
April 13, 2014 -- Updated 1856 GMT (0256 HKT)
Al Franken says Comcast, the nation's largest cable provider, wants to acquire Time Warner Cable, the nation's second-largest cable provider. Should we be concerned?
April 11, 2014 -- Updated 1522 GMT (2322 HKT)
Philip Cook and Kristin Goss says the Pennsylvania stabbing attack, which caused grave injury -- but not death, carries a lesson on guns for policymakers
April 11, 2014 -- Updated 1906 GMT (0306 HKT)
Wikipedia lists 105 football movies, but all too many of them are forgettable, writes Mike Downey
April 11, 2014 -- Updated 1432 GMT (2232 HKT)
John Sutter and hundreds of iReporters set out to run marathons after the bombings -- and learned a lot about the culture of running
April 11, 2014 -- Updated 1649 GMT (0049 HKT)
Timothy Stanley says it was cowardly to withdraw the offer of an honorary degree to Ayaan Hirsi Ali. The university should have done its homework on her narrow views and not made the offer
April 11, 2014 -- Updated 1416 GMT (2216 HKT)
Al Awlaki
Almost three years after his death in a 2011 CIA drone strike in Yemen, Anwar al-Awlaki continues to inspire violent jihadist extremists in the U.S, writes Peter Bergen
April 12, 2014 -- Updated 0121 GMT (0921 HKT)
David Bianculli says Colbert is a smart, funny interviewer, but ditching his blowhard persona to take over the mainstream late-night role may cost him fans
April 10, 2014 -- Updated 1731 GMT (0131 HKT)
Rep. Paul Ryan says the Republican budget places its trust in the people, not in Washington
April 10, 2014 -- Updated 2128 GMT (0528 HKT)
Aaron David Miller says Obama isn't to blame for Kerry's lack of progress in resolving Mideast talks
April 14, 2014 -- Updated 1522 GMT (2322 HKT)
David Weinberger says beyond focusing on the horrors of the attack a year ago, it's worth remembering the lessons it taught about strength, the dangers of idle speculation and Boston's solidarity
April 10, 2014 -- Updated 1632 GMT (0032 HKT)
Katherine Newman says the motive for the school stabbing attack in Pennsylvania is not yet known, but research on such rampages turns up similarities in suspects and circumstances
April 9, 2014 -- Updated 1839 GMT (0239 HKT)
Wendy Townsend says the Rattlesnake Roundup -- where thousands of pounds of snakes are killed and tormented -- is barbaric
ADVERTISEMENT