Blogs

Net Politics

CFR experts investigate the impact of information and communication technologies on security, privacy, and international affairs.

Latest Post

Generated by Gemini

DoD's AI Balancing Act

To secure a strategic advantage, the DoD must manage the tension between vendor hype and extreme alarmism regarding AI adoption.

Read More
Cybersecurity
Cyber Week in Review: November 17, 2017
In observance of Thanksgiving, we will no be publishing Week in Review next week and will return December 1. Here is a quick round-up of this week’s technology headlines and related stories you may have missed: To disclose or not to disclose? The White House unveiled the first charter for an updated Vulnerabilities Equities Process (VEP) this week. The VEP charter offers a detailed look at the process by which government agencies decide whether to disclose software flaws or retain them for intelligence gathering purposes or offensive operations. Prominently featured in the updated VEP: more transparency, interagency collaboration, and codified processes. According to the new guidelines, if an agency determines a vulnerability reaches the threshold for entry into the process, a board of representatives from relevant agencies (listed in the guidelines) convenes to discuss the vulnerability’s impact on intelligence collection, weigh its operational value, and votes on whether or not to disclose it to the public. If the VEP board decides to keep a vulnerability private, the decision must be reviewed every year. VEP has long been criticized for favoring secrecy and allowing the NSA to hoard exploits. Despite some deficiencies, Robert Knake argues that the new guidelines are a general improvement from the Obama-era process. On the other hand, some are unsatisfied and have long maintained that the review process should be codified into law, while others argue that the process is only meant to satisfy the public without truly holding agencies accountable. BUT CHINA! Even as the U.S. attempts to make the VEP more transparent, other countries have been less forthcoming with their disclosure process. A report from Recorded Future says that China’s National Vulnerability Database (CNNVD) holds back more disclosures than previously thought. Studying 300 cases of delayed disclosures, the researchers found that CNNVD is slow to report malware associated with Chinese APT groups. The most atypical delay (236 days) was for a pre-installed backdoor that sent user data back to China, likely for surveillance purposes. The researchers conclude that CNNVD is essential a shell for China's spy service, the Ministry of State Security (MSS), and willfully delays disclosures to aid MSS operations. Déjà Vu. A team of researchers recently disclosed evidence that Russia attempted to influence the Brexit referendum last year. About 150,000 Russian Twitter accounts disseminated messages on social media urging the UK to leave the European Union in the days leading up to the vote, and more than 400 of these accounts are suspected to be directly linked to the Kremlin. The messages utilized racist and xenophobic content containing racial slurs, anti-Muslim rhetoric, and pictures of London Mayor Sadiq Khan. In addition, the United Kingdom's top cyber official announced this week that Russian hackers have launched attacks on Britain's energy, communication, and media industry networks in the past year. The disclosure earned Russia a sharp rebuke by Prime Minister Theresa May. “We know what you are doing,” she said. “And you will not succeed.” I'm old enough to remember when the internet was becoming freer. Online freedom declined for the seventh consecutive year, according to a new Freedom House report on the state of internet freedom around the world. Behind this year's downbeat report are the usual cast of characters: China was found to be the world’s worst abuser of internet freedom, followed by Syria and Ethiopia. Other countries where the internet was determined to be “not free” include Russia, Saudi Arabia, and Venezuela. The United States was found to have the sixth freest internet but scored worse than last year. Reasons cited for the decline in the U.S.'s standing include an uptick in the harassment of journalists and the FCC’s intentions to roll back neutrality protections.
China
An Update on U.S.-China Cybersecurity Relations
Senior Fellow Adam Segal shares in thoughts on the latest round of the Track 1.5 U.S.-China Cyber Security Dialogue.
Cybersecurity
Grading the New Vulnerabilities Equities Policy: Pass
The new vulnerabilities equities process gets a passing grade but there is still room for improvement. 
  • Digital Policy
    Teaching Morality to Machines
    Before giving machines a sense of morality, humans have to first define morality in a way computers can process. A difficult but not impossible task.
  • Digital Policy
    Report Watch Vol. IV: Tracking Digital and Cyber Scholarship So You Don’t Have To
    Alexandra Kilroy is an intern for the Digital and Cyberspace Policy Program at the Council on Foreign Relations. For those new to Net Politics, our report-watch series of posts distills the most relevant digital and cyber scholarship to bring you the highlights. In this edition: online media during the 2016 U.S. election, creating a defense-dominant cyberspace, and creating a global attribution body. “Partisanship, Propaganda, and Disinformation: Online Media and the 2016 U.S. Presidential Election,” a report by Rob Faris, Hal Roberts, Rob Elting, Nikki Bourassa, Ethan Zuckerman, and Yochai Benkler Faris, Roberts, et al. examine coverage of the 2016 election to determine whether political biases of traditional news sources, the diversity of viewpoints and stories covered by such sources, and the popularity of partisan outlets across online media contributed to political polarization. The report finds that: The Trump campaign succeeded in shaping the election policy agenda, as the majority of sentences spoken on mainstream media about Trump focused on core issues like immigration, while the majority of sentences spoken about Clinton focused on scandals such as her use of a private email server; While coverage of Trump was largely critical, criticism focused on political positions rather than his character; Prominent media on the left present viewpoints from the left, right, and center, while prominent media on the right engage in more partisan reporting; Facebook was a more partisan environment than Twitter; across social media platforms, Breitbart was the most prominent conservative news source; and Partisan sources on the left and right were more popular on social media than centrist news sources and were more likely to engage in false reporting.   The team concludes that right-wing media sources were more insulated and partisan, allowing for the easier spread of disinformation and anti-Clinton stories. The institutional impartiality of the center-left media, combined with its popularity relative to far-left sources, meant that unreliable liberal stories did not garner the same amplification across media outlets. “Building a Defensible Cyberspace,” a report by the New York Cyber Task Force. Cyberspace has traditionally been seen as an offensive-dominant domain—attacks are cheap and vulnerabilities in software are legion, making it easy to break into a network undetected. The report’s authors argue that a mix of technology, operations and policy, can make cyberspace more defensible and actually become defense-dominant. By examining the last fifty years of computer security, the task force found that the most impactful innovations that made networks more defensible shared two characteristics. First, the innovation provided a clear defender advantage—“a dollar of defense” should “force attackers to spend considerably more to defeat it.” Second, the innovation must scale, quickly. Based on these characteristics, the report provides the following recommendations: The United States government should implement a new cybersecurity strategy “centered on the goal of a defensible cyberspace,” promote risk-based frameworks, and transition to cloud technology; Information technology and security companies should “push solutions with security built in or automatic,” implement a vulnerability disclosure program, and continue to reduce the cost and effort of developing secure code; and Information technology-dependent organizations should drive cybersecurity changes from the top (e.g. Board-level) and assume a risk-management approach to cybersecurity.   “Stateless Attribution: Towards International Accountability in Cyberspace,” by John S. Davis II, Benjamin Boudreaux, Jonathan William Welburn, Jair Aguirre, Cordaye Ogletree, Geoffrey McGovern, and Michael S. Chase Davis et al. review cases of notable cyberattacks, examine the problem of attribution, and recommend strategies for attributing cyberattacks. The authors review nineteen major cyberattacks and expose some of the challenges of attributing the incidents, namely that there is no set methodology for attributing incidents and that experts are often weary of attribution claims given that the evidence used to make a determination is not often public. This lack of transparency and credibility make it challenging for the public to take attribution claims seriously. As a solution to this problem, the report calls for the creation of an international organization, the Global Cyber Attribution Consortium. The organization would be made up of technical experts from cybersecurity companies and academia, as well as experts in cyberspace policy, international policy, and legal affairs. Most importantly, the consortium would not include states or their representatives in order to keep the body impartial. The consortium would work with victims of cyberattacks upon request to investigate incidents and publish detailed findings for public review, and leave it to the victim to determine whether a response is necessary. The authors argue the new entity would promote global cybersecurity, as the international community could use the organization’s findings to deter future attacks, strengthen defenses, and hold perpetrators accountable. As a disclaimer, the study was funded by Microsoft, which has advocated for an attribution organization along the lines of the International Atomic Energy Agency as part of its push for a Digital Geneva Convention.