Cyber Arms Control: Trust, but Don’t Verify?

Cyber Arms Control: Trust, but Don’t Verify?

In the twenty-first century, attacks against computer systems and networks emerged as powerful tools of warfare.

During the 2008 invasion of the Republic of Georgia, Georgian computer systems suffered attacks in parallel to Russia’s conventional offensive. In 2010, the Stuxnet computer worm damaged the Iranian nuclear facilities at Bushehr and Natanz. Recognizing the threat posed by state sponsored cyber attacks, the Pentagon recently accused the Chinese military of attacking U.S. systems.

Interest in a cyber arms control regime has developed as cases of state sponsored cyber war increase. Yet due to the anonymity of cyberspace, treaties seeking to limit cyber weapons will lack the crucial verification component.

Two major challenges prevent the replication of traditional arms control agreements in cyberspace:

  • Verification: Arms control treaties require verification mechanisms and reliance on a “trust, but verify” model. Yet current technologies cannot verify compliance with any ban on cyber weapons or cyber war tactics
  • Attribution: Cyber weapons are not solely under the control of state actors, and tracking the source of a cyber attack presents unique challenges with no equivalent in traditional arms control. Even if the origination of an attack is tracked to within a state’s borders, unequivocally distinguishing between a state sponsored cyber attack and one led by a private citizen remains impossible

While a verifiable arms control treaty remains out of reach given the limitations of current technologies, strategies for mitigating a cyber arms race could include:

  • Forging agreements to foster transnational cooperation in cyber forensics to identify the perpetrator of attacks,  thereby developing trust and conceivably creating a deterrent
  • Establishing peacetime norms of behavior in cyberspace that reflect the structure for acceptable cyber activities, similar to the arms control norms currently affecting state actions in the domain of space

A verifiable cyber arms control treaty remains a nonstarter. Yet the international community should act to form cooperative agreements and shape new international norms that promote restraint in cyberspace. 

Contributors

* Arc Aspicio |

Arc Aspicio is a management, strategy, and technology consulting firm that takes a mission-oriented approach to complex client challenges. As a rapidly growing company, Arc Aspicio has a bold strategy for 2016-2018 that drives growth through new capabilities in strategy, design, human capital, data analytics, information sharing, cybersecurity, and strategic communications. The company is known for a strong, collaborative culture that values gratitude – for its clients and its great team. And, #welovedogs! Follow us on Twitter @arcaspicio or learn more at www.arcaspicio.com.

Lynn Ann Casey / Chief Executive Officer
info@arcaspicio.com
703.465.2060

Confessions of a Chief Strategy Officer

Confessions of a Chief Strategy Officer

I’ll admit it, I was a little smug. After more than 20 years in the consulting business helping clients develop, implement, and integrate their strategies, I thought… “how hard could it be to do the same things for my own company – a company of consultants?” I had the commitment of my leadership, a group of talented people, and a plan and resources to grow the company. We had energy and we had a great process and tools to successful. What could go wrong?

Exploring Trends in Strategic Workforce Planning (Attract, Engage, and Retain)

Exploring Trends in Strategic Workforce Planning (Attract, Engage, and Retain)

Federal agencies have been undergoing significant transformation, requiring effective workforce strategies that can assist them in facing increasing challenges. As government leaders look for and implement initiatives to improve performance, Strategic Workforce Planning, (SWP) has become instrumental in assisting organizations to focus on their most important resource: their people

#Innovate Your Heart Out: We See an Innovation Day in Your Future

#Innovate Your Heart Out: We See an Innovation Day in Your Future

Innovation is difficult to harness for organizations of all sizes (Government and private sector alike). Replicating a process to encourage and produce innovation is even more challenging. Innovating in a structured space and time seems counter-intuitive, and begs the question: can thinking outside the box be a structured activity? Arc Aspicio recently held an Innovation Day to answer this question.

A Unified Brand Helps Serve a Complex Mission

A Unified Brand Helps Serve a Complex Mission

The Department of Homeland Security (DHS), created in 2003, undertook the most significant reorganization of federal agencies since the Cold War. It brought together federal, state, local, tribal, and territorial agencies with a focus on securing the U.S. from threats in a collaborative way. DHS pulls together five complex mission areas: preventing terrorism and enhancing security; managing our borders; administering immigration laws; securing cyberspace; and ensuring disaster resilience.

Towards Preparedness and an Emergency Management Workforce of the Future

Towards Preparedness and an Emergency Management Workforce of the Future

Grit and determination. This is what the Federal Emergency Management Agency (FEMA) workforce is known for. After what is arguably the most challenging year in its history, the FEMA leadership called on the agency to enable the workforce through four elements: build, empower, sustain, and train. A key factor in creating a scalable, sustainable disaster response workforce is to foster a proactive culture, one focused on preparedness. A proactive mindset can create an environment that asks the “what if” questions that lead to more prepared response efforts.