Skip to main content

Has U.S. started an Internet war?

By Bruce Schneier, Special to CNN
updated 10:46 AM EDT, Tue June 18, 2013
STORY HIGHLIGHTS
  • Bruce Schneier: U.S. is pursuing policies that are destabilizing and expensive
  • Schneier: The cyberwar arms race will define the Internet in the 21st century
  • He asks: How much of what the U.S. does is an act of war by international definitions?
  • Schneier: We need more transparency, cooperation and viable cyberweapons treaties

Editor's note: Bruce Schneier is a security technologist and author of "Liars and Outliers: Enabling the Trust Society Needs to Survive."

(CNN) -- Today, the United States is conducting offensive cyberwar actions around the world.

More than passively eavesdropping, we're penetrating and damaging foreign networks for both espionage and to ready them for attack. We're creating custom-designed Internet weapons, pre-targeted and ready to be "fired" against some piece of another country's electronic infrastructure on a moment's notice.

This is much worse than what we're accusing China of doing to us. We're pursuing policies that are both expensive and destabilizing and aren't making the Internet any safer. We're reacting from fear, and causing other countries to counter-react from fear. We're ignoring resilience in favor of offense.

Bruce Schneier
Bruce Schneier

Welcome to the cyberwar arms race, an arms race that will define the Internet in the 21st century.

Presidential Policy Directive 20, issued last October and released by Edward Snowden, outlines U.S. cyberwar policy. Most of it isn't very interesting, but there are two paragraphs about "Offensive Cyber Effect Operations," or OCEO, that are intriguing:

"OECO can offer unique and unconventional capabilities to advance U.S. national objectives around the world with little or no warning to the adversary or target and with potential effects ranging from subtle to severely damaging. The development and sustainment of OCEO capabilities, however, may require considerable time and effort if access and tools for a specific target do not already exist.

"The United States Government shall identify potential targets of national importance where OCEO can offer a favorable balance of effectiveness and risk as compared with other instruments of national power, establish and maintain OCEO capabilities integrated as appropriate with other U.S. offensive capabilities, and execute those capabilities in a manner consistent with the provisions of this directive."

Opinion: Cyber arms control? Forget about it

Obama: NSA programs are transparent
Releasing NSA leaks: A public service?
NSA fallout could be 'harmful'
Could the NSA leaker defect to China?

These two paragraphs, and another paragraph about OCEO, are the only parts of the document classified "top secret." And that's because what they're saying is very dangerous.

Cyberattacks have the potential to be both immediate and devastating. They can disrupt communications systems, disable national infrastructure, or, as in the case of Stuxnet, destroy nuclear reactors; but only if they've been created and targeted beforehand. Before launching cyberattacks against another country, we have to go through several steps.

We have to study the details of the computer systems they're running and determine the vulnerabilities of those systems. If we can't find exploitable vulnerabilities, we need to create them: leaving "back doors" in hacker speak. Then we have to build new cyberweapons designed specifically to attack those systems.

Sometimes we have to embed the hostile code in those networks, these are called "logic bombs," to be unleashed in the future. And we have to keep penetrating those foreign networks, because computer systems always change and we need to ensure that the cyberweapons are still effective.

Like our nuclear arsenal during the Cold War, our cyberweapons arsenal must be pretargeted and ready to launch.

That's what Obama directed the U.S. Cyber Command to do. We can see glimpses in how effective we are in Snowden's allegations that the NSA is currently penetrating foreign networks around the world: "We hack network backbones -- like huge Internet routers, basically -- that give us access to the communications of hundreds of thousands of computers without having to hack every single one."

The NSA and the U.S. Cyber Command are basically the same thing. They're both at Fort Meade in Maryland, and they're both led by Gen. Keith Alexander. The same people who hack network backbones are also building weapons to destroy those backbones. At a March Senate briefing, Alexander boasted of creating more than a dozen offensive cyber units.

Longtime NSA watcher James Bamford reached the same conclusion in his recent profile of Alexander and the U.S. Cyber Command (written before the Snowden revelations). He discussed some of the many cyberweapons the U.S. purchases:

"According to Defense News' C4ISR Journal and Bloomberg Businessweek, Endgame also offers its intelligence clients -- agencies like Cyber Command, the NSA, the CIA, and British intelligence -- a unique map showing them exactly where their targets are located. Dubbed Bonesaw, the map displays the geolocation and digital address of basically every device connected to the Internet around the world, providing what's called network situational awareness. The client locates a region on the password-protected web-based map, then picks a country and city -- say, Beijing, China. Next the client types in the name of the target organization, such as the Ministry of Public Security's No. 3 Research Institute, which is responsible for computer security -- or simply enters its address, 6 Zhengyi Road. The map will then display what software is running on the computers inside the facility, what types of malware some may contain, and a menu of custom-designed exploits that can be used to secretly gain entry. It can also pinpoint those devices infected with malware, such as the Conficker worm, as well as networks turned into botnets and zombies -- the equivalent of a back door left open...

"The buying and using of such a subscription by nation-states could be seen as an act of war. 'If you are engaged in reconnaissance on an adversary's systems, you are laying the electronic battlefield and preparing to use it' wrote Mike Jacobs, a former NSA director for information assurance, in a McAfee report on cyberwarfare. 'In my opinion, these activities constitute acts of war, or at least a prelude to future acts of war.' The question is, who else is on the secretive company's client list? Because there is as of yet no oversight or regulation of the cyberweapons trade, companies in the cyber-industrial complex are free to sell to whomever they wish. "It should be illegal,' said the former senior intelligence official involved in cyberwarfare. 'I knew about Endgame when I was in intelligence. The intelligence community didn't like it, but they're the largest consumer of that business.'"

That's the key question: How much of what the United States is currently doing is an act of war by international definitions? Already we're accusing China of penetrating our systems in order to map "military capabilities that could be exploited during a crisis." What PPD-20 and Snowden describe is much worse, and certainly China, and other countries, are doing the same.

All of this mapping of vulnerabilities and keeping them secret for offensive use makes the Internet less secure, and these pre-targeted, ready-to-unleash cyberweapons are destabalizing forces on international relationships. Rooting around other countries' networks, analyzing vulnerabilities, creating back doors, and leaving logic bombs could easily be construed as an act of war. And all it takes is one over-achieving national leader for this all to tumble into actual war.

It's time to stop the madness. Yes, our military needs to invest in cyberwar capabilities, but we also need international rules of cyberwar, more transparency from our own government on what we are and are not doing, international cooperation between governments and viable cyberweapons treaties. Yes, these are difficult. Yes, it's a long slow process. Yes, there won't be international consensus, certainly not in the beginning. But even with all of those problems, it's a better path to go down than the one we're on now.

We can start by taking most of the money we're investing in offensive cyberwar capabilities and spend them on national cyberspace resilience. MAD, mutually assured destruction, made sense because there were two superpowers opposing each other. On the Internet there are all sorts of different powers, from nation-states to much less organized groups. An arsenal of cyberweapons begs to be used, and, as we learned from Stuxnet, there's always collateral damage to innocents when they are. We're much safer with a strong defense than with a counterbalancing offense.

Follow @CNNOpinion on Twitter.

Join us at Facebook/CNNOpinion.

The opinions expressed in this commentary are solely those of Bruce Schneier.

ADVERTISEMENT
Part of complete coverage on
updated 2:45 PM EDT, Thu April 17, 2014
Michael Bloomberg and Shannon Watts say Americans are ready for sensible gun laws, but politicians are cowed by the NRA. Everytown for Gun Safety will prove the NRA is not that powerful.
updated 9:28 AM EDT, Thu April 17, 2014
Ruben Navarrette says Steve Israel is right: Some Republicans encourage anti-Latino prejudice. But that kind of bias is not limited to the GOP.
updated 7:23 PM EDT, Wed April 16, 2014
Peggy Drexler counts the ways Phyllis Schlafly's argument that lower pay for women helps them nab a husband is ridiculous.
updated 12:42 PM EDT, Wed April 16, 2014
Rick McGahey says Rep. Paul Ryan is signaling his presidential ambitions by appealing to hard core Republican values
updated 11:39 AM EDT, Wed April 16, 2014
Paul Saffo says current Google Glasses are doomed to become eBay collectibles, but they are only the leading edge of a surge in wearable tech that will change our lives
updated 2:49 PM EDT, Tue April 15, 2014
Kathleen Blee says the KKK and white power or neo-Nazi groups give haters the purpose and urgency to use violence.
updated 7:56 AM EDT, Wed April 16, 2014
Sen. Sheldon Whitehouse and Rep. Henry Waxman say read deep, and you'll see the federal Keystone pipeline report spells out the pipeline is bad news
updated 7:53 AM EDT, Wed April 16, 2014
Frida Ghitis says President Obama needs to stop making empty threats against Russia and consider other options
updated 5:29 PM EDT, Tue April 15, 2014
Peter Bergen and David Sterman say the Kansas Jewish Center killings are part of a string of lethal violence in the U.S. that outstrips al Qaeda-influenced attacks. Why don't we pay more attention?
updated 12:41 PM EDT, Tue April 15, 2014
Danny Cevallos says families of the passengers on Malaysian Airlines Flight 370 need legal counsel
updated 11:23 AM EDT, Mon April 14, 2014
David Frum says Russia is on a rampage of mischief while Western leaders and Western alliances charged with keeping the peace hem and haw
updated 7:56 AM EDT, Mon April 14, 2014
Most adults make the mistakes of hitting the snooze button and of checking emails first thing in the morning, writes Mel Robbins
updated 1:54 PM EDT, Mon April 14, 2014
David Wheeler says as middle-class careers continue to disappear, we need a monthly cash payment to everyone
updated 7:55 AM EDT, Mon April 14, 2014
Democrats need to show more political spine when it comes to the issue of taxes.
updated 11:55 AM EDT, Mon April 14, 2014
Donna Brazile recalls the 50th Anniversary of the Civil Rights Act as four presidents honored the heroes of the movement and Lyndon Johnson, who signed the law
updated 9:17 AM EDT, Mon April 14, 2014
Elmer Smith remembers Chuck Stone, the legendary journalist from Philadelphia who was known as a thorn in the side of police and an advocate for the little guy
updated 2:56 PM EDT, Sun April 13, 2014
Al Franken says Comcast, the nation's largest cable provider, wants to acquire Time Warner Cable, the nation's second-largest cable provider. Should we be concerned?
updated 11:22 AM EDT, Fri April 11, 2014
Philip Cook and Kristin Goss says the Pennsylvania stabbing attack, which caused grave injury -- but not death, carries a lesson on guns for policymakers
updated 3:06 PM EDT, Fri April 11, 2014
Wikipedia lists 105 football movies, but all too many of them are forgettable, writes Mike Downey
updated 10:32 AM EDT, Fri April 11, 2014
John Sutter and hundreds of iReporters set out to run marathons after the bombings -- and learned a lot about the culture of running
updated 12:49 PM EDT, Fri April 11, 2014
Timothy Stanley says it was cowardly to withdraw the offer of an honorary degree to Ayaan Hirsi Ali. The university should have done its homework on her narrow views and not made the offer
updated 10:16 AM EDT, Fri April 11, 2014
Al Awlaki
Almost three years after his death in a 2011 CIA drone strike in Yemen, Anwar al-Awlaki continues to inspire violent jihadist extremists in the U.S, writes Peter Bergen
updated 9:21 PM EDT, Fri April 11, 2014
David Bianculli says Colbert is a smart, funny interviewer, but ditching his blowhard persona to take over the mainstream late-night role may cost him fans
updated 1:31 PM EDT, Thu April 10, 2014
Rep. Paul Ryan says the Republican budget places its trust in the people, not in Washington
updated 5:28 PM EDT, Thu April 10, 2014
Aaron David Miller says Obama isn't to blame for Kerry's lack of progress in resolving Mideast talks
updated 11:22 AM EDT, Mon April 14, 2014
David Weinberger says beyond focusing on the horrors of the attack a year ago, it's worth remembering the lessons it taught about strength, the dangers of idle speculation and Boston's solidarity
updated 12:32 PM EDT, Thu April 10, 2014
Katherine Newman says the motive for the school stabbing attack in Pennsylvania is not yet known, but research on such rampages turns up similarities in suspects and circumstances
updated 2:39 PM EDT, Wed April 9, 2014
Wendy Townsend says the Rattlesnake Roundup -- where thousands of pounds of snakes are killed and tormented -- is barbaric
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT