Cyber Security in East Asia and Policy Cooperation

advertisement
Cyber Security in East Asia and Policy Cooperation
Summary of USJI Seminar on
“Cyber Security in East Asia and Policy Cooperation between Japan and the United States”
September 8, 2010
On the Independence Day of the United States in 2009 cyber attacks in a massive scale against
major web sites broke out without warning. Soon thereafter, similar attacks began in South Korea
and they continued in a wavelike fashion. Experts found that these attacks were conducted by the
same group, but could not find who they were.
As Japan maintains close relationships with both the United States and South Korea, these attacks
made the Japanese government realize seriousness of emerging threats in cyberspace.
In this session, experts discussed possible defense methods against cyber attacks, which are
expected to increase in number in the near future, and necessary policy cooperation and
coordination between Japan and the United States.
The four panelists presented on the September 8th, 2010 seminar are Dr. Motohiro Tsuchiya,
Associate Professor of Keio University, as the moderator, Mr. David Hoffman, Director of
Security Policy and Global Privacy Officer, Intel Corporation, Dr. Lance J. Hoffman,
Distinguished Research Professor, The George Washington University, Mr. Tomohiko Yamakawa,
Producer of NTT Corporation, Cyber Security Project, with commentator Mr. Greg Nojeim,
Senior Counsel and Director of the Project on Freedom, Security and Technology at the Center for
Democracy and Technology.
Professor Motohiro Tsuchiya, as a moderator, presented his topic “Cyber Security in East Asia.”
He recalled major security threats happening in the past decade in the region. In 1998, North
Korea carried its Taepodong Missile test over the Japanese main island into the Pacific Ocean;
North Korean Spy Ship violated the Japanese waters, and was followed by Japanese coast guard,
and later sunk by the North Koreans.
2004 saw a Chinese submarine intruding into the Japanese territorial waters. Also in 2004, a
Japanese consul in Shanghai committed suicide, after being blackmailed by secret Chinese agent.
China also wanted to break the two island chains, from Japan, Taiwan, the Philippines, with
Okinawa at the critical point, as China tried to expand into ocean from a continent.
In 2009, massive scale of cyber attacks was recorded in the U.S. and South Korea, including the
Department of Defense (DOD), the U.S. Congress, the Treasury, the Department of Homeland
Page 1 of 9
USJI
http://www.us-jpri.org/
Cyber Security in East Asia and Policy Cooperation
Security (DHS), Federal Trade Commission (FTC), New York Stock Exchange (NYSE),
Washington Post, among others. Servers were slowed down during the attacks.
These attacks are known as “BOTNET Attacks”. Although Japanese networks were not attacked,
eight Japanese servers were involved in the attacks. Owners of the servers had no idea that their
servers were used to attack other computers. It is very hard to find the real attackers.
In 2010 cyber attack broke out between South Korea and Japan over the ice skating title dispute
when Japanese girl lost the game. South Korean net users attacked Japan, because Japanese young
people were upset and commented on BBS about the ice skating judgment, which angered the
South Korean net users. This case showed that non-state groups can start attacks online.
Who cares about the cyber security in Japan? They are the National Police Agency, Ministry of
Defense, Cabinet Intelligence Research Office (CIRO), and National Information Security Center
(NISC).
Following these incidents, Mr. Hirano, Chief-Secretary of the Cabinet, said, “We cannot deny the
possibilities that we could be attacked. Cyber security is an important national security and crisis
management issue.” Thus, the Japanese government strengthens the National Information Security
Center (NISC), which was established in 2005, with officials on loan from several ministries, and
thus marking the Japanese policy change.
The Japanese government issued “Information Security Strategy for Protecting the Nation”
on May 11, 2010, as it realized that the large-scale cyber attack in the United States and South
Korea particularly alerted Japan, and could be a threat to national security.
According to Professor Tsuchiya, cyber attacks pose the following threats:
① Physical Damage to Infrastructures, Utilities, and Premises
② Financial Damage or Theft
③ Psychological Damage or Demonstration
④ Virtual Damage (Not Recognized, but Serious)
Most of the times, it is difficult to identify who the real attackers are, following a massive
international cyber attacking event.
The Keio University professor then talked about geeks, both in Japanese and the United States
societies. Despite their cultural differences between countries and governments, geeks should be
brought in to protect us.
Page 2 of 9
USJI
http://www.us-jpri.org/
Cyber Security in East Asia and Policy Cooperation
Tsuchiya said that “geek” is “a peculiar or otherwise odd person”, but our societies are
increasingly dependent on computer geeks.
He listed some of the most famous geeks, including Apple’s CEO Steve Jobs, Microsoft founder
Bill Gates, Google’s founders Larry Page and Sergey Brin.
Professor Motohiro Tsuchiya reminded the audience that technology affects national security, and
our society is dependent on computer networks, and called for cooperation between Japan and the
US, and the world on this issue.
Professor Lance J. Hoffman, from Cyber Security Policy and Research Institute at the George
Washington University in Washington D.C. presented his topic “Cyber Security in the U.S.”.
After a brief introduction of threats and attacks in the telecommunication sector in the past century,
Professor Hoffman pointed out that communication security has always been an issue, and in
today’s Internet Age, national security is a big concern, and therefore, for the first time, the United
States issued a presidential statement on cyber-security on May 29, 2009 when President Obama
said: “…We count on computer networks to deliver our oil and gas, our power and our
water. We rely on them for public transportation and air traffic control. Yet we know that
cyber intruders have probed our electrical grid and that in other countries cyber attacks
have plunged entire cities into darkness. In short, America's economic prosperity in the 21st
century will depend on cybersecurity. ”
Cyber-security is now prominent on the policy radar screen. Professor Hoffman described the
Comprehensive National Cybersecurity Initiative, outlining three Major Goals: (1) To establish a
front line of defense against today’s immediate threats; (2) To defend against the full spectrum of
threats; (3) To strengthen the future cybersecurity environment.
Despite increasing studies and research, and accelerated legislation on the matter, there are many
issues that need more attention and further actions. Professor Hoffman cited material developed
by his colleague Prof. Eva Vincze, that stated:
1.
Cyberspace is a complex problem for the following reasons: (1) Cyber security is a collective
concern that is comprehensive in scope—the Internet has no national boundaries. (2) Security
is typically regulated at the government level; (3) Cyber security is at once national,
international, public and private in character; (4) It touches many domains – business,
finance, control systems for power, gas, drinking water and other utilities; airport and air
traffic control systems, logistical systems, health care, government services, etc.
Page 3 of 9
USJI
http://www.us-jpri.org/
Cyber Security in East Asia and Policy Cooperation
2.
Technology alone is insufficient because (1) an interdisciplinary discussion with international
stakeholders is necessary; (2) human factors must be considered; (3) laws, mores, and
practices vary from country to country. It is imperative that countries develop improved lines
of communication based on trust to discuss cyber security both within and among themselves.
Professor Hoffman particularly discussed cyber crime, noting that according to the FBI estimates,
the average loss for a technology-oriented crime is nearly $500,000, and, further, the added cost to
the consumer is $100 to $150 per computer sale. Other estimates indicate that losses related to
high-tech crimes in the United States are $10 billion to $15 billion per year.
Major organized crime groups are known to be operating in over 30 countries spread across 6
continents.
He analyzed the increasing cyber crimes citing the volatile combination of:
–
Technically empowered segments of population
–
With the capacity to conduct sophisticated criminal operation
–
Limited economic opportunities to make an honest living
–
Few policies/laws/investigative/prosecutorial focus on cybercrime.
The George Washington professor cited that in the U.S. over 500,000 websites were successfully
compromised in 2008; malicious intrusions were up 40%; services like Google Earth were
reported to be used for several terrorist attacks; and in the developing world, foreign direct
investment as a whole may eventually be affected by the safety and integrity of data networks
available to investors in host countries.
Professor Hoffman called for countries facing the dual challenge in integrating cyber-security,
policy and law to maintain an environment that promotes efficiency, innovation, economic
prosperity, and free trade, while also promoting safety, security, civil liberties, and privacy rights.
Yet, the world community cannot avoid the dilemmas, because discussion has just begun, with
difficulty in defining cyberspace – is it a unique domain or part of a whole? Obviously, practice is
out-distancing policy.
Cyberspace developments happen rapidly and policy/law lag a lot behind.
Responsibilities for cyber-security are distributed across a wide array of federal departments and
agencies, many with overlapping authorities, none with sufficient decision authority to direct
Page 4 of 9
USJI
http://www.us-jpri.org/
Cyber Security in East Asia and Policy Cooperation
actions that deal with often conflicting issues in a consistent way. Total 80% of information
infrastructure is owned or managed by the private sector.
Secrecy is costly, until fairly recently there has been lack of awareness of the gravity of the
problem, and thus only recently has there been sufficient pressure on government to change.
Transparency involves intangible costs and information sharing. We know there is a problem, and
think it will get worse over time. But we don’t know if proposed solutions will be effective.
He cautioned the audience that new devices may be more easily hacked if security and privacy not
sufficiently considered in their design. Professor Hoffman pointed out the dilemma for
governments that wish to carry out surveillance of citizens, residents, and everyone, while
maintaining privacy, free speech, and freedom and noted that there are no easy options for
governments.
He noted Internet monitoring in China, with more than 298M users. He also cited the recent Green
Dam fiasco, where China originally proposed that all PCs sold in China would be required to
install government-proved monitoring software. It’s recently backed off to some extent on this,
after widespread protests from many, including manufacturers.
The George Washington professor also discussed unresolved legal Issues in cybersecurity that
have privacy implications, like, when government is permitted to protect privately owned critical
infrastructure; the use of automated attack detection and warning sensors; data sharing with third
parties within the Federal government, among others.
Mr. Tomohiko Yamakawa, Producer of NTT Corporation, Cyber Security Project, Research and
Development Planning Department, delivered a speech titled "Industry Side Views of Cyber
Security in Japan".
He discussed the following ideas: (1) cyber security as a cost; (2) cyber security as a challenge,
along with Computer Security Incident Response Team (CSIRT) activity (NTT-CERT) in Japan.
He also discussed his observations on identifying "cyber attack", and called for global
collaboration in cyber security.
Regarding cyber security as a cost, Mr. Yamakawa said it is a cost for most business enterprises to
implement governmental regulatory compliance.
As a provider of IT Service and Information Systems, NTT provides service for government,
critical Infrastructure (Telco, Finance, Electric Power supply, Gas, etc.), and business enterprises.
Page 5 of 9
USJI
http://www.us-jpri.org/
Cyber Security in East Asia and Policy Cooperation
NTT is committed to ensure the secrecy of communication, information assurance, and personal
DATA protection, as Japanese constitution guarantees it as basic human rights.
The NTT cyber expert also see cyber security/threat as a threat or opportunity based on his
observations, as the United States, under Obama administration, has initiated a leadership strategy
in cyber security issues. As for Japan, he discussed “CSIRT”, which means Computer Security
Incident Response Team, in response to and cope with vulnerabilities such as incident
management, incident response, vulnerability management, and gradually, the idea of “Cyber
Defense” emerged to protect customers from cyber attack, as NTT-CERT, as an incident
coordination center for NTT group companies.
Mr. Yamakawa said it is difficult to define “Cyber attack” clearly, as it may come in many
different forms at the same time, such as Jack’s PC is infected, Betty cannot access this website,
Taro’s website is not accessible, etc. Furthermore the intention of “attacker” is not clear whether
he/she really intended to have “unauthorized attack.”
The NTT expert reminded people of what happened in cyber attacks, or not, over the last few
years, as Estonia in 2007, Georgia in 2008, Korea in 2009, and Google case in 2010.
Therefore, global collaboration in cyber security is an urgent agenda on many aspects.
Most executives, both in government and industry, recognize cyber security as most significant for
management, and should be ready paying some money for “cyber security,” though what cyber
security issues they may have are not clear yet; or they should invest in firewalls, virus identifier,
certification for their own networks.
On the operation level, Mr. Yamakawa called for “your best doctor for cyber security” at your
hand to help identify the disease, give best medicine, and give best support, citing CSIRT as an
example.
Though policy framework of cyber security may differ in each country, there must be a common
“culture of cyber security” in the world, sharing knowhow and expertise.
In his speech, Mr. David Hoffman of Intel Corporation presented his talk titled: “The Future of
Computing” which direction would computing evolution go at Intel.
Among all computers in office, at home, or at coffee shop, and on a plane, we now see a great
diversity, an ongoing evolution that people may have a device in their car, or in the air, with all
data and applications to share information, with security and privacy being protected.
Page 6 of 9
USJI
http://www.us-jpri.org/
Cyber Security in East Asia and Policy Cooperation
As commercial aviation became global in the 1940s, and since 1977s and 1980s, cost of
commercial aviation has come down, and more people rely more on commercial aviation, but
threats could distract aviation, like volcano in Iceland recently, which became a global issue.
Similarly, people rely more on remote device for their daily life, in terms of managing their data,
therefore providing a challenge and opportunities for Intel and others to protect the security in
cyberspace. There are four different kinds of things to our attention: malware, hardware,
operational system and application wares.
David Hoffman said that last year (2009) over 6 million young participants competed at Intel
Science and Education Fair competition. Over 6,000 finalists from 59 countries displayed their
products in California to compete for the prize money of four million dollars, and so many of them
have products all based on the Internet application and global structure.
There was a time at Intel when we had design center in California, Europe, and Japan. Now design
centers from around globe to collaborate on new products.
The components we design, in decentralized environment, as Prof Hoffman mentioned, affect
global supply chains, create global strategy, from India to China.
Japanese government is in collaboration with the U.S. and EU for a coordinated policy in this
regard.
Commentator, Greg Nojeim from Center for Technology and Democracy, invited the panelists to
address the three following questions.
On the question of “good geeks” and “bad geeks,” how do we ensure that we have the best good
geeks so they can prevent the bad geeks from harming us?
The second question is who is the best doctor for cybersecurity – the government or the private
sector? It seems that there are three key cybersecurity players: the government, the private sector
and consumers. Each plays a different role when it comes to healing a cybersecurity problem.
What about the role government and consumers play to secure our cyber networks?
Also, as we know the Internet has no national boundaries, all domains depend on the Internet.
Securing everyone will be expensive. What kinds of costs should we prepare to bear?
Hoffman at GW University: I like the idea of bad vs. good geeks. The Federal government is
sponsoring scholars to engage in cyber security studies, and the sponsored scholars are to work for
Page 7 of 9
USJI
http://www.us-jpri.org/
Cyber Security in East Asia and Policy Cooperation
the government for a number of years after completion of their studies. Industry needs their own
people now and would benefit from a similar program.
Yamakawa: It is sometimes difficult to tell good geeks from bad geeks in cyber space in Japan.
Hoffman at Intel: Investment in cyber security is critical, as international collaboration is required,
though some of the scholarships are not open to non-US citizens. Israeli government is doing a
great job in this regard by sponsoring and recruiting experts in cyber security.
Nojeim: Regarding the secrecy of communication, it is a Constitutional right in Japan, while in the
U.S., 4th Amendment also provides similar protection. But in other countries, like India,
governments demand free access communications information from private business. For
example, India recently demanded that RIM (Research In Motion) locate a server in India so the
government there would be better able to gain access to private communications. How do we
reconcile privacy issues and government actions in global context?
Yamakawa: Different countries have different practice, while Japan, the U.S. and the EU have
laws to protect privacy of communication, but in other countries, like in India, governments tend
to try to have surveillance on mobile communication, like BlackBerry.
Hoffman at Intel: To answer a question from audience regarding email security from abroad into
the U.S., it is different for the U.S. government toward U.S. citizen vs. non-US citizen, global
context is difficult.
Nojeim: The US Foreign Intelligence Surveillance Act permits the U.S. government to eavesdrop
more readily on the communications of people who are not U.S. citizens or U.S. green card
holders. The criminal law, which also permits some eavesdropping, does not draw a distinction
between citizens and non-citizens.
An international investor on the floor: I want to ask Mr. Yamakawa on privacy issues. Law
enforcement uses GPS. For example, police tracks suspects who use an iPhone. How is people’s
privacy protected? Another question for Intel. As chip creator, what is your responsibility and
policies to protect your end users, when law enforcement agencies come in for information about
the customers, with or without warrant?
Yamakawa: Large corporations are likely to cooperate with law enforcement agencies, or jointly
work with them on global issues.
Hoffman at Intel: Large corporations, like Intel, depend on trust of customers to use our services,
as we have a robust policy to guarantee safety of customer information; sometimes there are
situations that we want law enforcement agency to help find out the problems facing us.
Page 8 of 9
USJI
http://www.us-jpri.org/
Cyber Security in East Asia and Policy Cooperation
Question: In terms of the Internet cyber security, do you think China’s firewall is making the
security work easier or harder?
Hoffman at GWU: It’s tough enough at this moment, but will be harder to get all countries to
agree to the same rule when it comes to punishment. This is why we need technical management,
public policy experts, etc. He cited the George Washington University cyber security scholarship
program where 30-40 percent of the students are from non-technical studies in these areas (but do
not graduate until they get enough technical expertise as well).
Page 9 of 9
USJI
http://www.us-jpri.org/
Download