1 This essay is an expansion of material published by the Council on Foreign Relations, http://www.foreignaffairs.com/articles/139819/martin-c-libicki/dont-buy…. Reprinted and adapted by permission of Foreign Affairs Copyright 2013 by the Council on Foreign Relations Inc., http://www.foreignaffairs.com.
2 For example, a Washington Post poll taken in May 2012 found that 51 percent of respondents were very or fairly concerned that U.S. government computers could be targeted by a major cyberattack. “Public Concern over Cyber-Attacks,” Washington Post, June 6, 2012.
3 James R. Clapper, “Worldwide Threat Assessment of the US Intelligence Community,” Statement before the Senate Select Committee on Intelligence, 113th Cong., 1st sess., March 12, 2013, http://www.dni.gov/files/documents/Intelligence%20Reports/2013%20ATA%20….
4 Dara Kerr, “ ‘Cyber 9/11’ May Be on Horizon, Homeland Security Chief Warns,” CNET, January 24, 2013, http://news.cnet.com/8301–1009_3-57565763–83/cyber‑9–11-may-be-on-horiz….
5 Alicia Budich, “FBI: Cyber Threat Might Surpass Terror Threat,” CBS News, Face the Nation, February 2, 2012, http://www.cbsnews.com/8301–3460_162-57370682/fbi-cyber-threat-might-su….
6 Viola Gienger, “U.S. Military Aid to Overseas Allies May Face Cuts, Mullen Says,” Bloomberg News, June 14, 2011, http://www.bloomberg.com/news/2011–06-13/pentagon-aid-to-foreign-milita….
7 Sean Gallagher, “Security Pros Predict ‘Major’ Cyber Terror Attack This Year,” Ars Technica, January 4, 2013, http://arstechnica.com/security/2013/01/security-pros-predict-major-cyb….
8 Siobhan Gorman, August Cole, and Yochi Dreazen, “Computer Spies Breach Fighter- Jet Project,” Wall Street Journal, April 21, 2009.
9 Hackers purportedly knocked the electrical system of a southern Brazilian city offline for several days. That claim (without details) was made by the Central Intelligence Agency’s Tom Donahue, “CIA Admits Cyberattacks Blacked Out Cities,” InformationWeek, January 18, 2008, http://www.informationweek.com/cia-admits-cyberattacksblackedoutciti/20…, and was broadcast (with details) by the CBS news show Sixty Minutes, http://www.cbsnews.com/8301–18560_162-5555565.html. Brazilian investigators refuted that claim; they blamed sooty insulators instead. Marcelo Soares, “Brazilian Blackout Traced to Sooty Insulators, Not Hackers,” Wired, November 9, 2009, http://www.wired.com/threatlevel/2009/11/brazil_blackout/.
10 Security analysts often argue that the number of incidents is grossly understated. Many penetrations are never discovered (particularly if the hacker is interested only in stealing data). Furthermore, businesses, they claim, underreport cyberattacks to preserve their reputation of being secure.
11 An interim agreement with Iran in late 2013 suggests that Iran is now taking those concerns more seriously, thereby reducing the odds (or at least the intensity) of a confrontation between Iran and the United States. Hence, the danger of cyberattacks as described in this essay is putatively lower. However, the broader lessons of this essay about the treatment of cyberattacks remain no less valid.
12 Nicole Perlroth, “In Cyberattack on Saudi Firm, U.S. Sees Iran Firing Back,” New York Times, October 23, 2012.
13 “US Officials: Cyberattacks on Aramco, RasGas May Have Come from Iran,” Doha News, October 14, 2012, http://dohanews.co/post/33562748342/us-officials-cyberattacks-on-aramco….
14 Quentin Hardy, “Bank Hacking Was the Work of Iranians, Officials Say,” New York Times, January 8, 2013.
15 Siobhan Gorman and Danny Yadron, “Iran Hacks Energy Firms, U.S. Says,” Wall Street Journal, May 23, 2013.
16 Leon E. Panetta, “Remarks by Secretary Panetta on Cybersecurity to the Business Executives for National Security, New York City,” October 11, 2012, U.S. Department of Defense, http://www.defense.gov/transcripts/transcript.aspx?transcriptid=5136.
17 Stewart A. Baker, Partner, Steptoe & Johnson LLP, “The Attribution Revolution: Raising the Costs for Hackers and Their Customers,” Statement before the Subcommittee on Crime and Terrorism of the Senate Judiciary Committee, 113th Cong., 1st sess., May 8, 2013, http://www.judiciary.senate.gov/pdf/5–8‑13BakerTestimony.pdf.
18 Alan Grayson, “On Syria Vote, Trust, but Verify,” New York Times, September 6, 2013.
19 In September 2013, Vladimir Putin issued a travel warning for Russians indicating that the United States might indict (for hacking, among other crimes) to avoid countries from which the United States could extradite them. Mark Johanson, “Russia Issues Travel Warning about US, Citing Threat of ‘Kidnapping,’ ” International Business Times, September 3, 2013, http://www.ibtimes.com/russia-issues-travel-warning-about-us-citing-thr….
20 Matt Hunter, “NASDAQ: ‘Connectivity Issue’ Led to Three-Hour Shutdown,” CNBC, August 22, 2013, http://www.cnbc.com/id/100968086.
21 See, for instance, Benjamin H. Friedman, Jim Harper, and Christopher A. Preble, eds., Terrorizing Ourselves: Why U.S. Counterterrorism Policy Is Failing and How to Fix It (Washington: Cato Institute, 2010); John Mueller, Overblown: How Politicians and the Terrorism Industry Inflate National Security Threats, and Why We Believe Them (New York: Free Press, 2006); and many writings of Bruce Schneier, Schneier on Security (blog), http://www.schneier.com.
22 In early 2007, Idaho Laboratories demonstrated that a set of malformed instructions could cause an untended electric generator (similar to those running the trans-Alaska pipeline) to destroy itself. Jeanne Meserve, “Sources: Staged Cyber Attack Reveals Vulnerability in Power Grid,” CNN, September 26, 2007, http://www.cnn.com/2007/US/09/26/power.at.risk/.
23 That inference was drawn from Jon R. Lindsay, “Stuxnet and the Limits of Cyber Warfare,” Security Studies 22, no. 3 (2013): 365–404. Furthermore, International Atomic Energy Agency inspections report no change in status to the most productive cascades at Natanz (module A24), while the 1,000 centrifuges observed disconnected were from cascades under construction (modules A26 and A28), running under vacuum but not filled with uranium hexafluoride gas (p. 390).
24 Note the heightened activity in cyberspace ascribed to the Syrian Electronic Army as the West contemplated a response to Syria’s chemical attack.
25 Department of Defense Strategy for Operating in Cyberspace, July 2011, http://www.defense.gov/news/d20110714cyber.pdf.
26 Julian Barnes and Siobhan Gorman, “Cyber Combat: Act of War,” Wall Street Journal, May 31, 2011.
27 International Strategy for Cyberspace: Prosperity, Security, and Openness in a Networked World (Washington: White House, 2011), p. 14.
28 Under the sponsorship of the NATO Cooperative Cyber Defence Centre of Excellence, http://www.ccdcoe.org/249.html.
29 Robbie Brown, “South Carolina Offers Details of Data Theft and Warns It Could Happen Elsewhere,” New York Times, November 20, 2012.