February 21, 2022
The Cyber Social Contract
In the spring of 2021, a Russia-based cybercrime group launched a ransomware attack against the largest fuel pipeline in the United States. According to the cybersecurity firm Mandiant, the subsequent shutdown and gas shortage across the East Coast likely originated from a single compromised password. That an individual misstep might disrupt critical services for millions illustrates just how vulnerable the United States’ digital ecosystem is in the twenty-first century.
Although most participants in the cyber-ecosystem are aware of these growing risks, the responsibility for mitigating systemic hazards is poorly distributed. Cyber-professionals and policymakers are too often motivated more by a fear of risk than by an aspiration to realize cyberspace’s full potential. Exacerbating this dynamic is a decades-old tendency among the large and sophisticated actors who design, construct, and operate digital systems to devolve the cost and difficulty of risk mitigation onto users who often lack the resources and expertise to address them.
Cyberthreats represent a betrayal of what advocates promised at the dawn of the digital revolution.
Too often, this state of affairs produces digital ecosystems where private information is easily accessible, predatory technology is inexpensive, and momentary lapses in vigilance can snowball into a continent-wide catastrophe. Although individually oriented tools like multifactor authentication and password managers are critical to solving elements of this problem, they are inadequate on their own. A durable solution must involve moving away from the tendency to charge isolated individuals, small businesses, and local governments with shouldering absurd levels of risk. Those more capable of carrying the load—such as governments and large firms—must take on some of the burden, and collective, collaborative defense needs to replace atomized and divided efforts. Until then, the problem will always look like someone else’s to solve.
Read the full article from Foreign Affairs.
More from CNAS
-
Energy, Economics & Security / Technology & National Security
Sharper: Chips and Export ControlsAs competition between the United States and China has intensified, advanced technology has become the latest battlefield. After years of restricting China’s access to advance...
By Charles Horn
-
Technology & National Security
Scaling Laws: The Open Questions Surrounding Open Source AI with Nathan Lambert and Keegan McBrideKeegan McBride, adjunct senior fellow at the Center for a New American Security joins to explore the current state of open source AI model development and associated policy qu...
By Keegan McBride
-
Energy, Economics & Security / Technology & National Security
Export Controls: Janet Egan, Sam Levy, and Peter Harrell on the White House's Semiconductor DecisionJanet Egan, a senior fellow with the Technology and National Security Program at the Center for a New American Security, discussed the Trump administration’s recent decision t...
By Janet Egan
-
Indo-Pacific Security / Technology & National Security
America Should Rent, Not Sell, AI Chips to ChinaSelling AI chips to China outright reduces America's AI lead for little benefit....
By Janet Egan & Lennart Heim