February 21, 2022
The Cyber Social Contract
In the spring of 2021, a Russia-based cybercrime group launched a ransomware attack against the largest fuel pipeline in the United States. According to the cybersecurity firm Mandiant, the subsequent shutdown and gas shortage across the East Coast likely originated from a single compromised password. That an individual misstep might disrupt critical services for millions illustrates just how vulnerable the United States’ digital ecosystem is in the twenty-first century.
Although most participants in the cyber-ecosystem are aware of these growing risks, the responsibility for mitigating systemic hazards is poorly distributed. Cyber-professionals and policymakers are too often motivated more by a fear of risk than by an aspiration to realize cyberspace’s full potential. Exacerbating this dynamic is a decades-old tendency among the large and sophisticated actors who design, construct, and operate digital systems to devolve the cost and difficulty of risk mitigation onto users who often lack the resources and expertise to address them.
Cyberthreats represent a betrayal of what advocates promised at the dawn of the digital revolution.
Too often, this state of affairs produces digital ecosystems where private information is easily accessible, predatory technology is inexpensive, and momentary lapses in vigilance can snowball into a continent-wide catastrophe. Although individually oriented tools like multifactor authentication and password managers are critical to solving elements of this problem, they are inadequate on their own. A durable solution must involve moving away from the tendency to charge isolated individuals, small businesses, and local governments with shouldering absurd levels of risk. Those more capable of carrying the load—such as governments and large firms—must take on some of the burden, and collective, collaborative defense needs to replace atomized and divided efforts. Until then, the problem will always look like someone else’s to solve.
Read the full article from Foreign Affairs.
More from CNAS
-
Technology & National Security
Microsoft Announcement Highlights Complicated Relationship Between Big Tech and WarMicrosoft restricted the Israeli military's access to some of its technology after it found that Israel's Defense Ministry was using its services to carry out mass surveillanc...
By Paul Scharre
-
Technology & National Security
Quantum Sensing at Scale: Navigating Commercialization RoadblocksQuantum sensing is racing forward in the lab—but turning prototypes into products still means wrestling with supply chains, certification, and unit economics. In “Quantum Sens...
By Constanza M. Vidal Bustamante
-
Technology & National Security
Constanza Bustamante, Research Fellow at the Center for a New American Security (CNAS) Joins the Superposition Guy’s PodcastConstanza Bustamante, a fellow at the Center for a New American Security (CNAS) is interviewed by Yuval Boger to discuss quantum policy at the nexus of national and economic s...
By Constanza M. Vidal Bustamante
-
Defense / Technology & National Security
Which Technology Offers the Best Defense Against Drones? Lasers or Mobile Gun Trucks?Poland, Denmark, Sweden, Romania and Norway are some of the European countries that have reported -- just this month alone -- drone incursions into their airspace. So far, the...
By Stacie Pettyjohn