Arms Control for Cyber

By Joseph DeTrani

Ambassador Joseph DeTrani is former Special envoy for Six Party Talks with North Korea and the U.S. Representative to the Korea Energy Development Organization (KEDO), as well as former CIA director of East Asia Operations. He also served as the Associate Director of National Intelligence and Mission Manager for North Korea and the Director of the National Counter Proliferation Center, while also serving as a Special Adviser to the Director of National Intelligence.  He currently serves on the Board of Managers at Sandia National Laboratories.  The views expressed represent those of the author.

Cipher Brief Expert Ambassador Joseph R. DeTrani was the former special envoy for negotiations with North Korea from 2003-2006 and was the former director of the National Counterproliferation Center.   The views expressed in this publication are the author’s and do not imply endorsement of the Office of the Director of National Intelligence or any other agency.

OPINION —  The Solar Winds cyber-attack in March 2020 that successfully targeted hundreds of U.S. Government agencies and private sector businesses was a wake-up call making clear that something must be done before it’s too late and that a state actor, either acting alone or contracting out to a criminal group, attacked our critical infrastructure, including programs that control the electric grid, air traffic control or water supply.

The Colonial Pipeline ransomware attack in May 2021 and the JBS meat processor ransomware attack in January 2021 were a few of the thousands of ransomware attacks that were reported to the FBI.  Indeed, the FBI internet Crime Report of 2020 reported 2,474 attacks in the U.S., with losses of more than $29 million.

According to media reporting, a Russian-affiliated criminal group, Cozy Bear, was responsible for the Solar Winds attack and an East European criminal group, Darkside, was responsible for the Colonial Pipeline attack.  Russian cyber criminals reportedly were responsible for the JBS attack.

President Biden made it clear to Russian President Vladimir Putin during their June 2021 meeting in Geneva, that cyber-attacks, to include ransomware attacks by criminal groups in Russia, need to cease and the U.S. President provided Putin with a list of 16 key infrastructure entities that are ‘off-limits’ to Russian cyberattacks.

Defending against these cyber-attacks is a priority of this and former administrations.  Ensuring that the perpetrators are held accountable with the threat of sanctions and indictments are logical and necessary responses which, hopefully, will deter future attacks.  Unfortunately, however, even with the threat of biting sanctions, these state-sponsored attacks by a growing number of cyber-criminal groups continues to grow.

It’s obvious that more must be done to deter countries from using cyber to attack other countries for economic and political advantage. We have relevant experience with nuclear energy and biological and chemical sciences that could and should be applied to cyber.


The Cipher Brief hosts private briefings with the world’s most experienced national and global security experts.  Become a member today.


The threat of nuclear proliferation was addressed with the establishment of the Nuclear Nonproliferation Treaty (NPT) in 1970.   Currently, there are 193 countries, with the initial five nuclear weapons states, that are committed to the peaceful use of nuclear energy and the eventual abolishment of all nuclear weapons.  The threat of biological weapons was addressed in 1972, with the establishment of the Biological Weapons Convention, with a membership of 183 countries, which bans all biological and toxin weapons.  And the 1994 Chemical Weapons Convention, with a membership of 193 countries, bans all chemical weapons.

It should now be obvious that cyber, if not used for peaceful purposes, should be viewed as another weapon of mass destruction.  The cyber attacks against government and private sector entities and the recent spate of ransomware attacks against critical private sector entities means we must be more proactive and establish international norms that hold countries accountable for their behavior and the behavior of their citizens and criminal groups that are involved in cyber-crimes.

We have rich experience convening conventions that addressed the unlawful and harmful use of nuclear energy and biological and chemical uses that could inflict significant pain and suffering on millions of innocent people.  We could and should, do this with cyber.


Go beyond the headlines with expert perspectives on today’s news with The Cipher Brief’s Daily Open-Source Podcast.  Listen here or wherever you listen to podcasts.


Given that establishing a new forum to address cyber, in the hope of establishing an international organization that could advocate for the peaceful and beneficial uses of cyber, while prohibiting the harmful uses of cyber, and establishing a process to oversee compliance with these commitments will take time, it’s important that something be done now, as an important interim step.

As we enter into a five year extension of New START arms control negotiations with Russia, there may be value in using this venue to table the issue of cyber to determine if the U.S. and Russia are prepared to discuss the issue in a different forum, but with the vigor that was applied to nuclear weapons, starting with the Strategic Arms Limitation Treaty (SALT)in 1972, followed by the Strategic Arms Reduction Treaty (START) in 1991 and the 2021 five year extension, with the New START Treaty.

Any discussion of cyber and the establishment of a forum to ensure that cyber is used only for peaceful purposes should also include China, given that several cyber intrusions reportedly also emanated from China.  Indeed, this could and should be a subject that continues to be discussed directly with China, especially given the 2015 agreement between former President Barack Obama and Chinese President Xi Jinping that neither the U.S. nor China “will conduct or knowingly support cyber-enabled theft of intellectual property, including trade secrets or other confidential business information for commercial advantage.”

Cyber is an international issue requiring immediate attention.  The U.S., Russia and China can provide the leadership necessary to ensure that the cyber domain is used only for peaceful purposes.  If they will only do it.

This column by Cipher Brief Expert Ambassador Joseph DeTrani was first published by The Washington Times.

Read more expert-driven national security insight, perspective and analysis in The Cipher Brief


Related Articles

Search

Close