This House would use targeted sanctions to respond to cyber-attacks

This House would use targeted sanctions to respond to cyber-attacks

The internet is increasingly seen as a potential battleground of the future, while there would be few casualties in such warfare it would have an impact on the real world. While the Director of National Intelligence has poured cold water over the idea that there might be a ‘digital Pearl Harbour’ in the next few years the possibility that cyber-attacks could knock out the U.S. electric grid has been recognised.[1]  The United States military has gone so far as to suggest that they would consider military action in response to such acts with one military official suggesting “If you shut down our power grid, maybe we will put a missile down one of your smokestacks.”[2] There have even been suggestions from the Defense Service Board that in the case of the biggest possible cyber-attacks the United States could not rule out a nuclear response.[3]

As yet however there have been no cases of cyber warfare but there have been increasing problems with cyber-attacks in a peace time situation; companies such as the New York Times and Google have been hacked,[4] a virus called Stuxnet put back Iran’s nuclear program, and most of Estonia’s internet was reduced to a crawl in 2007 as a result of a distributed denial of Service (DDoS) attack.[5] David Rothkopf has suggested that cyber-attacks will result in a ‘cool war’ in which there is little military action but persistent tension as a result of minor actions such as cyber-attacks he says “The purpose of Cool War is to be able to strike out constantly without triggering hot war while also making hot wars less desirable (much as did nuclear technology during Cold War days) or even necessary.”[6] If this becomes the case then the internet will surely be where this mostly happens. This makes it important that there is some formal way of responding to cyber-attacks that does not involve military action as the next step in escalation. Instead there needs to be a mechanism to resolve disputes and penalise the offender.

Fortunately at the same time as the US suggested the military option would not be off the table it accepted it would be a last resort and diplomatic, informational, and economic would come first “as appropriate and consistent with applicable international law”.[7]

So what are cyber-attacks and the proposed targeted sanctions?

NATO defines cyber attacks to be ‘a cyber operation, whether offensive or defensive, that is reasonably expected to cause injury or death to persons or damage or destruction to objects’[8] this is useful for defining what attacks might be just cause for a military response but this is a very high bar at the moment as few attacks cause immediate physical damage. Sanctions could be used in response to much lower level attacks. Businesses in particular would be keen to have the government help prevent the stealing of intellectual property through the imposition of sanctions. So we would simply be imposing sanctions when the economic losses are quantifiable and sufficient to be worth government effort to prevent.

Sanctions are the use of economic pressure by a state (or group) of states in an attempt to get another state to change a policy. The pressure is either through direct economic pain on the actor launching the attacks or to encourage public pressure.[9] In this case sanctions would be either attempting to prevent a state from launching cyber attacks of its own or to persuade it to crack down on non-state actors that are launching these attacks.

[1] Zetter, Kim, ‘Spy Chief Says Little Danger of Cyber ‘Pearl Harbor’ in Next Two Years’, WIRED, 12 March 2013, http://www.wired.com/threatlevel/2013/03/no-cyber-pearl-harbor/

[2] Brookes, Adam, ‘US Pentagon to treat cyber-attacks as ‘acts of war’’, BBC News, 1 June 2011, http://www.bbc.co.uk/news/world-us-canada-13614125

[3] Department of Defense Defense Schence Board, ‘Task Force Report: Resilient Military Systems and the Advanced Cyber Threat’, Office of the Under Secretary of Defense for Acquisition, Technology and Logistics, January 2013, http://www.acq.osd.mil/dsb/reports/ResilientMilitarySystems.CyberThreat.pdf p.41

[4] Ferran, Lee, ‘Major US Newspapers Allege Chinese Hack Attack’, ABC News, 31 January 2013, http://abcnews.go.com/Blotter/york-times-alleges-chinese-hack-attack/story?id=18365205#.UYEwCrWG18E

[5] Traynor, Ian, ‘Russia accused of unleashing cyberwar to disable Estonia’, The Guardian, 17 May 2007, http://www.guardian.co.uk/world/2007/may/17/topstories3.russia

[6] Rothkopf, David, ‘The Cool War’, Foreign Policy, 20 February 2013, http://www.foreignpolicy.com/articles/2013/02/20/the_cool_war_china_cyberwar

[7] Brookes, Adam, ‘US Pentagon to treat cyber-attacks as ‘acts of war’’, BBC News, 1 June 2011, http://www.bbc.co.uk/news/world-us-canada-13614125    

[8] Schmitt, Michael N. ed., Tallinn Manual on the International Law Applicable to Cyber Warfare, Cambridge University Press, 2013, http://ccdcoe.org/249.html p.106

[9] Pape, Robert A., ‘Why Economic Sanctions Do Not Work’, International Security, Vol. 22, Issue 2, Autumn 1997, pp.90-137, http://www.stanford.edu/class/ips216/Readings/pape_97%20(jstor).pdf p.93-4

 

Open all points
Points-for

Points For

POINT

Cyber-attacks pose a distinct problem for international diplomacy in that they are difficult to prevent and difficult to respond to. Any kind of military response as the United States has threatened would be completely disproportionate against all but the very biggest of cyber-attacks (those that actually result in deaths),[1] diplomacy on the other hand is as good as no response, if the response is simply a tongue lashing then the benefits of cyber espionage will be far higher than the cost.

The only proportionate, and therefore just, response to a cyber-attack is sanctions. The sanctions can be used to impose a similar economic cost on the offending state as that caused by the cyber-attack. This would be just like the World Trade Organisation's dispute settlement rules. They allow for the imposition of trade sanctions to a similar value to the losses being experienced as a result of protectionist action, with the sanctions sometimes on differing sectors to those where there are unfair trade practices.[2] Alternatively sanctions could mean a proportionate Internet response; users from the offending nation could be prohibited from using Internet services, for example an attack by hackers on the US could result in people from that country being blocked from Google and other US internet services.

[1] Friedman, Benjamin H., Preble, Christopher A., ‘A Military Response to Cyberattacks Is Preposterous’, CATO Institute, 2 June 2011, http://www.cato.org/publications/commentary/military-response-cyberattacks-is-preposterous

[2] World Trade Organisation, ‘Understanding the WTO: Settling Disputes’, 2013, http://www.wto.org/english/thewto_e/whatis_e/tif_e/disp1_e.htm

COUNTERPOINT

How do we determine what is proportionate? If some valuable intellectual property, such as part of the designs for the US's latest fighter jet the F35, which were hacked in 2009.[1] Then what can be the response to this? Can it simply be the cost of developing this design? If so then what about the strategic loss the state has suffered, how can that be calculated in? So long as it is excluded state sanctioned cyber-attacks will not be deterred.

[1] Gorman, Siobhan, Cole, August, and Dreazen, Yochi, ‘Computer Spies Breach Fighter-Jen Project’, The Wall Street Journal, 21 April 2009, http://online.wsj.com/article/SB124027491029837401.html.html

POINT

The big advantage of sanctions is that they can be as finely targeted as needed. If the sanctioning country only knows which country the cyber attack originated from then they can be broad brush sanctions, but if there is knowledge of which group initiated the attack then the sanctions can be more specific. For example in the case of unit 61398 Of the Chinese People’s Liberation Army that Mandiant showed has been attacking US companies[1] the United States could target sanctions at the People's Liberation Army by tightening weapons bans. Alternatively if the hackers are private then banning the import of certain computer equipment into that country would be appropriate. If individuals are known then the sanctions can be even more targeted, for example by freezing any bank accounts held outside their own country as the US did against North Korea when it sanctioned Banco Delta Asia through which North Korea laundered money from criminal activities.[2]

[1] Mandiant, ‘Exposing One of China’s Cyber Espionage Units’, mandiant.com, February 2013, http://intelreport.mandiant.com/Mandiant_APT1_Report.pdf

[2] Noland, Marcus, ‘Why Sanctions Can Hurt North Korea’, Council on Foreign Relations, 4 August 2010, http://www.cfr.org/north-korea/why-sanctions-can-hurt-north-korea/p22762

COUNTERPOINT

Sanctions cannot be very finely targeted and will always hit other groups as well as the cyber attackers. The chances of knowing specific individuals who were responsible are next to zero so those individuals cannot be targeted directly. This is the whole problem with cyber-attacks; they are very difficult to pin down. In the best case then sanctions are applied against the right target and happen to hit others as well; for example hackers are not the only new who want advanced computer equipment. At worst the sanctions will completely miss their target; it would be a major embarrassment for a country to impose sanctions for a cyber-attack only for it to later be discovered that the sanctions are against an innocent party through whom the attack had been routed.

POINT

At the moment the response to cyber-attacks has essentially been nothing. It is however clear that some response is needed as without a reaction there is no deterrence; the attacks will keep coming until something is done. The number of cyber-attacks and the sensitivity of the information stolen have been increasing over recent years and as more and more work is done online and more and more systems are connected to the Internet so cyber-attacks become more attractive. There needs to be a deterrent and the best deterrent is to make sure that such attacks are costly.

As these attacks are usually cross border (and in this debate we are only concerned with cross border attacks) then the only way to create a cost is through sanctions. These sanctions can either hit the assailant directly or else hit his government so encouraging them to crack down on hacking emanating from their country. It should be remembered that China argues that it does not launch cyber-attacks[1] meaning that any such attacks from China must duly be private. If this is the case then sanctions are the best way of prompting internal law enforcement. Sanctions therefore encourage all nations where there are cyber criminals to make sure they take such cyber-crime seriously. If they do not get their own cyber criminals under control then they may be affected by sanctions.

[1] China Daily, ‘China denies launching cyberattacks on US’, China.org.cn, 20 February 2013, http://www.china.org.cn/world/2013-02/20/content_28003282.htm

COUNTERPOINT

How can there ever be deterrence when the attacker believes they will not be caught, or that if they are the sanctions swill harm others not themselves? When the problem with preventing cyber-attacks is the difficulty of tracing the source[1] then deterrence becomes more and more difficult to apply. This is not like the Cold War where both superpowers could be certain that if they launched an attack there would be a devastating response. In this instance there is no certainly; the attacker believes they a, won't be caught, b, there will be no response and c, that the response won't affect them, and finally even if they are affected unless they are caught most times they will believe they will get away with it next time round.

[1] Greenemeier, Larry, ‘Seeking Address: Why Cyber Attacks Are So Difficult to Trace Back to Hackers’, Scientific American, 11 June 2011, http://www.scientificamerican.com/article.cfm?id=tracking-cyber-hackers

POINT

Cyber conflict favours the offence; when the defender is successful they gain nothing and impose no harm on the attacker who is free to try again elsewhere. The attackers are free to attack until they get past the defences somewhere.[1] That the attacks don’t risk lives helps to encourage an offensive mindset as makes it seem like there is no downside to attempting to dominate your opponent.[2] This means the only cyber response is to attack the attacker so that the same advantages apply.

The result is that cyber-attacks have a very real danger of long term tension or escalation. If one side is losing a conflict where both sides are attempting to steal the other's intellectual property (or the other has little to steal) the response may be something like the stuxnet attack that involves physical damage, this then would probably be considered an illegal use of force creating a thin line between a cyber-war and a real war.[3] When the cyber war involves physical damage as the US has warned there then may be a military response. Sanctions are a way to apply pressure without this risk of escalation into a military conflict.

[1] Lin, Herbert, ‘Escalation Dynamics and Conflict Termination in Cyberspace’, Strategic Studies Quarterly, Fall 2012, http://www.au.af.mil/au/ssq/2012/fall/lin.pdf p.51

[2] Rothkopf, David, ‘The Cool War’, Foreign Policy, 20 February 2013, http://www.foreignpolicy.com/articles/2013/02/20/the_cool_war_china_cyberwar

[3] Zetter, Kim, ‘Legal Experts: Stuxnet Attack on Iran Was Illegal ‘Act of Force’, Wired, 25 March 2013, http://www.wired.com/threatlevel/2013/03/stuxnet-act-of-force/

COUNTERPOINT

An asymmetric response to cyber-attacks in the form of sanctions may prevent escalation, but they could also simply encourage a cyber-attacker to do more knowing that sanctions cannot stop cyber-attacks. Sanctions in the past have rarely changed policy; Sanctions against Cuba did not result in overthrowing Castro, sanctions have not changed North Korea or Iran’s policy towards nuclear weapons, so there is little reason that sanctions would stop cyber-attacks.[1] Instead the country being sanctioned will find a way around and quite possibly escalate themselves much as North Korea has upped the stakes whenever new sanctions are imposed, most recently by cancelling a hotline to the South.[2]

[1] Friedman, Lara, ‘Getting over the sanctions delusion’, Foreign Policy The Middle East Channel, 14 March 2010, http://mideast.foreignpolicy.com/posts/2010/03/15/getting_over_the_sanctions_delusion

[2] Branigan, Tania, ‘Expanded UN sanctions on North Korea prompt rage from Pyongyang’, guardian.co.uk, 8 March 2013, http://www.guardian.co.uk/world/2013/mar/08/north-korea-rages-un-sanctions

Points-against

Points Against

POINT

Cyber-attacks pose a distinct problem for international diplomacy in that they are difficult to prevent and difficult to respond to. Any kind of military response as the United States has threatened would be completely disproportionate against all but the very biggest of cyber-attacks (those that actually result in deaths),[1] diplomacy on the other hand is as good as no response, if the response is simply a tongue lashing then the benefits of cyber espionage will be far higher than the cost.

The only proportionate, and therefore just, response to a cyber-attack is sanctions. The sanctions can be used to impose a similar economic cost on the offending state as that caused by the cyber-attack. This would be just like the World Trade Organisation's dispute settlement rules. They allow for the imposition of trade sanctions to a similar value to the losses being experienced as a result of protectionist action, with the sanctions sometimes on differing sectors to those where there are unfair trade practices.[2] Alternatively sanctions could mean a proportionate Internet response; users from the offending nation could be prohibited from using Internet services, for example an attack by hackers on the US could result in people from that country being blocked from Google and other US internet services.

[1] Friedman, Benjamin H., Preble, Christopher A., ‘A Military Response to Cyberattacks Is Preposterous’, CATO Institute, 2 June 2011, http://www.cato.org/publications/commentary/military-response-cyberattacks-is-preposterous

[2] World Trade Organisation, ‘Understanding the WTO: Settling Disputes’, 2013, http://www.wto.org/english/thewto_e/whatis_e/tif_e/disp1_e.htm

COUNTERPOINT

How do we determine what is proportionate? If some valuable intellectual property, such as part of the designs for the US's latest fighter jet the F35, which were hacked in 2009.[1] Then what can be the response to this? Can it simply be the cost of developing this design? If so then what about the strategic loss the state has suffered, how can that be calculated in? So long as it is excluded state sanctioned cyber-attacks will not be deterred.

[1] Gorman, Siobhan, Cole, August, and Dreazen, Yochi, ‘Computer Spies Breach Fighter-Jen Project’, The Wall Street Journal, 21 April 2009, http://online.wsj.com/article/SB124027491029837401.html.html

POINT

The big advantage of sanctions is that they can be as finely targeted as needed. If the sanctioning country only knows which country the cyber attack originated from then they can be broad brush sanctions, but if there is knowledge of which group initiated the attack then the sanctions can be more specific. For example in the case of unit 61398 Of the Chinese People’s Liberation Army that Mandiant showed has been attacking US companies[1] the United States could target sanctions at the People's Liberation Army by tightening weapons bans. Alternatively if the hackers are private then banning the import of certain computer equipment into that country would be appropriate. If individuals are known then the sanctions can be even more targeted, for example by freezing any bank accounts held outside their own country as the US did against North Korea when it sanctioned Banco Delta Asia through which North Korea laundered money from criminal activities.[2]

[1] Mandiant, ‘Exposing One of China’s Cyber Espionage Units’, mandiant.com, February 2013, http://intelreport.mandiant.com/Mandiant_APT1_Report.pdf

[2] Noland, Marcus, ‘Why Sanctions Can Hurt North Korea’, Council on Foreign Relations, 4 August 2010, http://www.cfr.org/north-korea/why-sanctions-can-hurt-north-korea/p22762

COUNTERPOINT

Sanctions cannot be very finely targeted and will always hit other groups as well as the cyber attackers. The chances of knowing specific individuals who were responsible are next to zero so those individuals cannot be targeted directly. This is the whole problem with cyber-attacks; they are very difficult to pin down. In the best case then sanctions are applied against the right target and happen to hit others as well; for example hackers are not the only new who want advanced computer equipment. At worst the sanctions will completely miss their target; it would be a major embarrassment for a country to impose sanctions for a cyber-attack only for it to later be discovered that the sanctions are against an innocent party through whom the attack had been routed.

POINT

At the moment the response to cyber-attacks has essentially been nothing. It is however clear that some response is needed as without a reaction there is no deterrence; the attacks will keep coming until something is done. The number of cyber-attacks and the sensitivity of the information stolen have been increasing over recent years and as more and more work is done online and more and more systems are connected to the Internet so cyber-attacks become more attractive. There needs to be a deterrent and the best deterrent is to make sure that such attacks are costly.

As these attacks are usually cross border (and in this debate we are only concerned with cross border attacks) then the only way to create a cost is through sanctions. These sanctions can either hit the assailant directly or else hit his government so encouraging them to crack down on hacking emanating from their country. It should be remembered that China argues that it does not launch cyber-attacks[1] meaning that any such attacks from China must duly be private. If this is the case then sanctions are the best way of prompting internal law enforcement. Sanctions therefore encourage all nations where there are cyber criminals to make sure they take such cyber-crime seriously. If they do not get their own cyber criminals under control then they may be affected by sanctions.

[1] China Daily, ‘China denies launching cyberattacks on US’, China.org.cn, 20 February 2013, http://www.china.org.cn/world/2013-02/20/content_28003282.htm

COUNTERPOINT

How can there ever be deterrence when the attacker believes they will not be caught, or that if they are the sanctions swill harm others not themselves? When the problem with preventing cyber-attacks is the difficulty of tracing the source[1] then deterrence becomes more and more difficult to apply. This is not like the Cold War where both superpowers could be certain that if they launched an attack there would be a devastating response. In this instance there is no certainly; the attacker believes they a, won't be caught, b, there will be no response and c, that the response won't affect them, and finally even if they are affected unless they are caught most times they will believe they will get away with it next time round.

[1] Greenemeier, Larry, ‘Seeking Address: Why Cyber Attacks Are So Difficult to Trace Back to Hackers’, Scientific American, 11 June 2011, http://www.scientificamerican.com/article.cfm?id=tracking-cyber-hackers

POINT

Cyber conflict favours the offence; when the defender is successful they gain nothing and impose no harm on the attacker who is free to try again elsewhere. The attackers are free to attack until they get past the defences somewhere.[1] That the attacks don’t risk lives helps to encourage an offensive mindset as makes it seem like there is no downside to attempting to dominate your opponent.[2] This means the only cyber response is to attack the attacker so that the same advantages apply.

The result is that cyber-attacks have a very real danger of long term tension or escalation. If one side is losing a conflict where both sides are attempting to steal the other's intellectual property (or the other has little to steal) the response may be something like the stuxnet attack that involves physical damage, this then would probably be considered an illegal use of force creating a thin line between a cyber-war and a real war.[3] When the cyber war involves physical damage as the US has warned there then may be a military response. Sanctions are a way to apply pressure without this risk of escalation into a military conflict.

[1] Lin, Herbert, ‘Escalation Dynamics and Conflict Termination in Cyberspace’, Strategic Studies Quarterly, Fall 2012, http://www.au.af.mil/au/ssq/2012/fall/lin.pdf p.51

[2] Rothkopf, David, ‘The Cool War’, Foreign Policy, 20 February 2013, http://www.foreignpolicy.com/articles/2013/02/20/the_cool_war_china_cyberwar

[3] Zetter, Kim, ‘Legal Experts: Stuxnet Attack on Iran Was Illegal ‘Act of Force’, Wired, 25 March 2013, http://www.wired.com/threatlevel/2013/03/stuxnet-act-of-force/

COUNTERPOINT

An asymmetric response to cyber-attacks in the form of sanctions may prevent escalation, but they could also simply encourage a cyber-attacker to do more knowing that sanctions cannot stop cyber-attacks. Sanctions in the past have rarely changed policy; Sanctions against Cuba did not result in overthrowing Castro, sanctions have not changed North Korea or Iran’s policy towards nuclear weapons, so there is little reason that sanctions would stop cyber-attacks.[1] Instead the country being sanctioned will find a way around and quite possibly escalate themselves much as North Korea has upped the stakes whenever new sanctions are imposed, most recently by cancelling a hotline to the South.[2]

[1] Friedman, Lara, ‘Getting over the sanctions delusion’, Foreign Policy The Middle East Channel, 14 March 2010, http://mideast.foreignpolicy.com/posts/2010/03/15/getting_over_the_sanctions_delusion

[2] Branigan, Tania, ‘Expanded UN sanctions on North Korea prompt rage from Pyongyang’, guardian.co.uk, 8 March 2013, http://www.guardian.co.uk/world/2013/mar/08/north-korea-rages-un-sanctions

POINT

When is it legitimate to use sanctions in response to an action? Any individual state (or group of states) can use sanctions against any other state. However for these sanctions to be effective they need to have broad based support. Sanctions by an individual country are unlikely to change the behaviour of an aggressor as they will be able to get around the sanctions. Moreover for any country that is a member of the WTO imposing sanctions may be considered illegal allowing the other country to counter them with similar measures.

The problem then is that there is no international response to hacking and it is unlikely there will be agreement on such a response. When countries like China deny that hacking comes from them are they likely to support the use of sanctions against such actions? Sanctions for much worse actions are often bogged down when they are attempted at the international level such as China and Russia vetoing sanctions against Syria in response to the violence there.[1]

[1] United Nations Security Council, ‘Security Council fails to adopt draft resolution on Syria that would have threatened sanctions, due to negative votes of China, Russian Federation’, un.org, SC/10714, 19 July 2012, https://www.un.org/News/Press/docs/2012/sc10714.doc.htm

COUNTERPOINT

This will clearly depend on the country engaging sanctions; sanctions from the US or EU will be much more significant than sanctions from the Philippines. Most countries however are a part of larger trade blocks; sanctions from the Philippines may not be much of a threat but sanctions from ASEAN would be much more compelling. Using such regional organisations can help nations get around the problems of agreement associated with broader UN sanctions. There have already been calls for groups such as ASEAN to work together against cyber attacks[1] and these groupings could be expanded to include other nations that agree with the policy on an ad hoc basis in much the same way as Japan is looking to join with ASEAN on such defence.[2]

[1] Minnick, Wendell, ‘Malaysia Calls for ASEAN ‘Master Plan’ to Fight Cyber Attacks’, Defense News, 3 June 2012, http://www.defensenews.com/article/20120603/DEFREG03/306030004/Malaysia-Calls-ASEAN-8216-Master-Plan-8217-Fight-Cyber-Attacks

[2] Westlake, Adam, ‘Japan pushes to form cyber-defense network with other ASEAN countries’, Japan Daily Press, 8 October 2012, http://japandailypress.com/japan-pushes-to-form-cyber-defense-network-with-other-asean-countries-0814818

POINT

The problem with sanctions is that they are almost always indiscriminate; Iran’s sanctions today are an example where the international community’s concerns are entirely with the government, over nuclear weapons, not the people yet the result has been a doubling in the price of staple foodstuffs and rapidly rising unemployment.[1]

This will equally be the case here. While sanctioners will try to target the sanctions the fact is there is nothing to target with sanctions that would not affect everyday lives. Hackers are ordinary people so clearly sanctions will affect others like themselves.  The most obvious reactions involve the internet but blocking access to internet services, or penalising ISP’s, or cutting off technology transfers, harm everyone else as much as hackers. Often this harm is in the form of simply making the internet less safe for people in that country because they will have to turn to pirated versions of software. IDC and Microsoft estimate the chances of being infected with malware when using pirated software at one in three[2] so it is no surprise that the Chinese government in October 2012 launched a campaign to have government and companies purchase legal software.[3]

[1] The Economist, ‘A red line and a reeling rial’, 6 October 2012, http://www.economist.com/node/21564229

[2] IDC, ‘White Paper: The Dangerous World of Counterfeit and Pirated Software’, Microsoft, March 2013, http://www.microsoft.com/en-us/news/download/presskits/antipiracy/docs/IDC030513.pdf p.3

[3] Xinhua, ‘Chinese gov’t says no to pirated software’, People’s Daily Online, 26 April 2013, http://english.peopledaily.com.cn/90882/8224829.html

COUNTERPOINT

The aim of sanctions does not have to be to directly affect the individuals doing the hacking, though in some cases this may be possible. Rather the aim is to change the attitude towards regulation and enforcement by the central government and possibly by the people as a whole. If the people of a country believe they are suffering as a result of the hackers in their midst they will be much more likely to demand their government make cracking down on such activities a priority.

POINT

The problem with sanctions is that they almost never work so all they do is provide punishment and damage relations without ever resolving the issue. Numerous studies have shown that sanctions don’t actually change the policy of the country that is being sanctioned.[1] Robert Pape suggests that sanctions are only effective in achieving policy change about 5% of the time because states can take substantial economic punishment before they give up on anything that might be considered to be a national interest, and because states are good at shifting the burden of the sanctions onto opposition groups,[2] or else use the sanctions to rally domestic support against the outside actor.[3]

Instead there need to be renewed cooperation on cyber security. Fundamentally as with things like drug smuggling, and people trafficking this is an international problem that needs to be tackled by law enforcement authorities. To that end there needs to be more cooperation not more recriminations.[4]

[1] Lindsay, James M., ‘Trade Sanctions As Policy Instruments: A Re-Examination’, International Studies Quarterly, Vol.30, Issue 2, June 1986, pp.153-170, http://www.stanford.edu/class/ips216/Readings/lindsay_86.pdf, p.1 provides a list of some of them

[2] Pape, Robert A., ‘Why Economic Sanctions Do Not Work’, International Security, Vol. 22, Issue 2, Autumn 1997, pp.90-137, http://www.stanford.edu/class/ips216/Readings/pape_97%20(jstor).pdf p.106

[3] Snyder, Jack, Myths of Empire, Cornell University Press, 1991

[4] Dingli, Shen, ‘What Kerry Should Tell China’, Foreign Policy, 11 April 2013, http://www.foreignpolicy.com/articles/2013/04/11/what_kerry_should_tell_china

COUNTERPOINT

Cooperation is not a helpful alternative as it really means status quo when we can see that the status quo is not going to reduce cyber-attacks or bring recompense. Rather this is precisely what sanctions are needed for; to encourage states that harbour cyber criminals and hackers to use their law enforcement capabilities to crack down on such attacks.

POINT

Sanctions are typically used as a response to the actions of another state, not the actions of a private actor. Much cyber espionage is not carried out by government entities such as the army or intelligence services. It is also not encouraged by government regulation. Rather it is carried out by private actors whether this is criminal organisations or businesses seeking to undermine their rivals and learn their secrets this is usually with a financial motive (75% of data breaches)[1], or else by individuals motivated by nationalism and patriotism to attack those they see as their nation’s enemies. It is difficult to see how sanctions against the nation as a whole affect these groups and individuals. This is certainly the case in China where many such as the ‘China Eagle Union’ admit to hacking for nationalist reasons rather than being told by the government.[2]

A response such as sanctions are simply likely to breed more resentment that the other power is attempting to bully their nation. The hackers only possible response is then more hacking. For those sponsored by companies if their company is hit by sanctions it simply becomes all the more necessary to find methods of getting ahead to offset any harm by sanctions.

[1] Verizon RISK Team, ‘2013 Data Breach Investigations Report’, Verizon, 23 April 2013, http://www.verizonenterprise.com/DBIR/2013/ p.6

[2] Beech, Hannah, ‘China’s Red Hackers: The Tale of One Patriotic Cyberwarrior’, Time, 21 February 2013, http://world.time.com/2013/02/21/chinas-red-hackers-the-tale-of-one-patriotic-cyberwarrior/

COUNTERPOINT

Even taking it at face value that most of these hackers are independent actors not a part of a state policy there would still be solid reasoning behind sanctions. That most cyber-attacks have a financial motive implies that sanctions are the best response; as it is hitting them in an area that the attackers are clearly interested in. As for those who are attacking for ‘patriotic’ reasons if they are truly patriots they will stop when they see their efforts are really harming their country not helping it. 

Bibliography

Beech, Hannah, ‘China’s Red Hackers: The Tale of One Patriotic Cyberwarrior’, Time, 21 February 2013, http://world.time.com/2013/02/21/chinas-red-hackers-the-tale-of-one-patriotic-cyberwarrior/

Branigan, Tania, ‘Expanded UN sanctions on North Korea prompt rage from Pyongyang’, guardian.co.uk, 8 March 2013, http://www.guardian.co.uk/world/2013/mar/08/north-korea-rages-un-sanctions

Brookes, Adam, ‘US Pentagon to treat cyber-attacks as ‘acts of war’’, BBC News, 1 June 2011, http://www.bbc.co.uk/news/world-us-canada-13614125

China Daily, ‘China denies launching cyberattacks on US’, China.org.cn, 20 February 2013, http://www.china.org.cn/world/2013-02/20/content_28003282.htm

Department of Defense Defense Schence Board, ‘Task Force Report: Resilient Military Systems and the Advanced Cyber Threat’, Office of the Under Secretary of Defense for Acquisition, Technology and Logistics, January 2013, http://www.acq.osd.mil/dsb/reports/ResilientMilitarySystems.CyberThreat.pdf

Dingli, Shen, ‘What Kerry Should Tell China’, Foreign Policy, 11 April 2013, http://www.foreignpolicy.com/articles/2013/04/11/what_kerry_should_tell_china

Ferran, Lee, ‘Major US Newspapers Allege Chinese Hack Attack’, ABC News, 31 January 2013, http://abcnews.go.com/Blotter/york-times-alleges-chinese-hack-attack/story?id=18365205#.UYEwCrWG18E

Friedman, Benjamin H., Preble, Christopher A., ‘A Military Response to Cyberattacks Is Preposterous’, CATO Institute, 2 June 2011, http://www.cato.org/publications/commentary/military-response-cyberattacks-is-preposterous

Friedman, Lara, ‘Getting over the sanctions delusion’, Foreign Policy The Middle East Channel, 14 March 2010, http://mideast.foreignpolicy.com/posts/2010/03/15/getting_over_the_sanctions_delusion

Gorman, Siobhan, Cole, August, and Dreazen, Yochi, ‘Computer Spies Breach Fighter-Jen Project’, The Wall Street Journal, 21 April 2009, http://online.wsj.com/article/SB124027491029837401.html.html

Greenemeier, Larry, ‘Seeking Address: Why Cyber Attacks Are So Difficult to Trace Back to Hackers’, Scientific American, 11 June 2011, http://www.scientificamerican.com/article.cfm?id=tracking-cyber-hackers

IDC, ‘White Paper: The Dangerous World of Counterfeit and Pirated Software’, Microsoft, March 2013, http://www.microsoft.com/en-us/news/download/presskits/antipiracy/docs/IDC030513.pdf

Lin, Herbert, ‘Escalation Dynamics and Conflict Termination in Cyberspace’, Strategic Studies Quarterly, Fall 2012, http://www.au.af.mil/au/ssq/2012/fall/lin.pdf

Lindsay, James M., ‘Trade Sanctions As Policy Instruments: A Re-Examination’, International Studies Quarterly, Vol.30, Issue 2, June 1986, pp.153-170, http://www.stanford.edu/class/ips216/Readings/lindsay_86.pdf

Mandiant, ‘Exposing One of China’s Cyber Espionage Units’, mandiant.com, February 2013, http://intelreport.mandiant.com/Mandiant_APT1_Report.pdf

Minnick, Wendell, ‘Malaysia Calls for ASEAN ‘Master Plan’ to Fight Cyber Attacks’, Defense News, 3 June 2012, http://www.defensenews.com/article/20120603/DEFREG03/306030004/Malaysia-Calls-ASEAN-8216-Master-Plan-8217-Fight-Cyber-Attacks

Noland, Marcus, ‘Why Sanctions Can Hurt North Korea’, Council on Foreign Relations, 4 August 2010, http://www.cfr.org/north-korea/why-sanctions-can-hurt-north-korea/p22762

Pape, Robert A., ‘Why Economic Sanctions Do Not Work’, International Security, Vol. 22, Issue 2, Autumn 1997, pp.90-137, http://www.stanford.edu/class/ips216/Readings/pape_97%20(jstor).pdf

Rothkopf, David, ‘The Cool War’, Foreign Policy, 20 February 2013, http://www.foreignpolicy.com/articles/2013/02/20/the_cool_war_china_cyberwar

Schmitt, Michael N. ed., Tallinn Manual on the International Law Applicable to Cyber Warfare, Cambridge University Press, 2013, http://ccdcoe.org/249.html

Snyder, Jack, Myths of Empire, Cornell University Press, 1991

The Economist, ‘A red line and a reeling rial’, 6 October 2012, http://www.economist.com/node/21564229

Traynor, Ian, ‘Russia accused of unleashing cyberwar to disable Estonia’, The Guardian, 17 May 2007, http://www.guardian.co.uk/world/2007/may/17/topstories3.russia

United Nations Security Council, ‘Security Council fails to adopt draft resolution on Syria that would have threatened sanctions, due to negative votes of China, Russian Federation’, un.org, SC/10714, 19 July 2012, https://www.un.org/News/Press/docs/2012/sc10714.doc.htm

Verizon RISK Team, ‘2013 Data Breach Investigations Report’, Verizon, 23 April 2013, http://www.verizonenterprise.com/DBIR/2013/

Westlake, Adam, ‘Japan pushes to form cyber-defense network with other ASEAN countries’, Japan Daily Press, 8 October 2012, http://japandailypress.com/japan-pushes-to-form-cyber-defense-network-with-other-asean-countries-0814818

World Trade Organisation, ‘Understanding the WTO: Settling Disputes’, 2013, http://www.wto.org/english/thewto_e/whatis_e/tif_e/disp1_e.htm

Xinhua, ‘Chinese gov’t says no to pirated software’, People’s Daily Online, 26 April 2013, http://english.peopledaily.com.cn/90882/8224829.html

Zetter, Kim, ‘Spy Chief Says Little Danger of Cyber ‘Pearl Harbor’ in Next Two Years’, WIRED, 12 March 2013, http://www.wired.com/threatlevel/2013/03/no-cyber-pearl-harbor/

Zetter, Kim, ‘Legal Experts: Stuxnet Attack on Iran Was Illegal ‘Act of Force’, WIRED, 25 March 2013, http://www.wired.com/threatlevel/2013/03/stuxnet-act-of-force/

Have a good for or against point on this topic? Share it with us!

Login or register in order to submit your arguments
Login
Share Points For or Against Image
Loading...