by Dave Chappelle
from
ItinCanada Website
Ron Deibert (PhD,
University of British Columbia) is Associate Professor of
Political Science, and Director of the Canada Centre for Global
Security Studies and
the Citizen Lab at the Munk
School of Global Affairs, University of Toronto.
The Citizen Lab is an interdisciplinary research and development
hothouse working at the intersection of the Internet, global
security, and human rights.
As a political scientist at U of T he is involved in several
collaborative cyberspace R&D projects. He is also a co-founder
and a principal investigator of the
Information Warfare Monitor and
OpenNet Initiative projects. Mr
Deibert will be speaking at
SC Congress Canada in June.
OpenNet document patterns of Internet censorship and
surveillance worldwide.
“We hold a mirror to
state-based and other forms of Internet filtering, going
back to 2002,” he said. “Every year we test in over 70
countries using field research and technical interrogation
methods.”
Generally speaking in the
early part of 2000s, governments either didn't care or were
oblivious to what was happening on the Internet. Today
censorship has become a worldwide norm.
In addition countries are
applying next generation controls.
“They’re engaging in
offensive activities and surveillance implementing new laws
that bring in a climate of censorship, and in some cases
forcing ISPs to do the policing for them.”
Part 1
May 12, 2011
The Information Warfare Monitor focuses on cyber warfare and espionage.
Tracking Ghostnet and
Shadows in The Cloud, published in 2010,
both originated in the office of
the
Dalai Lama.
“Our aim was to investigate cyber espionage
networks,” Mr Deibert said.
“So we figured it would be at a targeted
organization with lax security. We also had good relations with the
Tibetan government in exile through our field researchers.”
What they didn’t realize is that the same
attackers had simultaneously infiltrated hundreds of high-level targets,
including many governments.
“We’re trying to understand how it’s being
contested, and how governments and other authorities are exercising
their power in this domain. Cyberspace is a new domain of geopolitical
contestation. We want to outline several complimentary forces that are
leading to a watershed moment in the history and character of
cyberspace.”
The major forces are first a demographic shift,
from the north and west to the south and east of the planet.
The northern democratic countries where the
knowledge economy was formed are being overtaken by the developing
countries. Asia for example has 40% of the Internet population, yet it ranks
sixth in terms of penetration. There’s a huge growth potential that will
dwarf the number of users that come from places like Toronto or Silicon
Valley or Washington DC.
Most discussion occurs inside policy circles, within constituencies that
assume things - such as inside the Beltway.
“In fact the center of gravity of cyberspace
is shifting before our eyes, and that will affect the character of
cyberspace in ways we can’t predict.”
The Internet is expanding into countries
that have long histories of state intervention.
“We need to get used to that and think about
what it means.”
Communities want to communicate in their own
languages.
That pressures linguistic domains, which in turn
could lead to increasing government intervention in cyberspace.
“When we started there were only a handful
of countries that filtered Internet content. Now there are over 30. Many
are imposing requirements on ISPs to filter access to content. Not only
is it legitimate for governments to intervene, but also they’re becoming
more aggressive.”
Which leads to another factor - the
militarization of the Internet. There’s a lot of hype and exaggeration about
the idea of cyberwar. Yet there’s a ripple effect.
With the creation of the
US military Cyber Command it
is now overt.
“What’s different is that armed forces of
governments are tasked with building doctrines to fight and win wars in
this domain," said Mr Deibert.
"Many of these governments are looking to
the underworld of cybercrime to give them an advantage. Both the attacks
on Estonia and Russian-Georgian conflict involved the exploitation of
cybercrime that were directed by Russian authorities, and also piled on
by well-known criminal botnets.”
There is an arms race in cyberspace, and
criminals are caught up in it.
“Now we have huge cold war behemoths
partaking. That alone is an important force. Not just in terms of how
the market is organized by defense expenditures, but also by the
technology - deep packet inspection or computer exploitation tools.”
Part 2
May 16, 2011
In Egypt protestors found evidence that
a
UK firm had been contracted to assist the Egyptian secret police
with computer exploitation services.
"Suddenly this technology and behavior is
attractive to authoritarian regimes. A Canadian company -
Netsweeper - is unapologetic about
servicing this market,” said Ron Deibert, Associate Professor of
Political Science, and Director of the Canada Centre for Global Security
Studies and the Citizen Lab at the Munk School of Global Affairs,
University of Toronto.
The Citizen Lab is an interdisciplinary research
and development hothouse working at the intersection of the Internet, global
security, and human rights.
As a political scientist at U of T he is involved in several collaborative
cyberspace R&D projects. He is also a co-founder and a principal
investigator of the OpenNet Initiative and Information Warfare Monitor
projects.
“Cyberspace is owned and operated by the
private sector. So when governments want to control they have to pass
laws. Many of these private companies have to contravene laws of their
own countries... RIM in India, for example."
To operate in a market these firms may have to
turn over information on users.
RIM turning over data to UAE security services
may result in activists being thrown in jail, or worse.
“That will become more common,” Mr Deibert
said.
“The character of cyberspace is certainly
empowering of individuals in ways we’ve never seen. At the same time,
it’s a human made domain. It’s an artifact hat has been created. And it
can be destroyed or changed. Looming on the horizon are many threats.”
For example: network neutrality.
Change is coming, both from governments wanting
more control, and the large telcos that have to deal with the huge amounts
of cybercrime.
“The amount of malicious traffic Bell Canada
has to deal with is imposing on them the choice to discriminate the
traffic to better control it,” Mr Deibert said.
“It’s a commercial imperative. Not only defending their networks, but
also going out and disabling those responsible for engaging in offensive
computer attacks. It raises questions, if not alarms - a Canadian
company attacking inside a foreign government. If Bell can do that,
what’s stopping Chinese from doing that to a Canadian ISP that hosts a
Falun Gong page? It legitimizes the behavior.”
The US needs to be able to respond aggressively.
Whether you agree or not.
“In response to Shadows in the Cloud, where
our report showed evidence of Chinese infiltrators inside Indian
infrastructure, India proposed passing laws allowing patriotic hacking.”
And of course “patriotic” is defined by the
definer.
After
Wikileaks founder was arrested,
Anonymous targeted Visa and Mastercard, the
Tunisian government, an obscure US church, and then HPGary.
“This is the climate that’s engendered by
the overall militarization of cyberspace. Now it’s not restricted at all
- it‘s openly advocated.”
The huge market for cyber security now has
offensive capabilities.
“What is Canada doing here?” asked Mr
Deibert.
“As a country with a huge geographic
landmass with distributed population, we’re dependent on
telecommunications more than any other. We have no foreign cyberspace
policy, in contrast to many of our allies. We’re dependent on an open
yet secure global communications space. What can we do - cyberspace arms
control? It may not have merit, yet it’s worthy of discussion.”
There’s a lot that could be done in the law
enforcement side. One reason cybercrime is exploding is lack of law
enforcement, especially cooperation between countries.
And law enforcement officers are picky about
which laws they want to enforce.
“We did an investigation on Koobface, which
was
using Facebook. We had access to their
command and control infrastructure. We gave the information to the RCMP,
which did nothing with it. Low and behold the command and control
infrastructure of Koobface is now set up in Montreal, by a well-known
ISP that hosts malicious networks.”