Cyber Defense Review

There Is No “Cyber”

By Dr. David Thomson | September 07, 2016

At the recent Joint Service Academy (JSA) Cyber Security Summit at West Point (20-21 April, 2016), the word “cyber” was used in multiple different facets. As a noun, cyberspace is the “Domain characterized by the use of electronics and the electromagnetic spectrum to store, modify, and exchange data…” [COL11]. This is perhaps the broadest definition possible, proposed as the Cyberspace Operations Lexicon by the Joint Chiefs of Staff.

While the ambiguity with the meaning of the proper noun “Cyber” provides a difficult framework to focus meaningful actions, our use of the words “Cyber”, “Digital” and their like as adjectives serves only to create artificial divisions among researchers, practitioners, and decision-makers in the area.

The term “Cyber Security” is of course ubiquitous, being the focus of the JSA Cyber Security Summit and one of the main foci of the Army Cyber Institute (ACI) at West Point; that is unavoidable. Cyber Security can be many things: at the JSA Summit it was identified as the agglomeration of practicing good hardware and software manufacturing and implementation, sourcing trusted components (again, from both a hardware and software side) and providing training and education for workers to avoid naively poking holes in those standards [CON16].

The term operational security (OPSEC) is used to describe our behaviors while conducting the mission. For those whose jobs have security considerations, OPSEC refers to not discussing their work in public places, even in an unclassified way. The phrase “Digital OPSEC” or even “Cyber OPSEC” is frequently used to discuss our behaviors on the internet, such as not connecting to public WiFi, using discretion with location services on our mobile devices and sanitizing our use of social media.

I would argue that adjectivizing “Digital” OPSEC and “Cyber” Security is unwittingly creating a division in the minds and considerations of the non-practitioner.

Criminals will always focus and prey on the naive and meek. “Cyber” criminals are simply criminals with an internet connection. That is to say, “Cyber” criminals are merely modern-world criminals. The novelty of a “Cyber” criminal is:

  • They have a large attack surface with new input vectors,
  • Even if found, they may be geographically located outside of local law enforcement’s reach,

3) They have a whole new pool of the non-“tech-savvy”. Some of the pool are simply behind the times, others are self-identified “troglodytes”.

A brief aside about those “troglodytes”. In conversation, when introducing myself as a mathematician, the usual response is some version of, “I was never good at math”. Sometimes, when my annoyance takes over, I will try to my point across with, “It’s OK, I was never much good at reading, either.” The mathematician in me is highly disdainful of societal acceptance of “innumeracy” [PAU01]. Turning to the cyber world, how often do we hear, “I just don’t get this tech stuff”? In the same way as with innumeracy, this response is more and more unacceptable: in the modern world, having bad habits with this “tech stuff” is becoming akin to illiteracy or innumeracy, and we should grow the same sociopolitical pressures to combat this bad tech hygiene.

On the other side of the coin, we should not succumb to the paranoia inspired by the proper noun “Internet of Things”, whose devices are often adjectivized as “Smart”. Consequences of badly-implemented “Smart” monitoring could provide criminals, in spirit, with even more information to break into our homes. But are our homes truly less safe as a result?

The oft-cited example of the insecurity expounded by the “Internet of Things” is in the use of “Smart” thermostats: we broadcast our behaviors by transmitting our power consumption into the “Cloud”. Classically, a criminal would have to wait outside our homes to see us leave, notice our cars are not in the driveway and see our lights not switch on in the evening. If theft is the concern, however, does “Smart” monitoring really provide different opportunities than previously? Or does it simply change the habits of criminals, who can now observe an insecure home from the comfort of their couch[1] as opposed to on traditional “stake-outs” in a white van parked on the street?

Removing the qualifiers of “Cyber” or “Digital” from many of today’s terms removes the counter-arguments or commonly-given excuses for not observing good hygiene:

– practicing “Digital OPSEC” is simply practicing “OPSEC”

– maintaining good “Cyber Security” principles is simply maintaining good “Security” principles.

– the “Smart Home” or “Smart Monitoring” or “Smart Devices” are simply the “Home”, “Monitoring” and “Devices” and should be treated as such.

As the noun Cyber has become ubiquitous; as a result, using it as an adjective has, in these and many other cases, become obsolete.

 

References

[CON16] C. Connolly (ed.), Proceedings of the Joint Service Academy Cyber Security Summit, Preprint, 2016.

[COL11] Cyberspace operations lexicon, Accessed July 6, 2016 http://www.nsci-va.org/CyberReferenceLib/2010-11-joint%20Terminology%20for%20Cyberspace%20Operations.pdf

[PAU01] J. A. Paulos, Innumeracy: Mathematical Illiteracy and Its Consequences, Holt McDougal, 2001.

[1] I was tempted to write “mothers’ basements” as a dig at criminals, but in the spirit of this blog, I think we must also do away with what are now off-base stereotypes such as this one.



US Army Comments Policy
If you wish to comment, use the text box below. Army reserves the right to modify this policy at any time.

This is a moderated forum. That means all comments will be reviewed before posting. In addition, we expect that participants will treat each other, as well as our agency and our employees, with respect. We will not post comments that contain abusive or vulgar language, spam, hate speech, personal attacks, violate EEO policy, are offensive to other or similar content. We will not post comments that are spam, are clearly "off topic", promote services or products, infringe copyright protected material, or contain any links that don't contribute to the discussion. Comments that make unsupported accusations will also not be posted. The Army and the Army alone will make a determination as to which comments will be posted. Any references to commercial entities, products, services, or other non-governmental organizations or individuals that remain on the site are provided solely for the information of individuals using this page. These references are not intended to reflect the opinion of the Army, DoD, the United States, or its officers or employees concerning the significance, priority, or importance to be given the referenced entity, product, service, or organization. Such references are not an official or personal endorsement of any product, person, or service, and may not be quoted or reproduced for the purpose of stating or implying Army endorsement or approval of any product, person, or service.

Any comments that report criminal activity including: suicidal behaviour or sexual assault will be reported to appropriate authorities including OSI. This forum is not:

  • This forum is not to be used to report criminal activity. If you have information for law enforcement, please contact OSI or your local police agency.
  • Do not submit unsolicited proposals, or other business ideas or inquiries to this forum. This site is not to be used for contracting or commercial business.
  • This forum may not be used for the submission of any claim, demand, informal or formal complaint, or any other form of legal and/or administrative notice or process, or for the exhaustion of any legal and/or administrative remedy.

Army does not guarantee or warrant that any information posted by individuals on this forum is correct, and disclaims any liability for any loss or damage resulting from reliance on any such information. Army may not be able to verify, does not warrant or guarantee, and assumes no liability for anything posted on this website by any other person. Army does not endorse, support or otherwise promote any private or commercial entity or the information, products or services contained on those websites that may be reached through links on our website.

Members of the media are asked to send questions to the public affairs through their normal channels and to refrain from submitting questions here as comments. Reporter questions will not be posted. We recognize that the Web is a 24/7 medium, and your comments are welcome at any time. However, given the need to manage federal resources, moderating and posting of comments will occur during regular business hours Monday through Friday. Comments submitted after hours or on weekends will be read and posted as early as possible; in most cases, this means the next business day.

For the benefit of robust discussion, we ask that comments remain "on-topic." This means that comments will be posted only as it relates to the topic that is being discussed within the blog post. The views expressed on the site by non-federal commentators do not necessarily reflect the official views of the Army or the Federal Government.

To protect your own privacy and the privacy of others, please do not include personally identifiable information, such as name, Social Security number, DoD ID number, OSI Case number, phone numbers or email addresses in the body of your comment. If you do voluntarily include personally identifiable information in your comment, such as your name, that comment may or may not be posted on the page. If your comment is posted, your name will not be redacted or removed. In no circumstances will comments be posted that contain Social Security numbers, DoD ID numbers, OSI case numbers, addresses, email address or phone numbers. The default for the posting of comments is "anonymous", but if you opt not to, any information, including your login name, may be displayed on our site.

Thank you for taking the time to read this comment policy. We encourage your participation in our discussion and look forward to an active exchange of ideas.