Government Sponsored Cyber-insecurity Is A Gift For Hackers

The political legitimacy of democratic capitalism, that unlikely political formation that has brought us the end of history and now presents itself as the only bulwark against rightwing extremism, rests on a clear distribution of functions between governments and corporations.

The former take on the role of regulating the latter in order to protect the customers from the occasional harmful effects of the otherwise beneficial business activity.

This system is deemed to be democratic because people elect governments and can always vote them out; it’s capitalist because corporations are constrained by the logic of competition, which prizes efficiency, innovation and infinite expansion.

That logic, with its penchant for creative destruction of all things stale and permanent, can produce toxic results, which is precisely why government action is needed. Such, at any rate, is the social democratic consensus accepted by both centre-left and centre-right parties.

The questions of war and security, and the existential imperatives that they impose on the most democratic of societies, have always posed unresolved challenges to this framework, as can be glimpsed from occasional warnings about the military-industrial complex expressed by many a political insider nearing retirement.

Thus, standard democratic procedures are regularly suspended as governments demand tighter control over the flow of information, classify more of their internal communications and expand surveillance without any requisite checks and balances.

The standard critique of such practices attacks the undemocratic-because-unaccountable activities of the so-called “deep state”. Rooted in campaigns to defend privacy, opponents aim to make the deep state shallower, ideally by means of legal interventions aimed at restoring transparency and accountability. The real problem, they argue, is with the malfunctioning of democracy, we could easily ignore the capitalist part of “democratic capitalism”: we just need more and better legal instruments to tame the intelligence agencies.

Alas, the world in 2017 is not so easy to pigeonhole into the neat compartments of this scheme. Consider just one example: cyber-security. Plenty of rogue states are, indeed, busy hacking the servers of their adversaries in western Europe or North America. Likewise, there’s no denying that non-state hackers, operating for commercial or patriotic motives, have damaged their targets.

None of this punctures the founding myth of democratic capitalism – that governments are here to constrain the toxic activities of businesses; such new dangers actually warrant a greater role for the state.

What does puncture that myth, though, is the growing realisation, boosted by WikiLeaks’ recent disclosure of CIA hacking tools, that it’s democratic governments themselves, via their intelligence agencies, that are responsible for creating vulnerabilities in our communication networks, tinkering with our smart TVs and exploiting loopholes in our operating systems.

They do this for motives that some might view as noble: to identify early signs of terrorist activity, to track down criminals, to disable devices that might be part of sophisticated plots to wreak havoc on our cities. Whatever the motives, we should not lose sight of the larger political effects produced by such actions.

First, the expansion (and even the maintenance) of the surveillance capabilities of democratic governments presupposes a permanent structural insecurity of our communication networks. That insecurity, in turn, gets exploited not just by democratic governments but by anyone else, including all those rogue states and non-state hackers.

However, once insecurity is structural, the right response is not more security, but more insurance. This explains why cyber-insurance has become one of the most promising segments of the insurance market, with even sectors like manufacturing (itself increasingly wired up and interconnected) needing to spend more and more to insure against disruptive cyber-attacks.

In essence, cyber insurance, like any other form of insurance, is a domain of rentiers who are keen to extract a regular premium payment from those needing their services. The truly innovative element here is that the risk that creates this new class of rentiers exists partly, and, one could even say, mostly, because of government activity.

Here, the logic of democratic capitalism is no more: governments are not restraining the toxic activities of companies; rather, they engage in toxic activities of their own, which companies mitigate with activities that are either more or less toxic, depending on one’s views about the parasitic nature of economic activities pursued by rentiers.

The second political effect of the ever-expanding surveillance apparatus is the disadvantage it creates for small companies and non-profits, not to mention individuals. Remember the early utopian vision of a digital world, where we would all be running our own mail servers and, with time, might even master our own version of the connected home?

Well, today we demand more autonomy at our own risk: given the sophistication of cyber-attacks, which both aim to steal data and overwhelm sites with fake traffic, it’s obvious that the only actors capable of defending ordinary users, be they individuals or corporations, are big tech firms such as Google, Apple and Microsoft. This, too, violates the basic premise of democratic capitalism: citizens are encouraged to seek protection from companies, not governments.

When both spam and security threats are assessed using the most advanced forms of artificial intelligence, one can forget about any other, smaller player being able to compete with such firms that use the structural insecurity created by governments to further consolidate their near-monopoly status.

Democratic capitalism is thus always democratic monopoly capitalism, and even more so in its digital version. The idea that the normal imperatives of capitalist competition would exert extra pressure on digital giants seems quaint. There’s no garage big enough to house a startup that can unseat Google, not with its trove of customer data and artificial intelligence.

The third effect of this new post-democratic compromise is that, in presenting cyber-insecurity as a natural rather than human-made problem, it delegitimises the role of law, and politics in general, in mitigating conflicts between citizens and corporations.

Consider how we deal with other types of disasters. It would be imprudent to rely on the power of law and politics to ward off floods and earthquakes; insurance, under these conditions, is not an unreasonable option. But none of this prevents us from requiring stricter building standards so as to minimise the damage when the disaster does strike.

The world of cybersecurity does not follow this logic. Imagine if the government regularly dispatched a group of well-paid and well-educated saboteurs to weaken the anti-flood or anti-earthquake defences of our houses, leaving us no option but to turn to the private sector for security, either in the form of better defences or better insurance. This is the situation we are in right now; the only difference is that cyber-security disasters are almost entirely human-made and thus avoidable.

Rhetorically, the governments might even agree that, in the face of all these dangers, we all need to strengthen our privacy laws. In reality, though, we all know that it would only result in them sending even more saboteurs, with even more powerful tools, to weaken our defences. Who, under these conditions, would retain any faith in law and politics, rather than accept protections promised by the market, however flawed and expensive?

Cyber-security, alas, is just one of the many examples where the legitimacy of democratic capitalism, as well as of the social democratic parties that have traditionally defended it, has expired, even if its talking points are still in circulation. No wonder that social democratic parties are collapsing, as elections in the Netherlands and France have shown: they claim to be defending a system that no longer walks the talk.

Guardian:

You Migh Also Read:

Nation State Hacking Has A Big Commercial Impact:

We Are In A New Era Of Espionage:

 

 

 

« Uber Faces A Criminal Probe In The US
Google Neutralizes Phishing Scam »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Pen Test Partners LLP

Pen Test Partners LLP

Pen Test Partners provides penetration testing, security assessment and training services.

Veridify Security

Veridify Security

Veridify Security (formerly SecureRF), develops and licenses quantum-resistant, public-key security tools for the low-resource processors powering the Internet of Things.

Fluency Security

Fluency Security

Fluency is the only Security Analytics & Orchestration (SAO) solution that automates correlation, detection, validation and ongoing tracking.

Gulf Computer Services Co (GCSC)

Gulf Computer Services Co (GCSC)

Gulf Computer Services is a major player in the field of networking & Communication solutions for emerging industries such as Internet Services and Information Technology in Saudi Arabia.

GM Security Technologies

GM Security Technologies

GM Security Technologies provides leading managed security services of the highest quality to every type of individual and organization in Puerto Rico, Caribbean and Latin America.

IT Search

IT Search

IT Search is a specialist IT recruitment company focusing on Cyber Security, IT Infrastructure, Software, Data, Digital Transformation and C Suite leadership positions.

RIT Global Cybersecurity Institute

RIT Global Cybersecurity Institute

At RIT's Global Cybersecurity Institute, we educate and train cybersecurity professionals; develop new cybersecurity and AI-based knowledge for industry, academia, and government.

SimSpace

SimSpace

SimSpace is the visionary yet practical platform for measuring how your security system responds under actual, sustained attack.

CyberSN

CyberSN

CyberSN matches cybersecurity professionals to jobs and removes the pain from job searching and hiring.

Eureka Technology Partners

Eureka Technology Partners

Eureka Technology Partners are committed to helping you focus on your business by taking care of your IT infrastructure and data security needs.

Littlefish

Littlefish

Littlefish provide world-class, award-winning Managed IT and Cyber Security Services, delivered from our 24/7 UK service centres.

MAXXeGUARD Data Safety

MAXXeGUARD Data Safety

MAXXeGUARD: The High Security Shredder. MAXXeGUARD easily destroys hard disks up to the highest security levels as well as other digital data carriers like SSD’s, LTO’s, USB’s, CD’s etc.

Valtix

Valtix

Valtix is the first and only multi-cloud network security platform delivered as a service that enables cloud teams to meet the most stringent security requirements in a cloud-first & simple way.

Cylab - Carnegie Mellon University

Cylab - Carnegie Mellon University

Carnegie Mellon University CyLab is the University's security and privacy research institute.

Obsidian Security

Obsidian Security

Protect your business-critical applications by mitigating threats and reducing risk with Obsidian, the first truly comprehensive security solution for SaaS.

Red Helix

Red Helix

Red Helix (formerly Phoenix Datacom) is a market leader in network performance and cyber security.