Public-Private Partnerships in the Cyber Domain

0.jpg

Eugene Kaspersky has played down the alleged links between Kaspersky and the Kremlin

Whether the USA and Google, China and Huawei or Russia and Kaspersky, it is clear that many technology firms are closely aligned with a particular state. States work closely with technology firms for a number of reasons. Technology firms often possess more advanced expertise, infrastructure and access given their global outreach. Yet these public-private partnerships have interesting implications going forward - both for technology firms and states.

A technology firm's clientele often reflect the foreign policy stance of their home government. For example, many of the US cyber security firms work closely with the US government and other likeminded Western states whilst unlikely to work with states that pose a threat to the US. Of course, not all technology and cyber security firms correlate so closely with their state of origin: A recent data breach of Milan-based Hacking Team shows that they have been perfectly willing to deal with a number of states with questionable human rights records, selling spyware and intelligence gathering software to government agencies in Ethiopia, Bahrain, Egypt, Kazakhstan, Morocco, Sudan Russia, Saudi Arabia, Azerbaijan and Turkey. 

As states cooperate more closely with their state of origin (and like-minded states), it will foster mistrust amongst more distant states. Even just the perception of such a relationship is enough to create mistrust. For example, Iran accused German technology firm Siemens of colluding with the US and Israel in creating the Stuxnet virus that sabotaged an Iranian nuclear centrifuge that used Siemens software. Kaspersky is another interesting example - although respected within the cyber security community, it's perceived relationship with the Kremlin alienates some in the West.
 
These relationships with a state (or at least perceptions of them) have the potential to negatively affect a firm's business. For example, suspicions over Huawei's relationship with China has meant that Australia barred the telecommunication giant from bidding on its national broadband network and a US congressional report recommended Huawei be excluded altogether from sensitive US systems.

This sense of mistrust towards cyber security and technology firms believed to be aligned with a particular state has serious implications for globalisation. The main concern is that states will become increasingly sceptical of interacting with foreign-based firms and become more inward looking, instead seeking domestic solutions. Although there is already evidence of this trend, it is a concern going forward given the benefits globalisation brings. States that refuse to deal with foreign-based firms are bad news for consumers as technology products and services become less innovative and domestic firms are rewarded despite better options being available. In many respects this trend has already begun to take shape and looks unlikely to reverse. For example, China has worked hard to create viable alternatives to Western technology firms; having established these alternatives, China is unlikely to work closely with Western technology firms regardless of their stance in the future. There has been a lot of discussion on the decentralisation of the Internet where states increasingly work in small clusters with close allies. However, perhaps politically sensitive public-private partnerships pose bigger questions for globalisation in the cyber domain.

China has established a number of equivalents to Western firms such as Baidu, a search engine used in place of Google. 
Of course, states may decide to increasingly distance themselves with specific states. Firms want to maximise sales and that involves catering to as large a market as possible. The Information and Technology Foundation estimating that the NSA revelations will cost US technology firms up to $35 billion in lost revenue.

Yet for many of these firms, the state remains a valuable client that represents significant, business and revenue. This highlights a tension that currently exists: firms are incentivised to publicly distance themselves from states yet want to retain their business. 

Perhaps one solution for technology firms that is to perform 'separation theatre' - where efforts are made to create a public perception that firms are distancing themselves from a state whilst maintaining close relations behind closed doors. This process is arguably occurring at the moment. For example, although firms such as Google and Apple have worked hard to distance themselves from the US government since the Snowden leaks, the measures implemented have arguably only a limited effect. For example, whilst Apple now encrypts devices by default, there are a number of ways intelligence agencies such as the NSA can potentially still access data.

Crucially, private sector firms are going to be faced with real ethical and foreign policy decisions in the cyber domain. The relationship a cyber security or technology firm has with particular states will have consequences for both their future clientele and globalisation more broadly. Meanwhile, with an absence of regulation in many areas of the cyber domain, firms are faced with ethical decisions regarding the states they sell their products and services to. Whilst many states are acting with restraint, other firms are acting more recklessly. Hacking Team's recently exposed clientele reveals the limitations of regulation that currently exist in this space. The UN arms embargo prevents firms selling weapons to states with questionable human rights records. However, when Hacking Team's business relationship with Sudan was questioned by the UN, Hacking Team argued that its spying tools do not count as weapons so do not fall under such an embargo.

The Internet is undeniably a vehicle for globalisation. Email, social media and e-commerce all make the world smaller than ever before. Yet, when it comes to public-private partnerships, states appear increasingly inward looking. 

Jamie Collier

Jamie Collier is a DPhil Candidate in Cyber Security at Oxford's Centre for Doctoral Training in Cyber Security.

 

« United Hackers Given a Million Free Air Miles
Finland – Prolific Hacker Arrested & Sentenced »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

AvePoint

AvePoint

AvePoint is an established leader in enterprise-class data management, governance, and compliance software solutions.

Infrascale

Infrascale

Infrascale specialise in providing cloud backup and disaster recovery services.

Cyber Command

Cyber Command

Our Managed IT service allows clients to offload the management of day-to-day computer, server, and networking support to our team of professionals.

App-Ray

App-Ray

App-Ray provides fully automated security analysis of mobile applications to find security issues, privacy breaches and data leaking potentials.

ubirch

ubirch

The ubirch platform is designed to ensure that IoT data is trustworthy and secure.

SIS Certifications (SIS CERT)

SIS Certifications (SIS CERT)

SIS Certifications is an ISO certification body serving more than 10,000 clients in over 15 countries worldwide.

Lumu Technologies

Lumu Technologies

Lumu is a cybersecurity company that illuminates threats and attacks affecting enterprises worldwide.

TierPoint

TierPoint

TierPoint delivers secure, reliable, and connected infrastructure solutions at the internet’s edge. We meet you where you are in your journey to solve for data storage, compute, and recovery.

Russell Reynolds Associates

Russell Reynolds Associates

Russell Reynolds Associates is a global leadership advisory and search firm with functional expertise in Digital Leadership, Data & Analytics, and Compliance.

Visible Statement

Visible Statement

Visible Statement is a computer-based delivery system designed to insure the retention and recall of your most important security training messages.

Blok Cyber Security

Blok Cyber Security

Blok provide small businesses and sole traders, with affordable, managed Cyber Security Packages that offer immediate protection and peace of mind.

BreachQuest

BreachQuest

BreachQuest brings together cybersecurity experts with decades of experience identifying security flaws, penetrating networks, and responding to incidents.

Davinsi Labs

Davinsi Labs

Davinsi Labs helps companies achieve Digital Service Excellence with specialized Security Intelligence and Service Intelligence solutions.

FTx Identity

FTx Identity

FTx Identity is the world's most advanced age verification technology (AVT) and identity management system.

Arakyta

Arakyta

Arakÿta specializes in business strategy, work flow process and IT systems for organizations.

Spirit Technology Solutions

Spirit Technology Solutions

Spirit Technology Solutions is a modern workplace services provider committed to delivering solutions that embody our core principles of security, sustainability, and scalability.