Public-Private Partnerships in the Cyber Domain

0.jpg

Eugene Kaspersky has played down the alleged links between Kaspersky and the Kremlin

Whether the USA and Google, China and Huawei or Russia and Kaspersky, it is clear that many technology firms are closely aligned with a particular state. States work closely with technology firms for a number of reasons. Technology firms often possess more advanced expertise, infrastructure and access given their global outreach. Yet these public-private partnerships have interesting implications going forward - both for technology firms and states.

A technology firm's clientele often reflect the foreign policy stance of their home government. For example, many of the US cyber security firms work closely with the US government and other likeminded Western states whilst unlikely to work with states that pose a threat to the US. Of course, not all technology and cyber security firms correlate so closely with their state of origin: A recent data breach of Milan-based Hacking Team shows that they have been perfectly willing to deal with a number of states with questionable human rights records, selling spyware and intelligence gathering software to government agencies in Ethiopia, Bahrain, Egypt, Kazakhstan, Morocco, Sudan Russia, Saudi Arabia, Azerbaijan and Turkey. 

As states cooperate more closely with their state of origin (and like-minded states), it will foster mistrust amongst more distant states. Even just the perception of such a relationship is enough to create mistrust. For example, Iran accused German technology firm Siemens of colluding with the US and Israel in creating the Stuxnet virus that sabotaged an Iranian nuclear centrifuge that used Siemens software. Kaspersky is another interesting example - although respected within the cyber security community, it's perceived relationship with the Kremlin alienates some in the West.
 
These relationships with a state (or at least perceptions of them) have the potential to negatively affect a firm's business. For example, suspicions over Huawei's relationship with China has meant that Australia barred the telecommunication giant from bidding on its national broadband network and a US congressional report recommended Huawei be excluded altogether from sensitive US systems.

This sense of mistrust towards cyber security and technology firms believed to be aligned with a particular state has serious implications for globalisation. The main concern is that states will become increasingly sceptical of interacting with foreign-based firms and become more inward looking, instead seeking domestic solutions. Although there is already evidence of this trend, it is a concern going forward given the benefits globalisation brings. States that refuse to deal with foreign-based firms are bad news for consumers as technology products and services become less innovative and domestic firms are rewarded despite better options being available. In many respects this trend has already begun to take shape and looks unlikely to reverse. For example, China has worked hard to create viable alternatives to Western technology firms; having established these alternatives, China is unlikely to work closely with Western technology firms regardless of their stance in the future. There has been a lot of discussion on the decentralisation of the Internet where states increasingly work in small clusters with close allies. However, perhaps politically sensitive public-private partnerships pose bigger questions for globalisation in the cyber domain.

China has established a number of equivalents to Western firms such as Baidu, a search engine used in place of Google. 
Of course, states may decide to increasingly distance themselves with specific states. Firms want to maximise sales and that involves catering to as large a market as possible. The Information and Technology Foundation estimating that the NSA revelations will cost US technology firms up to $35 billion in lost revenue.

Yet for many of these firms, the state remains a valuable client that represents significant, business and revenue. This highlights a tension that currently exists: firms are incentivised to publicly distance themselves from states yet want to retain their business. 

Perhaps one solution for technology firms that is to perform 'separation theatre' - where efforts are made to create a public perception that firms are distancing themselves from a state whilst maintaining close relations behind closed doors. This process is arguably occurring at the moment. For example, although firms such as Google and Apple have worked hard to distance themselves from the US government since the Snowden leaks, the measures implemented have arguably only a limited effect. For example, whilst Apple now encrypts devices by default, there are a number of ways intelligence agencies such as the NSA can potentially still access data.

Crucially, private sector firms are going to be faced with real ethical and foreign policy decisions in the cyber domain. The relationship a cyber security or technology firm has with particular states will have consequences for both their future clientele and globalisation more broadly. Meanwhile, with an absence of regulation in many areas of the cyber domain, firms are faced with ethical decisions regarding the states they sell their products and services to. Whilst many states are acting with restraint, other firms are acting more recklessly. Hacking Team's recently exposed clientele reveals the limitations of regulation that currently exist in this space. The UN arms embargo prevents firms selling weapons to states with questionable human rights records. However, when Hacking Team's business relationship with Sudan was questioned by the UN, Hacking Team argued that its spying tools do not count as weapons so do not fall under such an embargo.

The Internet is undeniably a vehicle for globalisation. Email, social media and e-commerce all make the world smaller than ever before. Yet, when it comes to public-private partnerships, states appear increasingly inward looking. 

Jamie Collier

Jamie Collier is a DPhil Candidate in Cyber Security at Oxford's Centre for Doctoral Training in Cyber Security.

 

« United Hackers Given a Million Free Air Miles
Finland – Prolific Hacker Arrested & Sentenced »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

SERMA Safety & Security (S3)

SERMA Safety & Security (S3)

SERMA Safety & Security provides a comprehensive cybersecurity offering incorporating Expertise, Evaluation, Consultancy and Training, covering hardware, software and information systems.

Transpere

Transpere

Transpere provides IT Asset Disposition (ITAD), Data Destruction, Electronic Recycling and Onsite Data Services.

Celerium

Celerium

Celerium transforms cyber defense for both companies and industry sectors by leveraging cyber threat intelligence to defend against cyber threats and attacks.

Knovos

Knovos

Knovos is a leading technology innovator developing solutions for automating, integrating, and innovating Information Governance.

Networks Unlimited

Networks Unlimited

Networks Unlimited is a leading value-added distributor in Africa, providing technology solutions with a focus on security, networking, enterprise systems management and cloud technologies.

Dhound

Dhound

Dhound is a cybersecurity company providing web application penetration testing.

Fortified Health Security

Fortified Health Security

Fortified’s team of cybersecurity specialists is dedicated to helping healthcare providers, payers and business associates protect their patient data across the Fortified Healthcare Ecosystem.

AutoRABIT

AutoRABIT

AutoRABIT provides DevSecOps tools built specifically for Salesforce developers to increase release velocity, produce consistently high-quality code, and enhance data security.

Inversion6

Inversion6

Inversion6 (formerly MRK Technologies) is a cybersecurity risk management provider that offers custom security solutions.

European Union Agency for Network and Information Security (ENISA)

European Union Agency for Network and Information Security (ENISA)

The European Union Agency for Cybersecurity, ENISA, is the Union’s agency dedicated to achieving a high common level of cybersecurity across Europe.

InfoSec Brigade

InfoSec Brigade

InfoSec Brigade offers a suite of specialized solutions that help businesses to mitigate risk by integrating cyber and IT security protocols with business goals.

Mogwai Labs

Mogwai Labs

Mogwai Labs deliver cutting-edge penetration tests, security assessments and trainings, to safeguard your applications, networks and cloud environments from cyber threats.

Btech

Btech

Btech is the market leader in providing affordable managed IT security services for credit unions.

SecureDApp

SecureDApp

SecureDApp is a blockchain security company that specialises in offering comprehensive security solutions to companies operating in the web3 space.

Replica

Replica

Replica creates authentic virtual environments that ensure identities and assets are always protected no matter where or what work needs to get done.