Guy-Philippe Goldstein: How cyberattacks threaten real-world peace

40,734 views

2011-10-19 ・ TED


New videos

Guy-Philippe Goldstein: How cyberattacks threaten real-world peace

40,734 views ・ 2011-10-19

TED


Please double-click on the English subtitles below to play the video.

00:00
Translator: Elisabeth Buffard Reviewer: Veronica Martinez Starnes
0
0
7000
00:15
Good afternoon.
1
15260
1000
00:16
If you have followed
2
16260
2000
00:18
diplomatic news in the past weeks,
3
18260
2000
00:20
you may have heard of a kind of crisis
4
20260
2000
00:22
between China and the U.S.
5
22260
2000
00:24
regarding cyberattacks
6
24260
2000
00:26
against the American company Google.
7
26260
2000
00:28
Many things have been said about this.
8
28260
2000
00:30
Some people have called a cyberwar
9
30260
2000
00:32
what may actually be
10
32260
2000
00:34
just a spy operation --
11
34260
2000
00:36
and obviously, a quite mishandled one.
12
36260
2000
00:38
However, this episode reveals
13
38260
3000
00:41
the growing anxiety in the Western world
14
41260
2000
00:43
regarding these emerging cyber weapons.
15
43260
3000
00:46
It so happens that these weapons are dangerous.
16
46260
2000
00:48
They're of a new nature:
17
48260
2000
00:50
they could lead the world
18
50260
2000
00:52
into a digital conflict
19
52260
2000
00:54
that could turn into an armed struggle.
20
54260
2000
00:56
These virtual weapons can also destroy the physical world.
21
56260
4000
01:01
In 1982, in the middle of the Cold War
22
61260
3000
01:04
in Soviet Siberia,
23
64260
2000
01:06
a pipeline exploded with a burst of 3 kilotons,
24
66260
4000
01:10
the equivalent of a fourth of the Hiroshima bomb.
25
70260
2000
01:12
Now we know today -- this was revealed
26
72260
2000
01:14
by Thomas Reed,
27
74260
2000
01:16
Ronald Reagan's former U.S. Air Force Secretary --
28
76260
2000
01:18
this explosion was actually the result
29
78260
3000
01:21
of a CIA sabotage operation,
30
81260
2000
01:23
in which they had managed
31
83260
2000
01:25
to infiltrate the IT management systems
32
85260
2000
01:27
of that pipeline.
33
87260
2000
01:29
More recently, the U.S. government revealed
34
89260
3000
01:32
that in September 2008, more than 3 million people
35
92260
3000
01:35
in the state of Espirito Santo in Brazil
36
95260
3000
01:38
were plunged into darkness,
37
98260
2000
01:40
victims of a blackmail operation from cyber pirates.
38
100260
5000
01:45
Even more worrying for the Americans,
39
105260
2000
01:47
in December 2008 the holiest of holies,
40
107260
3000
01:50
the IT systems of CENTCOM,
41
110260
2000
01:52
the central command
42
112260
2000
01:54
managing the wars in Iraq and Afghanistan,
43
114260
3000
01:57
may have been infiltrated by hackers
44
117260
2000
01:59
who used these:
45
119260
3000
02:02
plain but infected USB keys.
46
122260
2000
02:04
And with these keys, they may have been able
47
124260
2000
02:06
to get inside CENTCOM's systems,
48
126260
2000
02:08
to see and hear everything,
49
128260
2000
02:10
and maybe even infect some of them.
50
130260
2000
02:12
As a result, the Americans take the threat very seriously.
51
132260
2000
02:14
I'll quote General James Cartwright,
52
134260
2000
02:16
Vice Chairman of the Joint Chiefs of Staff,
53
136260
2000
02:18
who says in a report to Congress
54
138260
2000
02:20
that cyberattacks could be as powerful as
55
140260
3000
02:23
weapons of mass destruction.
56
143260
3000
02:26
Moreover, the Americans have decided
57
146260
2000
02:28
to spend over 30 billion dollars
58
148260
2000
02:30
in the next five years
59
150260
1500
02:31
to build up their cyberwar capabilities.
60
151760
1500
02:34
And across the world today, we see
61
154260
2000
02:36
a sort of cyber arms race,
62
156260
3000
02:39
with cyberwar units
63
159260
2000
02:41
built up by countries like North Korea
64
161260
2000
02:43
or even Iran.
65
163260
1000
02:44
Yet, what you'll never hear
66
164260
2000
02:46
from spokespeople
67
166260
2000
02:48
from the Pentagon or the French Department of Defence
68
168260
3000
02:51
is that the question isn't really
69
171260
2000
02:53
who's the enemy, but actually
70
173260
2000
02:55
the very nature of cyber weapons.
71
175260
3000
02:58
And to understand why, we must look at how,
72
178260
2000
03:00
through the ages, military technologies
73
180260
3000
03:03
have maintained or destroyed
74
183260
2000
03:05
world peace.
75
185260
2000
03:08
For example,
76
188260
2000
03:10
if we'd had TEDxParis
77
190260
1000
03:11
350 years ago,
78
191260
2000
03:13
we would have talked about the military innovation of the day --
79
193260
3000
03:16
the massive Vauban-style fortifications --
80
196260
3000
03:19
and we could have predicted
81
199260
2000
03:21
a period of stability in the world or in Europe.
82
201260
3000
03:24
which was indeed the case in Europe
83
204260
3000
03:27
between 1650 and 1750.
84
207260
2000
03:29
Similarly, if we'd had this talk
85
209260
3000
03:32
30 or 40 years ago, we would have seen
86
212260
3000
03:35
how the rise of nuclear weapons,
87
215260
2000
03:37
and the threat of mutually assured destruction they imply,
88
217260
4000
03:41
prevents a direct fight between the two superpowers.
89
221260
3000
03:45
However, if we'd had this talk 60 years ago,
90
225260
2000
03:47
we would have seen how the emergence
91
227260
3000
03:50
of new aircraft and tank technologies,
92
230260
3000
03:53
which give the advantage to the attacker,
93
233260
3000
03:56
make the Blitzkrieg doctrine very credible
94
236260
3000
03:59
and thus create the possibility of war in Europe.
95
239260
3000
04:02
So military technologies
96
242260
2000
04:04
can influence the course of the world,
97
244260
2000
04:06
can make or break world peace --
98
246260
2000
04:08
and there lies the issue with cyber weapons.
99
248260
2000
04:10
The first issue:
100
250260
2000
04:12
Imagine a potential enemy announcing
101
252260
3000
04:15
they're building a cyberwar unit,
102
255260
2000
04:17
but only for their country's defense.
103
257260
2000
04:19
Okay, but what distinguishes it
104
259260
3000
04:22
from an offensive unit?
105
262260
2000
04:24
It gets even more complicated
106
264260
2000
04:26
when the doctrines of use become ambiguous.
107
266260
4000
04:30
Just 3 years ago, both the U.S. and France
108
270260
4000
04:34
were saying they were investing militarily in cyberspace,
109
274260
4000
04:38
strictly to defend their IT systems.
110
278260
2000
04:41
But today both countries say
111
281260
3000
04:44
the best defense is to attack.
112
284260
2000
04:46
And so, they're joining China,
113
286260
2000
04:48
whose doctrine of use for 15 years has been
114
288260
4000
04:52
both defensive and offensive.
115
292260
3000
04:55
The second issue:
116
295260
2000
04:57
Your country could be under cyberattack
117
297260
4000
05:01
with entire regions plunged into total darkness,
118
301260
3000
05:04
and you may not even know
119
304260
2000
05:06
who's attacking you.
120
306260
2000
05:08
Cyber weapons have this peculiar feature:
121
308260
1800
05:10
they can be used
122
310060
1500
05:11
without leaving traces.
123
311560
1700
05:13
This gives a tremendous advantage to the attacker,
124
313260
2000
05:15
because the defender
125
315260
2000
05:17
doesn't know who to fight back against.
126
317260
2000
05:19
And if the defender retaliates against the wrong adversary,
127
319260
2000
05:21
they risk making one more enemy
128
321260
3000
05:24
and ending up diplomatically isolated.
129
324260
2000
05:26
This issue isn't just theoretical.
130
326260
2000
05:28
In May 2007, Estonia was the victim of cyberattacks,
131
328260
2000
05:30
that damaged its communication
132
330260
3000
05:33
and banking systems.
133
333260
2000
05:35
Estonia accused Russia.
134
335260
2000
05:37
But NATO, though it defends Estonia,
135
337260
2000
05:39
reacted very prudently. Why?
136
339260
2000
05:41
Because NATO couldn't be 100% sure
137
341260
2000
05:43
that the Kremlin was indeed behind these attacks.
138
343260
5000
05:48
So to sum up, on the one hand,
139
348260
3000
05:51
when a possible enemy announces
140
351260
2000
05:53
they're building a cyberwar unit,
141
353260
2000
05:55
you don't know whether it's for attack
142
355260
2000
05:57
or defense.
143
357260
1000
05:58
On the other hand,
144
358260
1000
05:59
we know that these weapons give an advantage to attacking.
145
359260
4000
06:03
In a major article published in 1978,
146
363260
3000
06:06
Professor Robert Jervis of Columbia University in New York
147
366260
2000
06:08
described a model to understand
148
368260
2000
06:10
how conflicts could arise.
149
370260
2000
06:12
In this context,
150
372260
3000
06:15
when you don't know if the potential enemy
151
375260
2000
06:17
is preparing for defense or attack,
152
377260
3000
06:20
and if the weapons give an advantage to attacking,
153
380260
2000
06:22
then this environment is
154
382260
2000
06:24
most likely to spark a conflict.
155
384260
4000
06:28
This is the environment that's being created
156
388260
2000
06:30
by cyber weapons today,
157
390260
2000
06:32
and historically it was the environment in Europe
158
392260
3000
06:35
at the onset of World War I.
159
395260
4000
06:39
So cyber weapons
160
399260
2000
06:41
are dangerous by nature,
161
401260
2000
06:43
but in addition, they're emerging
162
403260
3000
06:46
in a much more unstable environment.
163
406260
2000
06:48
If you remember the Cold War,
164
408260
2000
06:50
it was a very hard game,
165
410260
2000
06:52
but a stable one played only by two players,
166
412260
2000
06:54
which allowed for some coordination between the two superpowers.
167
414260
2000
06:57
Today we're moving to a multipolar world
168
417260
5000
07:02
in which coordination is much more complicated,
169
422260
1000
07:03
as we have seen at Copenhagen.
170
423260
3000
07:06
And this coordination may become even trickier
171
426260
3000
07:09
with the introduction of cyber weapons.
172
429260
3000
07:12
Why? Because no nation
173
432260
2000
07:14
knows for sure whether its neighbor
174
434260
3000
07:17
is about to attack.
175
437260
2000
07:19
So nations may live under the threat
176
439260
2000
07:21
of what Nobel Prize winner Thomas Schelling
177
441260
3000
07:24
called the "reciprocal fear of surprise attack,"
178
444260
2000
07:26
as I don't know if my neighbor
179
446260
2000
07:28
is about to attack me or not --
180
448260
2000
07:30
I may never know --
181
450260
2000
07:32
so I might take the upper hand
182
452260
2000
07:34
and attack first.
183
454260
3000
07:37
Just last week,
184
457260
2000
07:39
in a New York Times article dated January 26, 2010,
185
459260
4000
07:43
it was revealed for the first time that
186
463260
2000
07:45
officials at the National Security Agency
187
465260
3000
07:48
were considering the possibility of preemptive attacks
188
468260
4000
07:52
in cases where the U.S. was about
189
472260
3000
07:55
to be cyberattacked.
190
475260
3000
07:58
And these preemptive attacks
191
478260
2000
08:00
might not just remain
192
480260
1000
08:01
in cyberspace.
193
481260
3000
08:05
In May 2009, General Kevin Chilton,
194
485260
5000
08:10
commander of the U.S. nuclear forces,
195
490260
3000
08:13
stated that in the event of cyberattacks against the U.S.,
196
493260
5000
08:18
all options would be on the table.
197
498260
3000
08:21
Cyber weapons do not replace
198
501260
2000
08:23
conventional or nuclear weapons --
199
503260
2000
08:25
they just add a new layer to the existing system of terror.
200
505260
5000
08:30
But in doing so, they also add their own risk
201
510260
3000
08:33
of triggering a conflict --
202
513260
2000
08:35
as we've just seen, a very important risk --
203
515260
2000
08:37
and a risk we may have to confront
204
517260
2000
08:39
with a collective security solution
205
519260
3000
08:42
which includes all of us:
206
522260
2000
08:44
European allies, NATO members,
207
524260
2000
08:46
our American friends and allies,
208
526260
2000
08:48
our other Western allies,
209
528260
2000
08:50
and maybe, by forcing their hand a little,
210
530260
2000
08:52
our Russian and Chinese partners.
211
532260
3000
08:55
The information technologies
212
535260
2000
08:57
Joël de Rosnay was talking about,
213
537260
1500
08:58
which were historically born from military research,
214
538760
2500
09:01
are today on the verge of developing
215
541260
2000
09:03
an offensive capability of destruction,
216
543260
3000
09:06
which could tomorrow, if we're not careful,
217
546260
4000
09:10
completely destroy world peace.
218
550260
3000
09:13
Thank you.
219
553260
2000
09:15
(Applause)
220
555260
3000
About this website

This site will introduce you to YouTube videos that are useful for learning English. You will see English lessons taught by top-notch teachers from around the world. Double-click on the English subtitles displayed on each video page to play the video from there. The subtitles scroll in sync with the video playback. If you have any comments or requests, please contact us using this contact form.

https://forms.gle/WvT1wiN1qDtmnspy7