Today, we focus on the fallout from the Google’s threat to pull out of China, due to a series of sophisticated hacks and attacks on Google, as well as a dozen more IT companies. Due to the attacks late last year, Google on Jan. 12 vowed to stop censoring Internet content for China’s Web users and possibly to leave the country altogether.
This ongoing tiff between Google and the Internet control authorities in China’s Communist Party-dominated government have uncorked a Pandora’s Box of security, free speech and corporate espionage issues. There are human rights issues and free speech issues, questions on China’s actual role, trade and fairness issues, and the point about Google’s policy of initially enabling Internet censorship and now apparently backtracking.
But there are also larger issues around security and Internet governance in general. Those are the issues we’ll be focusing on today. So, even as the U.S. State Department and others in the U.S. federal government seek answers on China’s purported role or complicity in the attacks, the repercussions on cloud computing and enterprise security are profound and may be long-term.
We’re going to look at some of the answers to what this donnybrook means for how enterprises should best protect their intellectual property from such sophisticated hackers as government, military or, quasi-government corporate entities and whether cloud services providers like Google are better than your average enterprise, or especially medium-sized business, at thwarting such risks.
We’ll look at how users of cloud computing should trust or not trust providers of such mission-critical cloud services as email, calendar, word processing, document storage, databases, and applications hosting. And we’ll look at how enterprise architecture, governance, security best practices, standards, and skills need to adapt still to meet these new requirements from insidious world-class threats.
This periodic discussion and dissection of IT infrastructure-related news and events with a panel of industry analysts and guests comes to you with the help of our charter sponsor Active Endpoints, maker of the ActiveVOS business process management system.
So, join me now in welcoming our panel for today’s discussion: Jim Kobielus, senior analyst at Forrester Research; Jason Bloomberg, managing partner at ZapThink; Jim Hietala, vice president for security at The Open Group; Elinor Mills, senior writer at Cnet, and Michael Dortch, director of research at Focus. The discussion is moderated by BriefingsDirect’s Dana Gardner, principal analyst at Interarbor Solutions.
Listen to the podcast (46:58 minutes).
Here are some excerpts:
Elinor Mills: We now have a huge first public example of a company coming out and saying, not only that they’ve been attacked — companies don’t want to admit that ever and it’s all under the radar — but also they’re pointing the fingers. Even though they’re not specifically saying, “We think it’s the Chinese state,” but they think enough of it that they’re willing to threaten to pull out of the country.
It’s huge, and it’s going to have every company reevaluating what their response is going to be — not just how they’re going to do business in other countries, but what is their response going to be to a major attack.
Jason Bloomberg: It’s not as big of a wakeup call as it should be. You can ask yourself, “Is this an attack by some small cadre of renegade hackers, or is this attack by the government of the People’s Republic of China? That’s an open question at this point.
Who is the victim? Is it Google, a corporation, or the United States? Is it the western world that is the victim here? Is this a harbinger of the way that international wars are going to be fought down the road?
We’ve all been worried about cyberwarfare coming, but we maybe don’t recognize it when we see it as a new battlefield. It’s the same as terrorism. It’s not necessarily clear who the participants are.
When you place the enterprise into this context, well, it’s not necessarily just that you have a business within the context of a government subject to particular laws of particular government; you have the supernational, where large corporations have to play in multiple jurisdictions. That’s already a governance challenge for these large enterprises.
Now, we have the introduction of cyberwarfare, where we have concerted professional attacks from unknown parties attacking unknown targets and where it’s not clear who the players are. Anybody, whether it’s a private company, a public company, or a government organization is potentially involved.
That basically raises the bar for security throughout the entire organization. We’ve seen this already, where perimeter-based security has fallen by the wayside as being insufficient. We already have this awareness that every single system on our network has to look out for itself and, even then, has levels of vulnerability. This just takes it to the national level.
Jim Kobielus: I don’t see anything radically or fundamentally new going on here. This is just a big, powerful and growing world power, China, and a big and growing world power on a tech front Google, colliding. … There has always been corporate espionage, and there’s always been vandalism perpetrated by companies against each other through subterfuge, and also by companies or fronts operating as the agent of unseen foreign power. … This is international realpolitik as usual, but in a different technological realm.
Jim Hietala: In terms of the visibility it’s gotten and the kinds of companies that were attacked, it’s a little bit game-changing. From the information security community perspective, these sorts of attacks have been going on for quite a while, aimed at defense contractors, and are now aimed at commercial enterprises and providers of cloud services.
I don’t think that the attacks per se are game-changing. There’s not a lot new here. It’s an attack against a browser that was couple of revs old and had vulnerability. The way in which the company was attacked isn’t necessarily game-changing, but the political ramifications around it and the other things we’ve just been talking about are what make it a little game-changing.
Michael Dortch: This puts Google in the very interesting position of having to decide. Is it a politically neutral corporation or is it a protector of the data that its clients around the world, not just here, and not just from governments but corporations? Is it a protector and an advocate of protection for the data that those clients have been trusted to it? Or, is it going to use the fact that it is a broker of all that data to sort of throw its muscle around and take on governments like China’s in debates like this?
The implications here are bigger than even what we’ve been discussing so far, because they get at the very nature of what a corporation is in this brave new network world of ours.
Dana Gardner: This boils down to almost two giant systems or schools of thought that are now colliding at a new point. They’ve collided at different points in the past on physical sovereignty, military sovereignty, and economic sovereignty. The competition is between what we might call “free enterprise-based systems” and state sponsorship through centralized control systems.
Free enterprise won, when it came to the Cold War, but it’s hard to say what’s going to happen in the economic environment where China is a little different beast. It’s state-sponsored, and it’s also taking advantage of free enterprise, but it’s very choosy about what it allows for either one of those systems to do or to dominate.
When you look at the Google, Google made itself into a figurehead of representing what a free-enterprise approach could do. It’s not state-sponsored or nationalistic. It’s corporate-sponsored. So it would be interesting to see who has the better technology, who has the better financial resources, and ultimately who has the organizational wherewithal to manifest their goals online that wins out in the marketplace.
If an organized effort is better at doing this than a corporate one, well then they might dominate. But so far, we’ve seen a very complex system that the marketplace — with choice, and shedding light and transparency on activities — ultimately allows for free-enterprise predominance. They can do it better, faster, cheaper and that it will ultimately win.
I think we’re really on the cusp here of a new level of competition, but not between countries or even alliances, but really between systems. The free-enterprise system versus the state-sponsored or the centralized or the controlled system. It should be very interesting. …
Bloomberg: If anything, cloud environments reduce the level of security.
They don’t increase it for the very reason that we don’t have a way of making them sovereign in their own right. They’re always not only subject to the laws of the local jurisdiction, but they’re subject to any number of different attacks that could be coming from any different location, where now the customers aren’t aware of this sort of vulnerability.
So “trust but verify” is a good point, but how can you verify if you’re relying on a third party to protect your data for you? It becomes much more difficult to do the verification. I’d say that organizations are going to be backing away from cloud, once they realize just how risky cloud environments are.
Mills: Microsoft’s general counsel Brad Smith recently gave a keynote at the Brookings Institute Forum, and he talked about modernizing and updating the laws to adapt specifically to the cloud. That included privacy rights under the Electronic Communications Privacy Act being more clearly defined, updating the Computer Fraud and Abuse Act, and setting up a framework so that differences in the regulations and practices in various countries can be worked out and reconciled.
Hietala: I don’t think there is a silver bullet cloud provider out there that has superior security to have that position. All enterprises still are going to have to be at the top of their game, in terms of protecting their assets, and that extends to small or medium businesses.
At some point, you could see a cloud provider stake out that part of the market to say, “We’re going to put in a superior set of controls and manage security to a higher degree than a typical small-to-medium business could,” but I don’t see that out there today.
Dortch: Many small businesses outsource payroll processing, customer relationship management (CRM), and a whole bunch of things. A lot of that stuff is outsourced to cloud service providers, and companies haven’t asked enough questions yet about exactly how cloud providers are protecting data and exactly how they can reassure that nothing bad is going to happen to it.
For example, if their servers come under attack, can they demonstrate credibly how data is going to be protected? These are the types of questions that incidents like this can and should raise in the minds of decision-makers at small and mid-sized businesses, just as they’re starting to raise these issues, and have been raising them for a while, among decision-makers at larger enterprise.
Kobielus: I think what will happen is that some cloud providers will increasingly be seen as safe havens for your data and for your applications, because A) they have the strong security, and B) they are hosted within, and governed by, the laws of nation-states that rigorously and faithfully try to protect this information and assure that the information can then be removed — transferred out of that country fluidly by the owners, without loss.
In other words, it’s like the Cayman Islands of the cloud — that offshore banking safe haven you can turn to for all this. Clearly, it’s not going to be China. …
In terms of who has responsibility and how will governance best-practices be spread uniformly across the world in such areas of IT protection, it’s going to be some combination of multilateral, bilateral, and unilateral action. For multilateral, the UN points to that, but there are also regional organizations. In Southeast Asia there is ASEAN, and in the Atlantic there is NATO, and so forth.
Bloomberg: Who decides what is enough? We have these opposing forces. One is that information should be free, and the Internet should be available to everybody. That basically pushes for removing barriers to information flow.
Then you have the security concerns that are driving putting up barriers to information flow, and there is always going to be conflict between those two forces. As increasingly sophisticated attacks develop, that pushes the public consensus toward increasing security.
That will impact our ability to have freedom, and that’s going to be, continue to be, a battle that I don’t see anybody winning. It’s’ really just going to be an ongoing battle as technology improves and as the bad guys’ attacks improve. It’s going to be an ongoing battle between security and freedom and between the good guys and the bad guys, as it were, and that’s never going to change.
Hietala: Large enterprises are going to have to be responsible for the security of their information. I think there are a lot of takeaways for enterprises from this attack. If you’re talking about specific individuals, it’s almost hopeless, because your average individual consumer doesn’t have the level of knowledge to go out and find the right solutions to protect themselves today.
So I’ll focus on the large enterprises. They have to do a good job of asset inventory, know where, within their identity infrastructure, they’re vulnerable to this specific attack, and then be pretty agile about implementing countermeasures to prevent it. They have to have patch management that’s adequate to the task of getting patches out quickly.
They need to do things like looking at the traffic leaving their network to see if people are already in their infrastructure. These Trojans leave traces of themselves when they ship information out of an organization. When people really understand what happened in this attack, they can take something away, go back, look at what they are doing from a security standpoint, and tighten things up.
If you’re talking about individuals putting things in the cloud, that’s a different discussion that doesn’t seem real feasible to me to get them to the point where they can secure their information today.
Kobielus: I don’t think Google is going to leave China. I think they are going to stay in China and somehow try to work it out with the PRC. I don’t know where that’s going, but fundamentally Google is a business and has a “don’t [be] evil” philosophy. They’re going to continue to qualify evil down to those things that don’t actually align with their business interest.
In other words, they’re going to stay. There’s going to be a lot of wariness now to entrust Google’s China operation with a whole lot of your IT — “you” as a corporation — and your data. There will be that wariness.
Other cloud providers will be setting up shop or hosting in other nations that are more respectful of IP, other nations that may not be launching corporate or governmental espionage at U.S.-headquartered properties in China. Those nations will become the preferred supernational cloud hosting platforms for the world.
I can’t really say who those nations might be, but you know what, Switzerland always sort of stands out. They’re still neutral after all these years. You’ve got to hand that to them. I trust them.
Bloomberg: In the short term, the noise is going to die down or going to go back to business as usual. The security is going to need to improve, but so are hacks from the bad guys. It’s going to continue, until there is the next big attack. And the question is, “What’s it going to be and how big is it going to be?”
We’re still waiting for that game changer. I don’t think this is a game changer. It’s just a way to skirmish. But if a hacker is able to bring down the Internet, for example, targeting the DNS infrastructure to the point that the entire thing collapses, that’s something that could wake people up to say, “We really have to get a handle on this and come up with a better approach.”
Hietala: From our perspective [at The Open Group], we’re starting to see more awareness at higher levels in governments that the threats and issues here are real. They’re here today. They seem to be state sponsored, and they’re something that needs to be paid attention to.
Secretary of State Clinton recently gave a speech where she talked specifically about this attack, but also talked about the need for nations to band together to address the problem. I don’t know what that looks like at this point, but I think that the fact that people at that level are talking about the problem is good for the industry and good for the outlook for solutions that are important in the future.
Mills: I think Google is going to get out of China and try and lead some kind of U.S. corporate effort or be a role model to try to do business in a more ethical way, without having to compromise and censor.
There will be a divergence that you’ll see. China and other countries may be pushed more towards limiting and creating their own sort of channel that’s government filtered. I think the battle is just going to get bigger. We’re going to have more fights on this front, but I think that Google may lead the way.
Dana Gardner is president and principal analyst at Interarbor Solutions, which tracks trends, delivers forecasts and interprets the competitive landscape of enterprise applications and software infrastructure markets for clients. He also produces BriefingsDirect sponsored podcasts. Follow Dana Gardner on Twitter. Disclosure: The Open Group is a sponsor of BriefingsDirect podcasts.