Sei sulla pagina 1di 15

9.

1
VOLUME

STRATEGIC
CONSIDERATIONS
FOR PHILIPPINE
CYBER SECURITY

OCCASIONAL
PAPER January 2016
OCCASIONAL PAPER JANUARY 2016

02

STRATEGIC
CONSIDERATIONS
FOR PHILIPPINE
CYBER SECURITY
CYBER CRIME
Despite the relatively controlled threat posed by cyber crime, the Philippine
government has adopted a more active posture towards countering illegal domestic
cyber activities in contrast to countering external threats to national security.

Cyberspace has become an indispensable domain The idea of a cyber revolution is based on three
for state interaction. Governments have, therefore, widely held assumptions suggested by some
made use of cyberspace for power projection, the scholars and policymakers about cyberspace:
protection of critical national infrastructure, and the it enables asymmetric advantages; it is offense-
exertion of political influence over other actors in the dominant; and, deterrence is not effective in
international system. This domain, however, has also this domain.3 First, cyberspace is asymmetric
become a prominent source of insecurity between because, it allows weaker actors to use fewer
states because of its particularly strong potential for resources and capabilities to challenge the military
espionage, sabotage, and subversion.1 While cyber forces of powerful states. Second, cyberspace is
security continues to be a contentious policy issue, offense-dominant for several reasons, including
the promise of a “cyber revolution” has influenced the instantaneous speed of attacks, the problem
numerous states to develop capabilities for military of attributing attacks to a perpetrator, and the
cyber operations. More than 40 states have now overwhelming dependence on cyberspace
developed military cyber organizations and policies throughout modern society.4 As a result, enemies
and nearly 70 states have crafted non- can exploit these opportunities and engage in
military policies and organizations.2 numerous malicious activities, including network Image Credit: rfa.com

C 2016 ADRiNSTITUTE for Strategic and International Studies. All rights reserved. * The views and opinions expressed in this Paper are those of the author and do not necessarily reflect those of the Institute.
OCCASIONAL PAPER JANUARY 2016

03

disruption and espionage against target states. Third, Athough the proliferation of cyber capabilities Given this context, this paper argues that despite
deterrence is not effective in cyberspace because the is inevitable, the assumptions about the value the strategic limitations of cyberspace, the
threat of retaliation is not viable if the adversaries are not of cyberspace for military operations are mainly Government of the Philippines should consider
cognizant of a state’s cyber capabilities. overstated and need to be clarified. First, cyber security as a policy priority because of
cyberspace does not provide asymmetric three reasons: the economic consequences of
Deterrence is the use of threats to discourage adversaries advantages to weak actors. The most sophisticated cybercrime, the security consequences of cyber
from initiating undesirable actions.5 The logic of cyber attacks, “Stuxnet” and “Flame” for instance, espionage and the political consequences of cyber
conventional deterrence is based on three core elements: required an unprecedented level of expertise and conflict in the region. The remainder of the paper
communication, credibility, and capability.6 For deterrence operational capabilities that weak states and non- is divided into in four sections. The first section
to be effective, a deterring state must first communicate state actors do not necessarily have.9 Second, introduces central concepts regarding the study of
to its adversaries which actions are unacceptable and the idea that cyberspace is offense-dominant cyber security. The second examines some factors
the corresponding punishment once these actions are is also questionable because the complexity that could influence the development of cyber
undertaken. The state must then demonstrate that it of weaponization makes offensive operations capabilities in the Philippines. The third surveys the
has the capabilities to support its threats. Lastly, the more difficult for states to develop. Moreover, the existing regional and domestic policy responses
state must establish credibility by convincing adversaries empirical evidence suggests that cyberspace is not to cyber threats. Finally, the last section offers
that the communicated threats will actually be carried necessarily offense-dominant as some academics some recommendations for the next president,
out.7 However, these elements are problematic when and policymakers argue because the success particularly focusing on integrating cyber security
applied to cyberspace. It would be detrimental for and decisiveness of offensive cyber operations within national security policy and military strategy.
states to communicate and demonstrate that they have are generally conditioned on “attack severity, Following these objectives, the paper does not
cyber capabilities because to do so diminishes their organizational competence, and actor resolve.”10 offer recommendations about the domestic
strategic surprise and technological superiority, the main Lastly, traditional deterrence models may not be law enforcement, e-governance, information
advantages of military cyber operations. Absent any useful in cyberspace but an alternative interpretation infrastructures and other related topics that fall
awareness and confirmation from their target state, of deterrence sees a cyber attack as an indication of outside the scope of strategic interactions between
adversaries will not be persuaded that successful deterrence because it substitutes kinetic actors in the international system.
a state has such capabilities.8 or physical attacks between states.11

C 2016 ADRiNSTITUTE for Strategic and International Studies. All rights reserved. www.stratbase.com.ph
OCCASIONAL PAPER JANUARY 2016

04
Concepts and Actors important to note that the specific operational
instrument involved in executing cyber attacks are
Our understanding of cyber issues is dependent on weapons delivered through a computer. A cyber Table 1. CYBER WEAPONS DEFINED14
how concepts and actors are defined and framed. It weapon, in this sense, is a computer code that is
is necessary to clarify specific concepts and identify used or is designed to be used with the objective
actors to avoid confusion and exaggeration about of threatening or causing damage to objects,
state capabilities and threats in cyberspace. The networks, or living beings.13 Cyber weapons can
following section therefore discusses some core come in different forms, ranging from generic tools
concepts and actors in area of cyber studies. that cause nuisances to high-end tools that can
bring down a state’s critical infrastructure. Table 1
Concepts presents the main types of cyber weapons
A core concept in the conduct of cyber security as well as their basic definitions.
operations is the offensive and defensive capabilities
of a state or its Computer Network Operations Another fundamental concept is the projection of
(CNO). These operations are divided into three power in cyberspace or cyber power. This paper
types of functions: Computer Network Attack considers cyber power as an extension of politics,
(CNA), Computer Network Defense (CND), and which is, fundamentally, the authoritative allocation
Computer Network Exploitation (CNE). CNA is an of valued things.15 Since power relates to the
offensive operation and is defined as the capability allocation of capabilities and resources, the paper
to use computers to “disrupt, deny, degrade, or adopts Nye’s idea of cyber power: “the ability to
destroy information” in adversaries’ computers obtain preferred outcomes through the use of
and information systems. CND, on the other hand, electronically interconnected information
involves the protection of a state’s computer resources of the cyber domain.”16
networks: having the capability to “detect, analyze,
and mitigate threats and vulnerabilities, and Moving to the next concept, much debate has
outmaneuver adversaries.” CNE is an espionage been generated by the term cyber war. While
operation and is the ability to collect intelligence several definitions exist for this concept, this
through the use of computer networks papers proceeds with the view that notion of war is
to gather data about adversaries.12 problematic and even dangerous when applied to
cyberspace. An act of war must be instrumental,
These functions provide a general idea of what political, and lethal, whether in cyberspace or
states can do in cyberspace, although it is not.17 No stand-alone cyber operation on record

C 2016 ADRiNSTITUTE for Strategic and International Studies. All rights reserved. www.stratbase.com.ph
OCCASIONAL PAPER JANUARY 2016

05 Table 2. Actors, incidents and weapons

meets these criteria, thus the concept of cyber In terms of non-state actors, there are three
war will not be used for purposes of the paper. As additional subcategories: criminals, hackers, and
alternative, the paper follows the work of Valeriano terrorists. Criminal organizations exploit cyberspace
and Maness who suggest the term cyber conflict as through various methods for monetary gain. The
more appropriate, as it involves hostile interactionsmajor types of online criminal activities include theft
between states but is not necessarily indicative of data, financial crimes, corruption, and crimes
of warfare.18 Cyber conflict is defined as “the use against children.23 Hackers on the other hand,
of computational technologies in cyberspace for execute in network intrusions for different reasons,
malevolent and destructive purposes in order to ranging from experiencing the thrill of the challenge
impact, change, or modify diplomatic as well as to bragging rights. Although cracking into networks
military interactions between entities.”19 once required a fair amount of skill or computer
knowledge, attack tools have now become
Actors more sophisticated and easier to use, providing
Since the barriers and costs to entry in hackers with more capabilities.24 For instance,
cyberspace are low, a range of actors have engaged politically motivated hackers or hacktivists, such
in numerous types of disruptive activities against as “Anonymous” and “LulzSec”, overload e-mail
different targets. There are two main categories servers and hack into websites to send a specific
of actors in cyberspace: states and non-state political message to target audience.
actors. States are clearly the dominant actors
in cyberspace, given their extensive resources, While there have been no recorded incidences
expertise, and capabilities. The development
20
of “cyberterrorism”, cyberspace is attractive to
of the most sophisticated and high-level CNO is terrorist organizations because it guarantees
typically designated to states’ intelligence and anonymity, it enables global communication, and
military services. The objectives of these services it delivers a strong psychological impact.25 The
are to collect and/or destroy intelligence by Central Intelligence Agency suggests that terrorists
exploiting and disrupting adversaries’ information will remain focused on traditional attack methods;
infrastructure. Some prominent examples include however, the CIA anticipates increasing cyber
the National Security Agency of the United States, threats as a more technically capable generation of
the Government Communications Headquarters of terrorists join the ranks.26 Table 2 provides some
the United Kingdom, the General Staff Department examples of the cyber weapons that different
(3rd and 4th Departments) of the People’s Liberation actors have utilized as well as the
Army in China,21 and the Reconnaissance General incidents they were involved in.
Bureau and General Staff Department of the
Korean People’s Army in North Korea.22

C 2016 ADRiNSTITUTE for Strategic and International Studies. All rights reserved. www.stratbase.com.ph
OCCASIONAL PAPER JANUARY 2016

06

In examining the role of different actors in of anonymity, and the high speed of transactions
cyberspace, it is imperative to highlight the offered by cyberspace provide criminals with
significant difference between the capabilities of unparalleled opportunities for profit generation. A
states and non-state actors in cyberspace. There report by the Center for Strategic and International
is a persistent media blitz about the threat of Studies and McAfee estimates that the global
massive and destructive cyber attacks by non-state economy loses $375 billion to $575 billion annually
actors, but these reports are largely overstated and due to cyber crimes. Even the most conservative
empirically untested.32 It is therefore necessary estimate of economic losses to these criminal
to adopt a more strategic understanding of cyber activities is more than the national income of most
conflict where the focus of inquiry is the realistic states and companies, signifying the level of
outcome or consequence of the attack aside from risk states face from cyber crime and Image Credit: media.licdn.com

technical and tactical considerations such as the how rapidly the risk can evolve.33
number of websites that are defaced or the
type of malicious code used by hackers. Despite the relatively controlled threat posed by Investigation), and the Anti-Cybercrime
n the context of the Philippines, cyber crime is
cyber crime, the Philippine government has adopted Group (Philippine National Police).36
an existing problem but is not as threatening
a more active posture towards countering illegal
compared to other organized criminal activities
Factors Affecting Cyber Security Development domestic cyber activities in contrast to countering Building on these efforts, there are two reasons why
such as robbery, kidnapping and drug trafficking.
external threats to national security. In terms of the government is encouraged to sustain and further
For instance, the Philippine National Police Anti-
States generally produce specific defense and crime prosecution, there are currently six laws that develop the capacity to address cyber crimes. First,
Crime Group reports that there were 3,368 recorded
security capabilities in response to external relate to cyberspace: the Cybercrime Prevention domestic enforcement agencies, specifically the
cases of cyber crime from 2003 to 2014.34 Of these
and domestic considerations. While there is no Act of 2012, the Anti-Photo and Voyeurism Act National Bureau of Investigation and the Philippine
cases, the most common forms of cyber crimes
scholarly nor policy consensus over which factors of 2009, the Anti-Child Pornography Act of 2009, National Police, still lack the expertise, capabilities,
were identified as website defacements, personal
constrain states’ investments in cyber capabilities, the E-Commerce Act of 2000, the Access Devices and resources to effectively counter cyber threats.37
account infiltrations, and Internet fraud. The data
the subsequent section offers three important Regulation Act of 1998, and the Anti-Wiretapping Given the rapidly rising number of internet users,
to systematically quantify the economic impact of
factors that could potentially influence further cyber Law of 1965. Moreover, the enforcement of it is impossible for the government to monitor
crime that make use of cyberspace is incomplete;
capability development in the Philippines. these laws is assigned to four key government millions of internet users without advanced network
however, the most substantial reports of losses have
agencies: the Cybercrime Investigation and surveillance systems and sufficient resources.
been from the Bangko Sentral ng Pilipinas, which
Economic: Cyber Crime Coordination Center (Department of Science and Second, the mechanisms for inter-agency
estimates that PhP175 million was lost due to ATM
The first factor is the growing industry of cyber Technology), the Office of Cybercrime (Department cooperation are underdeveloped and need to be
fraud in 2012 and PhP220 million in 2013.35
crime. The low barriers to entry, the assurance of Justice), Cybercrime Division (National Bureau of strengthened. Since cyber crimes are pervasive and

C 2016 ADRiNSTITUTE for Strategic and International Studies. All rights reserved. www.stratbase.com.ph
OCCASIONAL PAPER JANUARY 2016

07

persistent, it is crucial for the government to create hand, it can also facilitate network infiltration by
a cohesive strategy that defines the responsibilities adversaries.
of each agency and sets out a clear implementation
plan that accurately integrates their functions. In the case of the Philippines, investing in cyber
espionage or CNE capabilities would enhance
National Security: Cyber Espionage the intelligence collection of security and military
The second factor is the growing prominence of services. The minimum credible defense
cyberspace as area for espionage. Several cases strategy, which the government is developing, is
of cyber conflict relate to espionage operations fundamentally dependent on understanding an
between states. For example, in 2005, the United adversary’s intentions and capabilities.40 Given
States government discovered Chinese computer this situation, government security and military
network operations “Titan Rain”, which successfully forces can leverage the advantages of cyberspace
infiltrated numerous secure systems, including to collect vital intelligence regarding adversaries’
the Department of Defense, Department of State, intentions about critical issues, such as the ongoing
Department of Homeland Security, National territorial disputes or the arms dynamic in the region.
Aeronautics and Space Administration, and even the The government’s current focus is to improve
British Foreign Commonwealth Office.38 conventional capabilities of the military; it would be
reasonable to supplement these capabilities and
More recently, computer security company FireEye invest in military computer network operations.
revealed the extensive cyber espionage operation
of a group called APT30 against several states The paradox of cyberspace is that it also allows
in Southeast Asia and beyond. This incident is other states to steal information from computer
disconcerting because of APT30’s suspected networks in the Philippines. There have been several
association with the Chinese government as well as reports by companies like FireEye and Kaspersky
the group’s consistent focus on collecting specific Lab of network infiltrations against the Philippine
information about political, military, and economic government, but it is unclear if security and military
issues in the region, and about media organizations services have CND capabilities to defend the state’s
and journalists who write on topics about the networks against these hostile operations.41 This
Chinese government’s legitimacy. Considering
39
uncertainty is reflected in existing cyber security
these examples, espionage through cyberspace assessments, which indicate that the Philippines is
becomes paradoxical; on one hand, it enables deficient in military capabilities for cyber operations,
the efficient collection of intelligence, on the other public cybersecurity assistance networks (Computer

C 2016 ADRiNSTITUTE for Strategic and International Studies. All rights reserved. Image Credit: post-gazette.com www.stratbase.com.ph
OCCASIONAL PAPER JANUARY 2016

08
Emergency Response Teams), and inter-agency and of power, uneven distributions of economic power In light of the Philippines’ involvement in a territorial disputes involving China, North Korea, and
intergovernmental cooperation among other areas.42 within and between states, and intense territorial dispute with China, it is likely that cyber conflict will South Korea as adversaries.47
In this sense, it would be in the strategic interests disputes.43 Given these dynamics, there are two become a prominent tool for power projection in the
of the government to develop CND capabilities, crucial reasons why geopolitics in the Asia-Pacific twenty-first century. This conflict has the advantage The strategic consequences of this relatively new
considering the advantages of cyberspace for is integral to influencing the development of cyber of can delivering a strong message sans the risks trend may be crucial for the Philippines as it is still
intelligence collection and the necessity for defense capabilities in the Philippines. First, regional associated in conventional attacks. In addition, uncertain whether cyber conflict can consistently
against the persistent and pervasive threat of cyber disputes and insecurities between states have the Philippines is currently entangled between lead to crisis instability and force states to escalate
espionage by adversaries within region. continued on from conventional conflict domains two great powers that are also engaged in hostile low-risk cyber attacks into higher-risk conventional
and have manifested in cyberspace. This situation action in cyberspace. A recent ground-breaking attacks.48 In this case, the compelling reason for
Political: Cyber Conflict makes the Asia-Pacific the most active study confirms this observation: “China needs an the Philippines to develop cyber capabilities lies
The third factor is the persistent cyber conflict in region in terms of cyber conflicts between outlet, and military grandstanding, with possibility in supporting its allies to mitigate and de-escalate
the Asia-Pacific. The Philippines is located in a states, mainly due to Chinese action.44 of escalation involving the Americans is something existing cyber conflicts. Even if the Philippines does
region characterized by major shifts in the balance China does not want to deal with at the moment. not have defense agreements with Japan and South
China seems to be good at infiltrating foreign Korea, it could be entangled during cyber conflicts

despite the strategic


networks, and this seems to be the “least” because of its existing defense agreement with the
they can do for power projection.”45 United States. In short, the lack of cyber capabilities
precludes the Philippines from defending itself from

limitations of Second, other global “cyber powers” are also


located in the region. North Korea, South Korea,
cyber attacks as well as from contributing to the
security and stability of the regional cyberspace.

cyberspace, the
and Japan all have advanced cyber capabilities
and are immersed in various political rivalries and
territorial disputes in the Asia-Pacific.46 Whereas Policy Responses to Cyber Threats

Government of the these rivals typically project military power and


engage in aggressive actions through the air and Strategies to counter cyber threats have been

Philippines should consider


maritime domains, cyber conflict has also been implemented by states unilaterally, rather collectively
used as a tool to advance foreign policy interests. It through international institutions. There is a growing
is therefore not surprising that from 2001 to 2011, consensus that norms and cooperation can mitigate

cyber security North Korea instigated fifteen cyber attacks against


various states including South Korea, Japan and
the United States. South Korea was associated with
the uncertainty and hostility in cyberspace; however,
conflicting interests between powerful states,
exacerbated by the revelations of Edward Snowden,

as a policy priority eighteen cyber incidents, mostly against Japan and


North Korea. Japan, meanwhile, had fifteen cyber
make further international norm promotion
improbable.49 Responses to cyber threats have,

C 2016 ADRiNSTITUTE for Strategic and International Studies. All rights reserved. www.stratbase.com.ph
OCCASIONAL PAPER JANUARY 2016

09

therefore, been state-driven and particularly focused Working Group in May 2002.51 The strategy called for
on strengthening domestic law enforcement as well as increased cooperation and coordination in four broad
military capabilities. These responses have included areas: creating a legal framework; sharing information
everything from recruiting potential CNO specialists to and cooperation, producing security and technical
establishing full-scale cyber commands. This section guidelines, training and education; and developing
briefly surveys the policy responses of key regional wireless security technologies. The document, however,
institutions in the Asia-Pacific and the efforts of the did not provide any details regarding how the strategy
Government of the Philippines towards cyber security. would be implemented. The second document is
the APEC Strategy to Ensure Trusted, Secure and
Regional Sustainable Online Environment, which was drafted
States in the region have invested time and resources during the Senior Officials’ Meeting in November 2005.52
to address cyber threats mainly through the Asia-Pacific The document highlighted the emerging cyber threat
Economic Cooperation (APEC) and the Association and highlighted the need to improve the following cyber
of Southeast Asian Nations (ASEAN). The creation of security measures: cohesive domestic strategies, legal
regional levels of governance has created and policy frameworks, incident response and recovery
a collaborative space where such strategic capabilities, partnerships among government, industry,
discussions can take place. These efforts have, academics, public awareness regarding online security,
therefore, enabled states in the region to develop research and development, and interstate cooperation.
transnational responses to cyber threats with shared Much like the previous strategy, the modified version
confidence in their neighbors based on their does not offer any concrete directions on how APEC
similarities rather than differences.50 member states would realize these measures.

The cyber security efforts of APEC are captured The APEC TEL Strategic Action Plan 2016-2020 is
in three key documents. The first is the APEC the third and most recent document, produced by the
Image Credit: hoover.org
Cybersecurity Strategy, which was formulated by APEC Telecommunications and Information Working
the APEC Telecommunications and Information Group in March 2015.53 The document accentuated

C 2016 ADRiNSTITUTE for Strategic and International Studies. All rights reserved. www.stratbase.com.ph
OCCASIONAL PAPER JANUARY 2016

10
five key priorities, including a strong emphasis on Following this discussion, cyber security figured security is the second initiative and it has to do appropriate strategy to mitigate cyber conflict.
a secure, resilient, and trusted ICT (Information prominently in several subsequent meetings, with developing a common framework for network
and Communications Technologies) environment. including the 3rd Meeting of the ASEAN security and information security across the region.58 Domestic
More importantly, the document presented an Telecommunications and IT Ministers in 2003, The response of the Government of the Philippines
implementation plan that prescribed the need where it was decided that an ASEAN Information In reviewing the regional responses to cyber threats, towards cyber security has generally been limited
to undertake specific actions during the next Infrastructure was needed as well as the it is apparent that some barriers have been slowing despite a significant cyber incident that transpired
four years: research, capability-building, public development and operationalisation of the national the growth of cyber security efforts in the region. The in 2000. The “I LOVE YOU” virus, created by an
awareness, and intergovernmental cooperation. Computer Emergency Response Teams by 2005.55 first barrier is the uneven distribution of resources undergraduate Filipino computer science student,
Whereas the strategic plan recommends workable In 2006, the ASEAN Regional Forum released and capabilities among states. States such as infected around 55 million computers and
and specific measures to address cyber security, two statements that stressed the importance of Japan, South Korea, and Singapore are clearly more generated around $10 billion worth of damage
the success of the plan is largely dependent cyber security. The first was the ARF Statement technologically superior compared to other states globally.60 Government prosecutors filed cases
on the level of commitment and the on Cooperation in Ensuring Cyber Security, which like China, Indonesia, Malaysia, the Philippines, and against the perpetrator Onel de Guzman, but the
resources available to each state. reinforced the need for an ARF work plan on security Thailand; but even these are considerably more indictment was dismissed even at the first stage
in the use of ICT and more dialogue on confidence- advanced than states such as Brunei, Cambodia, because there was no law punishing
Cyber security has been a concern for ASEAN building, stability, and risk reduction measures to Laos, Myanmar or Vietnam. Even though this computer criminals at that time.61
for more than a decade, but prior to the ASEAN address the implications of ARF participants’ use “digital divide” is predominantly expressed in terms
ICT Masterplan 2015, no clear and concrete of ICT.56 The second was the ARF Statement on of infrastructure development and broadband A significant initiative towards a national cyber
regional strategy was developed by the institution Cooperation in Fighting Cyber Attack and Terrorist penetration, the economic inequalities and low security blueprint was the creation of the National
to compel its member states to address cyber Misuse of Cyber Space, which recommended the socio-political capacity levels present substantial Cyber Security Plan in 2004. The plan was
threats. The problem of cyber crime was first implementation of cyber crime laws in accordance challenges to these states as well.59 The second comprehensive and reflected the government’s
discussed during the 2nd Senior Officials Meeting on with national conditions and continued interstate barrier relates to the level of cooperation that states cyber security policy, which centers on
Transnational Crime in 2002. State representatives cooperation in countering cyber crime are willing to extend in the area of cyber security. institutionalizing “the necessary capabilities in the
agreed on the following responses: to establish a and terrorists’ use of cyberspace.57 States develop CNO capabilities to obtain different government and the private sector to adequately
compilation of applicable national laws, regulations strategic security objectives; therefore, it would not meet and respond to challenges and threats against
and international treaties relating to cyber crime The last and most current collaboration is the be in their best interest to share information about critical cyber infrastructures.”62 The plan presented
legislation; work towards the criminalization of ASEAN ICT Masterplan 2015 that was adopted their cyber operations. In this sense, collaborative four main strategies and corresponding programs
cyber crime activities; enhance law enforcement during the Telecommunications and IT Ministers operations and intelligence sharing can potentially that were part of the government’s solution
and intelligence cooperation; develop regional Meeting in 2011. The plan prioritizes cyber security diminish the strategic advantage of cyber operations to increasing threats in cyberspace.
training; coordinate with ASEAN Chiefs of National through two broad initiatives. Building trust is the more than other conventional military operations.
Police (ASEANAPOL) for the analysis of cyber crime first initiative and it involves the promotion of secure Furthermore, the absence of global norms or code The first strategy is to understand the risks present
activities; and seek training assistance from ASEAN transactions within ASEAN and public awareness of conduct for cyberspace operations also signifies through a sustained threat assessment of national
Dialogue Partners and international institutions.54 about online security. Promoting information the uncertainty and lack of consensus about the vulnerabilities and protective measures already

C 2016 ADRiNSTITUTE for Strategic and International Studies. All rights reserved. www.stratbase.com.ph
OCCASIONAL PAPER JANUARY 2016

11
being implemented by the government. The second discusses the status or completion of the programs proposed in the plan.
is risk control, which requires comprehensive
security planning, effective resolution of crisis, The last and most recent cyber security initiative by the Government of the
and risk monitoring. The third strategy relates to Philippines is Executive Order No. 189, which was released on September
the organization and mobilization of necessary 17, 2015. The Executive Order was drafted in response to increasing cyber
resources and relevant stakeholders, such threats, and in particular intended to address the theft of classified and sensitive
as specialists from the private sector and the electronic information and to assess national vulnerabilities of government and
international community, for the implementation of commercial information systems.65 It prescribes several measures, the most
the plan. The fourth strategy focuses on instituting salient of which are the reestablishment of the National Cyber Security Inter-
regulatory and legislative reforms crucial to Agency Committee, the formation of a National Cyber Security Coordination
addressing the challenges of cyber threats.63 Center, the creation of Computer Emergency Response Teams in all government
offices, and the transfer of the new Cybercrime Investigation and
Building on the cyber security policy, the National Coordinating Center from the Office of the President to the
Cybersecurity Coordination Office prepared an National Cybersecurity Inter-Agency Committee.66
operational framework in 2008. The National
Cybersecurity Coordination Strategy and The objectives of Executive Order are appropriate and reasonable, yet there are
Implementation Plan proposed a coordination two fundamental concerns that the government seemed to have missed. First,
strategy that comprised on five execution programs: there was no discussion about the sustainability of the initiatives proposed in
Cyber Security Legal Regime; Critical Cyber the document. Considering that the current government will be stepping down
Infrastructure Security Threat and Vulnerability in 2016, it is uncertain whether the plans will be continued by the next set of
Reduction; Critical Cyber Infrastructure Security political leaders. Second, the document does not provide any policy guidance
Awareness, Education and Training; Critical Cyber regarding offensive and defensive cyber operations. It is not possible to
Infrastructure Security Incident Response and secure national critical infrastructure and information systems
Consequent Management; and National and without a clear and integrated strategy for cyberspace.
International Coordinating Mechanisms.64
Thus, the government’s response to cyber threats can be described as
More importantly, the plan justified the urgent acceptable but nevertheless incoherent. An evaluation of previous cyber security
need for inter-agency cooperation through the initiatives suggests that there are no consistent links or continuation between
establishment of centralized committee and the the initiatives of the previous and the current government. This incoherence is
consistent participation of different government a contributing factor towards the underdevelopment of the cyber capabilities in
bodies and private organizations securing Philippine the Philippines. Nevertheless, the lack of capabilities can also be an opportunity
cyberspace. However, while the implementation for the next president given the rapidly increasing dependence of states on
plan was comprehensive and ambitious in theory, cyberspace. The succeeding section offers some ideas about the relevance of
as of yet there is no clear evidence or report that integrating cyber security as a national security priority in the Philippines.

C 2016 ADRiNSTITUTE for Strategic and International Studies. All rights reserved. www.stratbase.com.ph
OCCASIONAL PAPER JANUARY 2016

12

Considerations for the Next President to be accomplished by the government.68 A national security policy typically
explains the main priorities and objectives of the president of a state. If cyber
Since previous efforts in creating a cyber strategy security is to be a priority, the national security policy should explicitly explain the
were incoherent, the next president has the relevance of cyber security and its value for the state. Grand strategy denotes the
opportunity to ensure strategic coherence in coordination of all national assets towards the attainment of policy objectives.69
addressing cyber threats. There are two initial steps
in producing a cyber strategy: assessment and The grand strategy provides more details about the cyber strategy of the
development. The first is to assess the status and government such as the relevant cyber organizations, the system of coordination,
outcome of previous government initiatives on cyber management of capabilities, and cooperation with international institutions if
security such as the National Cyber Security Plan possible. The military strategy refers to use of military power in support of the
and Executive Order No. 189. The assessment grand strategy.70 A national military strategy, thus, discusses the objectives,
would have two objectives. The first is to determine general approaches, and the resources of the armed forces in preserving the
if existing cyber organizations have the sufficient national security of a state. In terms of cyber security, this strategy should explain
expertise, appropriate resources, and proper the military’s role in cyberspace and give the public a general sense of
procedures to defend the state. The second is to the type of military actions involved in securing the cyberspace.
evaluate if the existing inter-agency coordination and
implementation mechanisms are in place and are An operational strategy has to do with the cumulative and coordinated tactical
actually working. This assessment is necessary to actions undertaken to achieve a specific operational goal.71 Since goals at the
establish continuity and avoid wasting operational level are diverse, integrating cyber operations into military operations
resources during government transitions. would involve engagements ranging from disabling a command and control
system of a military base to disrupting the infrastructure protocols of a military
The second step is to develop cyber strategy production facility. Lastly, a tactical strategy refers to the details of combat,
that builds on the efforts of the previous specifically deployments, engagement with the enemy, and interaction between
government. There are five levels of strategy different units of the military.72 Cyber operations at the tactical level would entail
where the government needs to integrate cyber detailed actions, including the development of cyber units in each military
security: policy, grand, military, operational, and service, the type of response against cyber attacks, and the
tactical.67 Policy refers to the set of objectives coordination between different military cyber units.

Image Credit: forbescustom.com

C 2016 ADRiNSTITUTE for Strategic and International Studies. All rights reserved. www.stratbase.com.ph
OCCASIONAL PAPER JANUARY 2016

13

Conclusion

Cyber security is still a weak aspect of Philippine Reponses to cyber threats have mainly been previous and current government has mandated
national security. The lack of discussion regarding implemented by states, rather than collective action the investment in capabilities for military
the challenges and opportunities relating to through by international institutions. Whilst there is operations in cyberspace.
cyberspace is impeding current efforts to address a growing consensus that norms and cooperation
increasing cyber threats against the state. Given can mitigate the uncertainty and hostility in In this regard, the next president has the genuine
these circumstances, there are three reasons cyberspace, conflicting interests between powerful opportunity to consider cyber security as a core
why the Philippine government should consider states, aggravated by the revelations of Edward national security priority and to ensure strategic
cyber security as a policy priority. The first is that Snowden, make international norm promotion more coherence in addressing cyber threats. Strategic
the economic losses to cybercrime are escalating difficult. States in the region have invested time coherence can be enhanced by integrating cyber
and law enforcement agencies do not necessarily and resources to address cyber threats through security measures in all levels of strategy: policy,
have the capabilities to handle the massive volume the Asia-Pacific Economic Cooperation and the grand, military, operational, and tactical. More
of incidents. The second is cyber espionage has Association of Southeast Asian Nations but these significantly, the next president must realize that
become a predominant method of intelligence efforts are limited; although cyber security has the topic of cyber security is no longer just for the
collection and it is not clear if the military has the been a topic of concern for the last decade, more “IT crowd.” An interdisciplinary approach to cyber
capabilities to detect and counter these operations. concrete plans have only been articulated in the security that draws on a range of expertise and
Third is that the territorial disputes and political last few years. Domestic responses to cyber threats involves all government agencies is necessary to
conflicts in the Asia-Pacific region have “spilled over” have been limited since most of the efforts have protect Philippine national interests in cyberspace.
into cyberspace, therefore making the region the focused on establishing legal frameworks to enable
most active in terms of cyber conflict. law enforcement. There is no indication that the

C 2016 ADRiNSTITUTE for Strategic and International Studies. All rights reserved. www.stratbase.com.ph
OCCASIONAL PAPER JANUARY 2016

14
ENDNOTES: Economist: Modern Warfare, Intelligence and Deterrence: The technologies that are asean.org/ communities/asean-political-security-community/item/work-programme-
transforming London: Economist Books, Arquilla, J., (27 February 2012) Cyberwar Is to-implement-the-asean-plan-of-action-to-combat-transnational-crime-kuala-lumpur-
1
Rid T. (2013). Cyberwar will Not Take Place. London: Hurst & Co. Ltd, xiv-xv. Already Upon Us [Web log post]. Retrieved from http://foreignpolicy.com/2012/02/27/ 17-may-2002
2
United Nations Institute for Disarmament Research (2013). The Cyber Index In- cyberwar-is-already-upon-us/ and Palette, D. et. al. (12 October 2015) Cyberwar Ig- 55
Association of Southeast Asian Nations (2003) 3rd Meeting of the ASEAN Tele-
ternational Security Trends and Realities Geneva, Switzerland: United Nations. nites a New Arms Race. Wall Street Journal. Retrieved from http://www.wsj.com/ar- communications and IT Ministers. Retrieved from http://www.asean.org/communities/
3
For a more detailed discussion on these assumptions see Lynn III, W. J. (2010) ticles/cyberwar-ignites-a-new-arms-race-1444611128 asean-economic-community/category/asean-telecommunications-and-it-ministers-
Defending a New Domain: The Pentagon’s Cyberstrategy Foreign Affairs 89 (5), 97- 33
Lewis, J. (2014). Net Losses: Estimating the Global Cost of Cybercrime Wash- meeting-telmin
108, Nye Jr., J. S. (2011). The Future of Power New York: Public Affairs, Libicki, M. ington D.C.: Center for Strategic and International Studies. 56
ASEAN Regional Forum (2012) ARF Statement on Cooperation in Ensuring Cy-
(2009) Cyberdeterrence and Cyberwarfare Santa Monica, CA: RAND Corporation. 34
Guillermo, J. (2015). Local Cybercrime Landscape [PowerPoint slides] Retrieved ber Security. Retrieved from https://ccdcoe.org/sites/default/files/documents/ASEAN-
4
Sheldon, J. (2011). Deciphering Cyberpower: Strategic Purpose in Peace Stra- from http://aseanfic.org/2015/wp-content/uploads/2015/02/Philippine-Cybercrime- 120712-ARFStatementCS.pdf
tegic Studies Quarterly 5(2), 95-112. Landscape-ASEANFIC.pdf 57
ASEAN Regional Forum (2006) ARF Statement on Cooperation in Fighting Cyber
5
Freedman, L. and Raghavan, S. (2008) “Coercion” In Paul Williams (ed.) Security 35
Bartolome, J. (2014, November 1) Nearly P400M lost to ATM fraud from 2012 Attack and Terrorist Misuse of Cyber Space. Retrieved from http://www.mofa.go.jp/
Studies: An Introduction London: Routledge, 217-218. to 2013, says lawmaker [Web log post.] Retrieved from http://www.gmanetwork.com/ region/asia-paci/asean/conference/arf/state0607-3.html
6
Mansbach, R. W. and Taylor, K. L. (ed.) (2011) Introduction to Global Politics 2nd news/story/ 386207/ money/economy/nearly-p400m-lost-to-atm-fraud-from-2012-to- 58
Association of Southeast Asian Nations (2011) ASEAN ICT Masterplan 2015.
Edition London: Routledge, 297. 2013-says-lawmaker Retried from http://www.asean.org/resources/publications/asean-publications/item/
7
Ibid 36
Sy, Geronimo L. (2015). Philippines 2014-2015 Cybercrime Report The Rule of asean-ict-masterplan-2015
8
Libicki, M. (2013) Brandishing Cyberattack Capabilities Santa Monica, CA: Law in Cyberspace Manila: Department of Justice. 59
Thomas, Cyber Security in East Asia, 4-5
RAND Corporation, vii-xi. 37
Ibid 60
Poulsen, K. (2010, May 3) May 4, 2000: Tainted ‘Love’ Infects Computers Re-
9
Lindsay, J. (2013) Stuxnet and the Limits of Cyber Warfare. Security Studies (22) 38
Seagal, A., (2013) “From Titan Rain to Byzantine Hades” In Jason Healey (ed.) A trieved from http://www.wired.com/2010/05/0504i-love-you-virus/
3, 385-389. Fierce Domain in Cyberspace, 1986-2012 Virginia: Cyber Conflict Studies Association, 61
Sosa, g. (2009). “Country Report on Cybercrime: The Philippines” In M. Sasaki,
10
Gartzke, E. and Lindsay J. (2015) Weaving Tangled Webs: Offense, Defense, 165-167. Resource Material No. 79 Paper Presented at International Training Course: The Crimi-
and Deception in Cyberspace. Security Studies 24 (2), 346. 39
Kujawa, A. (2015). APT30 and the Mechanics of a Long-Running Cyber Espio- nal Justice Response to Cybercrime, Tokyo, Japan: United Nations Asia and Far East
11
Ibid nage Operation Milpitas, CA: FireEye. Institute, 80-87.
12
Cartwright, J. E. (2010). Joint Terminology for Cyberspace Operations Washing- 40
Domingo, F. (2015, 27 February). Intelligence as the Philippines’ First Line of De- 62
Milallos, M. and Romero, S. (2004). National Cyber Security Plan Manila: Office
ton D.C.: U.S. Department of Defense. fense [Web log post]. Retrieved from, http://nottspolitics.org/2015/02/27/intelligence- of the President, Task Force for the Security of Critical Infrastructure, 32.
13
Rid, T., and McBurney, P. (2012). Cyber-Weapons. RUSI Journal 157 (1), 7. as-the-philippines-first-line-of-defense/ 63
Ibid, 34-42.
14
Definitions adopted from Carr, J. (2010), Inside Cyber Warfare: Mapping the Cy- 41
Kujawa, APT30 and the Mechanics and Donohue, B. (19 May 2015). Naikon 64
National Cyber Security Coordination Office (2008). National Cyber-security Co-
ber Underworld Sebastopol, CA O’Reilly Media, Reveron, D. (Ed.). (2012). Cyberspace APT steals geopolitical data from the South China Sea [Web log post]. Retrieved from ordination and Implementation Strategy Quezon City: Author.
and National Security: Threats, Opportunities, and Power in a Virtual World Washington https://blog.kaspersky.com/ naikon-apt-south-china-sea/8696/ 65
Executive Order No. 189 (2015)
D.C.: Georgetown University Press, 8, and Valeriano, B., and Maness, R. (2015). Cyber 42
International Telecommunications Union (2015). Global Cybersecurity Index Ge- 66
Ibid
War versus Cyber Realities. Oxford: Oxford University Press, 33-37. neva, Switzerland: ITU and Feakin, T., et. al. (2015) Cyber Maturity in the Asia-Pacific 67
Kane, T. and Lonsdale, D. (2011). Understanding Contemporary Strategy Lon-
15
Easton, D. (1953). The Political System: An Inquiry into the State of Political Sci- Region Canberra: Australian Strategic Policy Institute. don: Routledge, 13.
ence New York: Alfred Knopf, 5. 43
Betts, R. K. (1994). Wealth Power, and Instability-East-Asia and the United 68
Clausewitz, Carl von (2008). On War (M. Howard and P. Paret, trans.), Oxford:
16
Nye, The Future of Power New, 123 States After the Cold War International Security 18(3), 34-77 and Christensen, T. J. Oxford University Press, 28-29
17
Rid et, al., Cyber-Weapons, 7 (1999). China, the US-Japan Alliance, and the Security Dilemma in East Asia. Interna- 69
Hart, B. H. Lidell (1967) Strategy: An Indirect Approach London: Faber & Faber,
18
Valeriano et. al., Cyber War versus Cyber Realities, 31 tional Security 23(4), 49-80 335.
19
Ibid 44
Valeriano et. al., Cyber War versus Cyber Realities, 128 70
Kane et. al., Understanding Contemporary Strategy, 13
20
Nye, The Future of Power and Lindsay, Stuxnet and the Limits of Cyber Warfare 45
Ibid 71
Ibid, 14
21
Patton A., et. al., Occupying the Information High Ground: Chinese Capabilities 46
Wicherski et. al. (2011) Ten Days of Rain Santa Clara, CA: McAfee; Booz Allen 72
Ibid, 14
for Computer Network Operations and Cyber Espionage, Washington D.C.: US-China Hamilton (2001) Cyber Power Index: Findings and Methodology Virginia: author; Vale-
Economic and Security Review Commission, 2012. riano et. al., Cyber War versus Cyber Realities
22
Jun, Jenny, et. al. (2014). The Organization of Cyber Operations in North Korea 47
Valeriano et. al., Cyber War versus Cyber Realities, 84-90
Washington D.C.: Center for Strategic and International Studies. 48
Gompert, D., and Libicki, M. (2014). Cyber Warfare and Sino-American Crisis
23
International Police (2015) Cybercrime Retrieved from http://www.interpol.int/ Instability. Survival, 56(4), 7-22.
Crime-areas/ Cybercrime/Cybercrime 49
For more on the debate about cyber norms see Stevens, T. (2012). A Cyberwar
24
Reveron, Cyberspace and National Security of Ideas? Deterrence and Norms in Cyberspace Contemporary Security Policy 33 (1),
25
Weimann, G. (2004). Cyberterrorism How Real Is the Threat? Washington D.C.: 148-170 and Farell, H. (2015). Promoting norms for Cyberspace Cyber Brief New York:
United States Peace Institute. Council on Foreign Relations.
26
Ibid 50
Thomas, N. (2009). Cyber Security in East Asia: Governing Anarchy Asian Secu-
27
Healey, Jason (ed.) (2013) A Fierce Domain in Cyberspace, 1986-2012 Virginia: rity 5 (1), 19-20.
Cyber Conflict Studies Association, 141-142; Berghel, H. (2001) The Code Red Worm 51
Richardson, J. (2002) APEC Cybersecurity Strategy Singapore: Asia-Pacific
Communications of the ACM (44) 12, 15-19. Economic Cooperation
28
Stiennon, R. (2015) “A Short Histroy of Cyber Warfare” In James Green (ed.) 52
Asia-Pacific Economic Cooperation (2004) APEC Strategy to Ensure Trusted,
Cyber Warfare: A Multidisciplinary Analysis London: Routledge, 9-10. Secure and Sustainable Online Environment Retrieved from http://www.apec.org/~/
29
Blank, S. (2008) Web War I: Is Europe’s First Information War a New Kind of media/Files/ Groups/TEL/05_TEL_APECStrategy.pdf
War? Comparative Strategy (27) 3, 227-247. 53
Asia-Pacific Economic Cooperation (2015) APEC TEL Strategic Action
30
Lindsay, Stuxnet and the Limits of Cyber Warfare; Falliere, N. (2011) W32.Stux- Plan 2016-2020. Retrieved from http://www.apec.org/~/media/Files/Groups/
net Dossier. Mountain View, CA: Symantec Corporation, 1-3. TEL/20150331_APEC%20TEL% 20Strategic%20Action%20Plan%202016-2020.pdf
31
Valeriano et. al., Cyber War versus Cyber Realities, 173-175; 54
Association of Southeast Asian Nations (2002) Work Programme to Implement
32
Exaggerations of war in cyberspace are discussed in Sutherland, B. (2011) The the ASEAN Plan of Action to Combat Transnational Crime. Retrieved from http://www.

C 2016 ADRiNSTITUTE for Strategic and International Studies. All rights reserved. www.stratbase.com.ph
9.1
VOLUME

ABOUT
Francis Domingo
is Assistant Professor of International Studies at De La Salle
University and concurrently a doctoral researcher affiliated with the Centre for
Conflict, Security and Terrorism and the Institute of Asia and Pacific Studies
at University of Nottingham. His current research explores the strategic
utility of cyber capabilities for small states. He holds an MA in Intelligence
Studies from Brunel University London (2009) and an MRes in Strategic Studies
from University of Reading (2014). His research has been published in
Defense and Security Analysis, Military and Strategic Affairs,
and Strategic Analysis, among other journals.

Before joining academia, he worked with the Armed Forces of the


Philippines as a research analyst with the Office of Strategic and
Special Studies (OSS), where he contributed to a number of
assessments on sensitive political and security issues.

Stratbase’s Albert Del Rosario Institute


is an independent international and strategic research
organization with the principal goal of addressing the
issues affecting the Philippines and East Asia
9F 6780 Ayala Avenue, Makati City
Philippines 1200
V 8921751
F 8921754
www.stratbase.com.ph

C 2016 ADRiNSTITUTE for Strategic and International Studies. All rights reserved. Image Credit: rfa.com and hoover.org

Potrebbero piacerti anche