The power, and peril, of networks

The bigger and more inclusive a network grows, the more valuable -- and vulnerable -- it becomes. Which is why networkers must connect with care.

|
MEL EVANS/AP/FILE
A CADET LEADS A CYBERDEFENSE EXERCISE AT THE UNITED STATES MILITARY ACADEMY AT WEST POINT IN NEW YORK.

Big, open, and active make a network thrive. Think of the telephone system, e-mail, Facebook. More users make a network more valuable, which brings more users, which brings more value. That’s the “network effect.” It has supercharged the reach and efficiency of manufacturers, financial institutions, shipping companies, power generators, and virtually every enterprise and individual connected to the Internet.

But with size, speed, and sprawl comes vulnerability. Basement-dwelling hackers, mobbed-up cyber thieves, and government-backed spy agencies specialize in network breaking and enterings. In a Monitor cover story (click here), Adam Segal, a specialist on cybersecurity at the Council on Foreign Relations, details China’s aggressive hacking of computer networks around the world. His report reveals why China feels its snooping is justified and how the United States and other nations – which do this, too, but to a different degree – are trying to counter it.

My first glimpse into the power and vulnerability of a computer network was in the early 1970s. United Press International, where I worked at the time, was replacing its clattering teletypes with computer monitors and phasing out the operators who’d punch code onto paper tape and throw manual switches to direct news and information to newspapers and radio stations. The new system was fast, quiet, and – even with honking big cathode ray tubes – seemed space-age.

One night, a few bored editors on the overnight shift began puttering around. They discovered the new system’s security flaws. Unpublished information in one news bureau could be read by people in other bureaus. News wires far away could be controlled via a few simple codes. No crimes were committed during this investigation; no business protocols were breached. But that insight has stayed with me ever since (yes, I was on that overnight shift). Networks are inherently vulnerable. The thing that makes them great – speed, distributed control, openness – is both strength and weakness. UPI tightened network security, but no network is ever totally secure.

Fast-forward through four decades of accelerating digitization of everything – electric grids, military communications, high-tech R&D – and you get an idea of what is at stake. One example: Investigators suspect that widespread blackouts in Ukraine late last year might have been triggered by Russian malware that a worker accidentally let in when he clicked on an e-mail link.

What’s to be done? It’s pretty simple, really: Be careful. As innocuous or urgent or official as a link in an e-mail may appear, think twice before clicking on it. Did the FBI or IRS or Apple ask for your password? Don’t give it up. If they are for real, they’ll get in touch another way. If, like most people, you use a credit card online, check to make sure you are entering your number on a secure site (“https” and a padlock icon are good clues).

Mainly, beware. Our networks open doors, improve decisionmaking, enhance commerce, connect us. Each user adds value. Each user is a potential way in for a hacker. Let’s be careful out there.

You've read  of  free articles. Subscribe to continue.
Real news can be honest, hopeful, credible, constructive.
What is the Monitor difference? Tackling the tough headlines – with humanity. Listening to sources – with respect. Seeing the story that others are missing by reporting what so often gets overlooked: the values that connect us. That’s Monitor reporting – news that changes how you see the world.

Dear Reader,

About a year ago, I happened upon this statement about the Monitor in the Harvard Business Review – under the charming heading of “do things that don’t interest you”:

“Many things that end up” being meaningful, writes social scientist Joseph Grenny, “have come from conference workshops, articles, or online videos that began as a chore and ended with an insight. My work in Kenya, for example, was heavily influenced by a Christian Science Monitor article I had forced myself to read 10 years earlier. Sometimes, we call things ‘boring’ simply because they lie outside the box we are currently in.”

If you were to come up with a punchline to a joke about the Monitor, that would probably be it. We’re seen as being global, fair, insightful, and perhaps a bit too earnest. We’re the bran muffin of journalism.

But you know what? We change lives. And I’m going to argue that we change lives precisely because we force open that too-small box that most human beings think they live in.

The Monitor is a peculiar little publication that’s hard for the world to figure out. We’re run by a church, but we’re not only for church members and we’re not about converting people. We’re known as being fair even as the world becomes as polarized as at any time since the newspaper’s founding in 1908.

We have a mission beyond circulation, we want to bridge divides. We’re about kicking down the door of thought everywhere and saying, “You are bigger and more capable than you realize. And we can prove it.”

If you’re looking for bran muffin journalism, you can subscribe to the Monitor for $15. You’ll get the Monitor Weekly magazine, the Monitor Daily email, and unlimited access to CSMonitor.com.

QR Code to The power, and peril, of networks
Read this article in
https://www.csmonitor.com/Commentary/From-the-Editors/2016/0131/The-power-and-peril-of-networks
QR Code to Subscription page
Start your subscription today
https://www.csmonitor.com/subscribe