Military Review English Edition March-April 2016 | Page 80
GSMA explains, “Mobile devices are often one of
the first things people reach for when disaster strikes;
for example, one of the first requests by those displaced
on Sinjar Mountain in Iraq was a means to charge
their mobile phones so that they could obtain information, to locate loved ones, and to become involved
in response efforts.”19 Those examples illustrate that, by
2015, mobile networks had truly become an essential
component of crisis management.
Beyond straightforward communications, mobile phones have also enabled mobile banking. As of
January 2015, 38 percent of the world’s population
lived without access to a bank account; mobile banking
promises the primary pathway for such communities.20
For example, Pakistan’s largest financial institution is a
Norwegian mobile phone operator.21 In another example, Kenya boasts one of the most popular and successful mobile phone payment systems in the world.22
However, in a 2011 report, the Department of
Homeland Security’s (DHS) Computer Emergency
Readiness Team warned “mobile phones are becoming more and more valuable as targets for attack.”23
Cybersecurity professionals consider mobile devices their networks’ greatest vulnerability.24 Between
August 2013 and March 2014, attacks per month
against mobile devices increased over 800 percent.25 In
one instance, Chinese cybercriminals used fake mobile
banking apps to trick users to enter credentials, which
enabled hackers to steal millions of dollars.26 Since
communities in future conflicts will be dependent on
mobile banking, cyberthreats to mobile banking will
influence Army stability operations.
Protecting and Restoring Essential
Services Reliant on Cyberspace
The international community plays a critical role in
helping stakeholders restore telecommunications as an
essential service. The International Telecommunication
Union (ITU) has a United Nations mandate to oversee information and communications technologies
(ICTs). ITU members include 173 governments and
hundreds of nongovernmental institutions and private
companies.27 In the first quarter of 2015, ITU personnel
deployed to help restore telecommunications for relief
efforts in Malawi, Mozambique, Micronesia, Nepal, and
Vanuatu.28 Efforts in telecommunications represent a
broader imperative for ICT growth for stability.
78
The Cyberspace Paradox and
Examples of Emerging Threats
Protecting and restoring ICTs are necessary components of prosperity.29 Future economic growth will
depend upon the mobility and flexibility of a country’s
networks.30 In 2007, ITU emphasized, “Organizations
and countries need to focus on innovation capacities
and rapid adaptability, backed up by a powerful and
secure information system, if they wish to survive
and assert themselves as long-term players in the new
competitive environment.”31 Increased access to the
Internet, mobile services, and broadband boosts economic growth.32 Moreover, the World Bank identifies
ICTs as key factors in social development.33 As developing countries continued to deepen their ICT penetration, their long-run infrastructure costs decrease,
thus creating a virtuous cycle.34 Those falling costs spur
even more broadband penetration.35 In short, ICTs unleash latent economic forces in developing economies.36
In a 2014 report, Microsoft researchers described a
“cybersecurity paradox” facing developing countries with
low ICT penetration.37 Those countries suffer the highest malware infection rates. Moreover, as those countries
develop ICT infrastructure, their infection rates accelerate.38 Thus, the poorest countries with the lowest ICT
levels can be most vulnerable to cybersecurity threats.
Since conflict zones already suffer elevated levels of
human trafficking, child exploitation, illicit drug trade,
and organized crime, vulnerable cyberspace makes them
ripe for exploitation.39 Consequently, cybercrime has
become an unavoidable evolution for nefarious actors in
such circumstances. For example, after the 2010 Haiti
earthquake, cybercriminals immediately published web
portals for fake charities to bilk donors.40
Elsewhere, cyberattacks have become a component
in political conflict. For example, when Russia seized
the Crimea in 2014, mobile phone operators in Ukraine
suffered significant service disruption.41 And, during
Ukraine’s May 2014 presidential election, pro-Russian
hackers penetrated the electronic voting system and
installed malicious code capable of deleting swaths of
votes.42
In response, in February 2015, Kiev publish YH