Tech companies are hoping you forget history and ignore their culpability. Credit: Thinkstock The Cybersecurity Tech Accord is the latest public relations effort by the private sector to show that they’re serious about making cyberspace a safer and more secure environment.For real this time.The accord comes on the heels of Google employees demanding that their company not be “in the business of war,” and earlier statements by the president of Microsoft calling for a digital Geneva Convention. In the immortal words of the bard: it is a tale of sound and fury, signifying nothing.Between citrus and cyberwarSilicon Valley is only the place is it today because of war, both hot and cold. It is easy to forget that the place now building Uber for dirty underwear, and streaming video of other people playing video games was also the home of Liberty Ships, the Polaris missile, and the armored personnel carrier among other martial technologies. Defense contracts funded early tech companies, including one of the biggest defense contractors in the world. Palatiar, which made Total Information Awareness a reality, is a child of the valley. Like it or not, the valley has played a key role in our nation’s ability to wage war since before transistors replaced fruit trees. Perpetuating legacy futuresGood wishes and aspirations captured on paper isn’t going to lead to progress. The tech accord is yet another attempt by people trained to think and act in the approved way to force legacy futures on a world that does not fit the old models. We have an actual Geneva convention that gets violated all the time. More countries have nuclear weapons today than had them before the non-proliferation treaty was in effect. Systems and methods built to deal with physical weapons will not work when applied to code, but it is far easier to go with what you know, regardless of whether that will get us where we want to be, or if it even makes sense.The distractionThe most amusing part of this entire exercise is the idea that the signatories are going to do anything of substance to bring about change. What are these firms pledging to do? Mount a stronger defense against cyberattacks. An admirable goal. Should we start with hardening your source code? What is the backlog of reported bugs for Windows, Oracle, Cisco, anyway?Not help governments launch cyberattacks. A useless gesture, considering the decision to launch cyberattacks is entirely in governmental hands. No corporate assistance or approval needed.Do more to…improve developer and user ability to protecting themselves. The NSA just released Unfetter for public use: what are the signatories offering the world that doesn’t come with licensing and maintenance fees?Build on existing relationships and establish new…partnerships with industry, civil society and security researchers. We know what major tech companies think of researchers, and we already have InfraGard, ISACs, ISAOs, the things like the Cyber Threat Alliance. If everyone is at a meeting, who is doing what needs to be done?When given the opportunity to reduce the risk of cyberattacks, most companies balk. The cybersecurity community makes a big deal out of the NSA losing some of its offensive tools, and rightfully so, but Microsoft would rather you forget that when their database of Windows bugs was hacked, timely disclosure wasn’t on the to-do list. The anti-virus industry, which loves to tout their ability to combat APT, would prefer you never hear that they helped fertilize those very threat actors.There is cyberwar because of Windows. There are targeting packages because of Facebook and LinkedIn. There are pathways into targets (and targets themselves) because of Cisco and Juniper. The best way these firms – all signatories to the Accord – can help defend cyberspace is to not make facilitating offense a feature.All thrust, no vectorWe all want to do something to improve the state of cybersecurity, but at what point do we stop being Heracles and start being Sisyphus? The amount and type of bad things that are happening in cyberspace on a regular basis is only growing in scope and scale, but there is no corresponding public outcry to do anything about it. You can’t get people to do the minimum it takes to influence policy after children are massacred in real life: do you think people are willing to do more or less when it comes to malicious activity online?We know what to do to counter threats, block attack vectors, and mitigate risk. We’ve known for decades. Every time we look at the problems we come up with the same solutions because the people responsible for the problems aren’t responding at scale and in a meaningful timeframe. Governments are only warring online because industry has built the environment for and provided the tools to wage it. Saying you’re against such activities absent some serious self-reflection is self-delusion.Accords and declarations and proclamations make people feel good, but they’re aimless motion, not forward progress. They’re what you do in the hopes that, if things get bad enough the powers that be – under the guise of leadership – will call on you to implement your politically familiar and acceptable solution. But until that day comes, what are you doing to make a difference now? Related content opinion It's only intelligence if you use it Threat intelligence can be valuable, if you actually have it and you’re prepared to make use of it. By Michael Tanji Apr 11, 2018 5 mins Security opinion The power of platforms In an age of information, the most dangerous dual-use technology is not kinetic. By Michael Tanji Mar 09, 2018 5 mins Technology Industry Cyberattacks Social Networking Apps opinion The global ungoverned area Looking at the Internet through Westphalian-tinted glasses is not going to make us safer or more secure. By Michael Tanji Feb 09, 2018 5 mins Cyberattacks Government Technology Industry opinion Listening to the echoes of cybersecurity history Advancing the cause of security means letting the lessons of the past inform our actions today. By Michael Tanji Jan 17, 2018 5 mins Technology Industry Cyberattacks Data and Information Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe