Wednesday, September 16, 2020

Crumbling State of Liberal Democracy: Some reflections on the International Democracy Day 2020

This article is by

Share this article

Article Contributor(s)

Adnan Abbasi

Article Title

Crumbling State of Liberal Democracy: Some reflections on the International Democracy Day 2020

Publisher

Global Views 360

Publication Date

September 16, 2020

URL

Representative image of people raising question

Representative image of people raising question | Source: rawpixel.com via Freepik

The liberal democratic world order which was accepted as a preferred governance model in major parts of the world has been under assault by the increasing authoritarian leaders since the last few years. The monopolization of power by subverting the in-build checks and balances of the democratic institutions is now a new norm in even the large democratic countries like the  United States or India as well. The International Democracy Day, which falls on 15 September, gives us an opportunity to reflect on the present state of liberal democracy in the world.

Monopolization of Democratic Institutions

In recent years democratic institutions across the world have shrunk into the hands of a few.

In the United States, President Trump is interfering in the running of independent democratic institutions. John Torpy—American academic, sociologist, and historian—currently Professor at City University of New York—fears that US democracy under Trump is going under “swamps”. Mentioning about President Trump’s obstruction of the democratic institutions, he writes “As many people have noted, if the president can simply refuse to cooperate with Congressional requests for documents and witness testimony, we live not in a democracy, which requires that officials be accountable for their actions, but in an autocracy, in which the executive can make decisions without the possibility of oversight by others.”

Viktor Orban, the President of Hungary | Source: Elekes Andor via Wikimedia

In Hungary, democracy is on the proverbial deathbed. Hungarian President Viktor Orban—amidst COVID-19 pandemic—passed a bill in parliament granting his government access to emergency powers. This bill—which is now the law of the land in this European Union country—gives the absolute power to the executive without any checks by the parliament. Political commentators like Zoltan Cegledi argue “The government’s will to destroy, limit and exhaust democracy is permanent. Its future victims will be the remnants of autonomy.”

In India, lately the government scrapped the question hour from the parliament citing the spread of COVID-19. Leader of Opposition Ghulam Nabi Azad expressing his concern on the decision said "In a democracy, the government is answerable to people of India through Parliament and the Parliament comprises members of Parliament representing different states, political parties, and regions of this country. People of the country have no access or means to ask the question to the minister inside the Parliament. So, their representatives are the members of the Parliament. These MPs ask questions on behalf of people of India."

This is not the first time the government of India changed the rules for the conduct of those institutions where it may get questioned. The RTI Act gave people of India the right to seek information from the different institutions of the government (excluding the intelligence). In 2019, the Indian parliament passed an amendment to the Right to Information (RTI) Act of 2005, which is being criticized widely.

Prabhash K Dutta mentions in his article published on India Today that this amendment removes the fixture of duration for the five years for chief information commissioners as well as the information commissioners and altered their salaries, for both they will be separately notified by the government. He furthermore mentions “This, in a political sense, means that the government can threaten or lure the chief information commissioner and information commissioners with arbitrary removal or extension and curtailment or increase in salary depending upon their suitability for the ruling dispensation.”

Lady Justice: Allegorical personification of the moral force in judicial systems | Source: Tingey Injury Law Firm via Unsplash

In some countries, the executives are also interfering in the judicial process. President Andrzej Duda of Poland has lately signed a law that gives him power to appoint the judges as well as penalizes the judges of the court to question any appointments done by the President in the judiciary. Malgorzata Gersdorf—the president of Poland's Supreme court—termed it as “Muzzle Law”.

In Hong Kong as well, after the implementation of the New Security Law by the Mainland severely affects the independence of the judiciary and gives China-appointed Chief Executive the power to appoint judges in the “cases of security.”

In Egypt the government under Al Sisi has subverted the judicial system by expanding the scope of military courts. These courts  are directly controlled by the army (not the judiciary) and the defendants can neither access a lawyer nor are brought to a judge after the arrest.

Throttling the flow of information on internet

The assault on democratic discourse has extended to the internet, which has emerged as an important tool for easy and quick access of information. However the authoritarian streak in the ruling establishments do not not want the information to spread so fast.

Anti CAA Protest in Assam, India | Source: Ankur Jyoti Dewri via Wikimedia

An apt example is the widespread shut down of the internet during the time of protest against the Citizenship Amendment Act (CAA) across India. These shutdowns were not only to gag the Anti-CAA protestors but also unconstitutional according to the law of the land.

In Indian province of Kashmir, the internet was totally shut down for almost 5 months from 5th August 2019. The services were later restored but even today, 16th September, 2020 there is no access to the high speed internet in the region.

In some other countries like Belarus and Ethiopia, as well, the government resorted to shutting down the internet during the public protests.

Similarly the popular social media platforms like facebook, twitter, reddit, and many others which are used to freely share information, are restricted or banned in many countries.

This all happened in 2019-20 despite the United Nations General Assembly (UNGA) resolution stating that cutting access to the internet violates  article 19, paragraph 3, of the International Covenant on Civil and Political Rights back in 2011.

Suppressing the dissidents

Anti Al-Sisi protests in London | Source: Alisdare Hickson via Flickr

In Egypt, the government is resorting to Military Court trials, and ditching the normal judicial system. The detainees are put under inhumane conditions (people tried here are mostly the dissidents against the government). Vanshita Banuana from Global Views 360 writes “There have been multiple reports of torture, sexual assault while placed in detention. In prison too, detainees face inhumane conditions, not being allowed to see family, exercise or get sunshine and fresh air. Thousands of student protestors, journalists and political dissidents have been tried in these military courts, and hundreds more have been killed extrajudicially. At the same time, citizens’ tools to criticise these steps are undermined, such as by limiting the domain of NGOs, censoring news and social media, and blocking around 600 websites.”

In India the government uses many draconian laws to suppress activists working for the marginalised communities. The Unlawful Activities Act (UAPA) is the most controversial and draconian law which is being used frequently by the government to curb the dissenting voices.

Indian government, as a part of its ambitious smart city project, is installing CCTV camera systems in the major towns across India. The footage from these cameras along with the AI based facial recognition technology is a deadly combination for curbing dissidence. Privacy experts like Arun Mohan Sukumar fear “If you don’t have adequate checks and balances, there’s a high chance the government will be tempted to use the data for highly dubious purposes.”

A ray of hope

As Victor Hugo said “When Dictatorship Is A Fact, Revolution Becomes A Right.” The people across the world have started speaking up against the assault on democratic values and institutions. They face hardship, vilification, and incarnation but remain committed to fight for the protection of liberal democracy. This gives us hope that the liberal democracy will ultimately prevail as it is what Abraham Lincoln described, “The government of the people, by the people, and for the people.”

Support us to bring the world closer

To keep our content accessible we don't charge anything from our readers and rely on donations to continue working. Your support is critical in keeping Global Views 360 independent and helps us to present a well-rounded world view on different international issues for you. Every contribution, however big or small, is valuable for us to keep on delivering in future as well.

Support Us

Share this article

Read More

February 4, 2021 5:20 PM

SolarWinds Attack and its implication for U.S. Security: Sabotage or espionage?

SolarWinds, a publicly listed Texas-based company with a value of more than $6 billion, has a very reputed customer list including multiple U.S. government agencies. The company develops softwares for businesses and agencies to help manage and monitor their networks, systems and  IT infrastructure. The company is a service provider to over 425 of the Fortune 500 companies, top 5 U.S. accounting firms, all major U.S. telecom providers, the U.S. treasury, several global universities and educational institutions, the NSA and the White House.

A set of hackers managed to sneak a malicious code into the software update of SolarWinds for a tool called “Orion”. Earlier, in 2020, the hackers had injected malware into the updates of Orion which were released between March and June of 2020. On 5th of Jan, 2021, the Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure security Agency (CISA), the Office of the director of National Intelligence (ODNI) and the National Security Agency (NSA) made an official joint statement stating, "an Advanced Persistent Threat (APT) actor, likely Russian in origin, is responsible for most or all of the recently discovered, ongoing cyber compromises of both government and non-governmental networks". U.S. government agencies like The Pentagon, National institute of Health, FBI, DHS, the Department of Energy and the Department of Veterans affairs were some significant users of Orion. In fact, in August 2020, the Department of Veterans affairs renewed its Orion license in a 2.8-million-dollar order. The Department of Veterans affairs has been heavily involved in COVID-19 relief.

The Orion hack began as early as March 2020. Over 18,000 customers had installed the compromised software which implies that these customers were vulnerable to spy operations throughout 2020. The malware inserted in the updates provided remote access of an organization’s network to the elite hackers. Since the malware was undetected for months, it gave the hackers an opportunity to obtain information from their targets. In fact, the hackers could also monitor emails and other internal communications. FireEye, the cybersecurity company who were the first to discover the breach describes the capability of the malware, from initially lying dormant up to two weeks, to hiding in plain sight by masquerading its investigation as “Orion Activity”. In 2016, Russian Military hackers used a method called “supply chain” to infect companies performing business in Ukraine with a hard-drive wiping virus called NotPetya. This attack is considered to be one of the most damaging cyber-attacks till date. The infiltration tactic used in the current hack is also identified to be similar to the “supply chain” method.

The Orion software framework contained a backdoor that communicated via HTTP to third party servers. Cybersecurity firm, FireEye has been tracking the trojanized version of Orion plug-in as SUNBURST.

FireEye Logo

FireEye described the use of SUNBURST backdoor on one of its blogs published on 13th December 2020. It stated,

“After an initial dormant period of up to two weeks, it retrieves and executes commands, called “Jobs”, that include the ability to transfer files, execute files, profile the system, reboot the machine, and disable system services. The malware masquerades its network traffic as the Orion Improvement Program (OIP) protocol and stores reconnaissance results within legitimate plugin configuration files allowing it to blend in with legitimate SolarWinds activity. The backdoor uses multiple obfuscated blocklists to identify forensic and anti-virus tools running as processes, services, and drivers.”

FireEye described the attack through the SUNBURST backdoor as “highly evasive”. Meanwhile, SolarWinds is facing a class action lawsuit filed by a stakeholder of the IT Infrastructure Management software company in the U.S. District Court for the Western District of Texas on 4th Jan 2021. The lawsuit is filed against SolarWinds’ ex-president, Kevin Thompson and chief financial officer, J. Barton Kalsu on the grounds of violating Federal Securities laws under Securities Exchange Act of 1934. The complaint states that SolarWinds Company failed to disclose that "since mid-2020, Orion monitoring products had a vulnerability that allowed hackers to compromise the server upon which the products ran". The complaint also mentioned that SolarWinds update server had a fairly weak and easily accessible password, ‘solarwinds123’.

Microsoft’s internal security research team found evidence that the same hackers had accessed some internal source code in their company’s systems. Microsoft mentioned that the attempted activities were beyond just the presence of malware SolarWinds code in their environment. Microsoft has “an open source like culture” which allows teams within Microsoft to view the source code. The company acknowledges that it is a threat model but they are downplaying the risk by saying “just viewing the source code should not cause any elevated risk”.

The Russian Hackers have also managed to breach the network of Austin City, Texas. The breach dates back to at-least mid of October 2020. The hackers have seemed to target the U.S. Treasury, Departments of Commerce and Homeland Security, The Pentagon, Cybersecurity firm FireEye, and SolarWinds. The breach of the network of the Austin city is an apparent win for Russian hackers. Theoretically, the compromise could have helped them access sensitive information in accordance with the city governance, elections, city police and by excavating deeper, the hackers can practically burrow inside energy, water and airport networks of the city.

Berserk Bear, the hacking outfit that is currently believed to be behind Austin’s breach appears to have used Austin’s network as grounds to stage larger attacks. Berserk Bear also known as BROMINE inter alia several names is believed to have been responsible for a series of breaches of significant U.S. infrastructures in the past year.

The attacks on SolarWinds, U.S. government and FireEye have been linked to another Russian group called APT29 also popularly known as Cozy Bear. Berserk Bear is allegedly a unit of Russian federal Security Service (FSB). Cozy Bear is known to be affiliated with the Russian Foreign Intelligence Service, or SVR. FSB and SVR are considered to be successors of the Committee of State Security of the Soviet-era which was widely known as the KGB.

The Austin Council seems to have been aware of the breach from October 2020. The FBI and CISA had published an initial advisory warning of “advanced persistent threat actors” (APTs) on October 9th, 2020. The advisory warned the city council of APTs targeting state and local governments. On October 22nd, a follow-up advisory was published in which both agencies accredited the breach to Berserk Bear. CISA published a heat map listing the types of organizations that were breached, scanned or targeted by Berserk Bear. The reputation of Berserk Bear of lurking fit their common pattern of espionage-oriented attacks. Sami Ruohonen, a researcher at Finnish cybersecurity firm F-Secure said that the adversaries have already been in the network for more than a couple of months before someone discovers their existence. Ruohonen also mentioned that this technique is specially preferred by APT groups because, the longer they go unnoticed, the longer they have a remote access to the network. F-Secure, in a report published in 2019, compared Berserk Bear and similar groups to the cyber equivalent of sleeper cells.

The cybersecurity experts have warned Austin city and the U.S that Berserk Bear hackers are not just involved in espionage and sabotage. They can gear up at any moment and create havoc in the United States. These Russian Hackers can cause city blackouts, disturbance in water supply and can even disrupt COVID-19 relief. Vikram Thakur, a technical director at Symantec who has tracked Berserk Bear for years quotes,  “We should be cognizant of the level of information that they have, turning on valves or closing valves, things of that sort — they have the expertise to do it.”

Kevin Thomson, the ex-CEO of SolarWinds | Source: SolarWinds Facebook

SolarWinds replaced their ex-CEO Kevin Thomson with Mr Sudhakar Ramakrishnan. Unlike his predecessor Thomson, who is an accountant by training, Ramakrishnan comes from a security background having led Pulse Secure in the recent past. The new CEO publicly stated that the company will be making 5 critical changes to put security front and center. The company also hired ex-CISA chief Chris Krebs and Facebook’s former security lead, Alex Stamos. Krebs and Stamos work as independent consultants to help the company coordinate its crisis response. Krebs told the Financial Times that it could even take years to uncover the full extent of the hack. On the brighter side, the new CEO mentioned that the company has engaged several cybersecurity experts to assist SolarWinds in its efforts to become more secure.  We can hope that, with better expertise, vision and understanding of threat and vulnerability management, the company is now headed towards a better future.

Read More