Kuwait Times

US no longer has geography as defense, ally in cyber combat

‘It’s our geeks versus their geeks’

-

The United States has long relied on its borders and superior military might to protect against and deter foreign aggressors. But a lack of boundaries and any rulebook in cyberspace has increased the threat and leveled the playing field today.

It’s unclear how President Donald Trump, who has emphasized an “America First” approach to domestic issues, will respond to cyberspace threats, which transcend traditiona­l borders and make it easier and cheaper than ever for foreigners to attack the US Whatever the approach, it will set the tone and precedent for global policies during a critical time when the ground rules are still being written.

At a hearing this month on foreign cyberthrea­ts, the chairman of the Senate Armed Services Committee, Sen John McCain, R-Ariz, ran through a list of recent operations the US believes was carried out by foreign countries Russia, China, Iran and North Korea. The targets: the White House, State Department, Office of Personnel Management, Joint Chiefs of Staff, Navy, major US financial institutio­ns, a small New York dam and Sony Pictures Entertainm­ent Inc. “Our adversarie­s have reached a common conclusion, that the reward for attacking America in cyberspace outweighs the risk,” McCain said.

With most of the US critical infrastruc­ture in private hands and Americans among the most connected citizens in the world, the potential attack surface for any hacker is vast and increasing. U.S. officials and lawmakers have argued that because there is no official policy on cyberwarfa­re, the response to any attack can be slow, politicize­d and ultimately ineffectua­l. The US took two months, after publicly accusing Russian government hackers of trying to influence the presidenti­al election, to respond with economic sanctions and other more symbolic measures.

Informatio­n space

The reality is that the “nature of conflict has moved to the informatio­n space instead of just the physical kinetic space, and it now operates at greater scale and quicker speed,” said Sean Kanuck, who served as the first US national intelligen­ce officer for cyber issues in the Office of the Director for National Intelligen­ce. Under the Obama administra­tion, the US proposed internatio­nal cyber rules for peacetime, including that countries should not target another’s critical infrastruc­ture. But otherwise, it has maintained existing internatio­nal laws and reserved the right to respond to any cyberattac­k.

The Trump administra­tion is reviewing cyber policies, but it has said it will prioritize developing defensive and offensive cyber capabiliti­es. It has also said it will work with internatio­nal partners to engage in “cyberwarfa­re to disrupt and disable (terrorist) propaganda and recruiting.” Unlike convention­al warfare, the costs in cyberspace can have rippling impacts for both the victim and attacker. Malicious software may end up spreading in an unforeseen and unplanned manner, and a hacker who gets into a single computer can cause unpredicte­d effects to a network.

“Look at what North Korea did to Sony or what China did to us via the OPM hack,” said David Gioe, a history fellow at the Army Cyber Institute at West Point and a former FBI agent. “You’ve got all of these aircraft carriers and all of this ocean, and it really doesn’t matter because we’re still feeling effects. They’re not kinetic effects, but they’re surely effects.” More than 20 million people had their personal informatio­n compromise­d when the Office of Personnel Management was hacked in what the US believes was a Chinese espionage operation.

“Really it’s our geeks versus their geeks,” Gioe said. “In the same way as single combat. It doesn’t matter how good my army is or your army is, it’s me versus you.” — AP

 ??  ?? IDAHO FALLS: In this Sept 30, 2011, file photo, a reflection of the Department of Homeland Security logo is seen reflected in the glasses of a cyber security analyst in the watch and warning center at the Department of Homeland Security’s secretive...
IDAHO FALLS: In this Sept 30, 2011, file photo, a reflection of the Department of Homeland Security logo is seen reflected in the glasses of a cyber security analyst in the watch and warning center at the Department of Homeland Security’s secretive...

Newspapers in English

Newspapers from Kuwait