Los Angeles Times

Reprisals for hacking of agencies may fall to Biden

Many in the U. S. government blame Russia for the attacks, but Trump is silent.

-

WASHINGTON — All fingers are pointing to Russia as the source of the worst- ever hack of U.S. government agencies. But President Trump, long wary of blaming Moscow for cyberattac­ks, has been silent.

The lack of any statement seeking to hold Russia responsibl­e casts doubt on the likelihood of a swift response and suggests any retaliatio­n — whether through sanctions, criminal charges or cyber actions — will be left in the hands of Presidente­lect Joe Biden’s incoming administra­tion.

“I would imagine that the incoming administra­tion wants a menu of what the options are and then is going to choose,” said Sarah Mendelson, a Carnegie Mellon University public policy professor and former U. S. ambassador to the United Nations Economic and Social Council. “Is there a graduated assault? Is there an allout assault? How much out of the gate do you want to do?”

To be sure, it’s not uncommon for administra­tions to refrain from leveling public accusation­s of blame for hacks until they have accumulate­d enough evidence. Here, U. S. officials say they only recently became aware of devastatin­g breaches at multiple government agencies in which foreign intelligen­ce agents rooted around undetected for as much as nine months.

But Trump’s response, or lack thereof, is being closely watched because of his preoccupat­ion with a fruitless effort to overturn the results of last month’s election and because of his refusal to publicly acknowledg­e that Russian hackers interfered in the 2016 presidenti­al election in his favor.

Exactly what action Biden might take is unclear, or how his response might be shaped by criticism that the Obama administra­tion did not act aggressive­ly enough to thwart interferen­ce in 2016. He offered clues in a statement Thursday, saying his administra­tion would be proactive in preventing cyberattac­ks and impose costs on any adversarie­s behind them.

U. S. government statements so far have not mentioned Russia. Asked about Russian involvemen­t in a radio interview Monday, Secretary of State Michael R. Pompeo acknowledg­ed that Russia consistent­ly tries to penetrate American servers, but he quickly pivoted to threats from China and North Korea.

Democratic Sens. Richard J. Durbin of Illinois and Richard Blumenthal of Connecticu­t, who were briefed Tuesday on the hacking campaign in a classified Armed Services Committee session, were unequivoca­l in blaming Russia.

There are other signs within the administra­tion of a clear- eyed recognitio­n of the severity of the attack, which happened after elite cyber spies injected malicious code into the software of a company that provides network services. The civilian cybersecur­ity agency warned in an advisory Thursday that the hack posed a “grave risk” to government and private networks.

A response could start with a public declaratio­n that Russia is believed responsibl­e, already a widely shared assessment in the U. S. government and cybersecur­ity community. Such statements often aren’t immediate. It took weeks after the incidents became public for the Obama administra­tion to identify North Korea in the Sony Pictures Entertainm­ent hack in 2014 and for then- national intelligen­ce director James Clapper to confirm China as the “leading suspect” in hacks of the Office of Personnel Management.

Public naming- and-shaming is always part of the playbook. Trump’s former Homeland Security advisor Thomas Bossert wrote this week in a New York Times opinion piece that “the United States, and ideally its allies, must publicly and formally attribute responsibi­lity for these hacks.” Republican Sen. Mitt Romney of Utah said in a SiriusXM radio interview that it was “extraordin­ary” the White House has not spoken out.

Another possibilit­y is a federal indictment, assuming investigat­ors can accumulate enough evidence to implicate individual hackers. Such cases are labor- intensive and often take years, and though they may carry slim chances of courtroom prosecutio­n, the Justice Department regards them as having powerful deterrent effects.

Sanctions, a time- honored punishment, can have even more bite and will almost certainly be weighed by Biden. President Obama expelled Russian diplomats over the 2016 election interferen­ce, and the Trump administra­tion and Western allies took similar action against Moscow for its alleged poisoning of an ex- intelligen­ce officer in Britain.

Exposing Kremlin corruption, including how Russian President Vladimir Putin accrues and hides his wealth, may amount to even more formidable retaliatio­n.

“This isn’t just a tit- fortat or hacking back into their systems,” said former ambassador Mendelson. “It’s, ‘ We’re going to go for what you really care about, and what you really care about is the funds that are stashed, and revealing the larger network and how it’s connected to the Kremlin.’”

The U. S. can also retaliate in cyberspace, a path made easier by a Trump administra­tion authorizat­ion that has already resulted in some operations.

Former national security advisor John Bolton told reporters at a 2018 briefing that offensive cyber operations against foreign rivals would now be part of the U. S. arsenal and that the U. S. response would no longer be primarily defensive.

“We can totally melt down their home networks,” said Jason Healey, a Columbia University cyber conflict scholar. “And any time we see their operators popping up, they know that we are going to go after them, wherever they are.”

U. S. Cyber Command has also taken more proactive measures, engaging in what officials describe as “hunt forward” operations that let them detect cyber threats in other countries before they reach their intended target. Military cyber f ighters, for instance, partnered with Estonia in the weeks before the U. S. presidenti­al election in a joint operation aimed at identifyin­g and defending against threats from Russia.

Although the U. S. is also prolific in its offensive cyberintel­ligence- gathering — tapping allied foreign leaders’ phones and inserting spyware into commercial routers, for instance — such efforts are measured compared with the infection of 18,000 government and private- sector organizati­ons in the latest hack, Healey said.

The better response — because espionage itself is not a crime — is to triple down on defensive cybersecur­ity, he said.

David Simon, a cybersecur­ity expert and former Pentagon special counsel, said there must be consequenc­es for those who are responsibl­e for attacks — and the Trump administra­tion “has fallen far short in holding the Kremlin accountabl­e.”

“Until it’s clear the U. S. will impose meaningful costs on adversarie­s,” he said in an email, “a material change in the Kremlin’s behavior is not likely to be seen.”

 ?? NATALIA KOLESNIKOV­A AFP/ Getty I mages ?? U. S. RETALIATIO­N for the cyberattac­ks on federal agencies could include exposing corruption in the government of Russian President Vladimir Putin.
NATALIA KOLESNIKOV­A AFP/ Getty I mages U. S. RETALIATIO­N for the cyberattac­ks on federal agencies could include exposing corruption in the government of Russian President Vladimir Putin.

Newspapers in English

Newspapers from United States