The Sentinel-Record

‘SolarWinds’ an act of espionage, not war

- David Ignatius Copyright 2020, Washington Post Writers group

WASHINGTON — One simple way to think about the threat posed by Russian intelligen­ce in its “SolarWinds” hack is that it exposed the vulnerabil­ity of the vast store of supposedly secure personal and corporate data known as the “cloud.”

This wasn’t an attack on classified systems or a sabotage mission, from what we know. Loose talk by Sen. Richard Durbin, D-Ill., calling it “virtually a declaratio­n of war” is misplaced. This appears to have been an especially intrusive version of cyberespio­nage, which government­s conduct routinely around the world.

But make no mistake: The

SolarWinds hack, named for the company whose widely used network software was manipulate­d to plant malware, was a scary snapshot of today’s Internet — a world where personal privacy has all but vanished and nation states or private actors can penetrate systems and steal data almost at will. If you’re used to thinking of the United States as a fortress, forget it. Our informatio­n space has become the terrain where people fight their cyberwars: We’re the Internet version of Belgium or Lebanon, trampled by so many armies of manipulati­on.

An interestin­g fact about this hack is that private companies seem more agitated about it than do the cyberwarri­ors at the Pentagon. Brad Smith, the president of Microsoft, called the SolarWinds hack “an act of recklessne­ss” and a “moment of reckoning.” A more cautious assessment came from an official familiar with the thinking of U.S. Cyber Command, who was reluctant even to call it an attack, describing it instead as “espionage” and “below the level of conflict.” The official cautioned in an interview: “To respond to espionage as an act of war might be disproport­ionate.”

Was this a failure of the U.S. approach to cyberwar, a strategy described as “persistent engagement” by Gen. Paul Nakasone, the head of both Cyber Command and the code-breaking National Security Agency? I think not. Instead, I believe it underlines the reality of Nakasone’s premise in framing that doctrine two years ago — that the world is in a constant state of low-level cyber conflict, and the United States needs to “defend forward” so it can deter real acts of war, like disabling the power grid, by threatenin­g similar actions.

Why wasn’t the SolarWinds hack discovered sooner, so preventive action could have been taken? That’s the real question, and it involves whether government and the private sector can cooperate better in cyber counteresp­ionage.

What’s really happening here, I suspect, is a problem very familiar for the United States — a failure to “connect the dots” and share informatio­n between silos. Glenn Gerstell, a former NSA general counsel, noted in an interview that the Department of Homeland Security was apparently aware last summer that the Russians were probing the “Einstein” system that supposedly protects unclassifi­ed “dot-gov” systems. But that informatio­n didn’t trigger action by the FBI, NSA or Cyber Command or other agencies that might have identified and stopped the hack. Answer: That’s not their turf, but DHS’. As Gerstell told me: “There’s no one place in the U.S. government where all the foreign intelligen­ce gets merged with the domestic cyber hints and turned into action.”

Connecting the dots should also involve private companies. Smith put it bluntly in his blog post last week: Cybersecur­ity threats “require a unique level of collaborat­ion between the public and private sectors.” Private companies may be the first to spot malware breaches, and, as Smith argues, “effective cyberdefen­se requires not just a coalition of the world’s democracie­s, but a coalition with leading tech companies.”

To understand why tech companies are so concerned, check out the Cybersecur­ity Advisory issued by the NSA last week warning that attackers are “abusing trust” by using forged credential­s “to access protected data” in the cloud. The NSA warned that these hacking tools “subvert the mechanisms that the organizati­on uses to grant access to cloud and on-premises resources and/or to compromise administra­tor credential­s with the ability to manage cloud resources.” Yikes!

Fortunatel­y, this is the rare crisis where the needed reforms have just been enacted into law — too late to stop the SolarWinds hack, obviously, but perhaps in time to prevent the next one. The National Defense Authorizat­ion Act passed last week contained 26 amendments from the blue-ribbon Cyberspace Solarium Commission’s report last March, including a new White House cyber director and a new threat-hunting team at the Department of Homeland Security.

“We can’t patch our way out of the risk,” argued Sen. Angus King, I-Maine, one of the co-chairs of the commission, in an interview Tuesday. New laws will encourage the “layered deterrence” the commission recommende­d. And if other tech companies follow the lead of Microsoft and find ways to work with democratic government­s, we might have a better chance of protecting the security of our data — which was so ravaged in the latest assault.

 ??  ??

Newspapers in English

Newspapers from United States