National Post

The new Cold War

- Derek H. Burney National Post Derek H. Burney is the co- author of Braver Canada: Shaping Our Destiny in a Precarious World, published by Mcgill- Queen’s in 2020.

If grappling with a contentiou­s presidenti­al transition, a spiralling COVID-19 crisis and the president’s last- minute brinkmansh­ip on pandemic aid and defence spending were not sufficient­ly challengin­g, reports of a major hack that compromise­d several government agencies and thousands of private companies sent a severe shock wave through America’s national security network.

The attacks began in March and are regarded as the most extensive security breach in American history. It shows the rivalry between major powers in cyberspace is becoming a more ominous, 21st-century version of the Cold War.

In the murky world of cybersecur­ity, one rarely gets full details about the extent of the damage or about what would be the most appropriat­e response. Those being attacked are usually reluctant to publicly acknowledg­e what has been compromise­d, while the perpetrato­rs, for very different reasons, are unlikely to make public what they did or why. It is a cat- and- mouse game between offenders and defenders, but those on the offence seem to be winning.

The revelation­s are embarrassi­ng given that, in February 2020, Gen. Paul Nakasone, head of the National Security Agency and the United States Cyber Command, said that U. S. teams were “understand­ing the adversary better than the adversary understand­s themselves.” Little did he know what was about to happen one month after he made those remarks.

Adding to the confusion are reports that, just before President Donald Trump fired its leader, Chris Krebs, the federal Cybersecur­ity and Infrastruc­ture Security Agency ( CISA) was repeatedly criticized by the Homeland Security Department’s watchdog for “poor intelligen­ce sharing with its private and public partners and weak informatio­n security for its own system.”

Equally concerning were reports of CISA’S failure to ensure the physical security of polling locations, in sharp contrast to Krebs’ assertion that the 2020 elections were the “safest and most secure in history,” a boast that prompted his firing.

What we do know is that problems emerged when computer users downloaded an update for network monitoring software developed by Solar Winds, a company with an enormous customer base. It was a textbook supply chain attack. The hackers implanted malicious code into the company’s regular software updates, creating a potential backdoor into any of its tens of thousands of customers’ networks.

The hack is unique in scope and ran without being noticed for nine months. Only a handful of organizati­ons, including the cybersecur­ity company Fireeye and three federal agencies — the department­s of commerce, energy and treasury — have publicly admitted to being seriously affected. State and Homeland Security were also vulnerable.

While Solar Winds has since updated its software, the hackers’ nine-month head start means they likely built additional entry points into networks that they deemed important. “Just because you closed the intrusion doesn’t mean that you solved the problem,” observed Neil Jenkins, the chief analytic officer of the Cyber Threat Alliance. Yet to be explained is why the attack went undetected for nine months.

Victimized organizati­ons now have to choose between two unpleasant options: spending significan­t resources searching through their computers in the hope that they can eradicate the hackers’ footholds, or rebuilding their networks from scratch.

Secretary of State Mike Pompeo and Attorney General William Barr, along with U. S. intelligen­ce officials, pointed clearly to Russia as the culprit, suspecting that the hacking was most likely driven by

Russia’s SVR intelligen­ce agency, though Russia has denied it.

President Trump, meanwhile, downplayed the “exaggerate­d” media reports, saying the situation was “under control,” a claim that president-elect Joe Biden flatly dismissed. Trump also declared, without offering specifics, that China, rather than Russia, “may” have been behind it.

It may take years to unravel the extent of the damage. But what is certain is that America’s defence capability is demonstrab­ly inadequate. That is why the most urgent task will be to tighten lines of responsibi­lity and accountabi­lity for defending against foreign intrusions. ( There is also a need for similar improvemen­ts in Canada’s cybersecur­ity monitoring.)

Once forensic evidence is collected to confirm the perpetrato­r, the next task will be to make clear that intrusions of this magnitude will not go unpunished, in order to deter future attacks from Russia, or other unsavoury countries like China, Iran and North Korea.

The president- elect was quick to fault the Trump administra­tion for not prioritizi­ng cybersecur­ity. He described digital threats as being “among the most grave problems facing America.” Biden has already assured the hackers that there will be “substantia­l costs” and that America “will respond, and probably in kind.”

Senators on both sides of the aisle underscore­d Biden’s call for a swift response. Republican senators Marco Rubio and Mitt Romney asserted that America must retaliate and “not just with sanctions.” In fact, given those already in place, there is not much scope for additional economic sanctions against Russia. Democratic Sen. Dick Durbin of Illinois called the hack a “virtual declaratio­n of war.”

Given the decrepit state of the Russian economy, targeting Russian corporatio­ns would not produce comparable economic damage. Instead, the Foundation for Defense of Democracie­s, a Washington, D. C.- based think- tank, suggested the U. S. strike back by hacking and releasing informatio­n about President Vladimir Putin’s personal wealth, in an attempt to shame him into halting digital attacks against the United States.

Shining a light on government corruption and exposing how much money foreign leaders have stashed away could be damaging in authoritar­ian countries like Russia and China. The ultimate goal would be to make cyberspace more peaceful rather than simply punching back in anger.

Others believe that the U. S. should overtly disrupt Russia’s security and infrastruc­ture networks. But that could escalate the situation even further.

Russia is aggressive­ly positionin­g itself to confront the new Biden administra­tion. Deputy Foreign Minister Sergei Ryabkov stated recently that Russian- U. S relations are “going from bad to worse,” and that Russia does not expect “anything good” from the new president. He suggested a policy of “total deterrence” toward Washington, with minimal dialogue.

Putin often extols the spies who hack into U. S agencies. Laying a wreath at the SVR monument on Dec. 27, Putin praised the work of SVR officials as “extremely important,” noting “the difficult profession­al operations that have been conducted.” Such words suggest that the prospects of engaging in a constructi­ve dialogue with his government are slim.

President Biden will be obliged to deal with the fallout from the latest cyberattac­k as one of his first orders of business. How he chooses to respond will be watched carefully by allies and adversarie­s alike, and will be an early, critical test of the new administra­tion’s leadership mettle.

russia is positionin­g

itself to act against

biden’s government.

— derek h. burney

a major hack in late 2020 might have opened the next chapter.

 ?? BRENDAN SMIALOWSKI / AFP via Gett y Imag es files ?? Russian President Vladimir Putin and U. S. President Donald Trump at the G20 summit in 2019. There is nothing to suggest an administra­tion change will ease tensions between the two superpower­s.
BRENDAN SMIALOWSKI / AFP via Gett y Imag es files Russian President Vladimir Putin and U. S. President Donald Trump at the G20 summit in 2019. There is nothing to suggest an administra­tion change will ease tensions between the two superpower­s.

Newspapers in English

Newspapers from Canada