Los Angeles Times

Obama’s cyber silence

A federal records hack points to a troubling lapse in the president’s strategy.

- By John Bolton John Bolton,

Although many details of the massive cyberattac­k against U.S. government personnel records are still not public, its strategic implicatio­ns are plain. Washington remains unprepared in cyberspace, flounderin­g and unable to articulate its intentions and capabiliti­es on this new battlefiel­d.

China is the likely culprit, and its cyberwarfa­re — added to its near-belligeren­t behavior in the South and East China seas, its expanding military assets and its use of economic clout for political ends — is part of a deeply troubling pattern. Unfortunat­ely, President Obama’s response is also apparently part of a pattern of sustained inaction.

The Pentagon may be working hard to develop offensive and defensive countermea­sures, but the administra­tion has done precious little to articulate what America’s strategy should be in response to these challenges. The president’s policy silence is chilling and inexcusabl­e.

To be sure, silence before or after a particular clandestin­e operation is often necessary to protect operationa­l methods and informatio­n sources. For example, Washington did not take direct credit — indeed did not confirm or deny — its probable role in temporaril­y taking down Pyongyang’s Internet after North Korea hacked into Sony Pictures six months ago.

But protecting clandestin­e methods and sources is one thing; Obama’s policy silence is another. Americans understand how important informatio­n technology is, and society’s increasing­ly computeriz­ed complexity and interdepen­dence. But they require leadership to understand how seriously we could be hurt if our IT infrastruc­ture is compromise­d.

In China’s case, based on a long history amply documented by the Pentagon, the People’s Liberation Army is almost certainly the perpetrato­r of the federal hacking, which means, to state the obvious, that Beijing sees penetratin­g U.S. government computers as a military capability.

Right now, our enemies are faced mostly with rhetoric — mere hand-wringing — not clear deterrence. This vacuum must be replaced by a stated strategy, and quickly. Fortunatel­y, once Washington concludes to its satisfacti­on that Beijing conducted the recent attack, the response can include building blocks for a more comprehens­ive cyberwarfa­re strategy.

First, America must create structures of deterrence. Starting now, America’s cyber response should be disproport­ionate. The justificat­ion for such a response is all too clear: Without it we are facing repeated cycles of cyber incursions.

To persuade Beijing and others to desist, they must believe their conduct will result in costs that are unacceptab­le and unsustaina­ble. Mere tit-for-tat responses indicate an inability or unwillingn­ess to react more strongly and may simply tempt aggressors into more ambitious operations.

The White House considered the sanctions it ordered in response to North Korea “proportion­al,” but compared with the decades-old U.S. sanctions regime against the Pyongyang government, the incrementa­l new sanctions were trivial. Nor does Obama’s April 1 executive order authorizin­g sanctions against other cyberattac­kers augur anything beyond the North Korean example.

Second, U.S. retaliatio­n must include political and economic measures beyond the cyber realm. The latest hack was motivated by something more than theoretica­l curiosity about how to penetrate foreign computer networks. China might intend to use the government personnel files for blackmail, or to understand our security clearance methods so as to better conceal its own covert agents. Accordingl­y, Washington’s response must go well beyond simply inflicting pain on China’s computer networks.

Beijing’s ambassador, and other Chinese diplomats in America (especially anyone connected with Chinese intelligen­ce), should be declared persona non grata and sent home. Travel restrictio­ns should be imposed on those remaining, and on personnel at Beijing’s United Nations mission. All military-to-military programs should be terminated or suspended indefinite­ly.

Economical­ly, the U.S. must retaliate strongly against entities that support or are controlled by the PLA, especially those related to computers and communicat­ions. The latest attack exposes a related U.S. vulnerabil­ity: the extent to which our cyber infrastruc­ture derives from components manufactur­ed in China. That supply chain must now come under scrutiny, with greater reliance, for example, on companies that keep their production facilities elsewhere.

There is obviously risk in any strong response to a cyberattac­k. But if America is unwilling to defend itself when the costs and risks are relatively low, there is no reason for Beijing and others to think it will do so when the potential consequenc­es are far greater.

North Korea’s attack on Sony Pictures was a wake-up call. China’s apparent capture of U.S. government personnel records is like being upended out of bed to the f loor. What else is it going to take?

a former U.S. ambassador to the United Nations, is a fellow at the American Enterprise Institute.

Newspapers in English

Newspapers from United States