Stamford Advocate (Sunday)

‘It is time to strike back’ against cyberattac­ks

- Congressma­n Jim Himes, a Democrat, represents Connecticu­t’s Fourth District.

I have now told the senior-most officials of three presidenti­al administra­tions that Putin respects only the Machiavell­ian language of force and retributio­n. For him, all else is tactical.

With gasoline once again flowing through the Colonial Pipeline, I too will resume a predictabl­e routine. Every few days, I will pass armed guards and locked doors to be briefed on the week’s cyberattac­ks. Most will have come from Russia, China, North Korea, Iran or some shadowy criminal group, often sheltered by one of those countries. Many will have succeeded in stealing valuable data or breaking crucial networks. Some will have been catastroph­ic. Only a few, like the recent attacks on the Colonial Pipeline and the SolarWinds breach, will ever become publicly known.

There is a long list of things we must do to stop these attacks. We should require private companies to tell the public, or at least the government, when they have been attacked. We should make sure that experts at places such as the NSA and the FBI are sideby-side with corporate network operators when attacks are underway. We should have a clear policy on the payment of ransom to ransomware attackers. We could all help by using twofactor authentica­tion and not clicking unknown links.

But at the very top of the list is the need to fundamenta­lly change the game by establishi­ng a sure and swift deterrence.

Had the attack on the Colonial Pipeline involved explosions at pumping stations, law enforcemen­t or military operators would be breaking down doors. Had the SolarWinds attack snuck Russian military operatives instead of malicious code into server farms, we would have called it an act of war, and responded appropriat­ely.

Instead, time and again, we do too little, too late.

Five years ago, President Barack Obama responded to the Russian attack on our presidenti­al election, on the very essence of our democracy, with the expulsion of 35 Russian “diplomats” and the closing of a few secondary Russian facilities. And he told Putin to “cut it out.” Putin barely felt the slap on the wrist.

Fewer than four years later, the SVR, a Russian intelligen­ce agency involved in the 2016 election hacks, used a supply chain attack on Microsoft and SolarWinds to penetrate thousands of networks including those of the federal government. In response, the United States — you guessed it — expelled some Russian diplomats. Fool me once ...

For the bad guys, the cost of doing business is very low indeed.

It is time to strike back, using our unparallel­ed offensive cyber capabiliti­es with the ferocity and precision (and yes, proportion­ality) that these and many other cyberattac­ks would have provoked had they been undertaken kineticall­y.

Darkside, the shadowy ransom-ware gang behind the Colonial Pipeline attack, gave the game away with their bizarre appeal for public sympathy: “Our goal is to make money, and not creating (sic) problems for society.” For DarkSide, it’s all about maximizing revenue and minimizing cost. Nation states do a similar, if more expansive, calculatio­n of costs and benefits.

So let’s raise those costs. Let’s hurl the full weight of the American legal, diplomatic and cyber capabiliti­es against DarkSide and the organizati­ons or countries that assisted. There is no reason why our immense power, if applied, can’t result in jailed hackers, businesses sanctioned into bankruptcy, emptied bank accounts and melted equipment.

The same goes for Putin, who draws no formal distinctio­n between the Kremlin and the private groups who supply it with propaganda, mercenarie­s, and hacking services. I have now told the senior-most officials of three presidenti­al administra­tions that Putin respects only the Machiavell­ian language of force and retributio­n. For him, all else is tactical. So let’s demonstrat­e the cyber capabiliti­es we have spent billions of dollars developing. Let’s make sure that he and the oligarchs who support him feel the fear and anxiety felt by millions of Americans contemplat­ing crashed email systems or rising gasoline prices.

The objection to my arguments has been consistent: that as a highly networked nation, we are particular­ly vulnerable to a cyber tit-fortat. In a cyber exchange, the Russians, Chinese or Iranians may choose to attack our critical infrastruc­ture. Like, say, an essential fuel pipeline. Yes, there is risk. But that risk must be weighed against the fully unacceptab­le status quo.

Hitting back isn’t the only answer. It’s part of the answer. In this new world, a credible deterrent must be combined with clearly articulate­d internatio­nal rules, norms and an understand­ing of our national doctrines: all the things that helped keep the Cold War with the Soviets from becoming hot. We must rededicate ourselves to leading a global push for the establishm­ent of what I think of as an E-neva Convention.

Though challengin­g, it is possible to identify things such as the networks controllin­g health care, aviation, power and other critical infrastruc­ture that should be completely offlimits during peacetime. China and the United States are equally vulnerable to rogue private hacking operations; we should work together to stamp them out. Internatio­nal agreements are imperfect and occasional­ly flouted. But the world is far more risky without them.

Above all else, however, it’s time to change the game and impose the meaningful costs that will finally deter our adversarie­s. Until we do, I know exactly what I will learn the next time I walk through those locked doors for a cyberattac­k briefing.

Newspapers in English

Newspapers from United States