With looming threats of an open cyber war with Russia, U.S. President Barack Obama has moved to split the leadership of the NSA and the United States’ cyber warfare command. Obama supported made the following statement.
“While the dual-hat arrangement was once appropriate in order to enable a fledgling Cybercom to leverage NSA’s advanced capabilities and expertise, Cybercom has since matured to the point where it needs its own leader.”
While it is unclear whether on not the new President-elect, Donald Trump, would support this, Obama made it a priority in his 2017 defense authorization bill. While Cybercom is mostly responsible for disrupting the enemy’s network when ordered, NSA has traditionally held a more defensive role, by protecting the government’s classified documents. This split would see the two agencies work on more focused roles.
President Obama spoke last week about how the U.S. is more vulnerable to cyber attacks compared to Russia.
“Our economy is more digitized, it’s more vulnerable, partly because we’re a wealthier nation, and we’re more wired than other nations.”
Experts such as Austin Berglas, a former FBI agent turned cyber-security consultant at K2 Intelligence, also believe that the United States being a much more digitized society than Russia is more vulnerable to cyber attacks on critical infrastructure. Some experts, however, disagree with President Obama, pointing out that even though the United States is much more dependent on the internet, Russia is the weaker and more unstable country, something that could be advantageous to the U.S. Michael Hayden, former CIA director, points out how the U.S. could provide Russian citizens with software that can make it easier for them to speak against their government. Kenneth Geers, of NATO’s Cyber Center, agrees.
“Dictators may win cyber battles, but they will lose cyber wars.”
The fact remains that there are no clear precedents on how the U.S. should respond to a cyber attack. If such an attack were to result in any form of physical damage, leading to the destruction of an infrastructure or harm to American citizens, there would be a clear path to follow. But in situations of cyber attacks that don’t involve force, the democratic email hacks for instance, the U.S. remains unclear as on how to respond. By responding without proper analysis of the situation, the U.S. could risk the situation escalating to undesired levels.
Jason Healey, a Columbia University scholar, calls the election hacking one of the most serious kinds of conflict we’ve ever come across. And he doesn’t think the U.S.’s diplomatic tactics or sanctions against Russia are doing it any help.
“It’s clear Putin does not care about sanctions or other diplomatic means we might use to get him to back down.”
Russian President Vladimir Putin & U.S. President Barack Obama. [Image by Alexei Druzhinin, Sputnik, Kremlin Pool/AP Images]
The U.S. already maintains a strict sanction against Russia, and if it were to seek additional sanctions, Laura Galante, director of global Intelligence for FireEye, believes that Russia could start targeting American businesses as well. She believes that the Russians could hack “U.S. businesses and executives for reputation damage,” comparing the ramifications to the damages done to the Democratic Party during the election.
Some experts such as former NSA Computer Scientist, Dave Aitel, recommend that the only way to get the Russians to back down would be for the U.S. to show an aggressive response.
“Let’s turn off all the lights in Moscow, then turn them back on five minutes later. And do that every day at a certain hour. It’s scary with no collateral damage.”
Others have suggested a more quieter response — the U.S. target the hackers and shuts down their operation.
Either way, Frank Cilluffo of George Washington University’s Center for Cyber and Homeland Security believes that the U.S. needs to respond right away as not doing show may show a sign a weakness to the adversary.
“From a credibility perspective, we absolutely have no choice but to respond. Everyone is watching.”
[Feature Image by Profit_Image/Shutterstock]