Subscribe free to our newsletters via your




CYBER WARS
Obama struggles for deterrence amid wave of cyberattacks
By Andrew BEATTY
Washington (AFP) June 6, 2015


The audacious hack of data on four million US government employees exposed America's shaky cyber defenses and the Obama administration's ongoing struggle to develop an effective deterrence.

On April 1 -- in the midst of tense negotiations over Iran's nuclear program -- President Barack Obama signed an executive order authorizing sanctions against foreign-based hackers.

For the administration, it was a critical step to address a growing national security threat, a threat every bit as real as that posed by Tehran.

Part of the strategy was to boost cyber defenses -- new versions of the government's intrusion detection system "Einstein" would be fast-tracked and the National Security Agency would be given more powers to screen for potential attacks.

But defenses -- as the latest China-originated breach at the Office of Personnel Management showed -- are imperfect, quickly outdated and expensive to keep up.

The Department of Defense alone has an estimated seven million networked devices to protect.

So the White House looked at developing an effective deterrence.

"We've talked a lot about what we are doing to protect our network defenses and increase public-private cooperation on information sharing," said an administration official, who asked not to be named.

"But you are also seeing an effort to develop some new response capabilities."

Prosecuting offenders would play a role. Last year, five officers from Unit 61398 of the Third Department of the People's Liberation Army of China were charged with spying on six US companies in the nuclear, metals and solar sectors.

On the scale of deterrence options, indictments, like sanctions, sat usefully between diplomatic complaints or "demarches" unlikely to be a game-changer and kinetic military action.

But even today, with a range of responses available to Obama, there is still limited deterrence, said retired Lieutenant General David Barno, who commanded US and coalition forces in Afghanistan from 2003-2005.

"We have a degree of deterrence" toward state actors, he told AFP, "but it's inadequate to the scope of the threat."

The chief problem may be that cyber adversaries still do not know what response to expect.

Because cyber attacks range vastly in scope and intent, knowing who, how and when to hit back is fraught.

Officials point to the difficulties in simple attribution in an arena where lines are blurred between military and civilian, criminality and espionage.

"What is easily overlooked if you are talking about a response is the fact that it is so exceedingly complicated and difficult to affix firm and certain attribution if you are talking about cyber activities," said the administration official.

The People's Liberation Army -- like Iran's Revolutionary Guard or forces in Russia and North Korea -- may be major state-level players, but their actions can be masked by the use of cybermilitias and other groups.

- A cyber doctrine -

Knowing how to respond may be even more difficult that finding a target.

In 2012, then State Department lawyer Harold Koh seemed to set the bar for an attack that would warrant military action.

"Cyber activities that proximately result in death, injury or significant destruction would likely be viewed as a use of force," he said.

Possible scenarios included an air traffic control breach that caused an airline to crash, or a cyber-prompted meltdown at a nuclear power station.

Even though this latest hack compromises 750,000 civilian Pentagon employees, a military response would seem disproportionate.

Other cases are less clear-cut.

Iran is thought to be behind a series of attacks in 2012 on Saudi Aramco designed to halt oil production.

Presidents since Jimmy Carter have said they would use military force in response to physical threats that would similarly hurt vital US interests.

America's own Stuxnet program targeted Iranian's nuclear facilities and was widely seen as an alternative to military airstrikes.

Experts point to cyber counterattacks as a possible key to developing a credible deterrent.

But as one administration official put it, "there is no 'bad internet' the bad guys are using the same internet as everybody else is using. It is hard to ensure that only the bad guys are getting impacted by that."

Barno compared the difficulties in using a cyber counterattack to deterrence during the cold war.

"In the nuclear world, I can count warheads, I can look at bombers versus bombers. In the cyber world, I don't know what to count," he said.

"No one knows what proportional is, proportional may look very different in the eye of the person who is on the receiving end of it."

And without a mutually understood framework, "you lose control of escalation very rapidly. There is no way to calibrate proportional responses."

Working out these problems, and building an effective deterrent, is likely to extend well beyond Obama's presidency.

"We really have not got any established rules of the road that everyone understands. We barely have a working vocabulary," said Barno.

"We shouldn't underestimate how long this took in the Cold War. We didn't have this (deterrence) in the 1940s and well into the 1950s, we are at the very beginnings of this in the cyber domain."


Thanks for being here;
We need your help. The SpaceDaily news network continues to grow but revenues have never been harder to maintain.

With the rise of Ad Blockers, and Facebook - our traditional revenue sources via quality network advertising continues to decline. And unlike so many other news sites, we don't have a paywall - with those annoying usernames and passwords.

Our news coverage takes time and effort to publish 365 days a year.

If you find our news sites informative and useful then please consider becoming a regular supporter or for now make a one off contribution.
SpaceDaily Contributor
$5 Billed Once


credit card or paypal
SpaceDaily Monthly Supporter
$5 Billed Monthly


paypal only


.


Related Links
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle








CYBER WARS
Brain's reaction to certain words could replace passwords
Binghamton NY (SPX) Jun 05, 2015
You might not need to remember those complicated e-mail and bank account passwords for much longer. According to a new study, the way your brain responds to certain words could be used to replace passwords. In "Brainprint," a newly published study in academic journal Neurocomputing, researchers from Binghamton University observed the brain signals of 45 volunteers as they read a list of 75 ... read more


CYBER WARS
Nepal parties reach long-awaited charter deal after quake

Crossing minefields to get to school in Colombia

China ship tragedy toll above 400, relatives and workers remember dead

UN's new weather chief seeks to improve disaster alerts

CYBER WARS
Russia, China Plan to Equip Commercial Trucks With Glonass, BeiDou

GLONASS to Go on Stream in 2015

Satellites make a load of difference to bridge safety

Advanced Navigation Releases Interface and Logging Unit

CYBER WARS
Cooking up cognition

World's last tribes on collision course with modern society

Out of Africa via Egypt

New human ancestor species from Ethiopia lived alongside Lucy's species

CYBER WARS
Do cheaters have an evolutionary advantage?

A smelling bee?

Study points to human impact on evolution of freshwater fish

Researchers develop facial recognition software for birds

CYBER WARS
HIV's sweet tooth is its downfall

US military confirms more anthrax blunders

Pentagon admits wider problem with anthrax shipments

Why you need one vaccine for measles and many for the flu

CYBER WARS
China cites 'tremendous' human rights progress in report

China's miniature homemakers cut down to size

Far from the madding crowd: China's rich seek own islands

China's new tech giants show old bias with porn stars

CYBER WARS
Polish bootcamp trains security contractors for mission impossible

A blast and gunfire: Mexico's chopper battle

CYBER WARS
China economy shows more weakness as imports, exports fall

China manufacturing index at six-month high but strains remain

Bernanke blames Congress as China flexes economic muscles

China bottle maker declares default on $100 mn bonds




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement All images and articles appearing on Space Media Network have been edited or digitally altered in some way. Any requests to remove copyright material will be acted upon in a timely and appropriate manner. Any attempt to extort money from Space Media Network will be ignored and reported to Australian Law Enforcement Agencies as a potential case of financial fraud involving the use of a telephonic carriage device or postal service.