Subscribe free to our newsletters via your
. Military Space News .




CYBER WARS
Obama struggles for deterrence amid wave of cyberattacks
By Andrew BEATTY
Washington (AFP) June 6, 2015


The audacious hack of data on four million US government employees exposed America's shaky cyber defenses and the Obama administration's ongoing struggle to develop an effective deterrence.

On April 1 -- in the midst of tense negotiations over Iran's nuclear program -- President Barack Obama signed an executive order authorizing sanctions against foreign-based hackers.

For the administration, it was a critical step to address a growing national security threat, a threat every bit as real as that posed by Tehran.

Part of the strategy was to boost cyber defenses -- new versions of the government's intrusion detection system "Einstein" would be fast-tracked and the National Security Agency would be given more powers to screen for potential attacks.

But defenses -- as the latest China-originated breach at the Office of Personnel Management showed -- are imperfect, quickly outdated and expensive to keep up.

The Department of Defense alone has an estimated seven million networked devices to protect.

So the White House looked at developing an effective deterrence.

"We've talked a lot about what we are doing to protect our network defenses and increase public-private cooperation on information sharing," said an administration official, who asked not to be named.

"But you are also seeing an effort to develop some new response capabilities."

Prosecuting offenders would play a role. Last year, five officers from Unit 61398 of the Third Department of the People's Liberation Army of China were charged with spying on six US companies in the nuclear, metals and solar sectors.

On the scale of deterrence options, indictments, like sanctions, sat usefully between diplomatic complaints or "demarches" unlikely to be a game-changer and kinetic military action.

But even today, with a range of responses available to Obama, there is still limited deterrence, said retired Lieutenant General David Barno, who commanded US and coalition forces in Afghanistan from 2003-2005.

"We have a degree of deterrence" toward state actors, he told AFP, "but it's inadequate to the scope of the threat."

The chief problem may be that cyber adversaries still do not know what response to expect.

Because cyber attacks range vastly in scope and intent, knowing who, how and when to hit back is fraught.

Officials point to the difficulties in simple attribution in an arena where lines are blurred between military and civilian, criminality and espionage.

"What is easily overlooked if you are talking about a response is the fact that it is so exceedingly complicated and difficult to affix firm and certain attribution if you are talking about cyber activities," said the administration official.

The People's Liberation Army -- like Iran's Revolutionary Guard or forces in Russia and North Korea -- may be major state-level players, but their actions can be masked by the use of cybermilitias and other groups.

- A cyber doctrine -

Knowing how to respond may be even more difficult that finding a target.

In 2012, then State Department lawyer Harold Koh seemed to set the bar for an attack that would warrant military action.

"Cyber activities that proximately result in death, injury or significant destruction would likely be viewed as a use of force," he said.

Possible scenarios included an air traffic control breach that caused an airline to crash, or a cyber-prompted meltdown at a nuclear power station.

Even though this latest hack compromises 750,000 civilian Pentagon employees, a military response would seem disproportionate.

Other cases are less clear-cut.

Iran is thought to be behind a series of attacks in 2012 on Saudi Aramco designed to halt oil production.

Presidents since Jimmy Carter have said they would use military force in response to physical threats that would similarly hurt vital US interests.

America's own Stuxnet program targeted Iranian's nuclear facilities and was widely seen as an alternative to military airstrikes.

Experts point to cyber counterattacks as a possible key to developing a credible deterrent.

But as one administration official put it, "there is no 'bad internet' the bad guys are using the same internet as everybody else is using. It is hard to ensure that only the bad guys are getting impacted by that."

Barno compared the difficulties in using a cyber counterattack to deterrence during the cold war.

"In the nuclear world, I can count warheads, I can look at bombers versus bombers. In the cyber world, I don't know what to count," he said.

"No one knows what proportional is, proportional may look very different in the eye of the person who is on the receiving end of it."

And without a mutually understood framework, "you lose control of escalation very rapidly. There is no way to calibrate proportional responses."

Working out these problems, and building an effective deterrent, is likely to extend well beyond Obama's presidency.

"We really have not got any established rules of the road that everyone understands. We barely have a working vocabulary," said Barno.

"We shouldn't underestimate how long this took in the Cold War. We didn't have this (deterrence) in the 1940s and well into the 1950s, we are at the very beginnings of this in the cyber domain."


Thanks for being here;
We need your help. The SpaceDaily news network continues to grow but revenues have never been harder to maintain.

With the rise of Ad Blockers, and Facebook - our traditional revenue sources via quality network advertising continues to decline. And unlike so many other news sites, we don't have a paywall - with those annoying usernames and passwords.

Our news coverage takes time and effort to publish 365 days a year.

If you find our news sites informative and useful then please consider becoming a regular supporter or for now make a one off contribution.

SpaceDaily Contributor
$5 Billed Once


credit card or paypal
SpaceDaily Monthly Supporter
$5 Billed Monthly


paypal only

.


Related Links
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle




Memory Foam Mattress Review
Newsletters :: SpaceDaily :: SpaceWar :: TerraDaily :: Energy Daily
XML Feeds :: Space News :: Earth News :: War News :: Solar Energy News





CYBER WARS
Brain's reaction to certain words could replace passwords
Binghamton NY (SPX) Jun 05, 2015
You might not need to remember those complicated e-mail and bank account passwords for much longer. According to a new study, the way your brain responds to certain words could be used to replace passwords. In "Brainprint," a newly published study in academic journal Neurocomputing, researchers from Binghamton University observed the brain signals of 45 volunteers as they read a list of 75 ... read more


CYBER WARS
Kremlin Focuses on Alleged US Plans to Aim Missiles at Russia's Nukes

Germany opts for MEADS missile defence system

US Defense Department to deploy radar in alaska to protect Pacific coast

Northrop's battle command system brings down ballistic missile target

CYBER WARS
US Might Add Missiles to Its Military Buildup in Europe to Counter Russia

US Defense Contractor Raytheon Launches State-of-the-Art SM-3 Missile

Navy orders more Raytheon SM-6 air defense missiles

Indian Air Force jet test fires Harpoon missile

CYBER WARS
X-37B Still Largely Unexplained

IAI shines spotlight on loitering attack drone

China monitors university entrance exams with drones

Military Sensor Optics For UAVs

CYBER WARS
US Navy accepts third LMC-Built MUOS comsat

Continued Momentum for Commercial Satellite Acquisition Reform

IOC status for upgraded French AWACS aircraft

Russian Radio-Electronic Forces to Conduct Drills in Armenian Mountains

CYBER WARS
Russia to Produce Successor of Tu-160 Strategic Bomber After 2023

ONR-sponsored technology to lighten marines' loads

VSE wins places on Army TACOM contracts

US Air Force Develops Electromagnetic Pulse Weapon

CYBER WARS
Spain to decide on lifting A400M flight suspension next week

US Defense Secretary Carter signs defence projects with India

Army contracting official charged in parts investigation

French arms exports in 2014 'best in 15 years'

CYBER WARS
NATO launches 'spearhead' drill on eastern flank

Philippines, Japan to hold fresh naval drills

Top Chinese officer pays visit to US: Pentagon

G7 leaders to stand firm on security threats, Ukraine

CYBER WARS
Measuring the mass of molecules on the nano-scale

Novel X-ray lens sharpens view into the nano world

Engineering phase changes in nanoparticle arrays

DNA double helix does double duty assembling nanoparticle arrays




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement All images and articles appearing on Space Media Network have been edited or digitally altered in some way. Any requests to remove copyright material will be acted upon in a timely and appropriate manner. Any attempt to extort money from Space Media Network will be ignored and reported to Australian Law Enforcement Agencies as a potential case of financial fraud involving the use of a telephonic carriage device or postal service.