Subscribe free to our newsletters via your
. 24/7 Space News .




CYBER WARS
Obama struggles for deterrence amid wave of cyberattacks
By Andrew BEATTY
Washington (AFP) June 6, 2015


The audacious hack of data on four million US government employees exposed America's shaky cyber defenses and the Obama administration's ongoing struggle to develop an effective deterrence.

On April 1 -- in the midst of tense negotiations over Iran's nuclear program -- President Barack Obama signed an executive order authorizing sanctions against foreign-based hackers.

For the administration, it was a critical step to address a growing national security threat, a threat every bit as real as that posed by Tehran.

Part of the strategy was to boost cyber defenses -- new versions of the government's intrusion detection system "Einstein" would be fast-tracked and the National Security Agency would be given more powers to screen for potential attacks.

But defenses -- as the latest China-originated breach at the Office of Personnel Management showed -- are imperfect, quickly outdated and expensive to keep up.

The Department of Defense alone has an estimated seven million networked devices to protect.

So the White House looked at developing an effective deterrence.

"We've talked a lot about what we are doing to protect our network defenses and increase public-private cooperation on information sharing," said an administration official, who asked not to be named.

"But you are also seeing an effort to develop some new response capabilities."

Prosecuting offenders would play a role. Last year, five officers from Unit 61398 of the Third Department of the People's Liberation Army of China were charged with spying on six US companies in the nuclear, metals and solar sectors.

On the scale of deterrence options, indictments, like sanctions, sat usefully between diplomatic complaints or "demarches" unlikely to be a game-changer and kinetic military action.

But even today, with a range of responses available to Obama, there is still limited deterrence, said retired Lieutenant General David Barno, who commanded US and coalition forces in Afghanistan from 2003-2005.

"We have a degree of deterrence" toward state actors, he told AFP, "but it's inadequate to the scope of the threat."

The chief problem may be that cyber adversaries still do not know what response to expect.

Because cyber attacks range vastly in scope and intent, knowing who, how and when to hit back is fraught.

Officials point to the difficulties in simple attribution in an arena where lines are blurred between military and civilian, criminality and espionage.

"What is easily overlooked if you are talking about a response is the fact that it is so exceedingly complicated and difficult to affix firm and certain attribution if you are talking about cyber activities," said the administration official.

The People's Liberation Army -- like Iran's Revolutionary Guard or forces in Russia and North Korea -- may be major state-level players, but their actions can be masked by the use of cybermilitias and other groups.

- A cyber doctrine -

Knowing how to respond may be even more difficult that finding a target.

In 2012, then State Department lawyer Harold Koh seemed to set the bar for an attack that would warrant military action.

"Cyber activities that proximately result in death, injury or significant destruction would likely be viewed as a use of force," he said.

Possible scenarios included an air traffic control breach that caused an airline to crash, or a cyber-prompted meltdown at a nuclear power station.

Even though this latest hack compromises 750,000 civilian Pentagon employees, a military response would seem disproportionate.

Other cases are less clear-cut.

Iran is thought to be behind a series of attacks in 2012 on Saudi Aramco designed to halt oil production.

Presidents since Jimmy Carter have said they would use military force in response to physical threats that would similarly hurt vital US interests.

America's own Stuxnet program targeted Iranian's nuclear facilities and was widely seen as an alternative to military airstrikes.

Experts point to cyber counterattacks as a possible key to developing a credible deterrent.

But as one administration official put it, "there is no 'bad internet' the bad guys are using the same internet as everybody else is using. It is hard to ensure that only the bad guys are getting impacted by that."

Barno compared the difficulties in using a cyber counterattack to deterrence during the cold war.

"In the nuclear world, I can count warheads, I can look at bombers versus bombers. In the cyber world, I don't know what to count," he said.

"No one knows what proportional is, proportional may look very different in the eye of the person who is on the receiving end of it."

And without a mutually understood framework, "you lose control of escalation very rapidly. There is no way to calibrate proportional responses."

Working out these problems, and building an effective deterrent, is likely to extend well beyond Obama's presidency.

"We really have not got any established rules of the road that everyone understands. We barely have a working vocabulary," said Barno.

"We shouldn't underestimate how long this took in the Cold War. We didn't have this (deterrence) in the 1940s and well into the 1950s, we are at the very beginnings of this in the cyber domain."


Thanks for being here;
We need your help. The SpaceDaily news network continues to grow but revenues have never been harder to maintain.

With the rise of Ad Blockers, and Facebook - our traditional revenue sources via quality network advertising continues to decline. And unlike so many other news sites, we don't have a paywall - with those annoying usernames and passwords.

Our news coverage takes time and effort to publish 365 days a year.

If you find our news sites informative and useful then please consider becoming a regular supporter or for now make a one off contribution.
SpaceDaily Contributor
$5 Billed Once


credit card or paypal
SpaceDaily Monthly Supporter
$5 Billed Monthly


paypal only


.


Related Links
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle








CYBER WARS
Brain's reaction to certain words could replace passwords
Binghamton NY (SPX) Jun 05, 2015
You might not need to remember those complicated e-mail and bank account passwords for much longer. According to a new study, the way your brain responds to certain words could be used to replace passwords. In "Brainprint," a newly published study in academic journal Neurocomputing, researchers from Binghamton University observed the brain signals of 45 volunteers as they read a list of 75 ... read more


CYBER WARS
Crashing comets may explain mysterious lunar swirls

Google Lunar X-Prize meets Yoda

China, Russia plan joint landing on the Moon

NASA's LRO Moves Closer to the Lunar Surface

CYBER WARS
Supersonic NASA parachute torn to pieces in latest test

Rover Ready for Solar Conjunction and Period of Curtailed Operations

NASA Spacecraft Detects Impact Glass on Surface of Mars

Building a Smarter Rover

CYBER WARS
Spacecraft glitch shifts orbiting ISS: Russia

XCOR Selects Matrix Composites to Develop Lynx Chines

NASA's LDSD Project Completes Second Experimental Test Flight

ESA astronaut Samantha Cristoforetti returning home

CYBER WARS
Electric thruster propels China's interstellar ambitions

China Plans First Ever Landing On The Lunar Far Side

China ranked 4th among world space powers

3D printer making Chinese space suit parts

CYBER WARS
Russia aims for launch of next manned flight to ISS in July

Russian Space Agency Reschedules 6 Flights to ISS for 2015

Crewmembers From ISS to Return to Earth June 11

Historic handshake between space and Earth

CYBER WARS
Angara to launch first manned rocket from Vostochny in 2023

Airbus developing reusable space rocket launcher

Recent Proton loss to push up launch costs warns manufacturer

Air Force Certifies SpaceX for National Security Space Missions

CYBER WARS
Astronomers discover a young solar system around a nearby star

Hubble in 'Oh Planet, What Art Thou?' 25th Anniversary Video

Astronomers Discover a Young Solar System Around a Nearby Star

Circular orbits identified for small exoplanets

CYBER WARS
China launches space junk monitoring center

New tunable laser diode for high-frequency efficiency

Lockheed completesc assembly of next-gen weather satellite for NOAA

How natural channel proteins move in artificial membranes




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement All images and articles appearing on Space Media Network have been edited or digitally altered in some way. Any requests to remove copyright material will be acted upon in a timely and appropriate manner. Any attempt to extort money from Space Media Network will be ignored and reported to Australian Law Enforcement Agencies as a potential case of financial fraud involving the use of a telephonic carriage device or postal service.