Donald Trump Doesn’t Understand Cyberwar

In late March, Donald Trump sat down with a few reporters from The New York Times for a rare, in-depth interview about his foreign policy ideas.

The conversation careened from Middle East alliances to nuclear weapons to trade pacts, touching briefly on the ever-more pressing topic of cyberwar. Trump said the US lagged behind other world powers, and that the “inconceivable power of cyber” should figure “very strongly in our thought process.”

Now, far from being cooked through, his thoughts on cybersecurity and cyberwar seem to have deflated. At the Republican National Convention, the Times’ Maggie Haberman and David Sanger checked up on the ideas of the man who’s now the Republican nominee for president. Here’s what he had to say:

David Sanger: You’ve seen several of those countries come under cyberattack, things that are short of war, clearly appear to be coming from Russia.

Donald Trump: Well, we’re under cyberattack.

Sanger: We’re under regular cyberattack. Would you use cyber-weapons before you used military force?

Trump: Cyber is absolutely a thing of the future and the present. Look, we’re under cyberattack, forget about them. And we don’t even know where it’s coming from.

Sanger: Some days we do, and some days we don’t.

Trump: Because we’re obsolete. Right now, Russia and China in particular and other places.

Sanger: Would you support the United States’ not only developing as we are but fielding cyber-weapons as an alternative?

Trump: Yes. I am a fan of the future, and cyber is the future.

At that point, Sanger gave up and moved on to a new line of questioning.

In March, Trump was wrong about several aspects of cyberwar. This time, he stuck to statements so anodyne that they’re nearly impossible to fact check.

Like before, Trump appears particularly worried about the difficulty of tracking down the perpetrators of cyberattacks. That’s certainly one of the things that makes cyberwar trickier than a conventional conflict: A missile might be easy to track through the sky, but a virus can come from anywhere, and skilled hackers generally cover their digital tracks assiduously.

But the US is getting good at identifying attackers. Officials attributed a massive attack on Sony Pictures Entertainment to North Korea, and privately pointed fingers at China for data breaches at the Office of Personnel Management, and at Russia for attempts to get into email systems at the State Department at the White House.

Trump also repeated his earlier claim that the United States is “obsolete” in cyberwar. It’s true that state-sponsored hackers have repeatedly poked holes in the defenses of American corporations and governments. But American offensive capabilities are likely unmatched.

This year, the Defense Department launched into full-on cyberwar against the Islamic State, promising to disrupt the group’s propaganda, internal communications, and basic functions like payroll. The campaign marks the first time the Pentagon has publicly announced that it’s using its own cyber-weapons to go after an adversary—previous attacks, like the Stuxnet worm that targeted Iranian nuclear centrifuges, were conducted in secrecy. But as reported by The Washington Post, the operation, which would support the US-led coalition’s airstrike campaign, has gotten off to a slow start, as the Pentagon hires up for the effort and stockpiles weapons to use against the group.

Of course, this is a whole lot more detail than Trump was ready or willing to take on in his interview this week. Political analysts, security experts, and even the nominee’s own ghostwriter are wringing their hands over the thought of the lasting, catastrophic damage Trump could inflict with access to the US nuclear arsenal. The potential that he’d misuse the government’s secretive stockpile of viruses and malware is only slightly less worrisome.

If Trump is to live up to his self-proclaimed title, a “fan of the future”, he’d do well to brush up on his cyberwar talking points before the first presidential debate in September.

Ein News: http://bit.ly/2bb77VI

« For Sale: Leaked Terror Watch List
Made in Britain: Facebook's Drones »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

IX Associates

IX Associates

IX Associates is a UK based IT Integration business specialising in risk, compliance, eDefence, and network security solutions.

Energy Sec

Energy Sec

EnergySec is a United States 501(c)(3) non-profit corporation formed to support energy sector organizations with the security of their critical technology infrastructures.

NXO France

NXO France

NXO is an independent leader in the integration and management of digital workflows with services covering digital infrastructures, communications & collaboration, and security.

Wayra UK

Wayra UK

Wayra UK, part of Telefónica Open Future, has been chosen to run a new cyber accelerator facility to help UK start-ups grow and take the lead in producing the next generation of cyber security systems

Cyfirma

Cyfirma

CYFIRMA offers Cyber threat visibility and intelligence suite and services aimed at keeping your organization’s cybersecurity posture up-to-date.

Brimondo

Brimondo

At Brimondo we help you to maximize and protect your brand value by being a proactive and strategic partner within brand protection with experts within intellectual property and digital assets.

Pentest Limited

Pentest Limited

Pentest Limited provide information security consultation, penetration testing & red teaming services to companies across the globe.

Ostra Cybersecurity

Ostra Cybersecurity

As a next-generation MSSP, Ostra Cybersecurity combines best-in-class tools, proprietary technology and exceptional talent to deliver Fortune 100-level protection for businesses of all sizes.

Cyber Risk International

Cyber Risk International

Cyber Risk International offer CyberPrism, a B2B SaaS solution that empowers businesses to perform a self-assessment of their cyber security program.

Dataminr

Dataminr

Dataminr Pulse helps organizations strengthen business resilience with AI-powered, real-time risk and event discovery—and the integrated tools to manage responses.

ConductorOne

ConductorOne

ConductorOne is building the identity security platform for the modern workforce.

Wattlecorp Cybersecurity Labs

Wattlecorp Cybersecurity Labs

Wattlecorp Cybersecurity Labs are a group of IT security specialists, ethical hackers, and researchers driven to identify security flaws before cyber threat actors does.

AuditBoard

AuditBoard

AuditBoard is the leading cloud-based platform transforming audit, risk, ESG, and InfoSec management.

CBIT Digital Forensics Services (CDFS)

CBIT Digital Forensics Services (CDFS)

CDFS is Australia’s premier supplier of digital forensic tools, industry-embedded training and certification to Law Enforcement, Government, and Corporate Enterprise.

Sasken Technologies

Sasken Technologies

Sasken’s Cybersecurity Services enables enterprises to develop, maintain, and take digital products to the market with security postures that empower operational excellence.

AmiViz

AmiViz

AmiViz is the first B2B enterprise marketplace focussed on Cybersecurity business in the Middle East and Africa, designed specially to serve the interests of enterprise resellers and vendors.