Donald Trump Doesn’t Understand Cyberwar

In late March, Donald Trump sat down with a few reporters from The New York Times for a rare, in-depth interview about his foreign policy ideas.

The conversation careened from Middle East alliances to nuclear weapons to trade pacts, touching briefly on the ever-more pressing topic of cyberwar. Trump said the US lagged behind other world powers, and that the “inconceivable power of cyber” should figure “very strongly in our thought process.”

Now, far from being cooked through, his thoughts on cybersecurity and cyberwar seem to have deflated. At the Republican National Convention, the Times’ Maggie Haberman and David Sanger checked up on the ideas of the man who’s now the Republican nominee for president. Here’s what he had to say:

David Sanger: You’ve seen several of those countries come under cyberattack, things that are short of war, clearly appear to be coming from Russia.

Donald Trump: Well, we’re under cyberattack.

Sanger: We’re under regular cyberattack. Would you use cyber-weapons before you used military force?

Trump: Cyber is absolutely a thing of the future and the present. Look, we’re under cyberattack, forget about them. And we don’t even know where it’s coming from.

Sanger: Some days we do, and some days we don’t.

Trump: Because we’re obsolete. Right now, Russia and China in particular and other places.

Sanger: Would you support the United States’ not only developing as we are but fielding cyber-weapons as an alternative?

Trump: Yes. I am a fan of the future, and cyber is the future.

At that point, Sanger gave up and moved on to a new line of questioning.

In March, Trump was wrong about several aspects of cyberwar. This time, he stuck to statements so anodyne that they’re nearly impossible to fact check.

Like before, Trump appears particularly worried about the difficulty of tracking down the perpetrators of cyberattacks. That’s certainly one of the things that makes cyberwar trickier than a conventional conflict: A missile might be easy to track through the sky, but a virus can come from anywhere, and skilled hackers generally cover their digital tracks assiduously.

But the US is getting good at identifying attackers. Officials attributed a massive attack on Sony Pictures Entertainment to North Korea, and privately pointed fingers at China for data breaches at the Office of Personnel Management, and at Russia for attempts to get into email systems at the State Department at the White House.

Trump also repeated his earlier claim that the United States is “obsolete” in cyberwar. It’s true that state-sponsored hackers have repeatedly poked holes in the defenses of American corporations and governments. But American offensive capabilities are likely unmatched.

This year, the Defense Department launched into full-on cyberwar against the Islamic State, promising to disrupt the group’s propaganda, internal communications, and basic functions like payroll. The campaign marks the first time the Pentagon has publicly announced that it’s using its own cyber-weapons to go after an adversary—previous attacks, like the Stuxnet worm that targeted Iranian nuclear centrifuges, were conducted in secrecy. But as reported by The Washington Post, the operation, which would support the US-led coalition’s airstrike campaign, has gotten off to a slow start, as the Pentagon hires up for the effort and stockpiles weapons to use against the group.

Of course, this is a whole lot more detail than Trump was ready or willing to take on in his interview this week. Political analysts, security experts, and even the nominee’s own ghostwriter are wringing their hands over the thought of the lasting, catastrophic damage Trump could inflict with access to the US nuclear arsenal. The potential that he’d misuse the government’s secretive stockpile of viruses and malware is only slightly less worrisome.

If Trump is to live up to his self-proclaimed title, a “fan of the future”, he’d do well to brush up on his cyberwar talking points before the first presidential debate in September.

Ein News: http://bit.ly/2bb77VI

« For Sale: Leaked Terror Watch List
Made in Britain: Facebook's Drones »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

OASIS Open

OASIS Open

OASIS Open is where individuals, organizations, and governments come together to solve some of the world’s biggest technical challenges through the development of open code and open standards.

Fornetix

Fornetix

Fornetix is a cybersecurity platform enabling Zero Trust while delivering critical encryption automation, access controls, authorization services, machine identity, and ICAM solutions,

Synack

Synack

Synack provides a hacker-powered intelligence platform that uncovers security vulnerabilities that often remain undetected by traditional pen testers and scanners.

ComCERT

ComCERT

ComCERT SA is an independent, private consulting company focusing in the assistance of its customers facing the dangers of cyber threats and security incidents.

Digital Management (DMI)

Digital Management (DMI)

DMI is a provider of mobile enterprise, business intelligence and cybersecurity services.

TROOPERS

TROOPERS

TROOPERS InfoSec event consists of two days of high-end training, followed by a two-day, three-track conference, culminating in Roundtables on the final day.

AttackIQ

AttackIQ

AttackIQ delivers continuous validation of your enterprise security program so you can strengthen your security posture and your response capabilities.

Blue Hexagon

Blue Hexagon

Blue Hexagon is a deep learning innovator focused on protecting organizations from cyberthreats.

Rede Nacional CSIRT

Rede Nacional CSIRT

Rede Nacional CSIRT is a national network of CSIRTs in Portugal aimed at cooperation and mutual assistance in the handling of incidents and in the sharing of good security practices.

Pakistan Telecommunication Company Limited (PTCL)

Pakistan Telecommunication Company Limited (PTCL)

Pakistan Telecommunication Company Limited (PTCL) is the largest integrated Information Communication Technology (ICT) company of Pakistan.

Gunnison Consulting Group

Gunnison Consulting Group

Gunnison Consulting Group serves the Federal Government with high quality IT consulting services.

NAK Consulting Services

NAK Consulting Services

NAK is helping organisations to create Secure, Agile IT Environments. Our goal is to be the trusted advisor and managed service partner for our clients.

Match Systems

Match Systems

Match Systems provides blockchain investigations, KYC, KYT, AML, Due Diligence and compliance services.

SecureWeb3

SecureWeb3

SecureWeb3 helps businesses and brands to secure their Web3 presence by offering a full suite of security services including training, consultancy & brand protection solutions.

LockMagic

LockMagic

Lockmagic is an information asset management solution to protect, track, audit and control accesses to sensitive information inside and outside your organization.

MadWolf Technologies

MadWolf Technologies

MadWolf’s mission is to deliver enterprise-quality managed services and focused applications to organizations operating in the non-profit, association and international development sectors.