Deterrence & Cyber Attacks On The US Electoral System

 

The sanctions and expulsions announced recently against Russia raise important questions about how the United States can effectively deter cyberattacks of this kind in the future, and how effective the measures announced will likely be in doing so.

 

Deterring future cyber-meddling in US elections will require convincing adversaries, Russia and others, that any future such meddling will either be:

A. Ineffective and/or

B. Too costly to be worthwhile.

There are at least two ways to make such operations ineffective:

  • First, the United States could seek to dampen or counter the influence on the actual electoral debate, for example, by swiftly exposing them, a resilience strategy akin to what was sometimes called passive defense during the Cold War.​
  • Second, the United States could seek simply to make such operations impossible by developing highly effective cyber-network defenses, a strategy akin to what was sometimes called active defense.

To make it clear that cyber operations against future elections will be costly, the United States must also demonstrate both a capability and a will to strike back in the future, in other words to punish those states and actors that might contemplate using their cyber capabilities in this way.

Demonstrating a capability to punish is relatively easy, indeed almost unnecessary. The United States has a broad arsenal of military, diplomatic, financial and other means at its disposal to inflict costs on any country that might seek to use cyber tools to interfere in its elections.

Demonstrating the will to do so is much, much more difficult. It requires making clear that the United States judges the stakes at hand to be so important that it would be willing to make use a broad range of tools from its arsenal, even if the costs of doing so were high, to punish future leaders who conducted cyberattacks against US elections.

Given these requirements, how much will the US response help deter future attacks?

On the helpful side, the measures should help make future enemy cyber operations easier to detect and thus riskier and more likely to fail. The Department of Homeland Security and the Federal Bureau of Investigations will now make certain information about Russian cyber capabilities available to the private sector. How much of an effect this will have, however, remains to be seen.

Also on the helpful side, the expulsions and the sanctions impose some cost on the perpetrators while also demonstrating some will on the part of the United States to make some sacrifices because expulsions may eventually be met with reprisals in kind from Moscow, not-with-standing President Vladimir Putin's announcement that he won't retaliate in kind to the expulsions.

Yet whether accepting this cost is enough to impress the Kremlin and deter future action is debatable.

If it truly wishes to deter future action, the United States may thus move toward a stronger declaratory posture by going further in emphasising (publicly and privately to the Kremlin) the very high importance of the integrity of the US democratic process in the future.

The recent White House statement refers to international law and harm to US interests, but it might have stated more forcefully that attacks on the US democratic process are utterly unacceptable and will not be tolerated.

Criticisms of the response on the basis that it does not use existing cyber tools to retaliate are misplaced.

First of all, the US response leaves that possibility open by stating that “we will continue to take a variety of actions at a time and place of our choosing, some of which will not be publicised.” So the United States might still exercise the cyber options it has.

There is no reason to assume that a cyber response is necessarily the best deterrent against cyber-attacks.

If it doesn't, however, that's not necessarily a mistake. There is no reason to assume that a cyber response is necessarily the best deterrent against cyber-attacks. Meanwhile, using existing military cyber tools would have been escalatory while removing options that the United States would better reserve for wartime. Some cyber weapons, once used, can't be used again.

A US cyber operation that exposed corruption within the regime now or later might have some deterrent effect. However, exposing corruption would be mostly cost-free for the United States, so it doesn't underscore US will or stake. It's also difficult to repeat.

A better option would perhaps be to demonstrate a capability to expose corruption, perhaps by exposing the tip of the iceberg, while leaving much of the capability in reserve, to keep the proverbial powder dry so that it can deter future attacks.

A single response does not need to constitute a complete cyber deterrence posture and the measures announced recently should not be judged as such. Effective deterrence in the cyber domain can only emerge out of a consistent set of actions, policies, and declarations over time.

Looking ahead, however, the United States will need to emphasize consistently the importance of the integrity of the electoral process. The time may soon come when the United States needs to demonstrate its willingness to sacrifice to protect it.

Rand:    

Electoral Influence: 40yrs Of Kremlin Interference:       German Spy Chief Fears Russian Interference In 2017 Elections:

 

« Uber Wants Self-Flying Vertical Takeoff Cars
How To Automate Cyber Defense »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Security Stronghold

Security Stronghold

Security Stronghold is focused on protecting computers from malicious programs like viruses, Trojans, spyware, adware, trackware, keyloggers and other kinds of online threats.

Intezer Labs

Intezer Labs

The only solution replicating the concepts of the biological immune system into cyber-security. Intezer provides enterprises with unparalleled Threat Detection and accelerates Incident Response.

Data Resolve Technologies

Data Resolve Technologies

Data Resolve offer a mechanism through which customers can detect and tackle various kinds of sensitive activities pertaining to data loss and data theft.

Wolfpack Information Risk

Wolfpack Information Risk

Wolfpack specialise in information and cyber threat management covering the full spectrum of prevention, detection, incident response and business resilience capabilities.

Montimage

Montimage

Montimage develops tools for testing and monitoring networks, applications and services; in particular, for the verification of functional, performance (QoS/QoE) and security aspects.

SGBox

SGBox

SGBox is a highly flexible and scalable solution for IT security. Choose the modules which your company needs and implement it without any modification to your network infrastructure.

Angoka

Angoka

Angoka provide hardware-based solutions for managing the cybersecurity risks inherent in machine-to-machine communication networks.

Unit21

Unit21

Unit21 helps protect businesses against adversaries through a simple API and dashboard for detecting and managing money laundering, fraud, and other sophisticated risks across multiple industries.

StoneLock

StoneLock

StoneLock is a trusted leader in the design and manufacture of facial recognition software and technology.

Drawbridge

Drawbridge

Drawbridge is a premier provider of cybersecurity software and solutions to the alternative investment industry.

Cyber Security Works (CSW)

Cyber Security Works (CSW)

Cyber Security Works is your organization’s early cybersecurity warning system to help prevent attacks before they happen.

RubinBrown

RubinBrown

RubinBrown LLP is a leading accounting and professional consulting firm. The RubinBrown name and reputation are synonymous with experience, integrity and value.

Q5id

Q5id

At Q5id, we prove that your customers' digital identity and real-world identity are the same, our verification and authentication solution delivers a Proven and Secure digital identity for everyone.

Riot Security

Riot Security

In today's world, most successful cyberattacks start by a human failure. Riot have developed a platform that makes it easy to prepare your employees for cyberattacks, in a way they love.

CelcomDigi

CelcomDigi

CelcomDigi aspire to be Malaysia’s top Telco-Tech company, transforming beyond core connectivity to lead digitalization and innovation as part of nation-building.

Terra Security

Terra Security

Terra Security is the first agentic-AI platform built for web application penetration testing.