Obama Warns Of Russian Cyber Warfare Threat

President Barack Obama has warned Russia that the United States has "more capacity than anybody" when it comes to cyber warfare, saying hack attacks cannot become “wild, wild, West.” 

Obama made the remarks to reporters following the G20 conference in Hangzhou, China. The issue of Russian hackers being implicated in breaching US cyberspace was a key issue at the summit. Though Obama didn't identify specific instances, he said, "We have had problems with cyber intrusions from Russia in the past" and that the goal is to not to duplicate a "cycle of escalation" that has occurred in arms races of the past.

"What we cannot do is have a situation where this becomes the wild, wild West, where countries that have significant cyber capacity start engaging in unhealthy competition or conflict through these means," the president said.

Making a subtle threat to Russia, Obama added, “Look, we’re moving into a new era here where a number of countries have significant capacities. And frankly we’ve got more capacity than anybody, both offensively and defensively.”

US officials have blamed Russia for the recent hacking of the Democratic National Committee’s (DNC) servers, and law enforcement and intelligence agencies are reportedly concerned about the Kremlin trying to disrupt or undermine the presidential elections. However, Russian Foreign Minister Sergei Lavrov has in the past rejected claims that Moscow was behind a recent hack of DNC servers.

In July, the WikiLeaks website released about 20,000 emails from the DNC, which showed that party leaders had purportedly sought to undermine the presidential campaign of Senator Bernie Sanders.

Clinton Response

The campaign of Democratic presidential nominee Hillary Clinton alleged that Russia had released the emails to influence the November presidential election.

But as Obama and Clinton call for discussions of cyber-attacks, experts say that government-led hacking is already booming, and the lack of international guidelines has led to unintended consequences for ordinary civilians caught up in cyber conflict. The US and the United Nations are each working to develop rules of engagement for the digital arena, but in the meantime, countries are deciding for themselves whether or not to follow the same guidelines for cyber capabilities as they do for traditional weaponry.

The US military should be ready and able to hack back against governments who target the country online, Clinton said. She pointed to the breach of the Democratic National Committee as an example of a cyber-attack against the US, and advocated political, economic and military responses to such attacks.

Of course, the US already engages in plenty of cyber warfare. To use Clinton’s words, the US has hacked into a lot of things. But her speech suggests an expansion of this kind of hacking is the best response to the recent Russian intrusions into the DNC and the Clinton campaign.

Clinton’s technology platform doesn’t include an official stance on offensive hacking, but a source familiar with her campaign says that Clinton would likely respond to a cyber-attack through diplomacy and sanctions, with military response as a last resort.

Hacking back has been a matter of policy debate in the US for years, and the question of how to respond to cyber-attacks isn’t entirely resolved. Most of the debate has centered around how to protect US companies from intellectual property theft, but how and why the US should hack a foreign government is a bit of an open question.

The State Department currently views cyber-attacks as similar to physical ones, and bases its policy on presidential strategy.

Ein News:        TechCrunch:

 

« Does Russia Benefit When Assange Reveals Secrets?
US Spy Agencies Will Analyse Insider-Threats »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Verisec International

Verisec International

Verisec International AB is a Swedish Tech company focused since inception in enabling Trust in Digital Transactions, through the development of proprietary cutting-edge technologies and services.

Davis Wright Tremaine (DWT)

Davis Wright Tremaine (DWT)

Davis Wright Tremaine is a full-service law firm with offices throughout the US and in Shanghai, China. Practice areas include Technology, Privacy & Security.

GSMA - IoT Security Guidelines

GSMA - IoT Security Guidelines

GSMA has created a set of security guidelines for the benefit of service providers who are looking to develop new IoT products and services.

Trusted Knight

Trusted Knight

Trusted Knight is a leading provider of security software solutions focused on defeating newly developed malware and crimeware trojans.

ThreatAdvice

ThreatAdvice

ThreatAdvice is a provider of cybersecurity education, awareness and threat intelligence.

Cybersecurity Collaborative

Cybersecurity Collaborative

CyberSecurity Collaborative is a forum for CISOs to share information that will collectively make us stronger, and better equipped to protect our enterprises from those seeking to damage them.

Styra

Styra

Styra allows companies to secure cloud environments and applications, including those built on the popular Kubernetes open-source cloud platform.

Energia Ventures

Energia Ventures

Energia Ventures is a three-month intensive accelerator for entrepreneurs with an innovative business in the energy, smart grid, cleantech, and cybersecurity sectors.

Vivitec

Vivitec

Vivitec security services are tailored for your business, industry, risk, technology, and size to ensure great protection and planned response for the inevitable cyber-attacks on your business.

OWN

OWN

OWN (formerly SEKOIA) is a major French player in cybersecurity providing tailor-made, informed and adapted cyber support thanks to its DNA of passionate and committed experts.

Huntington Ingalls Industries (HII)

Huntington Ingalls Industries (HII)

Huntington Ingalls Industries is America’s largest military shipbuilding company and a provider of professional services to partners in government and industry.

AB Handshake

AB Handshake

AB Handshake offers a game-changing solution for telecom service providers that eliminates fraud on inbound and outbound voice traffic.

Topsec Cloud Solutions

Topsec Cloud Solutions

The Topsec Managed Email Security Platform eliminates Spam, Viruses, Malware, and Phishing.

Lumifi

Lumifi

Lumifi provide end-to-end cybersecurity resilience solutions with a specialty in managed detection and response (MDR) services.

Permiso Security

Permiso Security

Permiso combines industry leading Identity Security Posture Management with Identity Threat Detection and Response, leaving no place to hide for identity threats lurking in your environment.

Scope AI

Scope AI

Scope AI is an innovative technology company specializing in quantum security and machine learning.