Obama Warns Of Russian Cyber Warfare Threat

President Barack Obama has warned Russia that the United States has "more capacity than anybody" when it comes to cyber warfare, saying hack attacks cannot become “wild, wild, West.” 

Obama made the remarks to reporters following the G20 conference in Hangzhou, China. The issue of Russian hackers being implicated in breaching US cyberspace was a key issue at the summit. Though Obama didn't identify specific instances, he said, "We have had problems with cyber intrusions from Russia in the past" and that the goal is to not to duplicate a "cycle of escalation" that has occurred in arms races of the past.

"What we cannot do is have a situation where this becomes the wild, wild West, where countries that have significant cyber capacity start engaging in unhealthy competition or conflict through these means," the president said.

Making a subtle threat to Russia, Obama added, “Look, we’re moving into a new era here where a number of countries have significant capacities. And frankly we’ve got more capacity than anybody, both offensively and defensively.”

US officials have blamed Russia for the recent hacking of the Democratic National Committee’s (DNC) servers, and law enforcement and intelligence agencies are reportedly concerned about the Kremlin trying to disrupt or undermine the presidential elections. However, Russian Foreign Minister Sergei Lavrov has in the past rejected claims that Moscow was behind a recent hack of DNC servers.

In July, the WikiLeaks website released about 20,000 emails from the DNC, which showed that party leaders had purportedly sought to undermine the presidential campaign of Senator Bernie Sanders.

Clinton Response

The campaign of Democratic presidential nominee Hillary Clinton alleged that Russia had released the emails to influence the November presidential election.

But as Obama and Clinton call for discussions of cyber-attacks, experts say that government-led hacking is already booming, and the lack of international guidelines has led to unintended consequences for ordinary civilians caught up in cyber conflict. The US and the United Nations are each working to develop rules of engagement for the digital arena, but in the meantime, countries are deciding for themselves whether or not to follow the same guidelines for cyber capabilities as they do for traditional weaponry.

The US military should be ready and able to hack back against governments who target the country online, Clinton said. She pointed to the breach of the Democratic National Committee as an example of a cyber-attack against the US, and advocated political, economic and military responses to such attacks.

Of course, the US already engages in plenty of cyber warfare. To use Clinton’s words, the US has hacked into a lot of things. But her speech suggests an expansion of this kind of hacking is the best response to the recent Russian intrusions into the DNC and the Clinton campaign.

Clinton’s technology platform doesn’t include an official stance on offensive hacking, but a source familiar with her campaign says that Clinton would likely respond to a cyber-attack through diplomacy and sanctions, with military response as a last resort.

Hacking back has been a matter of policy debate in the US for years, and the question of how to respond to cyber-attacks isn’t entirely resolved. Most of the debate has centered around how to protect US companies from intellectual property theft, but how and why the US should hack a foreign government is a bit of an open question.

The State Department currently views cyber-attacks as similar to physical ones, and bases its policy on presidential strategy.

Ein News:        TechCrunch:

 

« Does Russia Benefit When Assange Reveals Secrets?
US Spy Agencies Will Analyse Insider-Threats »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

SealPath

SealPath

SealPath enables companies to protect and control their documents wherever they are: In their PC, in their corporate network, on a partner’s network, in the cloud.

Thermo Systems

Thermo Systems

Thermo Systems is a design-build control systems engineering and construction firm. Capabilties include industrial control system cybersecurity.

VisionWare

VisionWare

VisionWare provide consulting services and solutions in areas covering both physical and digital security.

Egis Technology

Egis Technology

Egis specializes in the IC design, research and development, and the testing and sales of capacitive fingerprint sensor.

Wynyard Group

Wynyard Group

Wynyard Group is a niche, technology-driven company specializing in Integrated Border Security solutions for enhanced public safety.

Trust Stamp

Trust Stamp

Trust Stamp provide Identity and Trust as a Service to answer two fundamental questions: “Who are you?” and “Do I trust you?"

Infosequre

Infosequre

Infosequre builds up your security awareness culture and turns your employees into the first line of defense against cyber risks.

LogMeIn

LogMeIn

LogMeIn makes it possible for millions of people and businesses around the globe to do their best work simply and securely—on any device, from any location and at any time.

TRU Staffing Partners

TRU Staffing Partners

TRU Staffing Partners is an award-winning contract staffing and executive search firm for cybersecurity, eDiscovery and privacy companies and professionals.

1898 & Co

1898 & Co

Keep your critical assets secure with a comprehensive portfolio of services from high-level assessments to fully managed security services designed for operational technology applications.

Check Point Software Technologies

Check Point Software Technologies

Check Point Software Technologies is a leading provider of cyber security solutions to governments and corporate enterprises globally.

CYGNVS

CYGNVS

CYGNVS is a guided cyber crisis response platform providing anytime, anyplace access. A SaaS platform for cyber crisis management – a safe way to connect and control your response.

TrustCloud

TrustCloud

TrustCloud is a global company specializing in the orchestration and custody of secure digital transactions including identification, signature, payments, and electronic custody.

Myntex

Myntex

Myntex® builds the future of mobile security. We empower our partners to deliver exclusive mobile endpoint security software, fortifying against mobile threats, device exploits and data exfiltration.

Secher Security

Secher Security

Secher Security is a professional and secure partner with a high level of professional expertise in simplifying and optimizing complex IT infrastructures.

Mira Security

Mira Security

Mira Security provides safe and secure visibility into encrypted traffic allowing the tools used by enterprise security teams to function effectively.