Trump Relaxes US Cyber Attack Rules

President Trump has signed an order relaxing rules around the use of cyber-weapons.

It is a reversal of guidelines, drawn up under President Obama, which required a large number of federal agencies to be involved in any decision to launch a cyber-attack. Specific details of what the new rules will be are classified information. One official said the US was taking "an offensive step forward".

The US administration is under pressure to deal with cyber-threats, amid growing concerns that state-sponsored hacks could hit critical infrastructure.

Prof Alan Woodward, a computer scientist at the University of Surrey, told the BBC: "We are in a era when certain governments are acting aggressively in cyber-space, and that is rightly condemned by governments such as that in the US.

"To respond in kind is not necessarily the way to de-escalate the situation."

He added: "You wouldn't allow a pre-emptive physical attack without thorough analysis and approval at the highest levels, so why would cyber-attacks be any different?"

The rules for using cyber-weapons set out by President Obama involved multi-agency sign-off, but were criticised by some law-makers as being too bureaucratic.

The classified procedure was leaked in 2013 by former intelligence contractor Edward Snowden.

In June this year, the US imposed sanctions on five Russian companies for allegedly aiding Russia's main intelligence agency.

The firms, along with three individuals, are prohibited from any transactions involving the US financial system, and US firms are barred from doing business with them.

Three of those named have links to Divetechnoservices, a company that allegedly specialises in hacking into undersea communication cables.

BBC:

You Might Also Read:

Trump Blames Obama For Russian Cyber-Attack

« How Blockchain Can Protect IoT Devices
Hamas Turns To Instagram To Lure IDF Soldiers »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Clifford Chance

Clifford Chance

Clifford Chance are one of the world's pre-eminent law firms with resources across five continents. Practice areas include Cyber Security & Information Protection

Thycotic

Thycotic

Thycotic prevents cyber attacks by securing passwords, protecting endpoints and controlling application access.

BlueID

BlueID

BlueID is an IDaaS technology product which enables your objects to securely connect and interact with your users’ smart phones and smart watches.

Aujas

Aujas

Aujas helps organizations manage information security risks by protecting data, software, people and identities in alignment with best practices and compliance requirements.

Maticmind

Maticmind

Maticmind is an ICT System Integrator providing solutions and specialized skills in Networking, Security, Unified Communications & Collaboration, Datacenter & Cloud and Application.

authUSB

authUSB

authUSB Safe Door is a tool that provides secure access to the content of USB devices that circulate in organizations.

NGS (UK)

NGS (UK)

NGS (UK) Ltd are independent, vendor agnostic, next generation security trusted advisors, providing all-encompassing solutions from the perimeter to the endpoint.

Africa ICS Cyber Security Conference

Africa ICS Cyber Security Conference

Africa's largest ICS Cyber Security Conference and Expo. The only platform that will proudly present top level B2B and B2C networking opportunities.

The Cyber AB

The Cyber AB

The Cyber AB is the official accreditation body of the Cybersecurity Maturity Model Certification (CMMC) Ecosystem.

Eureka Technology Partners

Eureka Technology Partners

Eureka Technology Partners are committed to helping you focus on your business by taking care of your IT infrastructure and data security needs.

Axur

Axur

Discover and eliminate digital fraud and risks on the web. Utilize Axur’s entire AI potential, along with thousands of bots dispersed throughout the surface web as well as the deep and dark web.

Centre for Cyber Security Belgium (CCB)

Centre for Cyber Security Belgium (CCB)

The Centre for Cyber Security Belgium is the central authority for cyber security in Belgium.

OSC Edge

OSC Edge

OSC was founded with the vision of providing expert solutions in IT to government and businesses. OSC Edge empowers organizations with solutions that prepare them for today and tomorrow.

Schellman

Schellman

Schellman is a leading provider of attestation and compliance services.

Smile Identity

Smile Identity

Smile Identity helps businesses confirm the true identity of their users in real-time using any smartphone or computer.

CentriVault

CentriVault

CentriVault is a leading independent provider of Cyber Security and Data protection services to small and medium enterprises (SMEs).

ERCOM

ERCOM

Ercom, a subsidiary of the Thales Group, is a French company known for its mobility security solutions.