US Is Not Drawing 'Red Lines' in Cyberspace

With so much ambiguity, the cyber domain becomes a dangerous space into which conflicts can overflow, and from which conflicts can quickly escalate, because the rules of engagement are unclear.

The US is avoiding drawing "red lines" in cyberspace to maintain strategic ambiguity about its intentions and retain freedom of maneuver in its responses to online aggression, the deputy head of US Cyber Command said recently.

"Ambiguity, not locking yourself in, is the way that our government prefers to do this," Air Force Lt. Gen. Kevin McLaughlin told the 2016 Intelligence and National Security Summit.

He said he "agreed" with former National Intelligence Officer for Cyber Sean Kanuck, who laid out the reasoning in more detail during the panel discussion on cyber deterrence.   

"Currently most countries don't want to be incredibly specific about the red line for two reasons," explained Kanuck, now a consultant. "They don't want to invite people to do anything they want to below that red line thinking they can do it with impunity; and secondly you don't want to back yourself into a strategic corner where you have to respond if they do something above that red line or else lose credibility."

McLaughlin said attribution, it can be hard to know for sure who is behind a cyberattack, was an issue even outside of cyberspace, but that didn't cripple US response.

As an example, he cited the shooting down of Malaysia Airline's flight 17 en route from Holland over Ukraine, an action that has been attributed to pro-Russian militia using Kremlin-supplied anti-aircraft weapons. 

"It's hard to prove exactly who was behind it," he said of such an attack. "When you bring it to the public there's lots of debate and dialogue." Even with improving attribution, cyberattacks are tricky territory when it comes to response, he acknowledged.

"You get into discussions where it's [about] was that cyber action something you want to deter, or was the cyber action something we think of as a legitimate tool of nation-state [actors], but the end result is something that crossed the line."

Although he didn't give examples, one instance is Chinese hackers' looting of intellectual property from US advanced technology companies. US officials recognize that network intrusion and the theft of sensitive data is a legitimate objective for a national intelligence service. But they say it's wrong to give that data to Chinese companies so they can underbid, or out-engineer, their US competitors.

Cyber is, after all, only a domain, like the air and the sea. It's what the adversary does there, and why, that should dictate the US response, McLaughlin said.

"I think those red lines in cyber will firm up to some degree, but I think we'll see a lot of it generate down to: 'What actually was that country trying to do?' It's often not that the action itself in cyber[space] which was the thing that crossed the red line, it's often what was the objective ... behind it, the end result, that actually crossed the red line."

But with so much ambiguity, the cyber domain becomes a dangerous space into which conflicts can overflow, and from which conflicts can quickly escalate, precisely because the rules of engagement are unclear or poorly understood, Kanuck said.

"There's an interest in ambiguity from a strategic sense, but that also leads to strategic uncertainty," he said.

FedScoop
 

« Uber Starts Self Driving Taxis
Oliver Stone’s Snowden Film »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Assure Technical

Assure Technical

Assure Technical offers a holistic approach to Technical Security. Our expertise and services span across the Physical, Cyber and Counter Surveillance domains.

European Digital Media Association (EDiMA)

European Digital Media Association (EDiMA)

EDiMA, is the European trade association representing online platforms. It is an alliance of new media and Internet companies.

RoboForm

RoboForm

RoboForm's industry-leading encryption technology securely stores your passwords, with one Master Password serving as your encryption key.

Secure360

Secure360

Secure360 focuses on the following key areas: governance, risk and compliance, information security, physical security, business continuity management, and professional development.

Prewen

Prewen

Prewen provide solutions to protect sensitive data across the organisation.

REVI-IT

REVI-IT

REVI-IT is a Danish state-owned audit firm focusing on enterprise IT business processes and compliance,

CyberInt

CyberInt

CyberInt’s Managed Detection and Response services span globally and include some of the top finance, retail and telecommunication organizations.

Dcoya

Dcoya

Dcoya's complete security awareness training program gives you out-of-the-box compliance with PCI-DSS, HIPAA, SOX and ISO regulations.

Ideagen

Ideagen

Ideagen provides information management, safety, risk and compliance software solutions that allow organisations to achieve operational excellence, regulatory compliance and reduce risk.

Jamf

Jamf

Jamf is the only Apple Enterprise Management solution of scale that remotely connects, manages and protects Apple users, devices and services.

Vircom

Vircom

With a large majority of cyber attacks starting with email, Vircom provides protection against the worst email security threats to your business.

Logically.ai

Logically.ai

Logically combines artificial intelligence with expert analysts to tackle harmful and manipulative content at speed and scale.

Metabase Q

Metabase Q

Metabase Q protects you from financial and reputational losses with more efficient and intelligent cybersecurity, using the best worldwide in technologies, processes and specialists.

Sycope

Sycope

Sycope is focused on designing and developing highly specialised IT solutions for monitoring and improving network and application performance.

APCERT

APCERT

APCERT cooperates with CERTs and CSIRTs to ensure internet security in the Asia Pacific region, based around genuine information sharing, trust and cooperation.

Hive

Hive

Hive is a leading provider of cloud-based AI solutions to understand, search, and generate content, and is trusted by hundreds of the world's largest and most innovative organizations.