Добавить новость

Между Белгородом и Москвой вводятся дополнительные поезда

Борьбу с «серыми перевозчиками» строительных отходов усилят в Подмосковье

Артист Грек пожертвовал миллионы на борьбу с искусственным интеллектом, чтобы защитить будущее

Путин может встретиться с президентом Палестины Аббасом 13 августа

News in English


Новости сегодня

Новости от TheMoneytizer

Why America’s Cyber Strategy is Failing

George Beebe

Security, Americas

Cyber technology is blurring the lines that once separated espionage and warfare.

The pattern has become disturbingly regular. Every few years, evidence surfaces of a major cyber penetration of U.S. networks, and each instance prompts a wave of indignant American calls for tough retaliation.

Last week’s report of the “Solar Winds” operation, a massive new hack of multiple public and private U.S. organizations that has gone undetected for perhaps a year or even longer, is in many ways a repetition of the detection, attribution, and retaliation cycle that has been on endless replay since our discovery of Russia’s infamous “Moonlight Maze” intrusion in the 1990s kicked off a new era of cyber-espionage. Congressmen have called Solar Winds an enormous intelligence failure. President-elect Joe Biden has vowed that he will not stand by idly while our country is being attacked. This time, we say, the Russians (or whoever is behind the intrusion) will pay.

But preventing this kind of thing was exactly what we vowed to do after the last intrusion. In the wake of Russia’s cyber-targeting of American political campaigns and voting systems in 2016, which was followed by signs that Russians had also penetrated the control systems of some American power plants, U.S. strategists decided that merely playing cyber defense and imposing economic and legal penalties on foreign adversaries was not getting the job done. The gap between the capabilities of cyber attackers and cyber defenders was simply too wide for a strategy based on defense and after-the-fact punishment to be effective. Protecting American networks required a new approach, known as “defending forward” or “persistent engagement.”

This meant going on cyber offense to dismantle foreign botnets, to implant sensors and malware inside Russian networks, and force our digital adversaries to play defense against us. Seizing the initiative would, according to the strategists, render our opponents less able to attack us and more concerned that the costs of unbridled offensive operations might outweigh the benefits. In theory, persistent cyber competition between each side’s attackers would eventually produce a stable equilibrium, wherein we all would recognize where the redlines were drawn and respect those boundaries.

This defending forward strategy has been official U.S. policy since 2018, and Trump administration officials have claimed that it helped to limit interference in that fall’s midterm elections. The Solar Winds intrusion suggests that the United States needs to do more to manage and stabilize our cyber competition with Russia and other online opponents.

The fundamental problem is that we regard the cyber arena as essentially a deterrence matter, in which we can employ the concept of mutual vulnerability to dissuade our rivals from attacking us, much like we did during the Cold War. Then, as now, the offense had distinct advantages over the defense. Each side came to recognize that the other had an ability to annihilate its adversary no matter the defender’s efforts. This imbalance between offensive and defense created a mutual interest in avoiding a suicidal conflict, and Washington and Moscow found ways to preserve a reliable state of mutual vulnerability through arms control agreements that stabilized their competition.

But the cyber arena is much less amenable to forging a stable equilibrium. Unlike in the nuclear arena, cyber vulnerabilities change over time—software flaws pop in and out of existence as they are created, discovered, exploited, and patched. Malware often must be custom-made to take advantage of specific flaws, and its effectiveness ends when the flaws and exploits are detected. Unlike a nuclear-tipped missile that retains its capabilities for decades, whose presence and potential are clear to all concerned, cyber weapons are ephemeral and easily camouflaged phenomena. They require an unending process of finding and exploiting ever more vulnerabilities on the other side, in the expectation that each exploit will eventually be discovered and neutralized. Neither side in the competition can ever be confident that its offensive capabilities have produced a stable state of mutual cyber deterrence.

Moreover, cyber technology is blurring the lines that once separated espionage and warfare. In the bad old days, the United States and Soviet Union used human agents, satellite imagery, and signals interception to collect intelligence on the other side’s capabilities and intentions. These tools were easily distinguishable from missiles and tanks and other weapons of war. Today, much collection is done through cyber espionage, but it is a form of intelligence gathering that also can be used for non-kinetic military attacks. The Solar Winds intrusion may be aimed primarily at espionage, but we cannot be sure it is not also intended to alter or destroy data or even one day to sabotage critical American systems. And the easiest way to discern its intentions is to penetrate the perpetrator’s systems and gather cyber intelligence on what it is up to.

But this fuels exactly the same dynamic of detection and response on the part of our adversaries, for exactly the same reasons that we ourselves are incentivized to go on the offensive. Given the inherent vulnerabilities of all networks to such ambiguities and penetrations, this cycle of action and reaction is difficult to break.

It is also too dangerous to ignore. In a world where supply chains and commercial transactions and early warning systems and nuclear command and control are all digitally based, cyber sabotage could have enormously damaging—even existential—consequences. Awareness that these systems are vulnerable to cyber penetration, coupled with the difficulty of distinguishing cyber espionage against them from destructive sabotage, could make managing a regional crisis involving Russia or China far more precarious than it was in the Cold War era. The redlines in this escalating cyber competition might become apparent only after they are crossed.

What then should we do? Showing Moscow that we can hold Russian systems at risk is a necessary part of the solution, but it is only one part. Ironically, our new “persistent engagement” strategy has ruled out diplomatic engagement with Russia that might establish some rules of the cyber road and encourage mutual restraint. We have mistakenly regarded diplomacy as a reward for bad Russian behavior, when in fact it is an indispensable element of our own self-defense. We have deluded ourselves into believing that we can pressure the Russians into curtailing their intrusions without having to restrain our own operations.

We cannot rely on deterrence and mutual restraint pledges by themselves, however. We need to weaken the perilous link between cyber espionage and cyber sabotage by old-fashioned hardening of our critical infrastructure and reducing our dependency on digital networks. Putting in place manual back-ups for GPS and power generation systems, voting tabulators, early-warning satellites, weapons controls, and other critical functions would both reduce our adversaries’ incentives to target them and increase our confidence that we are not vulnerable to single points of failure if they are sabotaged. Building such resilience and redundancy will be expensive. The alternative, however, could be catastrophic.

George Beebe is the Vice President and Director of Studies at the Center for the National Interest, former head of Russia analysis at the Central Intelligence Agency, and author of The Russia Trap: How Our Shadow War with Russia Could Spiral into Nuclear Catastrophe.

Image: Reuters.

Читайте на 123ru.net


Новости 24/7 DirectAdvert - доход для вашего сайта



Частные объявления в Вашем городе, в Вашем регионе и в России



Smi24.net — ежеминутные новости с ежедневным архивом. Только у нас — все главные новости дня без политической цензуры. "123 Новости" — абсолютно все точки зрения, трезвая аналитика, цивилизованные споры и обсуждения без взаимных обвинений и оскорблений. Помните, что не у всех точка зрения совпадает с Вашей. Уважайте мнение других, даже если Вы отстаиваете свой взгляд и свою позицию. Smi24.net — облегчённая версия старейшего обозревателя новостей 123ru.net. Мы не навязываем Вам своё видение, мы даём Вам срез событий дня без цензуры и без купюр. Новости, какие они есть —онлайн с поминутным архивом по всем городам и регионам России, Украины, Белоруссии и Абхазии. Smi24.net — живые новости в живом эфире! Быстрый поиск от Smi24.net — это не только возможность первым узнать, но и преимущество сообщить срочные новости мгновенно на любом языке мира и быть услышанным тут же. В любую минуту Вы можете добавить свою новость - здесь.




Новости от наших партнёров в Вашем городе

Ria.city

Движение поездов МЦД-2 через станцию Царицыно в центр Москвы возобновится с 12 августа

В аэропорту Благовещенска 300 пассажиров более суток не могут улететь в Москву

В Москве возбудили уголовное дело после ДТП с подростками

Маломобильным гостям форума-фестиваля «Москва 2030» помогут на «Станции Манеж»

Музыкальные новости

Собянин: Москва направит в помощь Курской области свои силы и ресурсы

Боррель: удару по школе в Газе нет оправдания

Я очень люблю ваш город: актер Сергей Безруков поздравил Суздаль с 1000-летием

Воробьев сделал символическое вбрасывание шайбы перед финалом Кубка Овечкина

Новости России

Необычная стена из растений появилась у входа в Московский зоопарк

Музей Москвы откроет новую выставку в августе

Артист Грек пожертвовал миллионы на борьбу с искусственным интеллектом, чтобы защитить будущее

В аэропорту Благовещенска 300 пассажиров более суток не могут улететь в Москву

Экология в России и мире

Обложка песни. Обложки альбомов песен.

Обложка песни. Обложки альбомов песен. Сделать обложку для песни.

BIA Technologies наградила победителей международного конкурса математических докладов Best Paper Award

Жители столицы популярнейшей страны начинают массовое бегство из города, который оккупировали туристы и мигранты, и это вовсе не Париж

Спорт в России и мире

Теннисист Зверев раскритиковал условия в Олимпийской деревне

Медведев и Сафиуллин не смогли выйти в 1/2 финала турнира ATP в Монреале в парном разряде

Рублёв вышел в 1/4 финала турнира ATP в Монреале

Рублев обыграл первую ракетку мира в четвертьфинале «Мастерса» в Монреале

Moscow.media

В Самаре за взятку пойдёт под суд один из руководителей Минстроя

Эксперт: американский эксперимент не сможет ответить живём ли мы в симуляции

Большой стадионный концерт MACAN в Москве при поддержке Like FM

43664











Топ новостей на этот час

Rss.plus






Необычные проекты реализовали в рамках фестиваля «Лето в Москве. Сады и цветы»

Музей Москвы откроет новую выставку в августе

Ефимов: школу и детский сад построят в Тропарево-Никулине по программе КРТ

Артист Грек пожертвовал миллионы на борьбу с искусственным интеллектом, чтобы защитить будущее