{"id":5872,"date":"2016-10-14T09:01:25","date_gmt":"2016-10-14T14:01:25","guid":{"rendered":"http:\/\/huewhite.com\/umb\/?p=5872"},"modified":"2016-10-14T09:01:25","modified_gmt":"2016-10-14T14:01:25","slug":"what-to-do-about-cybermeddling","status":"publish","type":"post","link":"https:\/\/huewhite.com\/umb\/2016\/10\/14\/what-to-do-about-cybermeddling\/","title":{"rendered":"What To Do About CyberMeddling"},"content":{"rendered":"<p>The announcement that the United States would response &#8220;proportionately&#8221; to the alleged hacks by Russia of the American electoral process (by which I encompass both the Democratic database as well as various State-level electoral processes) has drawn various responses. <a href=\"https:\/\/www.lawfareblog.com\/us-cyber-deterrence-strategy-more-russian-roulette\" target=\"_blank\" data-saferedirecturl=\"https:\/\/www.google.com\/url?hl=en&amp;q=https:\/\/www.lawfareblog.com\/us-cyber-deterrence-strategy-more-russian-roulette&amp;source=gmail&amp;ust=1476482359042000&amp;usg=AFQjCNF5faKGf7CFgAbHOn92RRk9vEKsBQ\">First up <\/a>is Susan Hennessey on <i><b>Lawfare<\/b><\/i>, who covers the uncertainties of cyberwarefare episodes and provides a lot of interesting thoughts on the situation:<\/p>\n<blockquote><p>Public attribution is itself a significant government response and elucidates some of the administration\u2019s sensibilities regarding line-drawing. But it also raises a difficult question about how we should think about what we are responding to. It appears that the trigger for the Obama administration was the targeting of election infrastructure and the threat to actual or perceived electoral integrity. But it is unclear that the type of election system intrusion thus far at issue\u2014probing and scanning but not disrupting\u2014would have been enough to warrant a response by itself. By linking the two activities together and to an overarching motivation\u2014to interfere with the electoral process\u2014the Administration is signaling that its response is to a course of conduct, not a single event.<\/p>\n<p dir=\"ltr\">Taking a broad view is sensible where Russia undertakes hybrid actions\u2014intrusion into computer systems (malicious cyber activity) combined with the strategic release of documents (information warfare)\u2014as well as larger efforts to undertake many distinct activities to achieve an overall goal\u2014to sow distrust in the US electoral system. But the broad view here\u2014where individual \u201c<a href=\"https:\/\/www.lawfareblog.com\/national-security-adaptations-below-established-threshold-activities\" target=\"_blank\" rel=\"nofollow\" data-saferedirecturl=\"https:\/\/www.google.com\/url?hl=en&amp;q=https:\/\/www.lawfareblog.com\/national-security-adaptations-below-established-threshold-activities&amp;source=gmail&amp;ust=1476482359042000&amp;usg=AFQjCNGmov_VNJUl5g95SEOYU5Z3a5lNyw\">below established threshold activities<\/a>\u201d combine to cross the threshold\u2014also requires knowing what to group together.<\/p>\n<p dir=\"ltr\">We simultaneously engage Russia in cyberspace in a great many contexts, just as we do in diplomacy. And not everything is related. As Jack noted in a recent panel at <a href=\"https:\/\/yalelaw.hosted.panopto.com\/Panopto\/Pages\/Viewer.aspx?id=6f45c286-c6c2-4810-b432-434d32ba7ec2\" target=\"_blank\" rel=\"nofollow\" data-saferedirecturl=\"https:\/\/www.google.com\/url?hl=en&amp;q=https:\/\/yalelaw.hosted.panopto.com\/Panopto\/Pages\/Viewer.aspx?id%3D6f45c286-c6c2-4810-b432-434d32ba7ec2&amp;source=gmail&amp;ust=1476482359042000&amp;usg=AFQjCNEHGJiJcImAejy_2oL4cHO2fr40Fg\">Yale Law School<\/a>, when we step back, it\u2019s hard to know where the DNC and related leaks fall in the deterrence cycle. Are the leaks Russian retaliation for US action, such as imposing sanctions for Crimea? Or are the leaks intended by Russia to be a deterrent response to US cyber espionage? Or is this, as the White House statement would indicate, just a general attempt by Russia to see if it can sway the US election in its favor? Intelligence collection can answer some of those questions. But persistent uncertainty is a feature of cyber conflicts that is unlikely to ever resolve entirely.<\/p>\n<\/blockquote>\n<p dir=\"ltr\">It&#8217;s worth reading the whole article.\u00a0She also provides this <a href=\"http:\/\/1yxsm73j7aop3quc9y5ifaw3.wpengine.netdna-cdn.com\/wp-content\/uploads\/2015\/12\/Report-on-Cyber-Deterrence-Policy-Final.pdf\" target=\"_blank\" data-saferedirecturl=\"https:\/\/www.google.com\/url?hl=en&amp;q=http:\/\/1yxsm73j7aop3quc9y5ifaw3.wpengine.netdna-cdn.com\/wp-content\/uploads\/2015\/12\/Report-on-Cyber-Deterrence-Policy-Final.pdf&amp;source=gmail&amp;ust=1476482359042000&amp;usg=AFQjCNEYwSERIGNhIp7PmZyffQBIEQfR3g\">link <\/a>to the US policy on cyber deterrence &#8211; which I have not read.<\/p>\n<p>Karl Bode on <i><b>techdirt <\/b><\/i>prefers to <a href=\"https:\/\/www.techdirt.com\/articles\/20161012\/05432935779\/obama-promises-proportional-response-to-russian-hacking-ignores-that-we-started-fight.shtml\" target=\"_blank\" data-saferedirecturl=\"https:\/\/www.google.com\/url?hl=en&amp;q=https:\/\/www.techdirt.com\/articles\/20161012\/05432935779\/obama-promises-proportional-response-to-russian-hacking-ignores-that-we-started-fight.shtml&amp;source=gmail&amp;ust=1476482359042000&amp;usg=AFQjCNEsw3T_d-p0FporAb1wpcJOc6ykow\">attempt <\/a>to occupy the moral high ground:<\/p>\n<blockquote><p>We&#8217;ve noted <a href=\"https:\/\/www.techdirt.com\/articles\/20160725\/17545035064\/declaring-cyberwar-russia-because-dnc-hack-is-bad-idea.shtml\" target=\"_blank\" data-saferedirecturl=\"https:\/\/www.google.com\/url?hl=en&amp;q=https:\/\/www.techdirt.com\/articles\/20160725\/17545035064\/declaring-cyberwar-russia-because-dnc-hack-is-bad-idea.shtml&amp;source=gmail&amp;ust=1476482359042000&amp;usg=AFQjCNFUzpPtem_g0bo23T_VtmN_wGnD4g\">several times<\/a> how launching cyberwar (or <a href=\"https:\/\/www.techdirt.com\/articles\/20160901\/14363235418\/hillary-clinton-thinks-real-world-military-responses-to-hacking-attacks-are-nifty-idea.shtml\" target=\"_blank\" data-saferedirecturl=\"https:\/\/www.google.com\/url?hl=en&amp;q=https:\/\/www.techdirt.com\/articles\/20160901\/14363235418\/hillary-clinton-thinks-real-world-military-responses-to-hacking-attacks-are-nifty-idea.shtml&amp;source=gmail&amp;ust=1476482359042000&amp;usg=AFQjCNG5wHZ2GnkJjHD-ohg2R-Pr__mLjA\">real war<\/a>) on Russia over the recent spike in hack attacks is a notably idiotic idea. One, the United States effectively wrote the book on hacking other countries causing all manner of harm (hello, Stuxnet), making the narrative that we&#8217;re somehow defending our honor from shady international operatives foundationally incorrect. And two, any hacker worth his or her salt either doesn&#8217;t leave footprints advertising their presence, or may conduct false flag operations raising the risk of attacking the <i>wrong party<\/i>. &#8230;<\/p>\n<p>Again though, the very idea that the United States would be &#8220;responding&#8221; is fundamentally incorrect. We&#8217;ve been engaged in nation state hacking and election fiddling <i>for decades<\/i>, happily hacking the planet for almost as long as the internet has existed. We use <a href=\"https:\/\/www.washingtonpost.com\/news\/the-switch\/wp\/2016\/07\/29\/america-is-hacking-other-countries-with-stealthy-submarines\/\" target=\"_blank\" data-saferedirecturl=\"https:\/\/www.google.com\/url?hl=en&amp;q=https:\/\/www.washingtonpost.com\/news\/the-switch\/wp\/2016\/07\/29\/america-is-hacking-other-countries-with-stealthy-submarines\/&amp;source=gmail&amp;ust=1476482359042000&amp;usg=AFQjCNFdE9EKe0fWumFQvNmPJl0ePyAlQg\">submarines as underwater hacking platforms<\/a>, the U.S. government and its laundry list of contractors routinely <a href=\"http:\/\/www.reuters.com\/article\/us-election-intelligence-commentary-idUSKCN10F1H5\" target=\"_blank\" data-saferedirecturl=\"https:\/\/www.google.com\/url?hl=en&amp;q=http:\/\/www.reuters.com\/article\/us-election-intelligence-commentary-idUSKCN10F1H5&amp;source=gmail&amp;ust=1476482359042000&amp;usg=AFQjCNFAWfkzxiOtWCPpTtwwKvVPztm-ZQ\">hacking and fiddling with international elections<\/a> and <a href=\"https:\/\/www.techdirt.com\/articles\/20160405\/09295334108\/destroying-reputations-hacking-elections-fun-profit.shtml\" target=\"_blank\" data-saferedirecturl=\"https:\/\/www.google.com\/url?hl=en&amp;q=https:\/\/www.techdirt.com\/articles\/20160405\/09295334108\/destroying-reputations-hacking-elections-fun-profit.shtml&amp;source=gmail&amp;ust=1476482359042000&amp;usg=AFQjCNGBMR1jb4W3d0A3A9mHWnXLt38G4w\">destroying reputations when and if it&#8217;s convenient<\/a> to our global business interests. Our behavior in 1970s South America giving tech support to <a href=\"https:\/\/en.wikipedia.org\/wiki\/Operation_Condor\" target=\"_blank\" data-saferedirecturl=\"https:\/\/www.google.com\/url?hl=en&amp;q=https:\/\/en.wikipedia.org\/wiki\/Operation_Condor&amp;source=gmail&amp;ust=1476482359042000&amp;usg=AFQjCNFgIYrIV7bS0K52iEPM8s82harhiQ\">Operation Condor<\/a> is the dictionary definition of villainy.<\/p><\/blockquote>\n<p>He is probably correct on the technical aspects, although I&#8217;m no expert. However, on the stickier aspects, I do not think past moral indignities that stained\u00a0our country&#8217;s honor, as repugnant as they were, and even eventually counterproductive, requires us to bare our breast to the bloody blade of the assassin. Perhaps we should examine the histories of all countries, and then demand that each sacrifice in proportion to their past crimes?<\/p>\n<p>It&#8217;d be one poverty-stricken world after that exercise.<\/p>\n<p>We might be better served by examining how poorly the previous behaviors have served us in the long run, ruining\u00a0our reputations, etc, and then vow to do better in the future. And if Russia is indeed involved in this mess, respond. Perhaps Karl should review the behavior of Russia in World War II.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The announcement that the United States would response &#8220;proportionately&#8221; to the alleged hacks by Russia of the American electoral process (by which I encompass both the Democratic database as well as various State-level electoral processes) has drawn various responses. First up is Susan Hennessey on Lawfare, who covers the uncertainties \u2026 <a class=\"continue-reading-link\" href=\"https:\/\/huewhite.com\/umb\/2016\/10\/14\/what-to-do-about-cybermeddling\/\"> Continue reading <span class=\"meta-nav\">&rarr; <\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"nf_dc_page":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-5872","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/huewhite.com\/umb\/wp-json\/wp\/v2\/posts\/5872","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/huewhite.com\/umb\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/huewhite.com\/umb\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/huewhite.com\/umb\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/huewhite.com\/umb\/wp-json\/wp\/v2\/comments?post=5872"}],"version-history":[{"count":2,"href":"https:\/\/huewhite.com\/umb\/wp-json\/wp\/v2\/posts\/5872\/revisions"}],"predecessor-version":[{"id":5883,"href":"https:\/\/huewhite.com\/umb\/wp-json\/wp\/v2\/posts\/5872\/revisions\/5883"}],"wp:attachment":[{"href":"https:\/\/huewhite.com\/umb\/wp-json\/wp\/v2\/media?parent=5872"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/huewhite.com\/umb\/wp-json\/wp\/v2\/categories?post=5872"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/huewhite.com\/umb\/wp-json\/wp\/v2\/tags?post=5872"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}