Categories: Cyber warfare

Is US really thinking to preemptive cyber attacks as deterrent?

Cyberspace is abuzz with activity. Governments are secretly conducting cyber operations. Everyday, we read about malicous code used to steal information; or about cyber attacks that target critical infrastructure. The principal question raised by these fervent activities are rules of engagement and proportionality of defense – the operative limit of country that discovers an attack against its network. Can we envisage an automated decision making process in defence?

Recently many cases have highlighted intense cyber espionage activity against US Government and private industries with intent to steal information. The principal suspect is China, due to characteristic techniques adopted by hackers. Obviously this is just tip of iceberg.

The Obama administration has discovered that the President has power to order preemptive cyberattack to discourage those who    violate the US network, especially China, which is unresponsive to US efforts to mitigate attacks.

Last Sunday ‘The New York Times published an interesting article on the possibility of President Obama ordering a strike to respond to imminent cyber threats against critical national infrastructures.
The measure is limited to Homeland security menaced by threats that affect assets critical for the country and does not cover attacks on private industry like cyber espionage.

New policies will also govern how the intelligence agencies can carry out searches of faraway computer networks for signs of potential attacks on the United States and, if the president approves, attack adversaries by injecting them with destructive code — even if there is no declared war.”

The alert level has increased after the recent attacks on media agencies. Security experts are convinced that they are state-sponsored operations due the means and methods adopted.

The discussion on a possible preemptive attacks is in my opinion a provocation; it’s clear that that both US and China are pursuing their cyber strategies and are respectively conscious of the cyber capabilities of their adversaries; the declarations are a public admission of failure of diplomatic efforts.

US could increase pressure on China requiring for example major purchases of Chinese goods to go through national security reviews, according to the Council on Foreign Relations (CFR), but  that is very different from the organization of a cyber attacks for demonstrative purpose.

Is Obama’s administration really willing to give up so prolific commercial relationship?

“Adam Segal wrote in a blog post that China has responded by saying through the People’s Daily that the administration’s position could trigger a worldwide arms race.”

The U.S. threat of a pre-emptive strike could increase risk overall, and preemptive attack could be addressed against the wrong targets due the difficulty in locating the origin of attack

We must also consider that governments will continue to operate secretly in cyber space also on the offensive front and that statements of a pre-emptive attack are only a warning to the world about cyber capabilities of the country.

Cyber weaponry is the most complex arms race under way.  Declaration of preemptive cyberattack are useless.

cyber war is much more subtle and dangerous than preemptive cyber attack!

Pierluigi Paganini

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 84

Security Affairs Malware newsletter includes a collection of the best articles and research on malware…

2 hours ago

Security Affairs newsletter Round 563 by Pierluigi Paganini – INTERNATIONAL EDITION

A new round of the weekly Security Affairs newsletter has arrived! Every week, the best…

2 hours ago

Fintech firm Figure disclosed data breach after employee phishing attack

Fintech firm Figure confirmed a data breach after hackers used social engineering to trick an…

23 hours ago

U.S. CISA adds a flaw in BeyondTrust RS and PRA to its Known Exploited Vulnerabilities catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in BeyondTrust RS and…

24 hours ago

Suspected Russian hackers deploy CANFAIL malware against Ukraine

A new alleged Russia-linked APT group targeted Ukrainian defense, government, and energy groups, with CANFAIL…

1 day ago

New threat actor UAT-9921 deploys VoidLink against enterprise sectors

A new threat actor, UAT-9921, uses the modular VoidLink framework to target technology and financial…

2 days ago

This website uses cookies.