Categories: Cyber warfare

Is US really thinking to preemptive cyber attacks as deterrent?

Cyberspace is abuzz with activity. Governments are secretly conducting cyber operations. Everyday, we read about malicous code used to steal information; or about cyber attacks that target critical infrastructure. The principal question raised by these fervent activities are rules of engagement and proportionality of defense – the operative limit of country that discovers an attack against its network. Can we envisage an automated decision making process in defence?

Recently many cases have highlighted intense cyber espionage activity against US Government and private industries with intent to steal information. The principal suspect is China, due to characteristic techniques adopted by hackers. Obviously this is just tip of iceberg.

The Obama administration has discovered that the President has power to order preemptive cyberattack to discourage those who    violate the US network, especially China, which is unresponsive to US efforts to mitigate attacks.

Last Sunday ‘The New York Times published an interesting article on the possibility of President Obama ordering a strike to respond to imminent cyber threats against critical national infrastructures.
The measure is limited to Homeland security menaced by threats that affect assets critical for the country and does not cover attacks on private industry like cyber espionage.

New policies will also govern how the intelligence agencies can carry out searches of faraway computer networks for signs of potential attacks on the United States and, if the president approves, attack adversaries by injecting them with destructive code — even if there is no declared war.”

The alert level has increased after the recent attacks on media agencies. Security experts are convinced that they are state-sponsored operations due the means and methods adopted.

The discussion on a possible preemptive attacks is in my opinion a provocation; it’s clear that that both US and China are pursuing their cyber strategies and are respectively conscious of the cyber capabilities of their adversaries; the declarations are a public admission of failure of diplomatic efforts.

US could increase pressure on China requiring for example major purchases of Chinese goods to go through national security reviews, according to the Council on Foreign Relations (CFR), but  that is very different from the organization of a cyber attacks for demonstrative purpose.

Is Obama’s administration really willing to give up so prolific commercial relationship?

“Adam Segal wrote in a blog post that China has responded by saying through the People’s Daily that the administration’s position could trigger a worldwide arms race.”

The U.S. threat of a pre-emptive strike could increase risk overall, and preemptive attack could be addressed against the wrong targets due the difficulty in locating the origin of attack

We must also consider that governments will continue to operate secretly in cyber space also on the offensive front and that statements of a pre-emptive attack are only a warning to the world about cyber capabilities of the country.

Cyber weaponry is the most complex arms race under way.  Declaration of preemptive cyberattack are useless.

cyber war is much more subtle and dangerous than preemptive cyber attack!

Pierluigi Paganini

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

MITRE revealed that nation-state actors breached its systems via Ivanti zero-days

The MITRE Corporation revealed that a nation-state actor compromised its systems in January 2024 by…

3 hours ago

FBI chief says China is preparing to attack US critical infrastructure

China-linked threat actors are preparing cyber attacks against U.S. critical infrastructure warned FBI Director Christopher…

15 hours ago

United Nations Development Programme (UNDP) investigates data breach

The United Nations Development Programme (UNDP) has initiated an investigation into an alleged ransomware attack…

18 hours ago

FIN7 targeted a large U.S. carmaker with phishing attacks

BlackBerry reported that the financially motivated group FIN7 targeted the IT department of a large…

1 day ago

Law enforcement operation dismantled phishing-as-a-service platform LabHost

An international law enforcement operation led to the disruption of the prominent phishing-as-a-service platform LabHost.…

1 day ago

Previously unknown Kapeka backdoor linked to Russian Sandworm APT

Russia-linked APT Sandworm employed a previously undocumented backdoor called Kapeka in attacks against Eastern Europe since…

2 days ago

This website uses cookies.