DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports Events Over 2 million developers have joined DZone. Join Today! Thanks for visiting DZone today,
Edit Profile Manage Email Subscriptions Moderation Admin Console How to Post to DZone Article Submission Guidelines
View Profile
Sign Out
Refcards
Trend Reports
Events
Zones
Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Partner Zones AWS Cloud
by AWS Developer Relations
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Partner Zones
AWS Cloud
by AWS Developer Relations
The Latest "Software Integration: The Intersection of APIs, Microservices, and Cloud-Based Systems" Trend Report
Get the report

USCYBERCOM Strikes Back

Learn more about the US is fighting back in an open, offensive cyber campaign.

Christopher Lamb user avatar by
Christopher Lamb
CORE ·
Mar. 05, 19 · News
Like (1)
Save
Tweet
Share
3.18K Views

Join the DZone community and get the full member experience.

Join For Free

Image titleFor the first time, it seems the United States has executed an open, offensive cyber campaign against a foreign target. Multiple sources have reported over the past few days, and are reporting today, that the US Cyber Command attacked the Internet Research Agency during the mid-term elections to prevent Russian manipulation of social media.

Overall, this aligns with the Trump administration's hawkish position on offensive cyber capabilities. In August of 2018, president Trump signed an order reversing Presidential Rule 20. Presidential Rule 20, enacted by the Obama administration, assembled a large, complex network of approvals needed for cyber operation approval, essentially making offensive cyber operations bureaucratically impossible. The Trump administration, guided by John Bolton, removed many of these restrictions and vastly simplified the process, leading us to where we are today.

Interestingly, both the United States and Russia have confirmed these operations, which seemed to target the ability of the Internet Research Agency, an organization widely regarded to be an Internet propaganda arm of the Russian government, to effectively execute offensive propaganda operations. These operations are widely believed to have changed the dynamics of the last presidential race while also fanning the flames of domestic partisan political division.

The attacks themselves seem to have been targeted, information destruction attacks. The impact of the attacks is difficult to define, but there did seem to be much less interference in the congressional mid-term elections in the United States than there had been previously. That said, however, major social media and technology companies have increased efforts to curtail this kind of thing as well, making attribution for the shortfall in Internet social manipulation difficult to define.

The attacks do seem to be a measured response to ongoing cyber/social attacks engineered by and executed from the Internet Research Agency. As such, they are unlikely to unleash anything but a proportionate response. That said, advanced threat groups, like APT28 and 29, have been persecuting more destructive attacks against western organizations and infrastructure over the past decade, so proportionate is difficult to define.

This is the biggest risk of cyber engagement today.

These kinds of cyber interactions are persecuted in a grey area of first-of-breed nation-state interaction. Internationally, we have yet to collectively define appropriate responses for cyber attacks, and this makes this kind of interaction, even in relatively benign cases like this, risky. In this case, it seems clear that no specific retribution is warranted, and escalation is very unlikely. But this becomes much less clear if countries start attacking critical physical or economic infrastructure, especially at scale. Large scale system degradation of this kind can easily escalate into the kinetic realm, particularly if cyber attacks generate physical casualties. After all, hospitals need power too, as do plumbing systems in large urban areas. The city I live in, for example, is built on the side of a mountain, and all water is pumped from lower areas to higher. A week without power, especially in the summer, will lead to fatalities.

Though not widely reported, this is a significant step forward in cyber-political interaction and heralds a widespread recognition of cyber as a policy tool.

Internet Research (journal)

Opinions expressed by DZone contributors are their own.

Popular on DZone

  • mTLS Everywere
  • Rust vs Go: Which Is Better?
  • Strategies for Kubernetes Cluster Administrators: Understanding Pod Scheduling
  • OpenVPN With Radius and Multi-Factor Authentication

Comments

Partner Resources

X

ABOUT US

  • About DZone
  • Send feedback
  • Careers
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 600 Park Offices Drive
  • Suite 300
  • Durham, NC 27709
  • support@dzone.com
  • +1 (919) 678-0300

Let's be friends: