- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
IDG News Service - Cyberattacks on U.S. networks by other nations may not always demand the same level of retaliation, and only attacks that cause major damage or loss of life should prompt similar responses, a group of national security experts said Wednesday.
Cyberattacks on private companies and even on the U.S. Department of Defense's network are commonplace and part of a long history of international espionage that the U.S. and other countries have engaged in for years, said some panelists speaking at a cyberwar discussion at the Center for Strategic and International Studies (CSIS) in Washington, D.C.
Presented with a scenario similar to a computer compromise at RSA Security, in which the attackers also targeted defense contractor Lockheed Martin, defense consultant Franklin Miller said people getting upset with the attack seem to assume that the U.S. doesn't engage in some of the same practices.
"This is going to happen," said Miller, former senior director for defense policy and arms control at the U.S. National Security Council. "This is what intelligence organizations do."
CSIS fellow Adriane Lapointe presented Miller and other panelists with a series of reality-based scenarios and asked them what the appropriate U.S. government response should be. The CSIS panel came just days after the U.S. Department of Defense said it was prepared to use force to respond to some cyberattacks.
In some cases, attacks that appear to be sponsored by another nation -- including attacks that Google blamed on China in early 2010 -- may prompt the U.S. to file formal complaints, the panelists said. In other cases, the U.S. may want to signal another country that it considered an attack unfair, although it may be more difficult for other countries to read cybersignals than to interpret military aircraft flying near their borders, said James Lewis, director of the CSIS Technology and Public Policy Program.
The cybersignals of displeasure can be clear, said Robert Giesler, former director of information operations and strategic studies in the DOD's Office of the Secretary of Defense. "There are ways you can noisily go about penetrating networks," he said.
In some cases, the signal may not be cyber in nature, Miller added. "You don't have to [signal] in the same medium," he said. "If you want to inflict pain ... you need to find the point of pain. It may not be in the cyberworld. It may be elsewhere."
Countries may need to negotiate rules of engagement for cyber-espionage, panelists said.
Part of the problem with retaliating against other nations for a cyberattack is that it's still difficult to pinpoint where an attack came from, Giesler said. In some cases, compromised companies may attribute an attack to another nation when it's really a case of industrial espionage, he said. In other cases, attacks may come from so-called "patriotic" hackers who are acting on their own initiative, he said.
Even in attacks on DOD networks, "attribution still remains foggy," Giesler said.
Asked about attacks on DOD networks by another country, the panelists said the U.S. should respond, but in most cases, in a limited way. Only if major damage was done should the U.S. consider responding with force, said Judith Miller, former general counsel at the DOD.