Security

Obama and Clinton weigh in on cyber warfare tactics

Comment

Image Credits:

Russia’s recent intrusions into American political organizations’ networks are driving discussions about the rules of engagement for cyber warfare, and forcing America’s own hacking of foreign governments into the light.

President Barack Obama told reporters at the G-20 summit in China that he has been in discussions with other world leaders, including Russian president Vladimir Putin, about creating a set of standards for cyber warfare. The debate over how and when to hack another nation has also reached the presidential race, with Democratic candidate Hillary Clinton calling last week for increased cyber capability for the U.S. military and for international norm-setting.

“Look, we’re moving into a new era here where a number of countries have significant capacities,” Obama said. “But our goal is not to suddenly, in the cyber arena, duplicate a cycle of escalation that we saw when it comes to other arms races in the past, but rather to start instituting some norms so everybody’s acting responsibly.”

But as Obama and Clinton call for discussions of cyber attacks, experts say that government-led hacking is already booming, and the lack of international guidelines has led to unintended consequences for ordinary civilians caught up in cyber conflict. The U.S. and the United Nations are each working to develop rules of engagement for the digital arena, but in the meantime, countries are deciding for themselves whether or not to follow the same guidelines for cyber capabilities as they do for traditional weaponry.

“This behavior is already being engaged in. We don’t have the procedures in place but we’re already engaging in that way, so we’re putting the cart before the horse,” says Amie Stepanovich, U.S. policy manager at the digital rights organization Access Now.

Stepanovich points to examples of U.S. hacking efforts like Stuxnet, malware believed to be developed in a U.S.-Israeli collaboration that spread beyond the Iranian nuclear facility that was its initial target, or a 2012 NSA exploit that knocked the entire country of Syria offline. These incidents, she says, demonstrate how cyber attacks can unintentionally impact broad swaths of the population — and show why nations need clear rules about cyber attacks on infrastructure.

“It’s something the next administration is going to have to address. All of our interactions are moving into the digital space very quickly and we’re seeing cyber activity that could determine the outcome of an election,” Stepanovich says. “Making sure there are protections for human rights and for people becomes exceptionally important on the internet because we all use the same infrastructure.”

Clinton is positioning herself to lead that conversation. Her remarks last week at the American Legion convention offered insight into how the Democratic presidential candidate views the recent cyber attacks against Democratic organizations, and how she believes the U.S. should respond.

The U.S. military should be ready and able to hack back against governments who target the country online, Clinton said. She pointed to the breach of the Democratic National Committee as an example of a cyber attack against the U.S., and advocated political, economic and military responses to such attacks.

“We need a military that is ready and agile so it can meet the full range of threats and operate on short notice on every domain, not just land, sea, air, and space, but also cyber space,” Clinton said.

The former Secretary of State went on to add:

We’ll invest in the next frontier of military engagement — protecting U.S. interests in outer space and cyberspace. You’ve seen reports Russia has hacked into a lot of things. China has hacked into a lot of things. Russia even hacked into the Democratic National Committee, maybe even some state election systems.

So we have got to step up our game. Make sure we are well defended and able to take the fight to those who go after us. As president I will make it clear that the United States will treat cyber attacks just like any other attack. We will be ready with serious political, economic and military responses. And we are going to invest in protecting our governmental networks and national infrastructure. I want us to lead the world in setting the rules of cyberspace. If America doesn’t, others will.

Of course, the U.S. already engages in plenty of cyber warfare. To use Clinton’s words, the U.S. has hacked into a lot of things. But her speech suggests an expansion of this kind of hacking is the best response to the recent Russian intrusions into the DNC and the Clinton campaign.

Hacking back has been a matter of policy debate in the U.S. for years, and the question of how to respond to cyber attacks isn’t entirely resolved. Most of the debate has centered around how to protect U.S. companies from intellectual property theft, but how and why the U.S. should hack a foreign government is a bit of an open question.

The State Department currently views cyber attacks as similar to physical ones, and bases its policy on presidential strategy.

“When determining whether a cyber activity constitutes an armed attack sufficient to trigger a state’s inherent right of self-defense, the U.S. government believes that states should consider the nature and extent of injury or death to persons and the destruction of, or damage to, property,” Christopher Painter, the State Department’s coordinator for cyber issues, told a House committee in July. If the government decides that a cyber attack injured people or destroyed property, it can launch its own counterattack.

Although the DNC hack embarrassed top Democrats, the incident didn’t sow death or destruction — so it seems that Clinton is open to expanding the kinds of hacks that merit hacking back.

“There is no universal red line for what constitutes an act of war. That determination is always context-specific, and nobody should expect it to be different with cyber,” says Mara Tam, an independent ICT policy and security specialist. Tam, who has a background in conventional nonproliferation and arms control, argues that governments should launch and respond to cyber attacks in the same ways they do physical ones.

“When Hillary talks about things like hacking back, what we’re really talking about is a doctrine of proportionate response,” Tam explains. “Proportionate response doesn’t mean tit-for-tat, hack-hack back, which is what many in the information security community seem to assume. In practice, if the harm suffered from a cyber attack requires a response, that response may not occur in the cyber domain at all. It could well be a diplomatic response or an economic response.”

Clinton’s technology platform doesn’t include an official stance on offensive hacking, but a source familiar with her campaign says that Clinton would likely respond to a cyber attack through diplomacy and sanctions, with military response as a last resort.

In addition to Obama’s G-20 discussions and those underway at the State Department, the United Nations has also been working to establish guidelines for government hacking since 2009, when it formed the Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security (UN GGE). The UN GGE reconvened this August to continue developing this framework.

But in the meantime, government-led hacking is already underway. And because hacking doesn’t necessarily cause the same physical harm that traditional military action does, there are bound to be situations where the old rules just don’t apply.

“What we’ve seen, particularly with Russia, is that military applications of cyber are not necessarily looking for a kinetic effect. If you want to cripple your adversary’s ability to act coherently and with confidence, applications of cyber which embrace the informatic character of the domain are very effective,” Tam says.

It’s these kinds of attacks — ones that disrupt and misinform without causing harm to civilians or critical infrastructure — that have politicians struggling to come up with a proper response. As Obama noted yesterday, “What we cannot do is have a situation in which suddenly this becomes the wild wild West, where countries that have significant cyber capacity start engaging in competition — unhealthy competition or conflict — through these means when, I think wisely, we’ve put in place some norms when it comes to other weapons.”

More TechCrunch

Welcome back to TechCrunch’s Week in Review — TechCrunch’s newsletter recapping the week’s biggest news. Want it in your inbox every Saturday? Sign up here. Over the past eight years,…

Fisker collapsed under the weight of its founder’s promises

What is AI? We’ve put together this non-technical guide to give anyone a fighting chance to understand how and why today’s AI works.

WTF is AI?

President Joe Biden has vetoed H.J.Res. 109, a congressional resolution that would have overturned the Securities and Exchange Commission’s current approach to banks and crypto. Specifically, the resolution targeted the…

President Biden vetoes crypto custody bill

Featured Article

Industries may be ready for humanoid robots, but are the robots ready for them?

How large a role humanoids will play in that ecosystem is, perhaps, the biggest question on everyone’s mind at the moment.

13 hours ago
Industries may be ready for humanoid robots, but are the robots ready for them?

VCs are clamoring to invest in hot AI companies, willing to pay exorbitant share prices for coveted spots on their cap tables. Even so, most aren’t able to get into…

VCs are selling shares of hot AI companies like Anthropic and xAI to small investors in a wild SPV market

The fashion industry has a huge problem: Despite many returned items being unworn or undamaged, a lot, if not the majority, end up in the trash. An estimated 9.5 billion…

Deal Dive: How (Re)vive grew 10x last year by helping retailers recycle and sell returned items

Tumblr officially shut down “Tips,” an opt-in feature where creators could receive one-time payments from their followers.  As of today, the tipping icon has automatically disappeared from all posts and…

You can no longer use Tumblr’s tipping feature 

Generative AI improvements are increasingly being made through data curation and collection — not architectural — improvements. Big Tech has an advantage.

AI training data has a price tag that only Big Tech can afford

Keeping up with an industry as fast-moving as AI is a tall order. So until an AI can do it for you, here’s a handy roundup of recent stories in the world…

This Week in AI: Can we (and could we ever) trust OpenAI?

Jasper Health, a cancer care platform startup, laid off a substantial part of its workforce, TechCrunch has learned.

General Catalyst-backed Jasper Health lays off staff

Featured Article

Live Nation confirms Ticketmaster was hacked, says personal information stolen in data breach

Live Nation says its Ticketmaster subsidiary was hacked. A hacker claims to be selling 560 million customer records.

1 day ago
Live Nation confirms Ticketmaster was hacked, says personal information stolen in data breach

Featured Article

Inside EV startup Fisker’s collapse: how the company crumbled under its founders’ whims

An autonomous pod. A solid-state battery-powered sports car. An electric pickup truck. A convertible grand tourer EV with up to 600 miles of range. A “fully connected mobility device” for young urban innovators to be built by Foxconn and priced under $30,000. The next Popemobile. Over the past eight years, famed vehicle designer Henrik Fisker…

1 day ago
Inside EV startup Fisker’s collapse: how the company crumbled under its founders’ whims

Late Friday afternoon, a time window companies usually reserve for unflattering disclosures, AI startup Hugging Face said that its security team earlier this week detected “unauthorized access” to Spaces, Hugging…

Hugging Face says it detected ‘unauthorized access’ to its AI model hosting platform

Featured Article

Hacked, leaked, exposed: Why you should never use stalkerware apps

Using stalkerware is creepy, unethical, potentially illegal, and puts your data and that of your loved ones in danger.

1 day ago
Hacked, leaked, exposed: Why you should never use stalkerware apps

The design brief was simple: each grind and dry cycle had to be completed before breakfast. Here’s how Mill made it happen.

Mill’s redesigned food waste bin really is faster and quieter than before

Google is embarrassed about its AI Overviews, too. After a deluge of dunks and memes over the past week, which cracked on the poor quality and outright misinformation that arose…

Google admits its AI Overviews need work, but we’re all helping it beta test

Welcome to Startups Weekly — Haje‘s weekly recap of everything you can’t miss from the world of startups. Sign up here to get it in your inbox every Friday. In…

Startups Weekly: Musk raises $6B for AI and the fintech dominoes are falling

The product, which ZeroMark calls a “fire control system,” has two components: a small computer that has sensors, like lidar and electro-optical, and a motorized buttstock.

a16z-backed ZeroMark wants to give soldiers guns that don’t miss against drones

The RAW Dating App aims to shake up the dating scheme by shedding the fake, TikTok-ified, heavily filtered photos and replacing them with a more genuine, unvarnished experience. The app…

Pitch Deck Teardown: RAW Dating App’s $3M angel deck

Yes, we’re calling it “ThreadsDeck” now. At least that’s the tag many are using to describe the new user interface for Instagram’s X competitor, Threads, which resembles the column-based format…

‘ThreadsDeck’ arrived just in time for the Trump verdict

Japanese crypto exchange DMM Bitcoin confirmed on Friday that it had been the victim of a hack resulting in the theft of 4,502.9 bitcoin, or about $305 million.  According to…

Hackers steal $305M from DMM Bitcoin crypto exchange

This is not a drill! Today marks the final day to secure your early-bird tickets for TechCrunch Disrupt 2024 at a significantly reduced rate. At midnight tonight, May 31, ticket…

Disrupt 2024 early-bird prices end at midnight

Instagram is testing a way for creators to experiment with reels without committing to having them displayed on their profiles, giving the social network a possible edge over TikTok and…

Instagram tests ‘trial reels’ that don’t display to a creator’s followers

U.S. federal regulators have requested more information from Zoox, Amazon’s self-driving unit, as part of an investigation into rear-end crash risks posed by unexpected braking. The National Highway Traffic Safety…

Feds tell Zoox to send more info about autonomous vehicles suddenly braking

You thought the hottest rap battle of the summer was between Kendrick Lamar and Drake. You were wrong. It’s between Canva and an enterprise CIO. At its Canva Create event…

Canva’s rap battle is part of a long legacy of Silicon Valley cringe

Voice cloning startup ElevenLabs introduced a new tool for users to generate sound effects through prompts today after announcing the project back in February.

ElevenLabs debuts AI-powered tool to generate sound effects

We caught up with Antler founder and CEO Magnus Grimeland about the startup scene in Asia, the current tech startup trends in the region and investment approaches during the rise…

VC firm Antler’s CEO says Asia presents ‘biggest opportunity’ in the world for growth

Temu is to face Europe’s strictest rules after being designated as a “very large online platform” under the Digital Services Act (DSA).

Chinese e-commerce marketplace Temu faces stricter EU rules as a ‘very large online platform’

Meta has been banned from launching features on Facebook and Instagram that would have collected data on voters in Spain using the social networks ahead of next month’s European Elections.…

Spain bans Meta from launching election features on Facebook, Instagram over privacy fears

Stripe, the world’s most valuable fintech startup, said on Friday that it will temporarily move to an invite-only model for new account sign-ups in India, calling the move “a tough…

Stripe curbs its India ambitions over regulatory situation