Security

Obama and Clinton weigh in on cyber warfare tactics

Comment

Image Credits:

Russia’s recent intrusions into American political organizations’ networks are driving discussions about the rules of engagement for cyber warfare, and forcing America’s own hacking of foreign governments into the light.

President Barack Obama told reporters at the G-20 summit in China that he has been in discussions with other world leaders, including Russian president Vladimir Putin, about creating a set of standards for cyber warfare. The debate over how and when to hack another nation has also reached the presidential race, with Democratic candidate Hillary Clinton calling last week for increased cyber capability for the U.S. military and for international norm-setting.

“Look, we’re moving into a new era here where a number of countries have significant capacities,” Obama said. “But our goal is not to suddenly, in the cyber arena, duplicate a cycle of escalation that we saw when it comes to other arms races in the past, but rather to start instituting some norms so everybody’s acting responsibly.”

But as Obama and Clinton call for discussions of cyber attacks, experts say that government-led hacking is already booming, and the lack of international guidelines has led to unintended consequences for ordinary civilians caught up in cyber conflict. The U.S. and the United Nations are each working to develop rules of engagement for the digital arena, but in the meantime, countries are deciding for themselves whether or not to follow the same guidelines for cyber capabilities as they do for traditional weaponry.

“This behavior is already being engaged in. We don’t have the procedures in place but we’re already engaging in that way, so we’re putting the cart before the horse,” says Amie Stepanovich, U.S. policy manager at the digital rights organization Access Now.

Stepanovich points to examples of U.S. hacking efforts like Stuxnet, malware believed to be developed in a U.S.-Israeli collaboration that spread beyond the Iranian nuclear facility that was its initial target, or a 2012 NSA exploit that knocked the entire country of Syria offline. These incidents, she says, demonstrate how cyber attacks can unintentionally impact broad swaths of the population — and show why nations need clear rules about cyber attacks on infrastructure.

“It’s something the next administration is going to have to address. All of our interactions are moving into the digital space very quickly and we’re seeing cyber activity that could determine the outcome of an election,” Stepanovich says. “Making sure there are protections for human rights and for people becomes exceptionally important on the internet because we all use the same infrastructure.”

Clinton is positioning herself to lead that conversation. Her remarks last week at the American Legion convention offered insight into how the Democratic presidential candidate views the recent cyber attacks against Democratic organizations, and how she believes the U.S. should respond.

The U.S. military should be ready and able to hack back against governments who target the country online, Clinton said. She pointed to the breach of the Democratic National Committee as an example of a cyber attack against the U.S., and advocated political, economic and military responses to such attacks.

“We need a military that is ready and agile so it can meet the full range of threats and operate on short notice on every domain, not just land, sea, air, and space, but also cyber space,” Clinton said.

The former Secretary of State went on to add:

We’ll invest in the next frontier of military engagement — protecting U.S. interests in outer space and cyberspace. You’ve seen reports Russia has hacked into a lot of things. China has hacked into a lot of things. Russia even hacked into the Democratic National Committee, maybe even some state election systems.

So we have got to step up our game. Make sure we are well defended and able to take the fight to those who go after us. As president I will make it clear that the United States will treat cyber attacks just like any other attack. We will be ready with serious political, economic and military responses. And we are going to invest in protecting our governmental networks and national infrastructure. I want us to lead the world in setting the rules of cyberspace. If America doesn’t, others will.

Of course, the U.S. already engages in plenty of cyber warfare. To use Clinton’s words, the U.S. has hacked into a lot of things. But her speech suggests an expansion of this kind of hacking is the best response to the recent Russian intrusions into the DNC and the Clinton campaign.

Hacking back has been a matter of policy debate in the U.S. for years, and the question of how to respond to cyber attacks isn’t entirely resolved. Most of the debate has centered around how to protect U.S. companies from intellectual property theft, but how and why the U.S. should hack a foreign government is a bit of an open question.

The State Department currently views cyber attacks as similar to physical ones, and bases its policy on presidential strategy.

“When determining whether a cyber activity constitutes an armed attack sufficient to trigger a state’s inherent right of self-defense, the U.S. government believes that states should consider the nature and extent of injury or death to persons and the destruction of, or damage to, property,” Christopher Painter, the State Department’s coordinator for cyber issues, told a House committee in July. If the government decides that a cyber attack injured people or destroyed property, it can launch its own counterattack.

Although the DNC hack embarrassed top Democrats, the incident didn’t sow death or destruction — so it seems that Clinton is open to expanding the kinds of hacks that merit hacking back.

“There is no universal red line for what constitutes an act of war. That determination is always context-specific, and nobody should expect it to be different with cyber,” says Mara Tam, an independent ICT policy and security specialist. Tam, who has a background in conventional nonproliferation and arms control, argues that governments should launch and respond to cyber attacks in the same ways they do physical ones.

“When Hillary talks about things like hacking back, what we’re really talking about is a doctrine of proportionate response,” Tam explains. “Proportionate response doesn’t mean tit-for-tat, hack-hack back, which is what many in the information security community seem to assume. In practice, if the harm suffered from a cyber attack requires a response, that response may not occur in the cyber domain at all. It could well be a diplomatic response or an economic response.”

Clinton’s technology platform doesn’t include an official stance on offensive hacking, but a source familiar with her campaign says that Clinton would likely respond to a cyber attack through diplomacy and sanctions, with military response as a last resort.

In addition to Obama’s G-20 discussions and those underway at the State Department, the United Nations has also been working to establish guidelines for government hacking since 2009, when it formed the Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security (UN GGE). The UN GGE reconvened this August to continue developing this framework.

But in the meantime, government-led hacking is already underway. And because hacking doesn’t necessarily cause the same physical harm that traditional military action does, there are bound to be situations where the old rules just don’t apply.

“What we’ve seen, particularly with Russia, is that military applications of cyber are not necessarily looking for a kinetic effect. If you want to cripple your adversary’s ability to act coherently and with confidence, applications of cyber which embrace the informatic character of the domain are very effective,” Tam says.

It’s these kinds of attacks — ones that disrupt and misinform without causing harm to civilians or critical infrastructure — that have politicians struggling to come up with a proper response. As Obama noted yesterday, “What we cannot do is have a situation in which suddenly this becomes the wild wild West, where countries that have significant cyber capacity start engaging in competition — unhealthy competition or conflict — through these means when, I think wisely, we’ve put in place some norms when it comes to other weapons.”

More TechCrunch

Kudos uses AI to figure out consumer spending habits so it can then provide more personalized financial advice, like maximizing rewards and utilizing credit effectively.

Kudos lands $10M for an AI smart wallet that picks the best credit card for purchases

The EU’s warning comes after Microsoft failed to respond to a legally binding request for information that focused on its generative AI tools.

EU warns Microsoft it could be fined billions over missing GenAI risk info

The prospects for troubled banking-as-a-service startup Synapse have gone from bad to worse this week after a United States Trustee filed an emergency motion on Wednesday.  The trustee is asking…

A US Trustee wants troubled fintech Synapse to be liquidated via Chapter 7 bankruptcy, cites ‘gross mismanagement’

U.K.-based Seraphim Space is spinning up its 13th accelerator program, with nine participating companies working on a range of tech from propulsion to in-space manufacturing and space situational awareness. The…

Seraphim’s latest space accelerator welcomes nine companies

OpenAI has reached a deal with Reddit to use the social news site’s data for training AI models. In a blog post on OpenAI’s press relations site, the company said…

OpenAI inks deal to train AI on Reddit data

X users will now be able to discover posts from new Communities that are trending directly from an Explore tab within the section.

X pushes more users to Communities

For Mark Zuckerberg’s 40th birthday, his wife got him a photoshoot. Zuckerberg gives the camera a sly smile as he sits amid a carefully crafted re-creation of his childhood bedroom.…

Mark Zuckerberg’s makeover: Midlife crisis or carefully crafted rebrand?

Strava announced a slew of features, including AI to weed out leaderboard cheats, a new ‘family’ subscription plan, dark mode and more.

Strava taps AI to weed out leaderboard cheats, unveils ‘family’ plan, dark mode and more

We all fall down sometimes. Astronauts are no exception. You need to be in peak physical condition for space travel, but bulky space suits and lower gravity levels can be…

Astronauts fall over. Robotic limbs can help them back up.

Microsoft will launch its custom Cobalt 100 chips to customers as a public preview at its Build conference next week, TechCrunch has learned. In an analyst briefing ahead of Build,…

Microsoft’s custom Cobalt chips will come to Azure next week

What a wild week for transportation news! It was a smorgasbord of news that seemed to touch every sector and theme in transportation.

Tesla keeps cutting jobs and the feds probe Waymo

Sony Music Group has sent letters to more than 700 tech companies and music streaming services to warn them not to use its music to train AI without explicit permission.…

Sony Music warns tech companies over ‘unauthorized’ use of its content to train AI

Winston Chi, Butter’s founder and CEO, told TechCrunch that “most parties, including our investors and us, are making money” from the exit.

GrubMarket buys Butter to give its food distribution tech an AI boost

The investor lawsuit is related to Bolt securing a $30 million personal loan to Ryan Breslow, which was later defaulted on.

Bolt founder Ryan Breslow wants to settle an investor lawsuit by returning $37 million worth of shares

Meta, the parent company of Facebook, launched an enterprise version of the prominent social network in 2015. It always seemed like a stretch for a company built on a consumer…

With the end of Workplace, it’s fair to wonder if Meta was ever serious about the enterprise

X, formerly Twitter, turned TweetDeck into X Pro and pushed it behind a paywall. But there is a new column-based social media tool in town, and it’s from Instagram Threads.…

Meta Threads is testing pinned columns on the web, similar to the old TweetDeck

As part of 2024’s Accessibility Awareness Day, Google is showing off some updates to Android that should be useful to folks with mobility or vision impairments. Project Gameface allows gamers…

Google expands hands-free and eyes-free interfaces on Android

A hacker listed the data allegedly breached from Samco on a known cybercrime forum.

Hacker claims theft of India’s Samco account data

A top European privacy watchdog is investigating following the recent breaches of Dell customers’ personal information, TechCrunch has learned.  Ireland’s Data Protection Commission (DPC) deputy commissioner Graham Doyle confirmed to…

Ireland privacy watchdog confirms Dell data breach investigation

Ampere and Qualcomm aren’t the most obvious of partners. Both, after all, offer Arm-based chips for running data center servers (though Qualcomm’s largest market remains mobile). But as the two…

Ampere teams up with Qualcomm to launch an Arm-based AI server

At Google’s I/O developer conference, the company made its case to developers — and to some extent, consumers — why its bets on AI are ahead of rivals. At the…

Google I/O was an AI evolution, not a revolution

TechCrunch Disrupt has always been the ultimate convergence point for all things startup and tech. In the bustling world of innovation, it serves as the “big top” tent, where entrepreneurs,…

Meet the Magnificent Six: A tour of the stages at Disrupt 2024

There’s apparently a lot of demand for an on-demand handyperson. Khosla Ventures and Pear VC have just tripled down on their investment in Honey Homes, which offers up a dedicated…

Khosla Ventures, Pear VC triple down on Honey Homes, a smart way to hire a handyman

TikTok is testing the ability for users to upload 60-minute videos, the company confirmed to TechCrunch on Thursday. The feature is available to a limited group of users in select…

TikTok tests 60-minute video uploads as it continues to take on YouTube

Flock Safety is a multibillion-dollar startup that’s got eyes everywhere. As of Wednesday, with the company’s new Solar Condor cameras, those eyes are solar-powered and use wireless 5G networks to…

Flock Safety’s solar-powered cameras could make surveillance more widespread

Since he was very young, Bar Mor knew that he would inevitably do something with real estate. His family was involved in all types of real estate projects, from ground-up…

Agora raises $34M Series B to keep building the Carta for real estate

Poshmark, the social commerce site that lets people buy and sell new and used items to each other, launched a paid marketing tool on Thursday, giving sellers the ability to…

Poshmark’s ‘Promoted Closet’ tool lets sellers boost all their listings at once

Google is launching a Gemini add-on for educational institutes through Google Workspace.

Google adds Gemini to its Education suite

More money for the generative AI boom: Y Combinator-backed developer infrastructure startup Recall.ai announced Thursday it has raised a $10 million Series A funding round, bringing its total raised to over…

YC-backed Recall.ai gets $10M Series A to help companies use virtual meeting data

Engineers Adam Keating and Jeremy Andrews were tired of using spreadsheets and screenshots to collab with teammates — so they launched a startup, CoLab, to build a better way. The…

CoLab’s collaborative tools for engineers line up $21M in new funding