Espionage attempts like the SolarWinds hack are inevitable, so it's safer to focus on defense – not retaliation
- Written by William Akoto, Assistant Professor of International Politics, Fordham University
In the wake of the major espionage operation in which people alleged to be Russian government agents infiltrated the digital networks of the U.S. Defense, Treasury and Homeland Security departments[1] – as well as other government agencies and private companies – President Joe Biden is considering how to respond.
It’s not clear exactly what data the hackers actually stole in the time they had access, roughly from March through December 2020[2], but they exploited software made by the Texas-based firm SolarWinds to gain access to key research and security information[3], including research for future nuclear weapons.
Since taking office, Biden has ordered a thorough intelligence review[4] of Russian aggression around the world, which includes hacking, election interference[5], poisoning political opponents[6] and posting bounties for killing U.S. soldiers[7]. And on Jan. 21, his first full day in office, Biden received a report[8] from a congressional cybersecurity commission with 15 recommendations expected to prevent another major cyber breach. Those included boosting America’s cyber capabilities by increasing funding for U.S. Cyber Command and establishing a civilian reserve group that draws on cybersecurity talent in private industry and cybersecurity companies.
His administration faces pressure from members of Congress in both parties[9] and former government officials to respond forcefully to the SolarWinds breach.
He is reportedly considering[10] retaliatory cyberattacks against Russia and targeted financial sanctions against the individuals involved.
But the U.S. government may not be able to stop future intrusions into American computer systems. Scholarship describes how difficult it can be to effectively deter cyberattacks[11] or punish those responsible[12]. In fact, as a scholar of cyber conflict[13], my research strongly indicates that retaliation – in whatever form it might take – will almost certainly invite counterhacks from Russia, worsening tensions[14] between the countries and potentially escalating into the offline world.
A sophisticated attack
The SolarWinds hack was more advanced than previous ones: The hackers actually compromised software updates[15] that the network management company regularly provides to the businesses and government agencies that use its software. The hackers inserted malicious code into the official updates, which countless administrators trusted and installed on nearly 18,000 systems across the country.
Once installed, the malicious software connected to servers controlled by the hackers and gave them access to key data about government and corporate research and operations.
This isn’t the first major digital attack on the U.S. And its severity shows that past efforts to discourage cyberattacks have not been effective.
Under President Barack Obama, for instance, the U.S. leveled economic and diplomatic sanctions against the people and governments responsible for cyberespionage, including North Korea[16] and Russia[17]. The Trump administration likewise imposed sanctions against Iranian[18] and North Korean[19] hackers for a range of cyberattacks targeting U.S. companies, universities and government agencies.
[The Conversation’s Politics + Society editors pick need-to-know stories. Sign up for Politics Weekly[20].]
Several scholars, including my collaborators and me[21], have shown that though economic sanctions do hurt their targets, they also hurt the country imposing the restrictions – in this case, the United States – which misses out on business opportunities in the targeted countries. Newer rounds of sanctions also bar U.S. companies from doing business with third-country firms[22] that operate in targeted countries.
Sanctions don’t actually deter future attacks.
AP Photo/Andrew Harnik, pool[23]Government actions haven’t been enough
Beyond punishing hacker countries with sanctions, the U.S. has undertaken operations to directly attack the digital capabilities of those nations. For instance, U.S. Cyber Command[24], the arm of the military charged with defending the U.S. in cyberspace, cut off a key Russian agency’s internet access[25] during the 2018 congressional midterm election. The U.S. has also sent military cybersecurity experts overseas to learn more about Russian, Chinese and Iranian capabilities[26]. It’s also possible that Cyber Command has secretly undertaken other responses.
None of this has dissuaded hackers from repeatedly targeting American firms and government agencies. Indeed, prior research[27] confirms that the threat of formal sanctions has very little effect on deterring cyberattacks in lab settings.
If deterrence won’t work …
Ignoring cyberattacks, of course, is not a solution either. But I believe the challenge is to determine how to make clear to the perpetrators that large-scale cyber intrusions will not be tolerated – and to do so without escalating the online conflict. I believe there is only one way to prepare – and it’s to accept that hackers will keep trying to attack.
There are some ways to adjust to this new reality, just as there are with other complex and intractable problems. For instance, governments seek to mitigate harm from climate change by limiting greenhouse gas emissions and discouraging new construction in flood zones.
The cybersecurity equivalent could be building and programming computer systems that can withstand faults, failures and hacking[28] while still performing essential functions and protecting data security. The ultimate objective would be not to prevent systems from being breached, but to limit the damage and speed the recovery[29] when they are broken into. My research, and others’, indicates this could be an effective way to address the new reality of state-sponsored hacking while realizing there is no way to truly prevent future attacks.
References
- ^ infiltrated the digital networks of the U.S. Defense, Treasury and Homeland Security departments (www.theverge.com)
- ^ roughly from March through December 2020 (www.zdnet.com)
- ^ access to key research and security information (www.nytimes.com)
- ^ intelligence review (www.cyberscoop.com)
- ^ election interference (www.npr.org)
- ^ poisoning political opponents (www.cnn.com)
- ^ posting bounties for killing U.S. soldiers (www.nytimes.com)
- ^ report (www.solarium.gov)
- ^ from members of Congress in both parties (www.cnn.com)
- ^ reportedly considering (www.reuters.com)
- ^ deter cyberattacks (doi.org)
- ^ punish those responsible (doi.org)
- ^ scholar of cyber conflict (willakoto.com)
- ^ worsening tensions (doi.org)
- ^ compromised software updates (www.cnn.com)
- ^ North Korea (www.bankinfosecurity.com)
- ^ and Russia (www.nytimes.com)
- ^ Iranian (www.rferl.org)
- ^ North Korean (www.reuters.com)
- ^ Sign up for Politics Weekly (theconversation.com)
- ^ my collaborators and me (doi.org)
- ^ doing business with third-country firms (www.natlawreview.com)
- ^ AP Photo/Andrew Harnik, pool (newsroom.ap.org)
- ^ U.S. Cyber Command (www.cybercom.mil)
- ^ key Russian agency’s internet access (www.nytimes.com)
- ^ learn more about Russian, Chinese and Iranian capabilities (www.nytimes.com)
- ^ prior research (www.tandfonline.com)
- ^ withstand faults, failures and hacking (doi.org)
- ^ limit the damage and speed the recovery (www.raconteur.net)
Authors: William Akoto, Assistant Professor of International Politics, Fordham University