Modern field guide to security and privacy

US retaliation for OPM hack could set precedent in global cyberconflict

Passcode was the exclusive media partner for an event with the Atlantic Council exploring how the US should respond to attacks such as the Office of Personnel Management breach.

After the recent string of high-profile breaches such as the one at the Office of Personnel Management, many experts and international policymakers are watching closely at how the US may retaliate against suspected hackers.

When it comes to digital spying, international norms are noticeably absent; there's little precedent for how nations should retaliate to each other's network attacks. So a strong American response against China, the leading suspect in the OPM hack, could be a first step in establishing norms for international cyberconflicts and digital espionage.

At an event hosted by the Atlantic Council think tank in Washington on Wednesday, a panel of security experts debated various possibilities for US responses to the multitude of digital attacks on government agencies and private corporations. Passcode was the exclusive media partner for the Cyber Risk Wednesday event focusing on hacks, attacks, and what the US can do about it.

Here are three things we learned:

1. The US is careful about setting parameters on cyberespionage so it doesn't limit its own operations.

The US has spoken out publicly against certain kinds of attacks – destructive digital attacks, stealing intellectual property, and stealing personally identifiable information for private companies' gain, said Robert Knake, the Whitney Shepardson senior fellow for cyber policy at the Council on Foreign Relations.

But its relative silence after the OPM breach could leave other nations to interpret that the US does not consider the theft of government data for non-private benefit to be off-limits, he said. 

The message the US might be sending other countries, Mr. Knake said, is: “If you’re stealing this information for traditional espionage purposes, it doesn’t cross this red line ... and it’s not the kind of thing that we would use economic sanctions for.”

2. Starting a global dialogue about digital espionage has many challenges because of its secrecy.

Discussing traditional espionage with Russia during the cold war was relatively straightforward because both Washington and Moscow acknowledged their role in spying on each other, said Jason Healey, senior research scholar at the School of International and Public Affairs at Columbia University.

But talking to China about digital attacks is tough, because Beijing's public stance is that "we don't engage is this," he said. "Both for practical reasons, as well as potential for advantage, we can try and shift that.”

3. To thwart digital spying by other countries, the US could advocate the moral high ground and lead by example.

According to Mr. Healey, the US should continue showing restraint in espionage operations. “We don’t care if others show that restraint. We’re going to show restraint because of who we are,” he said.

Two Notable Quotes:

“We haven’t deterred anyone,” said Catherine Lotrionte, director of Georgetown University's Institute for Law, Science, and Global Security. Ms. Lotrionte said she doesn't believe that the current position of the US on digital attacks will keep future attackers at bay. 

“We’ve got to think about ... the limits that we want to place on espionage in cyberspace, in the context of what kinds of limits we want to place on ourselves," Knake said. 

Notable tweet:

Correction: A previous version of this article incorrectly spelled the name of Catherine Lotrionte. This version has been corrected. 

You've read  of  free articles. Subscribe to continue.
Real news can be honest, hopeful, credible, constructive.
What is the Monitor difference? Tackling the tough headlines – with humanity. Listening to sources – with respect. Seeing the story that others are missing by reporting what so often gets overlooked: the values that connect us. That’s Monitor reporting – news that changes how you see the world.

Dear Reader,

About a year ago, I happened upon this statement about the Monitor in the Harvard Business Review – under the charming heading of “do things that don’t interest you”:

“Many things that end up” being meaningful, writes social scientist Joseph Grenny, “have come from conference workshops, articles, or online videos that began as a chore and ended with an insight. My work in Kenya, for example, was heavily influenced by a Christian Science Monitor article I had forced myself to read 10 years earlier. Sometimes, we call things ‘boring’ simply because they lie outside the box we are currently in.”

If you were to come up with a punchline to a joke about the Monitor, that would probably be it. We’re seen as being global, fair, insightful, and perhaps a bit too earnest. We’re the bran muffin of journalism.

But you know what? We change lives. And I’m going to argue that we change lives precisely because we force open that too-small box that most human beings think they live in.

The Monitor is a peculiar little publication that’s hard for the world to figure out. We’re run by a church, but we’re not only for church members and we’re not about converting people. We’re known as being fair even as the world becomes as polarized as at any time since the newspaper’s founding in 1908.

We have a mission beyond circulation, we want to bridge divides. We’re about kicking down the door of thought everywhere and saying, “You are bigger and more capable than you realize. And we can prove it.”

If you’re looking for bran muffin journalism, you can subscribe to the Monitor for $15. You’ll get the Monitor Weekly magazine, the Monitor Daily email, and unlimited access to CSMonitor.com.

QR Code to US retaliation for OPM hack could set precedent in global cyberconflict
Read this article in
https://www.csmonitor.com/World/Passcode/2015/0821/US-retaliation-for-OPM-hack-could-set-precedent-in-global-cyberconflict
QR Code to Subscription page
Start your subscription today
https://www.csmonitor.com/subscribe