U.S. sanctions on Russia rewrite the rules on cyber responsibility

Some cyberpolice critics also feel that Biden’s sanctions for SolarWinds have been spied on in a more rigorous way: an absurd, knee-jerk response to appease those who have expressed accusations of soft behavior against the administration against Russia. “This is not an attempt to correct Russia’s behavior,” said Dmitry Alperovich, a former CTO of the security firm Crowd Strike and founder of the cybersecurity-centric Silverrado Policy Accelerator. “It makes us more concerned about the feeling that we’re hitting back for the domestic audience and, for the most part, openly.”

Alparovich argues that punishing the Kremlin for careful cyberspying – and with a huge collection of worse activities than that – makes it harder to really impose the Kremlin. “I’m not against Russia’s hammering,” Alperovich said. “But it could have been more effective if we had focused on two things that we thought were really pale and told them that if you corrected this behavior, these restrictions would be reduced. How can you achieve the effect or at least one effect?” This is not a chance to get effects.

Yet administration officials have argued that even espionage can cross borders, especially on this scale. J. Michael Daniels, president of the Cyber ​​Threat Alliance and former cyber coordinator at the Obama White House, said, “In some cases, the rule is not new, although it may be new in cybersecurity.” You don’t respond when it’s too big and too adventurous. “

It echoes the views of former President Donald Trump’s Homeland Security Adviser Tom Bosset, who says he took similar steps to punish Russia if it extended its term in the SolarWinds campaign. He argues that it falls under the same rules against hacking with no “inequality and proportionality” that he intended to determine. Sanctions in response to Russia’s notorious cybersecurity In 2017, which caused a loss of বিল 10 billion worldwide. “The Japanese planes will be moving like Pearl Harbor and we’re all saying, ‘OK, I’m sure and it’s just a spying effort they’re taking pictures right there,'” Bosrett told SolarWinds without responding. “Right now, Japanese planes are carrying risky companies and agencies across New York, Washington, DC, Indiana and LA, not just over Pearl Harbor.”

As much as officials from the Beadon administration said on Thursday, the amount of access Solarwinds hackers had access to is likely to be the main reason for the response that destruction is likely to occur. In an interview with reporters on Thursday, Rob Joyce, NSA director of cybersecurity, said, “There is an opportunity to do something other than the vast amount of access they have gained from this platform and that is something we cannot afford.” . “And that’s why the US government is spending and pushing back.

Critics of the administration’s response, however, noted that SVR could have used its SolarWinds hacking to cause a lot of disruption, but it didn’t. “You don’t hammer for what they can do to someone,” Alperovich says. “You pay attention to what they actually did.”

Chesney of the University of Texas has argued that the White House will probably also judge what it has done in Russia. The Notepatia attack used similarly used software supply chain hacking to spread destructive malware that would be recognized as the most expensive cybertack in history. Russia’s GRU military intelligence agency has run a notepad rather than a relatively cautious and shrewd SVR. However, this difference is less important than the similarity of the methods they used. “Russia is seen as a team,” Chesney said. “One of the children in the group burned their permission slip. And now everyone has been punished for it. ”

More great wired stories

Source link

Leave a Reply

Your email address will not be published. Required fields are marked *