Kulwant Saluja – Medill National Security Zone http://nationalsecurityzone.medill.northwestern.edu A resource for covering national security issues Tue, 15 Mar 2016 22:20:28 +0000 en-US hourly 1 Experts say retaliation over OPM cyber attacks may be misguided http://nationalsecurityzone.medill.northwestern.edu/blog/2015/09/03/experts-say-retaliation-over-opm-cyber-attacks-may-be-misguided/ Thu, 03 Sep 2015 23:59:43 +0000 http://nationalsecurityzone.medill.northwestern.edu/site/?p=23117 Continue reading ]]> WASHINGTON — With cyber attacks grabbing the public’s attention, calls for retaliation, especially against suspected state-sponsored intrusions, have escalated.

Critics argue that a passive approach by the U.S. government only emboldens perpetrators. Draw a red line, they urge; the massive Office of Personnel Management breach, in particular, warranted a decisive response by the government.

But on the other side, some experts warn that retaliation, in any form, would be shortsighted, simplistic, and unrealistic, potentially undermining America’s interests. The rules of engagement, even informal guidelines, have yet to be written, they say.

Those advocating hacking back say the OPM breach should have been the final straw. But where to strike? The Obama administration has not openly accused the Chinese government,or any government, of being behind the OPM cyber attack.

The OPM, which handles security clearance for federal government employees, discovered in June that the agency had been hacked. The latest figures reveal that records of 22 million workers were compromised.

But Robert Knake, former head of cybersecurity policy at the National Security Council, said those advocating for hacking back are overreacting.

“It’s bad. But it’s not devastating,” said Knake of the names and Social Security numbers exposed by the breach. “The reason it’s not devastating is that we know about it.”

Speaking at an Atlantic Council panel last week debating the consequences of retaliating for cyberattacks, Knake said identifying the breach offers the opportunity to mitigate the damage. Once armed with this knowledge, the government can use the hack to its advantage, he argued.

For example, in the unlikely event that China uses information gleaned from the breach to identify Americans involved in sensitive activities, Knake said the U.S. could respond with misdirection by changing personnel.

Knake said the leaking of classified National Security Agency information by NSA contractor Edward Snowden, changed the norms in cyberspace.

“We are in the post-Snowden period where the whole world knows the U.S. engages in this kind of [surveillance] activity,” said Knake. “That we have a very strong program. And we got through all those disclosures without … Angela Merkel or anyone else declaring that it was an act of war.”

Fighting cyber espionage requires a different skillset than defending against pre-Internet, traditional Cold War espionage, said Austin Berglas, former head of the FBI’s New York Cyber Branch. “Whatever country is trying to steal our state secrets or international property doesn’t have to have a physical body. They can do it from their own home. There is a cloak of anonymity that people can hide behind to deny the actions.”

Unlike the Cold War when the adversary was clear, there are many more nations engaged in cyber espionage. China, Russia North Korea and Iran have all been suspected as culprits.

Jason Healey, senior fellow, at the Atlantic Council’s Cyber Statecraft Initiative, said that in the Cold War, there was a set of unwritten “Moscow rules” illuminating red lines that would not be crossed.

“It wasn’t a treaty, but there was this sense of where each side could go and if they overstep that, than there might be repercussions,” Healey said at the Aug. 19 panel discussion. “We would never kill a Russian. They will never kill an American spy.”

In contrast, Healey said no set of unifying standards exist for resolving cyber espionage conflicts.

“We have had some cyber espionage cases going back to 1986 where the KGB was spying,” said Healey.

In a telephone interview, Daniel Garrie, founder and editor in chief of the Journal of Law and Cyber Warfare, said countries’ varying attitudes towards cyber warfare make it harder to establish standards between the U.S. and other countries.

“Not only is there no playbook for countries and companies looking to respond to a cyberattack,” said Garrie, “but there are arguably a hundred different play-books, for each country, making the appropriate and permissible response all the more challenging, assuming your legal team understands what sort of action you are seeking to take,”
In some countries, Garrie said hacking is “not per-se illegal and it is certainly not taboo or shameful, in fact, it appears in some countries that such activity is encouraged.”

While it would seem tempting to fighting back against perpetrators aggressively, a tit-for-tat approach in the OPM affair, risks giving rise to many more problems than it would solve.

]]>
Marines say farewell to the Phrog after its final flight http://nationalsecurityzone.medill.northwestern.edu/blog/2015/08/04/marines-say-farewell-to-the-phrog-after-its-final-flight/ Tue, 04 Aug 2015 14:03:49 +0000 http://nationalsecurityzone.medill.northwestern.edu/site/?p=22843 Continue reading ]]>

CHANTILLY, Va. — It served Marines in Vietnam, Afghanistan and Iraq. For more than half a century, the CH-46E Sea Knight helicopter was a vital part of Marine operations — and on Saturday, the aircraft made its final flight.

“It’s a historic day,” said Lt. Gen. Jon Davis, deputy commandant for Marine Corps aviation, at a ceremony at the National Air and Space Museum’s Udvar-Hazy Center outside Washington, D.C. “We like to say in the Marines, ‘There is no better friend. No worse enemy.'”

A CH-46E, which Marines affectionately refer to as “Phrogs,” sat at the north ramp outside the Boeing Aviation Hangar here on Saturday next to its replacement: the MV-22B Osprey tiltrotor aircraft.

“The CH-46 has protected combat power, has rescued Marines that were wounded on the battlefield and it has helped in a lot of humanitarian, disaster relief efforts,” Davis said. “We are going to do that and more with MV-22.”

It was a bittersweet day for retired Lt. Col. Bill “Booby” Hatch, who flew the CH-46 during his entire 26-year career with the Marines, including tours in Vietnam.

“I think the best endorsement for the CH-46 as a combat assault helicopter will come from the infantry, the grunts,” Hatch said. “Anytime we got the call, we went. It did not matter what was going on or how much shooting was there. We were going to get the grunts out.”

While the CH-46 represents the past, the Osprey is the future. It goes twice as fast as the CH-46E Sea Knight, and it can transport nearly three times the payload.

“[The] MV-22 is … the most in-demand aviation platform in the entire [Defense Department],” Davis said. “It’s a phenomenal airplane and it’s even better because it has got ‘U.S. Marines’ painted on the side.”

The CH-46 will be loaned to the National Air and Space Museum and remain on display here before being moved to its permanent home, the National Museum of the Marine Corps near Quantico, Virginia.

“It allows American people to connect in a physical sense with our history,” Davis said. “They will not only connect with the machines, but they also get to learn about the incredible people, the incredible Marines and sailors who flew in the airplanes.”


Published in conjunction with Marine Corp Times Logo

ysandk

]]>