
The Possibilities – and Perils – of a Trump-Putin Meeting
EXPERT INTERVIEWS – President Donald Trump is defied diplomatic norms with a pair of conversations this week over bringing an end to Russia’s war in […] More
Paul Kolbe, Director, Intelligence Project, Harvard University’s Belfer Center for Science and International Affairs
Paul Kolbe is Director of The Intelligence Project at Harvard University’s Belfer Center for Science and International Affairs. He previously served 25 years as an operations officer in the CIA and was a member of the Senior Intelligence Service, serving in Russia, the Balkans, Indonesia, East Germany, Zimbabwe, and Austria.
This piece was first published by our friends at Russia Matters, from Harvard Kennedy School’s Belfer Center for Science and International Affairs.
According to U.S. officials, Russia is the likely perpetrator of the SolarWinds cyber compromise of federal agencies, private sector firms, NGOs and academic institutions. The scale and impact brought accusations of a reckless and indiscriminate operation. Some politicians labeled this an act of war, while other commentators dismissed the SolarWinds compromise as espionage. Calls for retribution were widespread.
We know few details about the breadth, depth and impact of the SolarWinds cyber operation, though the scale was clearly massive with over 18,000 SolarWinds customers uploading malware-laden tools. But we do not know which companies and agencies have been affected, what information was compromised or whether damage occurred to any information systems. This lack of public disclosure likely represents caution in revealing what is known and not known, but also signals the difficulty of assessing just how bad we’ve been had.
So how should the U.S. respond?
A natural inclination will be to strike back in order to modify future Russian behavior and to introduce stronger cyber deterrence for other potential actors. Responses might include declaring Russian intelligence personnel persona non grata, indictment of perpetrators, targeted sanctions and execution of similar operations against select Russian systems. The aim would not just be punishment, but to change the risk-gain calculation for Russia, and others, when considering new cyber operations.
But frankly, all of these actions have been tried in the past and have not slowed the cyber onslaught. Russia does appreciate and adhere to reciprocity, and a specific and carefully calibrated shot across the bow is appropriate in response to SolarWinds. But we should not kid ourselves and think that such responses will stop cyber espionage or assaults. We are simply too fat and easy a target.
For this reason, retaliation is neither the most urgent nor the most important task at hand. Our most critical mission is to relentlessly and comprehensively improve our cyber defense.
SolarWinds dramatically exposed what many cyber experts have known and warned of: that the United States is pervasively, systemically vulnerable. Our attack surface—the systems, networks and devices that can be targeted and compromised—is stupendously large. The skill and number of U.S. adversaries—the states, criminal organizations and individuals who would exploit those vulnerabilities—is proliferating. Russia is but one wolf in an evolving and growing pack of cyber predators.
Read The 2021 Cyber Threat Will Drive Stronger Alliances by former Homeland Security Secretary Michael Chertoff exclusively in The Cipher Brief
Meanwhile, our networks are intricately interconnected, but we organize our defense into silo after silo. Government defenses are scattered across different agencies, companies are reluctant to share news of breaches and our intelligence agencies are pointed outwards. No one has a full view of the battlefield. Companies view cyber defense as a burdensome cost. Government budgets favor offense, and even when new funds are allocated to cyber defense, the focus is on securing government systems, not improving the fundamental security of larger and more vulnerable private sector infrastructure.
How might we better address our systemic national cyber vulnerability?
First, government efforts to bolster defense should focus on the private sector, which builds, owns, runs and is responsible for most of our cyber infrastructure. Better incentives are needed to improve security practices and culture. Also needed are disincentives that extract a cost for putting others at risk. Some elements in this regard might include:
We are in a new “Long War,” an ambient cyber conflict that will play out over decades against multiple adversaries. This is a conflict where the best offense may be a good defense. Limiting the potential harm adversaries can impose on us, while retaining the ability to inflict asymmetric damage, offers the best hope of bolstering U.S. national security and creating a world of cyber deterrence and restraint. Hopefully, SolarWinds marks the inflection point of a pivot to a more effective defense-based national cyber strategy.
A response can be read here: “Punitive Response to SolarWinds Would Be Misplaced, But Cyber Deterrence Still Matters” by Erica D. Borghard
The Cipher Brief hosts private briefings with the world’s most experienced national and global security experts. Become a member today.
Related Articles
EXPERT INTERVIEWS – President Donald Trump is defied diplomatic norms with a pair of conversations this week over bringing an end to Russia’s war in […] More
DEEP DIVE – On January 10, the oil tanker Eventin was steaming westward from Russia along Germany’s Baltic coast, bucking eight-foot waves and biting winds, […] More
BOTTOM LINE UP FRONT – On Tuesday, with Jordan’s King Abdullah II at his side, President Donald Trump exuded confidence that the Arab world will […] More
EXPERT INTERVIEW — World leaders and tech executives are gathered in Paris for the latest global summit on artificial intelligence. The French AI summit, co-hosted by […] More
BOTTOM LINE UP FRONT – As President Donald Trump doubles down on his idea of a U.S. takeover of Gaza, Arab governments are also doubling […] More
EXPERT INTERVIEW – A report from China about a massive new military command center – a complex that, when completed, is expected to be 10 […] More
Search