Aletho News


Washington to fight cyber-attacks with sanctions

RT | July 26, 2016

Saying that the US is “in the midst of a revolution of the cyber threat,” the White House has issued a directive establishing new guidelines for the government in case of “significant cyber incidents,” stressing that “no tool is off the table.”

The new instruction authorized by US President Barack Obama tasks several federal agencies with dealing with both cyber incidents and their aftermath. The Federal Bureau of Investigation (FBI) “will take the lead in coordinating the response to the immediate threat,” White House counterterrorism adviser Lisa Monaco said on Tuesday, while announcing the new measures at the International Conference on Cyber Security in New York.

Comparing cyber-attacks to “terrorism cases,” the US official stated “This includes bringing the full range of law enforcement and national security investigative tools to bear,” while stressing that “No tool is off the table.”

The Department of Homeland Security (DHS) has been tasked to help businesses recover from cyber incidents by providing technical assistance and supplying “additional federal resources to aid recovery.”

The directive, which also classifies the severity of cyber-attacks on a five-point scale, uses “the same analysis that guides our military, intelligence, law enforcement, or operations elsewhere – in air, land, sea, or space,” Monaco claimed, saying that over the past years “the rate of cyber intrusions and attacks has accelerated dramatically.”

While officials said they will “continue to use law enforcement tools,” the White House announced that the “power of sanction” will also be applied against international cyber abusers, citing its previous measures against North Korea, which it blamed for a massive attack on Sony Pictures. Pyongyang denied any involvement.

“Our tools now include an executive order authorizing sanctions against those that engage in significant malicious cyber activities, such as harming our nation’s critical infrastructure – our transportation systems or power grid,” the official announced.

“Nations like Russia and China are growing more assertive and sophisticated in their cyber operations,” the US counterterrorism adviser claimed, before mentioning cyber threats from “non-state actors,” including Islamic State (IS, formerly ISIS/ISIL).

“To put it bluntly, we are in the midst of a revolution of the cyber threat – one that is growing more persistent, more diverse, more frequent and more dangerous every day,” Monaco said, adding that “cyber operations on the battlefield” will be conducted to fight IS.

Among the recent cyber-attacks to plague the US was the hacking of the Democratic National Committee (DNC) database, when research on Republican Party and donor information was stolen from party servers and later disclosed. A cybersecurity firm hired by the DNC to investigate the data breach initially reported the hack to be the work of Russian government agencies, but a lone hacker by the name “Guccifer 2.0” then claimed responsibility.

Read more:

Severe cyber-attack could be a case for NATO action – Stoltenberg

‘Guccifer 2.0’ releases hacked DNC docs revealing mega donors, Clinton collusion

‘I don’t want to use 4-letter words’: Russian FM slams reporter over DNC leak claims

July 26, 2016 - Posted by | Economics, Progressive Hypocrite |

1 Comment »

  1. “Cyber attacks”……..Does that include actions by the NSA to obtain commercial advantage by ‘monitoring’ overseas corporations, and stealing technology, as described by Edward Snowden?? Or is it just Apply to foreigners sticking their nose into America’s business?

    Comment by Brian Harry, Australia | July 26, 2016 | Reply

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.