Jun 19, 2019

The U.S. goes on the cyber offensive

Illustration: Rebecca Zisser/Axios

After years of bitter complaints about cyberattacks from foreign adversaries, a new report describes aggressive U.S. cyber plans and intrusions of its own against Russia, a show of long-understood American prowess on the leading edge of warfare.

What’s happening: Experts tell Axios that the leak, published Sunday in the New York Times, may intend to signal the damage that the two countries could suffer in its confrontation with the U.S. But the disclosure also risks exacerbating already-fraught relations.

The big picture: For the last three or so years, the U.S. has been on the receiving end of some of the most damaging cyberattacks in history, climaxing with Russia's hacking of the 2016 presidential election. All in all, it has been an exceedingly embarrassing period for U.S. intelligence agencies, including the massively damaging 2013 theft of surveillance secrets by ex-CIA contractor Edward Snowden, and the leak of top National Security Agency hacking tools to the so-called Shadow Brokers.

But now, in a high-profile story, the U.S., under tremendous military, economic and diplomatic pressure globally amid the multi-front brinkmanship of the Trump administration, has been depicted as a formidable cyber actor:

  • In a piece Sunday, the NYT reported that the U.S. has placed “potentially crippling malware inside the Russian [electric] system at a depth and with an aggressiveness that had never been tried before.”
  • In another report, in 2016, the NYT described a plan called Nitro Zeus, in which American personnel would use vast U.S. cyber capabilities to “disable Iran’s air defense, communications systems and crucial parts of its power grid,” in addition to the Fordo nuclear enrichment site. The lead byline on both stories is David Sanger, a national security correspondent.

Both reports resembled a lower-level 21st century version of the “mutually assured destruction” policy between the U.S. and the Soviets that prevailed during the Cold War. “With the 2020 election heating up, and Russia's cyber offensive continuing, I can well imagine policymakers wishing Americans to know what their government is doing in response," Richard Fontaine, CEO of the Center for a New American Security, tells Axios. "That message is, shall we say, not always clearly communicated by the commander in chief.”

Fontaine called the twin actions “prudent preparation of a battlefield that may never be engaged. In order to respond via cyber means to an adversary's actions, it is too late to start when the crisis begins. That is why states place beacons in foreign systems.”

  • Previously, U.S. officials have described Russia inserting malware to sabotage U.S. infrastructure like power plants, water supplies and energy pipelines.
  • While neither nation is known to have actually flipped off the power switch in the other country, Russia did shut off the electricity in Ukraine in December 2015.
  • And in August, the U.S. attacked the Internet Research Agency, the group responsible for much of Russia’s hacking of the 2016 U.S. election.

There was much in the way of blowback. In a tweet, Trump called the Russia report a “virtual act of treason” by the Times. The paper itself said it checked the story with the National Security Council, which said it had no concerns. That was “perhaps an indication that some of the intrusions were intended to be noticed by the Russians,” the NYT said.

Speaking by email, James Lewis, director of CSIS’s Technology Policy Program, said that the leak may reflect unhappiness by some American officials with Trump’s Russia policy, and “a desire to lock in a more confrontational policy.”

Chris Meserole, a fellow at the Brookings Institution, agrees:

  • "The White House and intelligence community don’t see eye to eye on the threat Putin poses, particularly in cyberspace, so the leaks are designed to tie Trump’s hands while also communicating to the Kremlin that Russia is even more vulnerable to cyber attacks than we are."

Go deeper

The technology of witnessing brutality

Charging Alabama state troopers pass by fallen demonstrators in Selma on March 7, 1965. Photo: Bettmann/Getty Images

The ways Americans capture and share records of racist violence and police misconduct keep changing, but the pain of the underlying injustices they chronicle remains a stubborn constant.

Driving the news: After George Floyd's death at the hands of Minneapolis police sparked wide protests, Minnesota Gov. Tim Walz said, “Thank God a young person had a camera to video it."

39 mins ago - Health

Lessons from the lockdown — and what comes next

Illustration: Eniola Odetunde/Axios

We are nowhere near finished with the coronavirus, but the next phases of our response will — if we do it right — be more targeted and risk-based than the sweeping national lockdown we’re now emerging from.

Why it matters: Our experience battling this new virus has taught us a lot about what does and doesn’t work. We’ll have to apply those lessons rigorously, and keep adapting, if we have any hope of containing the virus and limiting the number of deaths from here on out.

Updated 57 mins ago - Politics & Policy

George Floyd protests: Unrest continues for 6th night across U.S.

A protest near the White House on Sunday night. Photo: Alex Wong/Getty Images

Most external lights at the White House were turned off late Sunday as the D.C. National Guard was deployed and authorities fired tear gas at hundreds of protesters nearby, per the New York Times.

What's happening: It's one of several tense, late-night standoffs between law enforcement and demonstrators in the United States over the death of George Floyd and other police-related killings of black people.