5 ways to fight back against Chinese cyber attacks
But would they work?
The debate over the Cyber Intelligence Sharing and Protection Act is largely a debate about how Congress will allocate authorities and powers to fight against Chinese cyber-espionage, which siphons off from the U.S. economy as much as $100 billion a year in intellectual property and proprietary information. CISPA is controversial because it vaguely defines what a "cyber threat" actually is, immunizes U.S. companies who share personal information with the government, lacks oversight mechanisms to prevent abuse by the government, and militarizes what is, in essence, a law enforcement function — an FBI and Department of Homeland Security function.
That latter objection is based on the Obama administration's intention to fight Chinese crime using a variety of different mechanisms. Importantly, it wants to determine how to fight — it does not want Congress to tell them how and when cyber information must be shared between private companies, the FBI, the CIA or the National Security Agency. Still, the White House has not explicitly said that President Obama won't allow some version of CIPSA to reach his desk. It has said that personal privacy is not well-protected by CIPSA, but traditionally, the executive branch has used this excuse as a fig-leaf to cover their opposition for other reasons.
So what can the U.S. do to reduce the cyber threat from China?
Subscribe to The Week
Escape your echo chamber. Get the facts behind the news, plus analysis from multiple perspectives.
Sign up for The Week's Free Newsletters
From our morning news briefing to a weekly Good News Newsletter, get the best of The Week delivered directly to your inbox.
From our morning news briefing to a weekly Good News Newsletter, get the best of The Week delivered directly to your inbox.
1. It can build an electronic wall around the country, forcing all Internet traffic to be subject to deep packet inspection; and then, to compare those packets against known signatures from China; segregate them; eradicate the malware from them, and then let them through. As I've written before, this is something the National Security Agency believes it CAN do but something that virtually every stakeholder except those inside the government believe would be an awfully hard sell to the American people.
2. It can require, or encourage, major technology companies that serve as Internet gateways for most Americans to boost their own cyber defenses, and then share, with immunity, suspected cyber threats with the government in real-time, allowing the NSA to swoop in and solve the problem. This is, incidentally, the CISPA approach.
3. It can secretly share with the big Internet companies the cyber techniques and tactics used by Chinese corporations and the military, giving U.S. companies a chance to develop cyber counter-measures. It can work in secret with companies to lure hackers from China into systems, and then manipulate those hackers into divulging attack patterns, which can be reverse-engineered to fortify defenses. Publicly, it can enforce its own laws against hacking and set an example for the world to follow.
4. It can fight back, engaging in tit-for-tat brinksmanship, hoping to convince the Chinese to back off by demonstrating the capacity of U.S. computer network operations. Though there is a body of secret law authorizing offensive cyber exploitation against China, the Obama administration doesn't want to engage in "war," as commonly understood. Less kinetic means include sanctions, property seizures and military deception/information operations campaigns.
Sign up for Today's Best Articles in your inbox
A free daily email with the biggest news stories of the day – and the best features from TheWeek.com
5. It can provide significant incentives for individuals and corporations to protect themselves, allowing free market mechanisms to determine the structure and rules of economy-wide computer network defense. For this approach to be effective, there has to be a broad understanding of what the threat is, what can and can't be done about it, and informal "rules" to shame/encourage those who don't and do participate. It can also work with companies that do major business with China to influence Chinese policies; it can propose a global treaty that would set clear guidelines and an enforcement mechanism. It can, can, can, but there are so many ifs, ands and buts to deal with it that they — we — probably won't, not for awhile anyway.
Some combination of all of these approaches is going to be the de facto law of the land, even though the community of smart people who debate cyber security still haven't agreed on a set of basic propositions, like whether it is possible to determine precisely where an attack emanated and what its motive actually was and who can be blamed for it.
But the U.S. is not powerless. And that's the point.
Marc Ambinder is TheWeek.com's editor-at-large. He is the author, with D.B. Grady, of The Command and Deep State: Inside the Government Secrecy Industry. Marc is also a contributing editor for The Atlantic and GQ. Formerly, he served as White House correspondent for National Journal, chief political consultant for CBS News, and politics editor at The Atlantic. Marc is a 2001 graduate of Harvard. He is married to Michael Park, a corporate strategy consultant, and lives in Los Angeles.
-
Will Starmer's Brexit reset work?
Today's Big Question PM will have to tread a fine line to keep Leavers on side as leaks suggest EU's 'tough red lines' in trade talks next year
By The Week UK Published
-
How domestic abusers are exploiting technology
The Explainer Apps intended for child safety are being used to secretly spy on partners
By Chas Newkey-Burden, The Week UK Published
-
Scientists finally know when humans and Neanderthals mixed DNA
Under the radar The two began interbreeding about 47,000 years ago, according to researchers
By Justin Klawans, The Week US Published
-
How do you solve a problem like Facebook?
The Explainer The social media giant is under intense scrutiny. But can it be reined in?
By Peter Weber Published
-
Microsoft's big bid for Gen Z
The Explainer Why the software giant wants to buy TikTok
By Amrita Khalid Published
-
Apple is about to start making laptops a lot more like phones
The Explainer A whole new era in the world of Mac
By Navneet Alang Published
-
Why are calendar apps so awful?
The Explainer Honestly it's a wonder we manage to schedule anything at all
By Navneet Alang Published
-
Tesla's stock price has skyrocketed. Is there a catch?
The Explainer The oddball story behind the electric car company's rapid turnaround
By Jeff Spross Published
-
How robocalls became America's most prevalent crime
The Explainer Today, half of all phone calls are automated scams. Here's everything you need to know.
By The Week Staff Published
-
Google's uncertain future
The Explainer As Larry Page and Sergey Brin officially step down, the company is at a crossroads
By Navneet Alang Published
-
Can Apple make VR mainstream?
The Explainer What to think of the company's foray into augmented reality
By Navneet Alang Published