Donald Trump Doesn’t Understand Cyberwar

In late March, Donald Trump sat down with a few reporters from The New York Times for a rare, in-depth interview about his foreign policy ideas.

The conversation careened from Middle East alliances to nuclear weapons to trade pacts, touching briefly on the ever-more pressing topic of cyberwar. Trump said the US lagged behind other world powers, and that the “inconceivable power of cyber” should figure “very strongly in our thought process.”

Now, far from being cooked through, his thoughts on cybersecurity and cyberwar seem to have deflated. At the Republican National Convention, the Times’ Maggie Haberman and David Sanger checked up on the ideas of the man who’s now the Republican nominee for president. Here’s what he had to say:

David Sanger: You’ve seen several of those countries come under cyberattack, things that are short of war, clearly appear to be coming from Russia.

Donald Trump: Well, we’re under cyberattack.

Sanger: We’re under regular cyberattack. Would you use cyber-weapons before you used military force?

Trump: Cyber is absolutely a thing of the future and the present. Look, we’re under cyberattack, forget about them. And we don’t even know where it’s coming from.

Sanger: Some days we do, and some days we don’t.

Trump: Because we’re obsolete. Right now, Russia and China in particular and other places.

Sanger: Would you support the United States’ not only developing as we are but fielding cyber-weapons as an alternative?

Trump: Yes. I am a fan of the future, and cyber is the future.

At that point, Sanger gave up and moved on to a new line of questioning.

In March, Trump was wrong about several aspects of cyberwar. This time, he stuck to statements so anodyne that they’re nearly impossible to fact check.

Like before, Trump appears particularly worried about the difficulty of tracking down the perpetrators of cyberattacks. That’s certainly one of the things that makes cyberwar trickier than a conventional conflict: A missile might be easy to track through the sky, but a virus can come from anywhere, and skilled hackers generally cover their digital tracks assiduously.

But the US is getting good at identifying attackers. Officials attributed a massive attack on Sony Pictures Entertainment to North Korea, and privately pointed fingers at China for data breaches at the Office of Personnel Management, and at Russia for attempts to get into email systems at the State Department at the White House.

Trump also repeated his earlier claim that the United States is “obsolete” in cyberwar. It’s true that state-sponsored hackers have repeatedly poked holes in the defenses of American corporations and governments. But American offensive capabilities are likely unmatched.

This year, the Defense Department launched into full-on cyberwar against the Islamic State, promising to disrupt the group’s propaganda, internal communications, and basic functions like payroll. The campaign marks the first time the Pentagon has publicly announced that it’s using its own cyber-weapons to go after an adversary—previous attacks, like the Stuxnet worm that targeted Iranian nuclear centrifuges, were conducted in secrecy. But as reported by The Washington Post, the operation, which would support the US-led coalition’s airstrike campaign, has gotten off to a slow start, as the Pentagon hires up for the effort and stockpiles weapons to use against the group.

Of course, this is a whole lot more detail than Trump was ready or willing to take on in his interview this week. Political analysts, security experts, and even the nominee’s own ghostwriter are wringing their hands over the thought of the lasting, catastrophic damage Trump could inflict with access to the US nuclear arsenal. The potential that he’d misuse the government’s secretive stockpile of viruses and malware is only slightly less worrisome.

If Trump is to live up to his self-proclaimed title, a “fan of the future”, he’d do well to brush up on his cyberwar talking points before the first presidential debate in September.

Ein News: http://bit.ly/2bb77VI

« For Sale: Leaked Terror Watch List
Made in Britain: Facebook's Drones »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Infosec (T) Ltd

Infosec (T) Ltd

Infosec (T) Limited is an independent Tanzania based consultancy specializing in IT governance, information security and IT audit.

Business Continuity

Business Continuity

Business Continuity delivers integrated IT solutions for cybersecurity, virtualization, cloud platforms and operational security solutions.

Safetica

Safetica

Safetica Technologies is a Czech software company that delivers data protection solutions for businesses of all types and sizes.

Startup Wise Guys

Startup Wise Guys

Startup Wise Guys is a mentorship-driven accelerator program for early stage B2B SaaS, Fintech, Cybersecurity & Defense AI startups.

Guardio

Guardio

Guardio develop tools and products to combat modern web and browser threats.

InfusionPoints

InfusionPoints

InfusionPoints is your independent trusted partner dedicated to assisting you in building your secure and compliant business solutions.

Exceed Cybersecurity & I.T. Services

Exceed Cybersecurity & I.T. Services

Exceed Cybersecurity & I.T. Services is a premier Managed Internet Technology (I.T.) company with a focus in cybersecurity risk management and CMMC compliance management.

Cyware

Cyware

Cyware is the only company building Virtual Cyber Fusion Centers enabling end-to-end threat intelligence automation, sharing, and unprecedented threat response for organizations globally.

Obscure Technologies

Obscure Technologies

Obscure Technologies is a firm of experts, specialised in brokering the best security solutions to market.

RB42

RB42

RB42 (formerly Nexa Technologies) provide cyber defense solutions (ComUnity, secure and encrypted messaging, detection of interception tools, etc) and cyber defense consultancy service.

SEK Security Ecosystem Knowledge

SEK Security Ecosystem Knowledge

SEK helps companies in the complex path of cybersecurity; in the analysis, detection and prevention of digital threats.

Port443

Port443

Port443 specialises in providing Security Orchestration, Automation and Remediation (SOAR) "as a service".

Action Fraud

Action Fraud

Action Fraud is the UK’s national reporting centre for fraud and cyber crime where you should report fraud if you have been scammed, defrauded or experienced cyber crime.

Mindflow

Mindflow

Mindflow is dedicated to bringing answers to the challenges the cybersecurity field and beyond face today.

RST Cloud

RST Cloud

RST Cloud is a cutting-edge technology company that specialises in threat intelligence solutions for businesses of all sizes.

Aprio

Aprio

Aprio is a premier business advisory and accounting firm. We deliver advisory, tax, managed, and private client services to build value, drive growth, manage risk, and protect wealth.