Donald Trump Doesn’t Understand Cyberwar

In late March, Donald Trump sat down with a few reporters from The New York Times for a rare, in-depth interview about his foreign policy ideas.

The conversation careened from Middle East alliances to nuclear weapons to trade pacts, touching briefly on the ever-more pressing topic of cyberwar. Trump said the US lagged behind other world powers, and that the “inconceivable power of cyber” should figure “very strongly in our thought process.”

Now, far from being cooked through, his thoughts on cybersecurity and cyberwar seem to have deflated. At the Republican National Convention, the Times’ Maggie Haberman and David Sanger checked up on the ideas of the man who’s now the Republican nominee for president. Here’s what he had to say:

David Sanger: You’ve seen several of those countries come under cyberattack, things that are short of war, clearly appear to be coming from Russia.

Donald Trump: Well, we’re under cyberattack.

Sanger: We’re under regular cyberattack. Would you use cyber-weapons before you used military force?

Trump: Cyber is absolutely a thing of the future and the present. Look, we’re under cyberattack, forget about them. And we don’t even know where it’s coming from.

Sanger: Some days we do, and some days we don’t.

Trump: Because we’re obsolete. Right now, Russia and China in particular and other places.

Sanger: Would you support the United States’ not only developing as we are but fielding cyber-weapons as an alternative?

Trump: Yes. I am a fan of the future, and cyber is the future.

At that point, Sanger gave up and moved on to a new line of questioning.

In March, Trump was wrong about several aspects of cyberwar. This time, he stuck to statements so anodyne that they’re nearly impossible to fact check.

Like before, Trump appears particularly worried about the difficulty of tracking down the perpetrators of cyberattacks. That’s certainly one of the things that makes cyberwar trickier than a conventional conflict: A missile might be easy to track through the sky, but a virus can come from anywhere, and skilled hackers generally cover their digital tracks assiduously.

But the US is getting good at identifying attackers. Officials attributed a massive attack on Sony Pictures Entertainment to North Korea, and privately pointed fingers at China for data breaches at the Office of Personnel Management, and at Russia for attempts to get into email systems at the State Department at the White House.

Trump also repeated his earlier claim that the United States is “obsolete” in cyberwar. It’s true that state-sponsored hackers have repeatedly poked holes in the defenses of American corporations and governments. But American offensive capabilities are likely unmatched.

This year, the Defense Department launched into full-on cyberwar against the Islamic State, promising to disrupt the group’s propaganda, internal communications, and basic functions like payroll. The campaign marks the first time the Pentagon has publicly announced that it’s using its own cyber-weapons to go after an adversary—previous attacks, like the Stuxnet worm that targeted Iranian nuclear centrifuges, were conducted in secrecy. But as reported by The Washington Post, the operation, which would support the US-led coalition’s airstrike campaign, has gotten off to a slow start, as the Pentagon hires up for the effort and stockpiles weapons to use against the group.

Of course, this is a whole lot more detail than Trump was ready or willing to take on in his interview this week. Political analysts, security experts, and even the nominee’s own ghostwriter are wringing their hands over the thought of the lasting, catastrophic damage Trump could inflict with access to the US nuclear arsenal. The potential that he’d misuse the government’s secretive stockpile of viruses and malware is only slightly less worrisome.

If Trump is to live up to his self-proclaimed title, a “fan of the future”, he’d do well to brush up on his cyberwar talking points before the first presidential debate in September.

Ein News: http://bit.ly/2bb77VI

« For Sale: Leaked Terror Watch List
Made in Britain: Facebook's Drones »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ThetaRay

ThetaRay

ThetaRay’s solution for Industrial cyber security protects against unknown cyber-attacks that target industry and critical infrastructure.

Panaseer

Panaseer

Panaseer is an enterprise cybersecurity automation and data analytics company that helps organizations stop preventable breaches by ensuring security controls are working effectively.

CryptTalk

CryptTalk

CryptTalk is an easy-to-use secure communication service.

Identillect Technologies

Identillect Technologies

Identillect Technologies provide a user-friendly secure email solution to protect critical information, with an emphasis on simplicity.

Wolfpack Information Risk

Wolfpack Information Risk

Wolfpack specialise in information and cyber threat management covering the full spectrum of prevention, detection, incident response and business resilience capabilities.

Ritz

Ritz

Ritz is the largest holistic pure-play cyber security solutions provider in Myanmar.

ZeroNorth

ZeroNorth

ZeroNorth provides a new approach to improve software and infrastructure security, simplify continuous compliance reporting and to create more cost-effective risk management programs.

Trustelem

Trustelem

Trustelem offers European and global companies a ready-to-use access management service that respects the principles of sovereignty, territoriality and privacy.

Startups.be

Startups.be

Startups.be helps tech entrepreneurs to be successful by providing quality access to service providers, business partners, customers and investors.

RevealSecurity

RevealSecurity

RevealSecurity's TrackerIQ detects malicious activities in enterprise applications.

Epoch Concepts

Epoch Concepts

Offering a full line of IT services, solutions, and integration capabilities, Epoch Concepts is the trusted partner of the US military, federal agencies, private enterprises, and systems integrators.

BugProve

BugProve

BugProve offers a firmware analysis tool that speeds up security testing processes and supports compliance needs by automating repetitive tasks and detecting 0-day vulnerabilities.

5S Technologies

5S Technologies

5S Technologies is a regional IT solutions and services provider based in Cary, NC and serving the Carolinas.

Prophet Security

Prophet Security

Prophet Security empowers organizations to triage, investigate, and respond to alerts with unparalleled speed and accuracy.

Aliro Security

Aliro Security

AliroNet is the world’s first entanglement Advanced Secure Network solution.

Heritage Cyber World

Heritage Cyber World

Heritage Cyber World is a one stop solution for all your security needs that brings together a team of security experts and analysts to deliver high-class security services.