Trump Relaxes US Cyber Attack Rules

President Trump has signed an order relaxing rules around the use of cyber-weapons.

It is a reversal of guidelines, drawn up under President Obama, which required a large number of federal agencies to be involved in any decision to launch a cyber-attack. Specific details of what the new rules will be are classified information. One official said the US was taking "an offensive step forward".

The US administration is under pressure to deal with cyber-threats, amid growing concerns that state-sponsored hacks could hit critical infrastructure.

Prof Alan Woodward, a computer scientist at the University of Surrey, told the BBC: "We are in a era when certain governments are acting aggressively in cyber-space, and that is rightly condemned by governments such as that in the US.

"To respond in kind is not necessarily the way to de-escalate the situation."

He added: "You wouldn't allow a pre-emptive physical attack without thorough analysis and approval at the highest levels, so why would cyber-attacks be any different?"

The rules for using cyber-weapons set out by President Obama involved multi-agency sign-off, but were criticised by some law-makers as being too bureaucratic.

The classified procedure was leaked in 2013 by former intelligence contractor Edward Snowden.

In June this year, the US imposed sanctions on five Russian companies for allegedly aiding Russia's main intelligence agency.

The firms, along with three individuals, are prohibited from any transactions involving the US financial system, and US firms are barred from doing business with them.

Three of those named have links to Divetechnoservices, a company that allegedly specialises in hacking into undersea communication cables.

BBC:

You Might Also Read:

Trump Blames Obama For Russian Cyber-Attack

« How Blockchain Can Protect IoT Devices
Hamas Turns To Instagram To Lure IDF Soldiers »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Aurec

Aurec

Aurec provides specialist recruitment and contracting services including ICT professionals.

Eden Legal

Eden Legal

Eden Legal provides legal services on commercial and regulatory issues affecting digital businesses.

FinalCode

FinalCode

FinalCode offers a file encryption and file-based enterprise digital rights management (eDRM) platform.

Lynx Software Technologies

Lynx Software Technologies

Lynx provide secure software and operating systems for use in mission critical applications such as aerospace, medical, transportation and IoT.

Watchcom Security Group

Watchcom Security Group

Watchcom is one of Norway's foremost suppliers of information security consultancy services.

CyberWarrior

CyberWarrior

CyberWarrior deliver training and consulting for some of the world’s top brands and also partner with national systems integrators to augment their teams with our expertise.

Repulsa

Repulsa

Repulsa provides state-of-the-art, patented, fast filtering with over 700 million malicious IP addresses and over 30 million categorized site listings updated daily.

Tesorion

Tesorion

Tesorion is a fusion of different enterprises each with its own specialisation in the field of cybersecurity. We have combined these specialisations to create an integrated comprehensive solution.

Secure Blockchain Technologies (SBT)

Secure Blockchain Technologies (SBT)

SBT is a team of Enterprise IT Security Professionals weaving security and Blockchain Technology into our customer’s operational fabric.

Angoka

Angoka

Angoka provide hardware-based solutions for managing the cybersecurity risks inherent in machine-to-machine communication networks.

Fasken

Fasken

Fasken is one of the largest business law firms in Canada and a recognized leader in privacy and cybersecurity law.

Stefanini Group

Stefanini Group

Stefanini is a global IT services company providing a broad range of solutions for digital transformation including automation, cloud, IoT and cybersecurity.

CYSIAM

CYSIAM

CYSIAM provides world-leading expertise in offensive security and critical incident response. We train our clients to be able to protect themselves and respond to attacks and breaches when they occur.

White Tuque

White Tuque

A new way to protect your organization. White Tuque is your partner in identifying threats, understanding your risk, and ensuring your business remains resilient.

Whitaker Brothers

Whitaker Brothers

Whitaker Brothers data destruction equipment can be found in 115 countries and every single continent in the world, from major military organizations to small offices.

Technoware Solutions

Technoware Solutions

Technoware Solutions is a global company committed to helping entities navigate the digital waters of modernizing their system processes in an ever changing cybersecurity landscape.