House Intel Chief Wants To Increase Cyber Attacks Against Russia

Airmen with the 24th Air Force at Port San Antonio look into their screens during an open house at the facility.

U.S. Air Force photo

AA Font size + Print

Airmen with the 24th Air Force at Port San Antonio look into their screens during an open house at the facility.

The United States needs to be on the offensive when it comes to a preventing cyber war, says Rep. Mike Rogers. By Patrick Tucker

The United States should be conducting more disruptive cyber attacks against nations like Russia, according to Rep. Mike Rogers, R-Mich., chairman of the House Intelligence Committee.

“I don’t think we are using all of our cyber-capability to disrupt” actors in Russia targeting U.S. interests, he said at The Washington Post’s cybersecurity summit on Thursday.

Rogers cited attacks out of Russia on the U.S. financial sector, specifically against JP Morgan Chase in August, as an example of nation states targeting U.S. companies and financial interests. The FBI is currently investigating whether or not the attacks were a response to the financial sanctions that the United States placed on Russia in March.

He didn’t directly implicate Putin’s government in the attack on JP Morgan Chase, but he called the attempted breaches a “decision [made] on the basis of sanctions,” and asked whether the intent was “to monitor transactions or go in destroy enough data to cause harm to transactions?”

He called it enough of an alarm to prompt the committee to “ramp up our efforts” and said the U.S. needs an “understandable policy on what offensive operations look like and should be.”

On Thursday, JP Morgan Chase released filings showing that the hack may have affected 76 million accounts, far broader than had been previously believed.

The power to wage cyber attacks is discussed under a Chairman of the Joint Chiefs Directive issued on June 21, 2013. And it’s alluded to in a March 5 Air Force instruction mandate titled “Command and Control (C2) for Cyberspace Operations“ (10-1701), but is otherwise classified.

Adm. Michael Rogers, the head of NSA and Cyber Command, said the United States has authority to conduct limited cyberwar activities. “Geographic combatant commanders already have authority to direct and execute certain Defensive Cyberspace Operations (DCO) within their own networks,” he testified at a recent Senate Armed Forces Committee hearing.

(RelatedNSA Chief: Yes, We Still Have Friends)

But Rep. Rogers cautioned that the private sector networks, which comprise 85 percent of the networks in the United States, are “not prepared to handle” even present-day hacks from nation states, much less a coordinated retaliatory back and forth of extremely sophisticated attacks, the sort of volleying that might be characterized as cyber war.

“If your [chief information officer] says he’s ready for what’s coming, find a new CIO,” he said.

Close [ x ] More from DefenseOne
 
 

Thank you for subscribing to newsletters from DefenseOne.com.
We think these reports might interest you:

  • Software-Defined Networking

    So many demands are being placed on federal information technology networks, which must handle vast amounts of data, accommodate voice and video, and cope with a multitude of highly connected devices while keeping government information secure from cyber threats. This issue brief discusses the state of SDN in the federal government and the path forward.

    Download
  • Military Readiness: Ensuring Readiness with Analytic Insight

    To determine military readiness, decision makers in defense organizations must develop an understanding of complex inter-relationships among readiness variables. For example, how will an anticipated change in a readiness input really impact readiness at the unit level and, equally important, how will it impact readiness outside of the unit? Learn how to form a more sophisticated and accurate understanding of readiness and make decisions in a timely and cost-effective manner.

    Download
  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

    Download
  • A New Security Architecture for Federal Networks

    Federal government networks are under constant attack, and the number of those attacks is increasing. This issue brief discusses today's threats and a new model for the future.

    Download
  • Information Operations: Retaking the High Ground

    Today's threats are fluent in rapidly evolving areas of the Internet, especially social media. Learn how military organizations can secure an advantage in this developing arena.

    Download

When you download a report, your information may be shared with the underwriters of that document.