Receive $80 Grab vouchers valid for use on all Grab services except GrabHitch and GrabShuttle when you subscribe to BT All-Digital at only $0.99*/month.
Find out more at btsub.sg/promo
[WASHINGTON] The US military needs to improve its ability to deter attacks on its computer networks, and is working to make them more costly for US adversaries, top US military and intelligence officials told a Senate hearing on Tuesday. "We are not where we need to be in our deterrent posture,"US Deputy Defense Secretary Robert Work told the Senate Armed Services Committee.
James Clapper, director of national intelligence, told the committee that cyber threats to the US national and economic security were increasing in frequency, scale, sophistication and severity of impact, both by countries such as Russia, China, Iran and North Korea, as well as non-state actors. "Such malicious cyber activity will continue and probably accelerate until we establish and demonstrate the capability to deter malicious state-sponsored cyber activity," he said. Establishing a credible deterrent requires agreement on norms of cyber behavior by the international community, he said.
He said the current environment was like "the Wild West,"and one key question was whether to put limits on spying activity that did not exist during the Cold War.
Mr Clapper and the other officials said they viewed last week's cyber agreement between China and the United States as a "good first step," but said it was unclear how effective the pact would be.
Asked if he was optimistic the agreement would eliminate Chinese cyber attacks, Mr Clapper said simply, "No." Work said three incidents - a massive breach of the US Office of Personnel Management (OPM) that involved the records of 21 million individuals, an attack on the unclassified network of the Joint Chiefs of Staff, and an earlier attack on Sony Pictures - were carried out by three different countries.
The United States has publicly linked the Sony attack to North Korea, and US officials, speaking on background, have linked the OPM attack to China, and the JCS attack to Russia.
In the OPM case, Mr Clapper said three types of evidence were needed link an attack to a given country: the geographic point of origin, the identity of the "actual perpetrator doing the keystrokes," and who was responsible for directing the act.
Mr Work said the administration's response would be "vigorous"if another incident of that scale occurred that was firmly linked to China. He said the response could involve a variety of tools, including economic sanctions and criminal indictments.