greater prices and penalties” for cyberattacks directed at U.S. targets.
The U.S. has already taken retaliatory motion in opposition to unhealthy cyber actors; in considered one of his closing acts as president, Joe Biden issued an govt order on cybersecurity that grants expanded authorities for sanctions in opposition to those that launch cyberattacks in opposition to U.S. important infrastructure. Quickly after, the Treasury Division sanctioned an alleged hacker and corporations in China linked to the current Salt Storm hack of U.S. telecommunications corporations. Washington has imposed comparable sanctions and monetary restrictions on entities linked to different current China-linked assaults, and the Division of Protection’s most up-to-date Cyber Technique instructed the division to organize responses to “harmful cyber assaults.” However many specialists consider the U.S. nonetheless lacks a transparent offensive cyber technique.
The U.S. has already taken retaliatory motion in opposition to unhealthy cyber actors; in considered one of his closing acts as president, Joe Biden issued an govt order on cybersecurity that grants expanded authorities for sanctions in opposition to those that launch cyberattacks in opposition to U.S. important infrastructure. Quickly after, the Treasury Division sanctioned an alleged hacker and corporations in China linked to the current Salt Storm hack of U.S. telecommunications corporations. Washington has imposed comparable sanctions and monetary restrictions on entities linked to different current China-linked assaults, and the Division of Protection’s most up-to-date Cyber Technique instructed the division to organize responses to “harmful cyber assaults.” However many specialists consider the U.S. nonetheless lacks a transparent offensive cyber technique.
The Cipher Temporary requested specialists what such a technique may appear like. They provided a spread of concepts – from offensive “playbooks” to cyber counterstrikes to an elevated position for the non-public sector – all within the title, as one professional put it, of constructing “the leap from passivity to proactivity.”