Get Task & Purpose in your inbox
Here's How The US Can Retaliate Against Russian Hacking And 'Kick Them In The Balls'
It's been nearly a year since US intelligence agencies accused top Russian officials authorized hacks on voting systems in the US's 2016 presidential election, and mounting evidence suggests that the US has not fought back against the hacks as strongly as possible.
But attributing and responding to cyber crimes can be difficult, as it can take "months, if not years" before even discovering the attack according Ken Geers, a cybersecurity expert for Comodo with experience in the NSA.
Even after finding and attributing an attack, experts may disagree over how best to deter Russia from conducting more attacks.
But should President Donald Trump "make that call" that Russia is to blame and must be retaliated against, Geers told Business Insider an out-of-the-box idea for how to retaliate.
2013 Moscow Victory Day ParadeWikimedia Commons photo
"It's been suggested that we could give Russia strong encryption or pro-democracy tools that the FSB [the Federal Security Service, Russia's equivalent of the FBI] can’t read or can’t break," said Geers.
In Russia, Putin's autocratic government strictly controls access to the internet and monitors the communications of its citizens, allowing it suppress negative stories and flood media with pro-regime propaganda. If the US provided Russians with tools to communicate secretly and effectively, new, unmonitored information could flow freely and Russians wouldn't have to fear speaking honestly about their government.
The move would be attractive because it is "asymmetric," meaning that Russia could not retaliate in turn, according to Geers. In the US, the government does not control communications, and Americans are already free to say whatever they want about the government.
"What if we flooded the Russian market with unbreakable encryption tools for free downloads?," Geers continued. "That would really make them angry and annoy them. It would put the question back to them, 'what are you going to do about it?'"
To accomplish this, the NSA could spend time "fingerprinting" or studying RUNET, the Russian version of the internet, according to Geers. The NSA would study the challenges Russia has with censorship, how it polices and monitor communications, and then develop a "fool-proof" tool with user manuals in Russian and drop it into the Russian market with free downloads as a "big surprise," he added.
"You’re just trying to figure out how to kick them in the balls," Geers said of the possible tactic. "But they’d probably figure out how to defeat it in time."
Geers acknowledged that such a move could elicit a dangerous response from Russia, but, without killing or even hurting anyone, it's unclear how Russia could escalate the conflict.
Russian President Vladimir Putin holds an award during a meeting of Russian Geographical Society in St Petersburg, Russia, Monday, April 27, 2015.Alexei Druzhinin/RIA Novosti, Kremlin Pool Photo via AP
As it stands, it appears that Russian hacking attempts have continued even after former president Barack Obama expelled Russian diplomats from the US in retaliation last year. Cybersecurity experts attribute a series of recent intrusions into US nuclear power plants to Russia.
Taking bold action, as Geers suggests, would leave Russia scrambling to attribute the attack to the US without clear evidence, while putting out fires from a newly empowered public inquiry into its dealings.
The ball would be in Russia's court, so to speak, and they might think twice about hacking the US election next time.
More from Business Insider:
- A key American defense has failed, and now Russia fears no reprisal for hacking the US
- A massive collection of Nazi artifacts was discovered in a secret room in Argentina
- A Marine veteran says a morning ritual he picked up in boot camp primes him for success every day
- Here's what happens when US Marines storm an enemy beach
- Here's how a North Korean nuclear attack on the US would play out
A former sailor who was busted buying firearms with his military discount and then reselling some of them to criminals is proving to be a wealth of information for federal investigators.
Julio Pino used his iPhone to record most, if not all, of his sales, court documents said. He even went so far as to review the buyers' driver's license on camera.
It is unclear how many of Pino's customer's now face criminal charges of their own. Federal indictments generally don't provide that level of detail and Assistant U.S. Attorney William B. Jackson declined to comment.
It all began with a medical check.
Carson Thomas, a healthy and fit 20-year-old infantryman who had joined the Army after a brief stint in college, figured he should tell the medics about the pain in his groin he had been feeling. It was Feb. 12, 2012, and the senior medic looked him over and decided to send him to sick call at the base hospital.
It seemed almost routine, something the Army doctors would be able to diagnose and fix so he could get back to being a grunt.
Now looking back on what happened some seven years later, it was anything but routine.
The US military now has to ask the Iraqis for permission before giving close air support to troops in combat
U.S. forces must now ask the Iraqi military for permission to fly in Iraqi airspace before coming to the aid of U.S. troops under fire, a top military spokesman said.
However, the mandatory approval process is not expected to slow down the time it takes the U.S. military to launch close air support and casualty evacuation missions for troops in the middle of a fight, said Army Col. James Rawlinson, a spokesman for Combined Joint Task Force-Operation Inherent Resolve.
Army Spc. Clayton James Horne died in Saudi Arabia on Aug. 17, making him the eighth non-combat fatality for Operation Inherent Resolve so far this year, defense officials have announced.
Horne, 23, was assigned to the 351st Military Police Company, 160th Military Police Battalion, an Army Reserve unit based in Ocala, Florida, a Pentagon news release says.
The soldier who was arrested for taking an armored personnel carrier on a slow-speed police chase through Virginia has been found not guilty by reason of insanity on two charges, according to The Richmond-Times Dispatch.
Joshua Phillip Yabut, 30, entered a plea of not guilty by reason of insanity for unauthorized use of a motor vehicle — in this case, a 12-ton APC taken from Fort Pickett in June 2018 — and violating the terms of his bond, which stemmed from a trip to Iraq he took in March 2019 (which was not a military deployment).