greater prices and penalties” for cyberattacks directed at U.S. targets.
The U.S. has already taken retaliatory motion towards unhealthy cyber actors; in one in every of his closing acts as president, Joe Biden issued an govt order on cybersecurity that grants expanded authorities for sanctions towards those that launch cyberattacks towards U.S. crucial infrastructure. Quickly after, the Treasury Division sanctioned an alleged hacker and firms in China linked to the latest Salt Storm hack of U.S. telecommunications corporations. Washington has imposed comparable sanctions and monetary restrictions on entities linked to different latest China-linked assaults, and the Division of Protection’s most up-to-date Cyber Technique instructed the division to arrange responses to “damaging cyber assaults.” However many specialists imagine the U.S. nonetheless lacks a transparent offensive cyber technique.
The U.S. has already taken retaliatory motion towards unhealthy cyber actors; in one in every of his closing acts as president, Joe Biden issued an govt order on cybersecurity that grants expanded authorities for sanctions towards those that launch cyberattacks towards U.S. crucial infrastructure. Quickly after, the Treasury Division sanctioned an alleged hacker and firms in China linked to the latest Salt Storm hack of U.S. telecommunications corporations. Washington has imposed comparable sanctions and monetary restrictions on entities linked to different latest China-linked assaults, and the Division of Protection’s most up-to-date Cyber Technique instructed the division to arrange responses to “damaging cyber assaults.” However many specialists imagine the U.S. nonetheless lacks a transparent offensive cyber technique.
The Cipher Temporary requested specialists what such a method would possibly appear to be. They provided a spread of concepts – from offensive “playbooks” to cyber counterstrikes to an elevated function for the personal sector – all within the identify, as one knowledgeable put it, of creating “the leap from passivity to proactivity.”