HackerSecret.com - The Most Authoritative Site in the World on the Hacking Tools and Techniques, Penetration Testing and CyberSecurity

  • Home
  • Visit Our Shop
  • Download the free App
  • Contact us for Info
VISIT OUR SHOP! CLICK HERE !

U.S. Cyber Infiltration of the Russian Electric Grid: Implications for Deterrence

by / Wednesday, 19 June 2019 / Published in Hacking
Share
Tweet
Pin
0 Shares

The New York Times reported on June 15 that “the United States is stepping up digital incursions into Russia’s electric power grid in a warning to President Vladimir V. Putin.” In particular, the Times reported that the United States has deployed code “inside Russia’s grid and other targets”—that is, “potentially crippling malware inside the Russian system, … intended partly as a warning, and partly to be poised to conduct cyberstrikes if a major conflict broke out between Washington and Moscow.” The article also noted that this step would represent a major escalation in the ongoing cyber conflict between Moscow and the United States.

That claim is probably true, though one has to wonder if June 15 should represent the point in time when the United States achieved these capabilities or only the point in time when the United States started talking publicly about its capabilities. The former, of course, would be the escalation step. It would not be the latter, unless we assume that the Russians were entirely oblivious to U.S. attempts at penetrating their electric grid before the Times story.

The story sheds light on one canonical argument about deterrence of cyber conflict. According to deterrence theory, the threat to carry out a punitive response must be credible to an adversary. The canonical argument about the impossibility of establishing the credibility of a cyber threat has always depended on the assumption that there was only one way to execute a cyber mission, and that demonstrating it to establish credibility would destroy its future value as a weapon in an operational nondemonstration context. Why? Because to demonstrate it would reveal critical secrets of that capability to the adversary, who would then use those secrets to remediate the vulnerabilities that enabled that offensive capability in the first place.

But the Times story noted that U.S. officials did not object to reporting on the malware implants that would give the United States capabilities to manipulate and/or shut down portions of Russia’s electric grid and presumably other critical infrastructure. Their lack of objection suggests that there must be multiple ways to carry out those missions—if there were only one way to carry out that mission, they would have been quite foolish to have revealed even the existence of such a way.

So what I learn from this story is that the assumption that there is but one singular method for carrying out a cyber mission is unlikely to be universally valid. Further, understanding the buggy nature of software development (which is unlikely to be significantly different in Russia than in the United States) leads me to believe Russian critical infrastructure overall has many vulnerabilities that could be exploited, just like U.S. critical infrastructure. This point is consistent with at least one analyst’s judgment that vulnerabilities are plentiful rather than rare.

This point in turn casts doubt on the premise that a demonstration of an offensive cyber capability will destroy its future value as an operational asset. Perhaps that particular capability might be negated, but other cyber capabilities to carry out the mission are likely to be available. The broader implication for deterrence of cyber conflict is that, at least under some circumstances, the technical credibility of a threat can be demonstrated.

Lawfare – Hard National Security Choices

Share
Tweet
Pin
0 Shares
Tagged under: Cyber, Deterrence, Electric, grid, Implications, Infiltration, Russian, U.S.

Search on the site

Our customers say

Annabel M. – Systems Engineer

 
Samuel D. – Ethical Hacker

 
Karola M. – Influencer

 
Marcus P. – Private Investigator

 
Rosemary S. – Housewife

 
Amit V. – IT Consultant

 
Matthew C. – Entrepreneur

 
Aisha B. – Computer Science student

 
Li W. – IT Analyst

 
Robert C. – Programmer

 

Click here now to visit our Shop!

Click here now to visit our Shop!

Other 2300 users like you have already done it this year!

DOWNLOADED 1316 TIMES!

DOWNLOADED 1316 TIMES!

Download now Hacker Secret our free Android app.

CONTACT US NOW FOR IMMEDIATE SUPPORT!

Contact Us
Write your email address here
Write here how we can help you - we support you immediately for all your needs!

Latest posts

  • How to tell if someone is stealing your wifi

  • How to check saved passwords on Chrome

  • The Computer Security Day

  • What is digital forensics

  • How to install Metasploit in Termux?

## Are you looking for products for hacking, computer security and penetration testing? Do you need to clean up your smartphone, your PC or your site from viruses and malware? Do you need to track down someone or retrieve urgent information? Do you want to buy devices already configured to experiment all the hacking techniques quickly and easily? Do you have special needs in software or hardware? ##

Contact us now … another 2300 users like you have already done it this year!

Click here now!

 

All the techniques, products and services described or contained on this site are intendend for exclusive use of study and professional training and to test the security of own's computer network in accordance with the national legislations on access to computer and online systems. All the services provided on this site (penetration testing, social accounts hardening, Incident Response & CSIRT, MSSP, Cybersecurity Consultancy, etc.) can be provided only with prior written and documented authorization from the owners or their legitimate representatives in accordance with current national regulations .

TOP
New Order