recentpopularlog in

jerryking : retribution   4

Putin Is Waging Information Warfare. Here’s How to Fight Back. - The New York Times
By MARK GALEOTTIDEC. 14, 2016

the United States and its allies should pursue a strategy of deterrence by denial. Mr. Putin shouldn’t fear retaliation for his information warfare — he should fear that he will fail.

There are several ways to go about this. First, United States institutions need better cybersecurity defenses. Political parties and major newspapers are now targets just as much as the power grid and the Pentagon are. The government has to help provide security when it can — but people have a duty to be more vigilant and recognize that their cybersecurity is about protecting the country, not just their own email accounts. ....Finally, Mr. Putin’s own vanity could be turned into a weapon against him. Every time he overreaches, the American government should point it out. Every time he fails, we need to say so loudly and clearly. We should tell jokes about him. He can rewrite the record in Russia, but the West does not have to contribute to his mythmaking — and we should stop building him up by portraying him as a virtual supervillain.
cyberattacks  Vladimir_Putin  cyber_security  cyber_warfare  retaliation  security_&_intelligence  punitive  phishing  deterrence  economic_warfare  blacklists  retribution  disinformation  campaigns  destabilization  Russia  information_warfare  delegitimization  deception  overreach  power_grid 
december 2016 by jerryking
What Can the Next President Do About Russia? - WSJ
By ROBERT D. KAPLAN
Updated Oct. 16, 2016

Of the two great autocratic powers in Eurasia, Russia is emerging as a greater short-term threat than China. The Chinese hope to gradually dominate the waters off the Asian mainland without getting into a shooting war with the U.S. Yet while Beijing’s aggression is cool, Moscow’s is hot....Russia’s economic situation is much worse than China’s, and so the incentive of its leaders to dial up nationalism is that much greater. But the larger factor, one that Western elites have trouble understanding, cannot be quantified: A deeply embedded sense of historical insecurity makes Russian aggression crude, brazen, bloodthirsty and risk-prone. ....How does the U.S. build leverage on the ground, from the Baltic Sea to the Syrian desert, that puts America in a position where negotiations with Russia can make a strategic difference?....

For without the proper geopolitical context, the secretary of state is a missionary, not a diplomat. ...In the cyber domain the U.S. has not sufficiently drawn red lines. What kind of Russian hacking will result in either a proportionate, or even disproportionate, punitive response? The Obama administration seems to be proceeding ad hoc, as it has done with Russia policy in general. The next administration, along with projecting military force throughout the Russian near abroad, will have to project force in cyberspace, too.
Russia  Vladimir_Putin  Robert_Kaplan  threats  deterrence  nationalism  Baltics  NATO  U.S.foreign_policy  leverage  geopolitics  log_rolling  diplomacy  realism  balance_of_power  realpolitik  cyber_warfare  autocracies  insecurity  hacking  maritime  punitive  retribution  retaliation  South_China_Sea  ad_hoc  red_lines  China  autocrats 
october 2016 by jerryking
North Korea: How Can the U.S. Respond to Sony Hack Attack? - WSJ
Dec. 20, 2014 | WSJ | By JONATHAN CHENG And JEYUP S. KWAAK.

SEOUL—U.S. President Barack Obama ’s warning on Friday of punitive action against North Korea following the cyberattack on Sony Pictures Entertainment raises a sticky question: what can the world’s leading military and economic power do to an isolated country that has successfully resisted decades worth of attempts to rein in its hostility?...However, engaging in any kind of cyber tit-for-tat with North Korea could undermine trust in the security of online banking and shopping services,
North_Korea  cyber_security  cyber_warfare  Sony  retaliation  sanctions  blacklists  economic_warfare  money_laundering  hackers  punitive  retribution  undermining_of_trust  cyberattacks 
december 2014 by jerryking

Copy this bookmark:





to read