Obama Considering Range of Options in Response to China’s Severely Damaging OPM Hack

By Bill Gertz. President Obama is considering a range of options in addition to economic sanctions in response to the massive theft of data from federal government computer networks, a senior White House security official said Tuesday.

“We’ve got a range of tools and we’ll consider all of them,” said Lisa Monaco, the White House’s homeland security adviser.

Monaco said in a brief interview with the Washington Free Beacon after a speech on cyber threats that the U.S. government is currently investigating the clandestine theft of sensitive information on at least 4 million government workers from computers at the Office of Personnel Management (OPM) . . .

Monaco’s comments on possible responses to the cyber attack were the first to indicate that the administration is considering more than economic sanctions in retaliation. Josh Earnest, the White House press secretary, suggested Friday that sanctions were among the options.

Monaco did not respond when asked why neither the president nor his advisers have condemned the cyber attack against the Office of Personnel Management, which has been described by U.S. officials as one of the most damaging compromises of sensitive information in recent years. (Read more from “Obama Considering Range of Options in Response to OPM Hack” HERE)

___________________________________________________________________

Chinese Cyber Attacks That Might Be Even Worse Than the OPM Hack

By Robert Knake. February 2013. DHS says that between December 2011 and June 2012, cyber criminals targeted twenty-three gas pipeline companies and stole information that could be used for sabotage purposes. Forensic data suggests the probes originated in China.
Why it’s worse: Espionage is one thing, sabotage is another. This incident crosses into what might be called “preparation of the battlefield”—laying the groundwork for military operations. In this incident, the hackers targeted an entire sector. They weren’t going after business data or stealing designs. The worst you can do with PII? Gain account access. The worst you can do with this info? Blow up pipelines.

March 2015. Canadian researchers say Chinese hackers attacked U.S. hosting site GitHub. GitHub said the attack involved “a wide combination of attack vectors” and used new techniques to involve unsuspecting web users in the flood of traffic to the site. According to the researchers, the attack targeted pages for two GitHub users—GreatFire and the New York Times’ Chinese mirror site—both of which circumvent China’s firewall.
Why it’s worse: This incident gets closer to the line North Korea crossed—interfering with our right to free speech. We haven’t quite articulated a norm in this area, but theInternational Strategy for Cyberspace comes close. In this case, China targeted GitHub because it was hosting pages for organizations that circumvent its Great Firewall. It may be time we put out a Monroe Doctrine for cyberspace, which would, make clear that trying to stifle freedom of speech in this country crosses a red line. We could go further and make it official policy to bring dissidents from other countries under this veil of protection. Taking a page from the Kennedy doctrine, the United States could declare that it will pay any price, bear any burden, host any website and defeat any denial of service attack in the cause of Internet freedom. . .

February 2012. Media reports say that Chinese hackers stole classified information about the technologies onboard F-35 Joint Strike Fighters.
Why it’s worse: Under current norms, military technology is fair game but this one is devastating if true. The hack targeted classified information on one of our most advanced weapons platforms. The info could save the Chinese decades in research and development. Worse, it could be used to find vulnerabilities that could be exploited in combat—think the pilot episode of Battlestar Gallactica. (Read more from this story HERE)

Follow Joe Miller on Twitter HERE and Facebook HERE.