Meanwhile, some US commentators on cybersecurity issues have suggested that these attacks are not a astonish but appear to be a new spin on an old strategy
It could have been a cold war drama. The world watched the coming week as accusations and counter-accusations were hurled by the American and Russian governments about documents stolen during a hack of the Democratic National Committee and the email account of Hillary Clintons campaign chair John Podesta.
The notion that public figures have any privacy rights appears to have been lost in the furore surrounding the narrative, stolen correspondence being bandied around in attempts to influence the outcome of one of the nastiest, most vitriolic US presidential campaigns in history.
Some have argued that as secretary of state, Hillary Clintons emails were fair game for hacking because had they not been held on a private server, they would have been subject to freedom of information requests and available to the general public.
There may be some truth to that, but it doesnt change the fact that correspondence between public figures has allegedly been hacked by those acting under the direction of a foreign government and released for everyone to peruse, with little opportunity for the authors to offer context or even confirm that the contents of the leaks are accurate.
The hackers have created a dilemma for American voters, according to Rob Guidry, CEO of social media analytics company Sc2 and a former special adviser to US Central Command. He tells voters seem to want the information that has been leaked by the hackers but dont feeling altogether comfy with the hacks that have brought the information to light.
What I find most intriguing about this is that many establishment outlets including Fox News are now actively turning to WikiLeaks and others for information that used to be provided by freedom of information requests, he told. Its a rather strange turn of events.
Malcolm Nance, a former naval intelligence officer and author of The Plot to Hack America: How Putins Cyberspies and WikiLeaks Tried to Steal the 2016 Election, indicates there is a deliberate strategy behind the timing of release of the hacked emails. The latest leaks mixture false information with text removed from real, stolen emails, he told. This is a slow-roll political attack on the entire political infrastructure of America. It is Watergate its literally Watergate. They did what Nixon couldnt do.
The US government is taking a very direct approach in calling out what it tells is Russian-directed hacking. Thats significant according to Richard Stiennon, author of There Will Be Cyberwar because there is nothing new in what the Russian government has allegedly done in the 2016 election cycle.
Russian interference with US elections is not heating up per se, as much as its coming out of the darkness, tells Stiennon, “whos also” chief strategy police officers of Georgia-based data security company Blancco Technology Group. Hacking the DNC and Democratic congressional campaigns and then the leaking of stolen emails is somewhat ham-fisted, but its an escalation of Russian disinformation campaigns, he said.
Stiennon also warned that one deeply disturbing potential outcome of these efforts could be to cause Americans to question the validity of the results of their general elections.
The probing of at least 23 election operations in various US nations could lead to mistrust in election results if the election is shut believe digital dangle chads, he told. The gloves are arriving off as the tools of cybercrime are merging with the tools of information disruption. The blatant assaults on US elections and political officials is just one component as continued hacking and doxxing[ releasing stolen documents] of US officials and agencies serves to embarrass the Obama administration.
After the elections, the new administration will have to be prepared for even further escalations.
That leads to the third and final issue: that the US will fight back. No one yet knows what form that reaction will take, but the words of White House press secretary Josh Earnest were clear about the administrations commitment to ensuring that the hacks do not run unanswered.
With regard to a response, we obviously will ensure that a US response is proportional. It is unlikely that our response would be announced in advance, he said.
Its surely possible that the chairman could choice reply options that we never announce. The president has talked before about the considerable capabilities that the US government has to both defend our systems in the United States, but also carry out offensive operations in other countries. So there are a range of reactions that are available to the president, and he will consider a reaction thats proportional.
When the US fightings back, internet users will need to watch out for the digital fallout particularly if it results in a tit for tat combat.
Turn the clock back to 2010 and the Stuxnet worm a computer virus whose origins in branches of the CIA and Mossad were lately chronicled in a documentary that debuted earlier this year. That worm wasnt intended to impact users beyond its original target in Iran, but did.
Where does retaliation begin, and where will it end?
Read more: www.theguardian.com