Published daily by the Lowy Institute

How the US election is setting cyber-security precedents

US officials are signaling that any cyber attack that impacts the election could result in a proportional response.

How the US election is setting cyber-security precedents

For all the unique and strange precedents set by this election, few could have foreseen that a new stage in cyber conflict would be one of them.

In the lead-up to election day in the US, officials are scrambling to signpost that any cyber attack that affects the election could result in a proportional response from US cyber agencies. Whether these warnings succeed in warding off an attack will have a significant impact on the future of conflict in cyberspace between states.

Since cyberspace has become a more pressing security issue over the last decade, governments and national security experts have continuously expressed concern over the vulnerability of critical infrastructure. The security of electricity grids, nuclear power stations, dams and other hardware was (and still is) thought to be the most urgent issue for cyber security officials.

However, this election has revealed a new front in the way cyber conflict is evolving. Many governments have declared that any cyber attack on their country’s critical infrastructure would amount to an act of war; this is a relatively clear line and signal for other states. But the grey zone that has emerged, and that opponents of the US are trying to exploit, is the ability to influence, discredit or manipulate political opinion and democratic processes.

This has been playing out in real time for those that have been watching the US election, with the method favoured so far being the hacking and releasing of private emails. The hacks against the Democratic National Committee and subsequent leaking to Wikileaks have been the most prominent. The timing of those leaks, right before the Democratic National Convention, was intended to cause maximum disruption and damage; the chairwoman, CEO, CFO and communications director of the Democratic party all resigned in the wake of the leaks.

The other major leak was the emails of Hillary Clinton’s campaign chairman, John Podesta. While likely not causing as much political damage as the hackers intended, the slow stream of leaked emails focused the news cycles for several weeks and reinforced negative perceptions of the Democratic candidate and her campaign.

The US government response has been the most interesting and important aspect of these episodes. In early October, the Office of the Director of National Intelligence and Department of Homeland Security released a joint statement labelling the Russian Government as the actor behind the hacks. The intention behind the statement was likely the same as similar statements regarding Chinese hacking of US government defence contractors and businesses: publicly accusing a foreign government of these sorts of operations is the warning shot before further action is taken.

Widespread manipulation of votes through cyber means would be nearly impossible in the US, as each state government is in charge of their voting processes, meaning there are 50 separate systems. Such an attack would also require physically tampering with some of the polling machines. But more targeted and strategic incidents are a real risk. Cyber attacks involving a few critical swing states would be enough to cause mass disruption. An attack like the distributed denial of service (DDoS) attack on the internet infrastructure company Dyn late last month, the largest of its type ever recorded, is another possibility. That particular attack brought down connections to CNN, The New York Times, CNBC, Twitter, Reddit and dozens of other sites at the same time.

In a close and politically tense election, disruptions to media organisations could more easily allow the spread of false information on social media. If foreign intelligence agencies are behind the leaked emails, as the US government says, they could also encourage the sharing of false news stories and information. While these efforts wouldn’t change the outcome of the election, at a minimum it would be a propaganda victory for those seeking to damage the legitimacy of the process, energise the populist trends that have been the hallmark of this election season and spur conspiracy theories.

The use of cyber operations at this scale is unprecedented. That is likely the reason why late last week NBC News reported from a government source that the US had ‘penetrated’ Russian infrastructure, including its electricity grid and national command systems. This is something most cyber experts assume governments have done for years, but to publicise it is another signpost.

The rules around cyber space are still being written. What, if anything, happens on election day will be an important episode to see whether some of those rules stick.

Photo: Getty Images/Drew Angerer

You may also be interested in