You are the owner of this page.
A7 A7
Columns
OTHER VIEW
Other View: How Russia overtook China as our biggest cyber-enemy

Special To The Washington Post

In June 2015, the U.S. government discovered something horrifying: The Office of Personnel Management had been hacked by China. The attackers had stolen the Social Security numbers, performance ratings and job assignments of millions of current and former federal employees.

It wasn’t the first time the Chinese had been tied to security breaches in the government. They had gained access to the computers of the Federal Deposit Insurance Corp.’s top officials as well as sensitive data in government employees’ security clearance files. The Chinese military was able to steal weapons designs, data on advanced technologies and insight into U.S. government policies. They had collected information about America’s electrical power grid, gas lines and waterworks.

Headlines about China’s attacks bordered on the hysterical. “Successful hacker attack could cripple U.S. infrastructure,” NBC blared. “China hacks the world,” the Christian Science Monitor declared. The National Interest called China’s data theft a “national security threat.”

Over the past year, though, China has largely faded from the conversation. It’s not because its hackers have gone away. The Chinese continue to extract secrets from the U.S. government. But their efforts are, and have always been, far less scary than Russia’s brazen new challenge in the information space. Unlike China, the Russians aren’t using their cyberspies to steal business insights or gather information that officials can use in private negotiations with the United States. They’re looking to disrupt elections in the United States and Europe, break NATO, and undermine democratic values—big strategic goals that President Vladimir Putin energetically pursues. Russia has become the biggest threat in cyberspace, and it will be very hard to defeat.

Both Russia and China have absconded with America’s secrets for decades. China’s efforts have been better known because Chinese hackers have gotten caught more. As the New York Times reported, they stole “designs for the F-35 fighter jet, corporate secrets for rolling steel, even the blueprints for gas pipelines that supply much of the United States.” In 2008, they accessed the campaign servers of Barack Obama and John McCain, stealing internal position papers and communications, the Times said. Those documents were never leaked.

Russian hackers have used more sophisticated techniques and, as a result, have operated mostly under the radar, navigating their way into the networks of major agencies, including the Defense and State departments. They have also gained access to U.S. Central Command, the White House, energy companies and critical infrastructure around the country.

Today, China’s cyberespionage efforts have become more refined. But they’re still focused on gathering information as quietly as possible. China isn’t looking to take down U.S. infrastructure, and its spies generally no longer steal secrets from foreign companies to help their own. President Xi Jinping has professionalized and centralized cyberspying, and China is careful to avoid anything that could look like an attack.

The Russians are not. The country’s aims are much more aggressive—and personal. Its leaders believe that the United States is trying to use the Internet (which the Kremlin calls a tool of the CIA) to remake the world in its own Western liberal image. Putin’s henchman Dmitry Medvedev, Russia’s prime minister, even claimed that Western social media is part of a plan for Arab Spring-style political unrest in his country, saying that “they have been preparing such a scenario for us, and now they will try even harder to implement it.”

As a result, Russian hackers aren’t just looking for information that could bolster their business efforts or improve their ability to negotiate with Washington. They’re aggressively working to destabilize and destroy democracy. The Democratic National Committee hack, which has been tied to Russia, was only one of several high-profile incidents. The Russians allegedly hacked the German Bundestag. They broke into a leading French TV network (pretending to be the Islamic State) and took it offline. A power plant in Ukraine was hacked as a warning to Kiev. Russian hackers have been accused of planting false news to undercut a partnership between Sweden and NATO. European intelligence services say the Russians are more active and more dangerous than at any other time since the Cold War.

This is what Russia calls a “new generation of warfare,” which uses hacking, leaks and nontraditional weapons such as RT, an English-language news site with a strident anti-American tone. Russia’s government has hired hundreds of trolls to plant pro-Russian messages in the comment sections of Western media outlets, uses “chatbots” to flood social media with hostile comments, and, of course, leaks purloined emails through various organizations, including WikiLeaks. China doesn’t do this.

This week, Obama pledged to retaliate against Russian hackers, telling NPR “we need to take action. And we will.” But figuring out what comes next has been a struggle. We can’t unleash a major U.S. Cyber Command operation without risking war. Some proposals put forward by experts are silly, such as leaking Putin’s Botox injection schedule. Others are feckless, such trying to embarrass Putin by publicizing pictures of his girlfriends.

America needs a better strategy, one that’s more assertive and nimble. And it can’t be focused on Russia alone. Other opponents remain busy and dangerous. North Korea, Iran and China have all tested American cyberdefenses and found them wanting. A good cybersecurity strategy can’t play whack-a-mole. We need an approach that convinces opponents it’s dangerous to attack the United States, and if they do, there will be consequences. The response to North Korea’s Sony hack shows that opponents’ behavior can be changed: After the United States imposed retaliatory sanctions, the number of attacks decreased significantly. We can reshape cyber-risk if we take action. We must.


Editorial
Our View: Cheers and Jeers

Cheer

Twin Falls County Sheriff’s deputies saved the life of a jail inmate this week when Cody William James Meade, 26, a Tennessee man who has racked up six additional felony charges while in custody since he was arrested in May on suspicion of robbing an Oasis Stop ‘N Go at gunpoint, smashed a window 8 feet above his jail door and escaped.

Meade then lowered the frame from a broken mirror over another inmate’s neck, taking him hostage and threatening to slit the man’s throat at any moment.

Deputies kept Meade talking and rushed in at the perfect moment — just as Meade went to adjust the mirror.

Sgt. James VanZante likely saved a life. It was a close call.

The deputies deserve a lot of credit for quick thinking and brave actions.

Jeer

Jeers to the Twin Falls Police Department, who this week took nearly a half-hour to respond to a call where shots were fired.

It happened Tuesday morning at the impound lot of A-1 Towing in Twin Falls where Charles Legg said he was shot at twice by someone trying to steal a pickup truck impounded Monday night in Buhl.

Police say the call came in during a shift change, there were some miscommunications, and officers were worried they were being set up by an ambush.

None of these are good excuses when someone says they’re being shot at.

Yes, police put their lives on the line every day, and we all want to ensure their safety. But nearly 30 minutes is far too long to respond to a case where there’s gunplay.

Hopefully, the department and dispatchers learn from this experience and close the communications gaps that caused such an inexcusable delay.

Cheer

A ribbon was cut, the governor spoke and the mayor shook plenty of hands Thursday at the official opening of the Crisis Center of South Central Idaho.

There was plenty to celebrate.

The center is just the third of its kind in Idaho, designed to offer immediate help to folks suffering mental health or addiction emergencies.

The center is run by ProActive Advantage, the contractor who won a bidding process earlier this year.

Since the center opened in late November, 23 people have already received help. Besides getting people immediate attention in crisis situations, the center should help lessen the demands on emergency rooms and county jails – which were sometimes the only places to take people in emergencies that weren’t immediately affecting their health.

Now, the center will offer hope to anyone who needs it, 24 hours a day, seven days a week.


Mailbag
Letters of Thanks

Thanks for donations

The Twin Falls Monarch Lions would like to thank the following businesses for their donation to our annual fundraising raffle: Maxie’s Pizza, Gertie’s Brick Oven Pizza, Krengel’s Hardware, Keyline Automotive, Canyon Pawn Shop, La Casita Restaurant, Wills Motor, OK Tires, Swensen’s Markets (South Park), Clean Water Equipment, Close-out Center, Mr. and Mrs. Norm Skinner, D&B Supply, Cycle’s & Sleds, Tony’s 2T Auto, Jiffy Lube, Webb Nursery, Napa Auto Supply, Norm’s Cafe, Poindexter’s, Rudy’s, Sav-Mor Drug, Twin Falls Sandwich Co., Cookie Basket, O’Dunkens, Glanbia Cheese, Gyros Sandwich Shop, KB’s, Twin Falls Bean Coffee Shop and Prasai Restaurant.

The funds from this year’s raffle will go to the Twin Falls Senior Center.

Thank you very much!

John Phillips, president

Merv Mueller, secretary-treasurer

Twin Falls Monarch Lions

Gifts Of Love 19th year was a joyful success!

We would like to take this opportunity to thank all of the supporters of this worthwhile cause of providing Christmas to our local care centers. It is through their generous donations of money, gifts or precious time we have been allowed to do as much as we have. Kiwanis Club of Twin Falls, Dr. David Spritzer, Pheasant Cove Dental, St. Edward’s Catholic Church, Chick-fil-A, Judy Snyder, Corinne Martins, Sandy Mueller, Sue Pack, Lynn Hedberg, Suzy Watson, Anna Mae Rogers, Tina Withers & Kids, Safe House Kids, Twin Falls High School Students. A special thank you to the Times-News and KMVT.

Teresa Rogers-Kossman

Twin Falls

The Letters of Thanks column will publish letters of up to 200 words from:

Organizations thanking contributors or supporters.

Individuals thanking public agencies and businesses for extraordinaryservice.

Send letters to letters@magicvalley.com. If you would like to purchase a classified ad to express gratitude of a personal rather than public nature, call The Times-News Customer Service department.