

Lawfare Daily: Can Chinese Cyber Operations Be Deterred, with Dakota Cary
22 snips Nov 5, 2024
Dakota Cary, a Strategic Advisory Consultant at SentinelOne and expert in cybersecurity, joins the discussion on U.S. efforts to deter Chinese cyber operations, particularly the Volt Typhoon group. He reveals why these intrusions on critical infrastructure are likely to continue. The conversation underscores the unique challenges of cyber deterrence, including attribution issues and evolving U.S. policies. Cary also emphasizes the need for enhanced defensive capabilities and proactive strategies to safeguard digital privacy in the face of growing threats.
AI Snips
Chapters
Transcript
Episode notes
Chinese Cyber Operations and Naming Conventions
- Chinese cyber operations aren't new, but naming conventions changed in 2022, causing re-evaluation.
- Microsoft's shift from periodic table elements to labels like "Typhoon" for China and "Blizzard" for Russia necessitates mapping new names to known actors.
Cyber Deterrence Theory's Nuances
- Cyber deterrence theory is complex, drawing from Cold War nuclear deterrence but less focused on military posturing.
- It grapples with norms, attribution challenges, and the applicability of traditional deterrence concepts to the cyber realm, often viewed as the purview of intelligence agencies.
2018 National Cyber Strategy
- The 2018 National Cyber Strategy used "all instruments of national power" to deter cyberattacks, sparking nuclear weapons debate.
- It included an international cyber deterrence initiative, emphasizing swift and transparent consequences.