• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Skip to footer
  • Home
  • About
    • Our Mission
      • Political Islam
    • Areas of Expertise
      • Economic Warfare
        • Cyber Security
      • U.S. Policy
      • Anti-Corruption
      • Foreign Election Observing
      • Supporting Free Speech
        • Legislation
      • Impact of ACD’s Work
      • Free Speech Celebration, U.S. Senate
    • Board of Directors & Advisors
    • Our Team
    • Contact Us
    • Subscribe
  • Our Impact
    • Endorsements
    • Additional Praise
  • Media
    • Recent Interviews
    • Events
      • Coming Events
    • Radio
    • Television
    • Rumble / Youtube
  • Publications
    • All Posts Archive
    • ACD Presentations
    • Articles
    • Books
    • Papers
    • Recommended Readings
  • Free Speech
    • Legislation & Support
    • Impact of ACD’s Work
      • FREE SPEECH Act Celebration, U.S. Senate, September 20, 2010
      • Some Congressional Testimonies
  • Economic warfare
    • The Impact of Purposeful Interference on U.S. Cyber Interests
    • Cyber/Space, EMP Insecurity- Current and Future Threats
    • The Existential EMP Threat
    • New Strategies to Secure U.S. Economy from Cyber Attacks
    • Economic Warfare Subversions July 9, 2012
    • CyberSpace Security – Papers And Articles
    • Cyber Security
    • Da’esh “lite” North America Islamist – Sources
    • The Muslim Brotherhood and Da’esh “Lite” in North America
  • Support ACD
    • Donate
    • Subscribe
    • Contact
American Center for Democracy

American Center for Democracy

  • facebook
  • twitter
  • youtube
  • linkedin
  • Free Speech
  • U.S. Policy
    • U.S. Foreign Policy
  • Political Islam
    • Canada
    • Hamas
    • Iran
    • Islam
    • Muslim Brotherhood
    • Palestinian
    • United States
  • Narco-Terrorism
  • Middle East Conflicts
    • Iran
    • Israel
  • Global Conflicts
    • China
    • North Korea
    • Russia
    • Ukraine
  • Soros
You are here: Home / Political Islam / Obama’s Threats Unlikely To Stop Cyber Attacks

Obama’s Threats Unlikely To Stop Cyber Attacks

September 2, 2015 by Rachel Ehrenfeld

Left: US President Barack Obama is expected to take a firm line on the issue of hacking during Chinese President Xi Jinping’s visit. Photo: AP

Talk about imposing sanctions on Chinese and Russian individuals and a company benefiting from their government’s looting of American trade, military and personnel secrets, is cheap, but futile.

The Obama administration’s threats of sanctions may sound reassuring to largely cyber-ignorant Americans, but it will do little to discourage further attacks. But threatening obviously difficult-to impose sanctions, will do little to deter the Chinese or the Russians. Especially so, since the security of the American government and private sector cyber systems is lacking, thus minimizing the risk of discovery before large quantities of data can be stolen over a long period of time. 

Besides, how would the U.S. government prove the companies or individuals knew the information was stolen? And what difference will it make, if meanwhile the difficult to prove stolen intellectual property has been already developed into products sold all over the world? Does the U.S. government expect American companies to publicly admit their failure? 

Stealing American military, research and trade secrets by hacking into vulnerable computer systems has been publicly acknowledged in October 1999. Reportedly, the Pentagon, Energy Department’s nuclear weapons and research labs, the National Aeronautics and Space Administration and several university research facilities and defense contractors, have been penetrated for at least one ewer. An FBI investigation, at that time, could not determine the identity of the hackers, but  “circumstantial evidence points heavily toward a Russia-based intelligence-gathering operation.” A year later, in 2000, the Defense Department traced the attacks back to Russia, but could not identify the “sponsor” of the attacks. While U.S. officials said that no secrets were stolen, they couldn’t say what and how much data was stolen. The Russian government, with Vladimir Putin, then acting president, denied any involvement. The significant change since then is the huge increase of Russian cyber attacks on U.S. vulnerable government and private sector computers. 

When did China begin its cyber attacks on the U.S. is unclear. But the Obama administration’s first public threats to “ take more assertive action against this cyber-threat,” was reported following the news in early February 2013 that Chinese hacked into the New York Times.” However, the huge increase of cyber attacks on U.S. government and private sector shows that appointing cyber czars and spending hundreds of millions on contractors did nothing to prevent a huge increase in cyber attacks, or even contributing to cyber literacy of American office holders and the general public. 

Instead of issuing more threats, the administration should consider Former assistant Secretary of Defense Richard Perle’s suggestion, as stated on April 9, 2013, at the American Center for Democracy’s briefing on “New Strategies to Secure the U.S. Economy from Cyber Depredation.”  Perle suggested the following:

“Would it make sense for us to approach the Chinese with the following proposition: We know what you are doing and we insist that it stop. If it doesn’t (it’s mostly ours to begin with), you should understand that we can do to you what you are doing to us. We don’t think there is much to be gained by stealing your intellectual property but how would you feel about the publication of your intergovernmental communications made available to your own citizens? In any society governed as the Chinese govern theirs, the threat of disclosure could be a very powerful deterrent.”

At the same forum, George Mason University Law Professor Jeremy Rabkin noted “there’s no good reason why we shouldn’t use cyber attack to damage a lot of property, especially in retaliation for enemies who have already done that to us. He pointed out that, “Cyber [warfare is] more like naval war–where we disrupt the enemy’s trade and communication without exempting commerce just because it’s owned by civilians…. So what is permissible in naval war should be applicable to cyber conflict.”

In the meantime, the U.S. government should use echo-response when it recognizes intrusion (hopefully immediately) to destroy the attacking system and authorize similar measures to the private sector, which would otherwise be illegal.

Filed Under: Political Islam

Primary Sidebar

Spotlight

website capture islamist incitement quote by j.woolsey obama signing Rachel's law chemical terrorism transportation terrorism nuclear threats on the rise winning the cyberwar gps concepts and misconceptions libel tourism

Search ACD

Recent Appearances

[9/29/2025] The Shilling Show

[9/2/2025] Wake Up Patriots

[8/29/2025] Decoding Soros

[5/1/2025] National Talk Radio with Shawn Moore

[3/11/2025] Shaun Thompson Interview

[3/10/2025] Larry Conners Interviews Rachel Ehrenfeld

[2/3/2025] The Truth About George Soros - Grey Matter Podcast

[1/22/2025] Fighting Terrorism Funding - SAM Podcast

[1/8/2025] COUNTER NARRATIVE Interview on PATRIOT.TV

[10/2/2024] The Shaun Thompson Show: Dr. Rachel Ehrenfeld

[9/30/2024] Counter Narrative: Soros Power Grab: Media Takeover & Election Manipulation |

See All Appearances

The Soros Agenda

g. soros

Soros: The Man Who Would Be Kingmaker, Part I

Rachel Ehrenfeld & Shawn Macomber

Soros: The Man Who Would Be Kingmaker, Part II

Soros: The Man Who Would be Kingmaker, Part III

Soros: The Man Who Would be Kingmaker, Part IV

More about Soros...
ORDER THE SOROS AGENDA →
Buy The Soros Agenda

Tags

antisemitism Caliphate Canada capital punishment China Christians Daniel Haqiqatjou Dawah Disinformation genocide Hamas Iran ISIS Islam Islamic Party of Ontario Islamic Relief Canada Islamic Relief Worldwide Islamization Islamophobia Israel J. Millard Burr Jews jihad Justin Trudeau LGBT liberalism Muslim Brotherhood Muslims NCCM Norman Bailey Palestine Political Islam Quran Russia Salaheddin Islamic Centre Saudi Arabia Sharia Sol W. Sanders SOROS Syria Terrorism Toronto US USA women's rights

Footer

About ACD

ACD is a New York-based 501(c)(3) not-for-profit organization, which monitors and exposes the enemies of freedom and their modus operandi, and explores pragmatic ways to counteract their methods.

Endorsements

"The ACD/EWI ability to predict future threats is second to none"

- R. James Woolsey, former Director of Central Intelligence

- - - More Endorsements - - -

Follow ACD!

  • facebook
  • twitter
  • youtube
  • linkedin

Copyright © 2025 | The American Center for Democracy is a 501(c)(3) non-profit organization. Your contribution is tax-deductible to the fullest extent of the law.