Skip to main content
  • Sections
  • Search

Center for Strategic & International Studies

User menu

  • Subscribe
  • Sign In

Topics

  • Climate Change
  • Cybersecurity and Technology
    • Cybersecurity
    • Data Governance
    • Intellectual Property
    • Intelligence, Surveillance, and Privacy
    • Military Technology
    • Space
    • Technology and Innovation
  • Defense and Security
    • Counterterrorism and Homeland Security
    • Defense Budget
    • Defense Industry, Acquisition, and Innovation
    • Defense Strategy and Capabilities
    • Geopolitics and International Security
    • Long-Term Futures
    • Missile Defense
    • Space
    • Weapons of Mass Destruction Proliferation
  • Economics
    • Asian Economics
    • Global Economic Governance
    • Trade and International Business
  • Energy and Sustainability
    • Energy, Climate Change, and Environmental Impacts
    • Energy and Geopolitics
    • Energy Innovation
    • Energy Markets, Trends, and Outlooks
  • Global Health
    • Family Planning, Maternal and Child Health, and Immunizations
    • Multilateral Institutions
    • Health and Security
    • Infectious Disease
  • Human Rights
    • Building Sustainable and Inclusive Democracy
    • Business and Human Rights
    • Responding to Egregious Human Rights Abuses
    • Civil Society
    • Transitional Justice
    • Human Security
  • International Development
    • Food and Agriculture
    • Governance and Rule of Law
    • Humanitarian Assistance
    • Human Mobility
    • Private Sector Development
    • U.S. Development Policy

Regions

  • Africa
    • North Africa
    • Sub-Saharan Africa
  • Americas
    • Caribbean
    • North America
    • South America
  • Arctic
  • Asia
    • Afghanistan
    • Australia, New Zealand & Pacific
    • China
    • India
    • Japan
    • Korea
    • Pakistan
    • Southeast Asia
  • Europe
    • European Union
    • NATO
    • Post-Soviet Europe
    • Turkey
  • Middle East
    • The Gulf
    • Egypt and the Levant
    • North Africa
  • Russia and Eurasia
    • The South Caucasus
    • Central Asia
    • Post-Soviet Europe
    • Russia

Sections menu

  • Programs
  • Experts
  • Events
  • Analysis
    • Blogs
    • Books
    • Commentary
    • Congressional Testimony
    • Critical Questions
    • Interactive Reports
    • Journals
    • Newsletter
    • Reports
    • Transcript
  • Podcasts
  • iDeas Lab
  • Transcripts
  • Web Projects

Main menu

  • About Us
  • Support CSIS
    • Securing Our Future
Photo: Adobe Stock
Commentary
Share
  • LinkedIn
  • Facebook
  • Twitter
  • Email
  • Printfriendly.com

Russia and the DNC Hacks

August 15, 2016

The UN Charter makes clear that any act by one state that threatens the territorial integrity or the political independence of another state is illegal, and it makes clear that actions of this kind could justify some punitive response. The recent hacks of the Democratic National Committee (DNC) do not threaten the United States’ territorial integrity, but they do threaten its political independence. They are part of a larger Russian effort to shape politics in the West to advance Russian foreign policy goals and damage the United States (a forthcoming study by my CSIS colleague Heather Conley will detail this) using misinformation, subsidies, and Internet trolls.

Russian attempts at manipulation do not signal the return of the Cold War, despite the desire of some analysts to cram them into that antiquated framework, if only because there is no reason for the Russians to think they would do any better the second time around. Russian tactics are different now, requiring a different response that may be difficult for an over-militarized U.S. foreign policy to generate. We are not going to war with Russia over hacking, nor will nuclear weapons deter them, but that does not mean inaction is the best choice. This is not the Cold War, but a new kind of conflict for the defense of democracy, with new tools and ideas that have yet to be developed.

One lesson that can be drawn from our experience with state-sponsored hacking is that, if there is no reaction to a hack, an opponent will take this as a green light to continue. A central goal for international cybersecurity is to establish consequences for malicious action; without consequences, malicious cyber actions will increase. This would be the lessons of the Sony incident, the actions by Iran against major U.S. banks and intrusion into critical infrastructure networks, and Chinese cyber commercial espionage. The United States has four primary opponents in cyberspace, but we have effective action against only three of them.

If there is a desire to pretend it wasn’t the Russians who were responsible for the DNC hacks, it is far too late to reverse this story. Both private and government sources attribute the hacking to Russia. The evidence that the material provided to WikiLeaks came from this Russian hack is less clear (putting aside Julian Assange’s ties to the Russians and the absence of indications that any other party was responsible), but the action that requires response is the Russian penetration of the DNC servers.

Wrangling over evidentiary standards misses the point. The rules for great power politics are not the same as the rules for a court, if a country wants to remain a great power. This is politics, not jurisprudence, and the audiences for any counteraction are the attacker, waiting to see if the U.S. will accept the hack, and the international community that is watching what the United States will do. Holding to a legal evidentiary standard only increases the likelihood of indecision and continued opponent action against us.

There are rumors that the United States and Russia have discussed the issue privately. If true, this also misses the point. Consequences must be public to have effect. Foreign Minister Sergey Lavrov’s reference to a four-letter word when asked about the incident does not generate confidence that the Russians are concerned about a U.S. response so far.

The argument that there are more important matters in the bilateral relationship, such as the Baltics or Syria, is frivolous. There is nothing more important than the political independence of the United States. Similarly, the “equivalence” argument make no more sense now than it did in the Cold War. While the Russians may believe that the United States seeks to undermine the Vladimir Putin regime, this is just paranoia. Both sides spy on each other, but one spies to defend democracy and the other to undermine it. If you have doubts about this, visit the sites of Reporters Without Borders or Human Rights Watch.

The Russians may feel justified in their actions, seeing them as retribution for the Panama Papers or for U.S. support to democratic groups in Russia. They may remember that they hacked both parties in previous elections, incidents where no information was leaked, and the matter was regarded as normal espionage practice. Russia may believe that it faces little risk of consequences in hacking the DNC. The goal for policy should be to change this belief, building the precedents for attribution, response, and thresholds established by U.S. actions against our other cyber opponents. Hacking should not be penalty free if we want it to stop.

The United States needs to respond to the DNC hack just as it responded to North Korea, Iran, and China for malicious actions in cyberspace. This leads to the more difficult question of what kind of response would be appropriate. We are not discouraging the Russians from coercive acts, nor are we likely to regain their affection. The upcoming Presidential election adds a further complication, but this does not justify waiting until after the election to respond.

The options for response include counter-leaks, indictments, sanctions, or some other public censure. The use of military force is not justified, and military demonstrations (overflights, ship passages, increased force levels in Europe, or covert cyber operations) are risky, given Russia’s confrontational attitude, and too indirect to be effective. Other options might include some kind of defensive or temporary stricture that makes it harder for Russia to connect to the global Internet, but the ability to carry out this kind of action is not well developed. The most effective response is likely to use legal tools—sanctions or indictments—and since the evidentiary standards for sanctions are lower than for indictments, they might be preferable. Sanctions are a more flexible tool than indictments, more visible than covert action, and they displease and annoy the Russians. All this makes them attractive.

Even an announcement that the United States is considering sanctions will prompt fury in Moscow and may incite further Russian retaliation. The United States would need to signal to Russia that further incidents or escalation will only increase risk to the Putin regime. Ultimately, responding to Russian political operations against the West will require a larger strategy that recognizes the end of the period of unchallenged American supremacy and the development of new kinds of nonmilitary responses to cyber actions. But a first step is to not let hacking go unpunished. To do otherwise will unravel the progress this administration has made with its carefully constructed efforts to make cyberspace more stable and secure.

James A. Lewis is a senior vice president and director of the Strategic Technologies Program at the Center for Strategic and International Studies in Washington, D.C.

Commentary is produced by the Center for Strategic and International Studies (CSIS), a private, tax-exempt institution focusing on international public policy issues. Its research is nonpartisan and nonproprietary. CSIS does not take specific policy positions. Accordingly, all views, positions, and conclusions expressed in this publication should be understood to be solely those of the author(s).

© 2016 by the Center for Strategic and International Studies. All rights reserved.

Written By
James Andrew Lewis
Senior Vice President and Director, Strategic Technologies Program
Media Queries
Contact H. Andrew Schwartz
Chief Communications Officer
Tel: 202.775.3242

Contact Paige Montfort
Media Relations Coordinator, External Relations
Tel: 202.775.3173
Related
Americas, Commentaries, Critical Questions, and Newsletters, Cyber Diplomacy and Deterrence, Cybersecurity, Cybersecurity and Technology, Defense and Security, Geopolitics and International Security, Intelligence, Surveillance, and Privacy, North America, Russia, Russia and Eurasia, Strategic Technologies Program

Most Recent From James Andrew Lewis

On Demand Event
The Future of Quantum – Driving Innovation and Security from the Government
May 16, 2022
In the News
Russian troops are proving that cell phones in war zones are a very bad idea
Task and Purpose | Jeff Schogol
May 13, 2022
Commentary
Who's Leaving Whom in the Dust?
By James Andrew Lewis
May 6, 2022
In the News
Russia’s cyber warfare against Ukraine more nuanced than expected
The Hill | Ines Kagubare
May 1, 2022
On Demand Event
AI and AVs: Implications in U.S.-China Competition
April 27, 2022
Report
Strategic Competition in the Financial Gray Zone
By James Andrew Lewis, Eugenia Lostri, Donatienne Ruy
April 25, 2022
In the News
War & Cryptocurrency - Russia’s Options to Use It in Ukraine Appear Limited
Forbes | Eric Tegler
April 21, 2022
In the News
Biden’s options if Russia hacks U.S. infrastructure
Politico | Maggie Miller
April 20, 2022
View all content by this expert
Footer menu
  • Topics
  • Regions
  • Programs
  • Experts
  • Events
  • Analysis
  • Web Projects
  • Podcasts
  • iDeas Lab
  • Transcripts
  • About Us
  • Support Us
Contact CSIS
Email CSIS
Tel: 202.887.0200
Fax: 202.775.3199
Visit CSIS Headquarters
1616 Rhode Island Avenue, NW
Washington, DC 20036
Media Queries
Contact H. Andrew Schwartz
Chief Communications Officer
Tel: 202.775.3242

Contact Paige Montfort
Media Relations Coordinator, External Relations
Tel: 202.775.3173

Daily Updates

Sign up to receive The Evening, a daily brief on the news, events, and people shaping the world of international affairs.

Subscribe to CSIS Newsletters

Follow CSIS
  • Facebook
  • Twitter
  • LinkedIn
  • YouTube
  • Instagram

All content © 2022. All rights reserved.

Legal menu
  • Credits
  • Privacy Policy
  • Reprint Permissions