Skip to content

US National Cyber Strategy Pushes Regulation, Aggressive Hack-Back Operations

The United States government has announced the forthcoming release of a complete National Cybersecurity Strategy that aims to adopt a more forceful stance against foreign adversaries and includes mandatory regulations for critical infrastructure vendors.

The 35-page document, crafted by the Office of the National Cyber Director, seeks to “level the playing field” in national security by making it mandatory for entities to take “reasonable precautions” to secure their software. The strategy also authorizes law enforcement and intelligence agencies to hack into foreign networks as a way to prevent or retaliate against attacks.

The document proposes that the FBI’s National Cyber Investigative Joint Task Force work in tandem with all relevant U.S. agencies on the assignment, with private companies acting as “full partners” to help detect and repel cyber threats. It is expected that President Biden will sign the document in the coming weeks.

The strategy document marks a significant departure from the previous administration’s cybersecurity policies. It is the latest in a series of steps taken by the Biden administration to bolster the nation’s cybersecurity posture, including signing two cybersecurity bills into law, and holding a virtual summit with tech leaders to discuss “concrete steps” to address the issue.

Key Points:

  • The US government is set to release a comprehensive 35-page National Cybersecurity Strategy.
  • The strategy calls for mandatory regulations on critical infrastructure vendors and authorizes law enforcement and intelligence agencies to hack into foreign networks.
  • The FBI’s National Cyber Investigative Joint Task Force will work in tandem with all relevant U.S. agencies, with private companies acting as “full partners”.
  • The strategy document is expected to be signed by President Biden “in the coming weeks.”
  • The strategy marks a significant departure from the previous administration’s cybersecurity policies.

Leave a Reply

Your email address will not be published. Required fields are marked *