White House pours cold water on cyber ‘letters of marque’ speculation
嗯,用户让我总结一下这篇文章的内容,控制在一百个字以内,而且不需要用“文章内容总结”或者“这篇文章”这样的开头。直接写描述就行。 首先,我需要通读整篇文章,抓住主要信息。文章主要讲的是特朗普政府的高级官员们在布拉格网络安全会议上表态,否认允许私营公司代表美国政府进行网络攻击,也就是所谓的“网络私掠许可证”。他们强调政府不会依赖私营企业进行网络进攻行动,而是要通过更频繁、更协调的方式来施加成本,同时推动与私营部门的合作,但这种合作不是让私营公司参与进攻性网络活动,而是利用私营部门的技术能力来照亮战场。 接下来,我需要把这些信息浓缩到100字以内。重点包括:特朗普政府的立场、否认私营公司参与攻击、强调施加成本和协调行动、以及与私营部门的合作方式。 可能的结构是:特朗普政府官员否认允许私营公司进行网络攻击,强调通过更频繁和协调的方式施加成本,并推动与私营部门的合作以增强防御能力。 检查一下字数是否符合要求,并确保没有使用任何开头词。 </think> 特朗普政府官员否认允许私营公司代表美国进行网络攻击,并强调将通过更频繁和协调的方式对威胁行为体施加成本。同时,他们推动与私营部门合作以增强防御能力。 2026-3-19 15:30:49 Author: therecord.media(查看原文) 阅读量:1 收藏

PRAGUE — The Trump administration is not considering cyber “letters of marque” or allowing private companies to carry out cyberattacks on behalf of the U.S. government, senior White House officials said this week, pushing back on growing speculation about the role of industry in U.S. cyber operations.

Thomas Lind, a senior adviser at the Office of the National Cyber Director, acknowledged at the Prague Cyber Security Conference on Tuesday that the administration’s four-page national cyber strategy, unveiled earlier this month, called for a more aggressive approach against criminal networks and adversarial governments.

The strategy reflects a broader shift inside the administration toward more routine use of offensive cyber capabilities. A senior National Security Council official previously told Recorded Future News the U.S. would work at “destigmatizing and normalizing” offensive cyber capabilities for the sake of changing the calculus for threat actors.

Responding to questions from European officials, Lind rejected suggestions that this meant the government would rely on private companies to conduct offensive operations.

“We have to impose heavy costs. We need to do it more often, and we need to do it in a more routine and coordinated fashion,” Lind said. He added that those responses will not necessarily mirror the attacks themselves: “We don’t have to cyber them because they’ve cybered us.”

Imposing such costs means the U.S. needs “to bring in the private sector,” said Lind, before stressing: “That does not mean hack back, that does not mean letters of marque,” he said. “We’re not interested in fighting pirates with pirates.”

National Cyber Director Sean Cairncross also addressed the issue Tuesday at the McCrary Cyber Summit in Washington, D.C., where he called for closer cooperation with industry while specifying that “private sector, industry or companies engaging in cyber offensive campaigns — that's not what we're talking about.”  

“What I'm talking about are the technical capabilities, the ability of our private sector to illuminate the battlefield from what they're seeing,” he said. “There's an enormous amount of capability on the private sector side, and now we have a steer from the United States government that we are looking for real partnership."

Earlier national security strategy documents reported on by Recorded Future News highlighted the importance of the U.S. government’s partnerships with the private sector to enable “real-time discovery, attribution, and response” to various threats.

The officials’ remarks follow weeks of speculation, fueled by reporting and policy proposals in Washington, that the administration could seek to expand the operational role of private companies in disrupting adversary networks — mirroring the use of non-state actors in countries such as China, Russia and Iran to achieve state objectives.

Many companies do have existing processes for coordinating with U.S. law enforcement to disrupt hostile actors. Businesses including Microsoft recently collaborated with the Department of Justice to tackle the Lumma infostealer’s infrastructure.

Lind described a similar model for collaboration centered on coordination and scale, with the private sector helping to identify threats and providing support for government-led actions, although the specifics of what these actions would look like remains unclear.

“We need to aggressively engage and leverage the private sector at scale in a way that we haven’t done already,” said Lind.

Additional reporting by Suzanne Smalley.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

Recorded Future

No previous article

No new articles

Alexander Martin

Alexander Martin

is the UK Editor for Recorded Future News. He was previously a technology reporter for Sky News and a fellow at the European Cyber Conflict Research Initiative, now Virtual Routes. He can be reached securely using Signal on: AlexanderMartin.79


文章来源: https://therecord.media/offensive-cyber-white-house-hacking
如有侵权请联系:admin#unsafe.sh