January 25, 2026

House Panel Urged to Rethink Cyber Restraint

A House Homeland Security subcommittee was advised to reconsider the U.S.'s cautious cyber conflict stance and potentially ease restrictions on government and private-sector responses to foreign cyberattacks.

House Panel Urged to Rethink Cyber Restraint, Consider Broader Counterattack Authority

Lawmakers on a House Homeland Security subcommittee heard testimony Tuesday urging the United States to abandon what witnesses described as an overly cautious approach to cyber conflict and to consider loosening restrictions on both government and, potentially, private-sector responses to foreign cyberattacks. Appearing before the cybersecurity and infrastructure protection subcommittee, experts argued that Washington’s long-standing fear of escalation in cyberspace has failed to deter adversaries and may have instead emboldened them.

Calls to Move Beyond Cyber Restraint

Joe Lin, chief executive of cyber warfare firm Twenty Technologies Inc., said U.S. policymakers have wrongly treated offensive cyber operations as uniquely dangerous. In written testimony, Lin argued that the government’s reluctance to respond forcefully has produced a cycle of repeated intrusions followed by limited diplomatic protests or sanctions.

“Restraint was supposed to prevent escalation,” Lin wrote. “In reality, it has created an environment where adversaries feel free to keep pushing.” Similar concerns were raised by Emily Harding, vice president at the Center for Strategic and International Studies’ Defense and Security Department. Harding told lawmakers that traditional deterrence concepts have not translated well into the cyber domain.

“The United States has responded to cyberattacks in limited ways, and escalation dominance simply does not exist online,” Harding said in her testimony. To restore deterrence, she argued, cyberattacks should be viewed as hostile acts rather than unavoidable annoyances.

Adversaries Operating in a Gray Zone

Harding added that countries such as China, Russia, Iran, and North Korea operate with a blurred distinction between peace and conflict, using cyber operations as a routine tool of competition rather than a last resort. While several witnesses endorsed a more assertive cyber posture, others emphasized that offensive operations must be matched with stronger domestic defenses. Frank Cilluffo, director of the McCrary Institute for Cyber and Critical Infrastructure Security at Auburn University, warned that counterattacks abroad could trigger retaliation at home.

Cilluffo said the Department of Homeland Security, particularly the Cybersecurity and Infrastructure Security Agency, would need to play a central role in hardening U.S. networks and coordinating with critical infrastructure operators to absorb potential blowback. He also suggested that private companies could play a limited role in active cyber defense, noting that many of the most advanced cyber capabilities such as threat intelligence, rapid response, and large-scale mitigation tools—reside in the private sector rather than within government agencies.

At the same time, Cilluffo acknowledged unresolved questions about how far private actors should be allowed to go, how their actions would be overseen, and how civil liberties and escalation risks could be managed. Not all witnesses supported expanding private-sector authority. Drew Bagley, chief privacy officer at CrowdStrike Holdings Inc., cautioned that reviving “hack back” policies could create more problems than they solve.

Bagley said early debates over hack-back authority were driven by relatively unsophisticated attacks in which stolen data was sometimes left exposed. Today’s cyber operations, he said, are far more complex, making retaliation riskier.

Risks of Escalation and Collateral Damage

“A broader set of actors conducting offensive actions could result in collateral damage, disrupted investigations, and escalation along sensitive geopolitical fault lines,” Bagley warned, arguing that cyber offense should remain in the hands of government professionals operating under clear legal authority and oversight.

Members of Congress signaled growing interest in revisiting U.S. cyber strategy. Subcommittee Chairman Rep. Andy Ogles (R-Tenn.) said that years of investment in cyber defense and resilience have improved survivability but have not changed adversary behavior.

“Defense by itself hasn’t been enough,” Ogles said. “Without credible offensive capabilities, deterrence in cyberspace simply doesn’t exist.”

Allies and Norms Still a Concern

Rep. Bennie Thompson (D-Miss.), ranking member of the full Homeland Security Committee, voiced cautious support for a tougher cyber stance but stressed the importance of coordination with U.S. allies.

“If we are going to shift norms around offensive cyber tools, we need to do it alongside our partners,” Thompson said. “Going it alone would carry its own risks.”

The hearing underscored bipartisan concern that existing cyber policies may be outdated, even as lawmakers remain divided over how far the United States and the private sector should go in taking the fight back to its digital adversaries.

Latest News

Cybersecurity

January 30, 2026

Record-Breaking 16 Billion Passwords Exposed in Massive Data Breach

A staggering 16 billion login credentials have been exposed in what experts are calling one of the largest data breaches in history, raising serious concerns about online security for both individuals and organizations.

Read now

January 30, 2026

Illinois Health Department Confirms Years-Long Data Exposure Affecting 700,000 Residents

The Illinois Department of Human Services (IDHS) recently disclosed that it mistakenly made private health-related information about hundreds of thousands of Illinois residents publicly accessible online

Read now

January 30, 2026

Oracle E-Business Hack Continues to Generate Ransom Demands

A rising number of companies using Oracle’s E-Business Suite are facing ransom demands following a cyberattack that may have begun as early as July 2025.

Read now

Fintech

January 30, 2026

Ethereum Emerges as a Long-Term Macro Bet Amid Quantum, AI, and Monetary Shifts

Ethereum is increasingly being framed not just as a blockchain platform, but as a long-duration macro asset that may be uniquely positioned to navigate emerging technological and economic pressures ranging from quantum computing to artificial intelligence.

Read now

January 30, 2026

Vitalik Buterin Reconsiders Blockchain Design Tradeoffs as Zero-Knowledge Proofs

Ethereum co-founder Vitalik Buterin says he no longer agrees with a position he publicly held in 2017, arguing that advances in zero-knowledge cryptography and a deeper appreciation for real-world failure modes have fundamentally changed how blockchains should balance decentralization, usability, and resilience.

Read now

January 30, 2026

Market Volatility Obscures Fundamentals as Crypto Investors Overlook Valuation Signals

A growing divide is emerging in crypto markets between price action and fundamentals, highlighting what some investors see as a broader erosion of valuation discipline across the asset class.

Read now

AI

February 4, 2026

What if AI Is Really Good and Not That Disruptive?

AI discourse has collapsed into two extremes. Either large language models will automate all knowledge work and upend civilization within a decade, or they’re glorified autocomplete and the whole thing is a bubble.

Read now

February 3, 2026

Google Brings “Personal Intelligence” to Search, Making AI Results Uniquely Yours

Google is pushing search further into the personal realm. On Wednesday, the company announced that Personal Intelligence, a feature that tailors AI responses using a user’s own context, is expanding to AI Mode in Google Search.

Read now

February 2, 2026

CopilotKit Shows How to Bring LangChain Deep Agents to Production UIs

CopilotKit has published a detailed guide demonstrating how to connect LangChain’s new Deep Agents framework to a real-time frontend using Next.js.

Read now

Technology

January 30, 2026

Apple AirTag Receives Significant Update After Five Years

Apple has unveiled a new iteration of its AirTag tracking device, dubbed 'the new AirTag,' featuring significant enhancements attributed to an upgraded Bluetooth chip.

Read now

January 30, 2026

AI-Driven Automation Transforms Global Infrastructure

A glass of water sits untouched on a desk for hours, a laptop glows in the dim light, and a software engineer types furiously. This is Ivan, a developer who has taken AI-assisted automation far beyond what most would imagine.

Read now

January 30, 2026

Microsoft Unveils Maia 200 AI Chip, Outpaces Amazon and Competes with Nvidia

Microsoft has introduced its latest in-house AI accelerator, the Azure Maia 200, designed to deliver high-speed inferencing for data center AI workloads.

Read now

Fintech

February 5, 2026

AI Budgets Are Wide Open

Product market fit means being in a good market with a product that can satisfy that market. Marc Andreessen’s advice still holds.

Read now

February 5, 2026

New York Attorney General Warns Consumers About Prediction Markets Ahead of Super Bowl

With Super Bowl 60 just days away, New York Attorney General Letitia James is urging consumers to be cautious when using prediction markets that offer Super Bowl related trades.

Read now

February 5, 2026

Elon Musk’s xAI dives into crypto and TradFi amid $1tn SpaceX merger

Elon Musk’s artificial intelligence venture xAI is making a decisive push into cryptocurrency and traditional finance as it ramps up hiring and prepares for a landmark merger with SpaceX reportedly valued at more than $1 trillion.

Read now
Personal

All EraseMe plans include a 30-day risk-free refund guarantee.

Not satisfied? Reach out to our 24/7 Support within 30 days of joining, and we’ll refund every cent no questions asked.

Try EraseMe