. 24/7 Space News .
CYBER WARS
Hitting back at hackers: debate swirls on how far to go
By Rob Lever
Washington (AFP) Nov 1, 2016


After a seemingly endless barrage of cyberattacks, debate is heating up on hitting back at hackers where it hurts.

Amid calls for ways to punish and deter hackers without sparking a so-called "cyber war," a panel of experts assembled by the George Washington University Center for Cyber and Homeland Security said in a report Monday that US policies should be eased to allow "active defense" measures by both the government and private sector.

However, it stopped short of endorsing the idea of "hacking back" to disable systems used by attackers.

The panel envisioned measures such as taking down "botnets" that disrupt cyberspace, freeing data from "ransomware" hackers and "rescue missions" to recover stolen data.

The report follows a wave of high-profile attacks against US companies and government databases, and after Washington accused Russia of using cyberattacks to attempt to disrupt next week's presidential election.

It comes after President Barack Obama called for a "proportional" response to Russia, while leaving unanswered whether this would mean a cyber attack or measures such as diplomatic or economic sanctions.

- 'Shooting behind the rabbit' -

Former national intelligence director and GWU task force co-chair Dennis Blair said the US has been moving too slowly in its response to cyberattacks.

"We are shooting so far behind the rabbit that we will only hit it if the rabbit makes another lap and comes back to where it was," he told a conference presenting the report.

Some analysts argue that hackers and states responsible for attacks should get a taste of their own medicine, and that US laws should be amended to allow for hacking back at the cyber criminals.

Some proposals call for private security firms to be "deputized" to carry out legally sanctioned hack-back operations when private firms are victimized.

"Department stores hire private investigators to catch shoplifters rather than relying only on the police. So too private companies should be able to hire their own security services," said a Hoover Institution paper written by scholars Jeremy Rabkin and Ariel Rabkin.

"There should be a list of approved hack-back vendors from which victims are free to choose."

Juan Zarate, a former White House national security advisor who now works with the Foundation for Defense of Democracies, said such a model for action could be based on the early days of the republic when Congress issued "letters of marque and reprisal" for private merchant ships to bring in maritime pirates.

In an essay last year, Zarate called for a "cyber-privateering regime that rewards, enables, and empowers the private sector to help defend itself in concert with government."

Others warn of the dangers of empowering private actors to engage in reprisals.

Nuala O'Connor, president of the Center for Democracy and Technology and co-chair of the GWU panel, argued of unintended consequences of authorizing companies to break into outside computer networks.

"I believe these types of measures should remain unlawful," she wrote, adding that it remains difficult to be sure of cyberattacks' sources.

"The risks of collateral damage to innocent internet users, to data security, and to national security that can result from overly aggressive defensive efforts needs to be better accounted for."

- 'Cyber shooting war' -

Steve Grobman, chief technical officer at Intel Security, also questioned whether private entities should be allowed to take counter-measures.

Because hackers can easily disguise their attacks, Grobman said a questionable retaliation could create an ugly situation.

"What I worry about is a terrorist entity creating an attack that appears to come from a nation state that creates a public push for some hack back and that leads to a live shooting cyber war," he said.

James Lewis, senior fellow at the Center for Strategic and International Studies, said the United States has pledged to its international partners to steer clear of these kinds of acts in cyberspace.

"We've told people the internet should be based on the rule of law, and (hacking back) would undercut that," he said.

"The question you always want to ask is whether this would make cyberspace more or less stable. This would make it less stable."

Patrick Lin, who led a study this year for California Polytechnic State University on the ethics of hacking back, said there is "a moral case for hacking back, but an under-developed case for its legality and effectiveness."

In the report, Lin wrote that while it is difficult to know whether hacking back has deterrent value, "doing nothing, as seems to be the case now, certainly offers no deterrence and likely encourages cyber-attackers to continue preying on others."


Thanks for being here;
We need your help. The SpaceDaily news network continues to grow but revenues have never been harder to maintain.

With the rise of Ad Blockers, and Facebook - our traditional revenue sources via quality network advertising continues to decline. And unlike so many other news sites, we don't have a paywall - with those annoying usernames and passwords.

Our news coverage takes time and effort to publish 365 days a year.

If you find our news sites informative and useful then please consider becoming a regular supporter or for now make a one off contribution.
SpaceDaily Contributor
$5 Billed Once


credit card or paypal
SpaceDaily Monthly Supporter
$5 Billed Monthly


paypal only


.


Related Links
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle

Previous Report
CYBER WARS
Learning Morse code without trying
Atlanta GA (SPX) Nov 02, 2016
It's not exactly beating something into someone's head. More like tapping it into the side. Researchers at the Georgia Institute of Technology have developed a system that teaches people Morse code within four hours using a series of vibrations felt near the ear. Participants wearing Google Glass learned it without paying attention to the signals - they played games while feeling the taps and he ... read more


CYBER WARS
Russia to Allocate $1.5Bln to Federal Space Program in 2017 - Draft Budget Plan

No Balloons for JPL's Birthday, Just a 'Satelloon'

Urine may be the X factor to exploring deep space

US, Russian, Japanese astronauts return from ISS

CYBER WARS
SpaceX Aims to Resume Falcon 9 Flights in 2016, Blames Helium Tank for Explosion

Raytheon gets $174 million Hypersonic Air-Breathing Weapon contract

SpaceX zeroes in on helium containers for rocket explosion

Proven engine packs big, in-space punch for Space Launch System

CYBER WARS
Detailed images of Schiaparelli and its descent hardware on Mars

Cursed not, Difficult yes

Did it crash or land? Search on for Europe's Mars craft

Rover Conducting Science Investigations at 'Spirit Mount'

CYBER WARS
US, China hold second meeting on advancing space cooperation

China to enhance space capabilities with launch of Shenzhou-11

Ambitious space satellite projects set for liftoff

China's permanent station plans ride on mission

CYBER WARS
Dream coming true for ISS-bound rookie French astronaut

Airbus DS contracts with Intelsat General for European Defence Communications

Final exams prepare Thomas Pesquet for launch

Airbus DS in partnership with Orbital ATK to build EUTELSAT 5 West B

CYBER WARS
With new model, buildings may 'sense' internal damage

3-D-printed permanent magnets outperform conventional versions, conserve rare materials

New tech uses electricity to track water, ID potential problems in concrete

Nickel-78 is a doubly magic isotope supercomputer confirms

CYBER WARS
How Planets Like Jupiter Form

Giant Rings Around Exoplanet Turn in the Wrong Direction

Preferentially Earth-sized Planets with Lots of Water

Potential new hunting ground for exoplanets discovered

CYBER WARS
Last Bits of 2015 Pluto Flyby Data Received on Earth

Uranus may have two undiscovered moons

Possible Clouds on Pluto, Next Target is Reddish

Curious tilt of the Sun traced to undiscovered planet









The content herein, unless otherwise known to be public domain, are Copyright 1995-2024 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. All articles labeled "by Staff Writers" include reports supplied to Space Media Network by industry news wires, PR agencies, corporate press officers and the like. Such articles are individually curated and edited by Space Media Network staff on the basis of the report's information value to our industry and professional readership. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. General Data Protection Regulation (GDPR) Statement Our advertisers use various cookies and the like to deliver the best ad banner available at one time. All network advertising suppliers have GDPR policies (Legitimate Interest) that conform with EU regulations for data collection. By using our websites you consent to cookie based advertising. If you do not agree with this then you must stop using the websites from May 25, 2018. Privacy Statement. Additional information can be found here at About Us.