.

  • Written by Scott Shackelford, Associate Professor of Business Law and Ethics; Director, Ostrom Workshop Program on Cybersecurity and Internet Governance; Cybersecurity Program Chair, IU-Bloomington, Indiana University

The deluge of cyberattacks sweeping across the world[1] has governments and companies thinking about new ways to protect their digital systems, and the corporate and state secrets stored within. For a long time, cybersecurity experts have erected firewalls to keep out unwanted traffic and set up decoy targets on their networks to distract hackers who do get in. They have also scoured the internet for hints about what cybercriminals might be up to next to better protect themselves and their clients.

Now, though, many leaders and officials are starting to think about stepping up their defensive activities, by taking more active measures[2]. An extreme option within this field of active defense is sometimes called “hacking back[3]” into an adversary’s systems to get clues about what they’re doing, shut down the attack or even delete data or otherwise damage[4] an attacker’s computers.

I have been researching[5] the benefits and drawbacks[6] of various active defense options with Danuvasin Charoen[7] of the Thai National Institute of Development Administration and Kalea Miao[8], an undergraduate Cox scholar at the Indiana University Kelley School of Business. We have found a surprising number and variety of firms – and countries – exploring various ways to be more proactive in their cybersecurity practices, often with little fanfare[9].

Getting active

How far should organizations be able to go to defend against cyberattacks? These soldiers are learning to defend digital networks – but could that involve attacking too? Mike Strasser, West Point Public Affairs[10]

On the surface, it might seem like the proverb is right: “The best defense is a good offense.” The damage from cyberattacks can be enormous: In May 2017, a single incident, the WannaCry cyber attack[11], affected hundreds of thousands of systems around the world and caused more than US$4 billion in lost productivity and data recovery costs. One month later, another attack, called NotPetya[12], cost global shipping giant Maersk $300 million[13] and reduced the company to relying on the Facebook-owned WhatsApp messaging system for official corporate communications.

Faced with this scale of loss, some companies want to step up their defenses. Firms with sophisticated technology systems know what’s needed to protect their customers, networks and valuable trade secrets. They also likely have employees with the skills to track down hackers and penetrate the attackers’ own systems. But the ethics[14] and implications of justifying a cyberattack as defensive get very complicated very quickly.

It’s often unclear, for example, exactly who is behind an attack – uncertainty that can last[15] for days, months or even years. So who should the hack-back target? What if a privately owned U.S. company believed that it was under attack from a firm owned by the Chinese government? If it hacked back, would that be an act of war between the countries? What should happen to repair corporate and international relations if the company was wrong and its attacker was somewhere else? Companies shouldn’t be empowered to start global cyber conflicts that could have dire consequences, but online and offline.

Of course, it’s also important to think about what might happen[16] if other countries allow their companies to hack back against U.S. government or corporate efforts. More U.S. firms could fall victim to cyberattacks as a result, and might find little legal recourse[17].

Engaging with the law

At the moment, hacking back is illegal, in the U.S. and in many nations around the world. In the U.S., the Computer Fraud and Abuse Act[18] makes it a crime to access another computer without authorization[19]. Every member of the G-7, including the U.S., as well as Thailand and Australia, has banned hacking back[20]. In 2018, more than 50 countries – but not the U.S. – signed an agreement that private firms based in their nations are not allowed to hack back[21].

However, supporters of active defensive tactics are pushing their message hard. The Republican Party’s 2016 presidential platform promised to ensure “users have a self-defense right[22] to deal with hackers as they see fit.” In March 2018, the Georgia state legislature passed a bill[23] to permit “active defense measures[24] that are designed to prevent or detect unauthorized computer access.” Two months later, then-Gov. Nathan Deal vetoed it[25], at the urging of technology firms concerned about its “national security implications and other potential ramifications.”

How far should organizations be able to go to defend against cyberattacks? Georgia Congressman Tom Graves. U.S. House of Representatives[26]

Had it become law, Georgia’s bill would still likely have run afoul of federal law. However, lawmakers in Washington have also proposed letting companies engage in certain types of active defense. In 2017, U.S. Rep. Tom Graves, a Georgia Republican, proposed the Active Cyber Defense Certainty Act[27], which would let companies engage in certain active defense measures, including conducting surveillance[28] on prospective attackers, provided that the firm informed the FBI first and that the action did not threaten[29] “public health or safety.” The bill died and has not yet been reintroduced; it’s not likely to get far in the new Democratic House.

Active defense remains illegal in the U.S. and much of the world. But the bans are not being enforced at home or abroad.

Going global

Not every country has banned hacking back. Singapore, for example, has been permitting[30] local firms to engage in active defense measures in an effort to prevent, detect, or counter specific threats to its critical infrastructure, including the financial industry. Other nations, such as France[31], do not wish to see the private sector out front, but are still keen to keep active defense as an option for governments.

How far should organizations be able to go to defend against cyberattacks? Electronic voting machines may be even more vulnerable if global cyber conflicts escalate. AP Photo/John Minchillo[32]

The more countries allow active defense, the more likely everyone – in the U.S. and around the world – is to become a cyberattack victim. Instead of deterring attacks, aggressive active defense increases the possibility of the lights going out[33], or American voting machines[34] returning inaccurate results.

Organizations can and should be encouraged to take passive defense measures, like gathering intelligence on potential attackers and reporting intrusions. But in my view they should be discouraged – if not prevented – from acting aggressively, because of the risk of destabilizing corporate and international relations. If the quest for cyber peace[35] degenerates into a tit-for-tat battle of digital vigilantism, global insecurity will be greater, not less.

References

  1. ^ cyberattacks sweeping across the world (www.pewglobal.org)
  2. ^ taking more active measures (m.csmonitor.com)
  3. ^ hacking back (www.newyorker.com)
  4. ^ delete data or otherwise damage (carnegieendowment.org)
  5. ^ I have been researching (scholar.google.com)
  6. ^ benefits and drawbacks (dx.doi.org)
  7. ^ Danuvasin Charoen (scholar.google.co.th)
  8. ^ Kalea Miao (www.linkedin.com)
  9. ^ little fanfare (www.technologyreview.com)
  10. ^ Mike Strasser, West Point Public Affairs (www.army.mil)
  11. ^ WannaCry cyber attack (www.cbsnews.com)
  12. ^ called NotPetya (theconversation.com)
  13. ^ global shipping giant Maersk $300 million (www.wired.com)
  14. ^ ethics (ethics.calpoly.edu)
  15. ^ uncertainty that can last (www.hoover.org)
  16. ^ what might happen (www.justsecurity.org)
  17. ^ legal recourse (www.schneier.com)
  18. ^ Computer Fraud and Abuse Act (www.law.cornell.edu)
  19. ^ without authorization (theconversation.com)
  20. ^ banned hacking back (papers.ssrn.com)
  21. ^ not allowed to hack back (www.diplomatie.gouv.fr)
  22. ^ users have a self-defense right (www.businessinsider.com)
  23. ^ passed a bill (www.wired.com)
  24. ^ active defense measures (gizmodo.com)
  25. ^ Nathan Deal vetoed it (thehill.com)
  26. ^ U.S. House of Representatives (en.wikipedia.org)
  27. ^ Active Cyber Defense Certainty Act (www.congress.gov)
  28. ^ conducting surveillance (www.newyorker.com)
  29. ^ threaten (tomgraves.house.gov)
  30. ^ has been permitting (www.rsis.edu.sg)
  31. ^ such as France (www.techdirt.com)
  32. ^ AP Photo/John Minchillo (www.apimages.com)
  33. ^ lights going out (www.cnn.com)
  34. ^ voting machines (www.nytimes.com)
  35. ^ cyber peace (ndias.nd.edu)

Authors: Scott Shackelford, Associate Professor of Business Law and Ethics; Director, Ostrom Workshop Program on Cybersecurity and Internet Governance; Cybersecurity Program Chair, IU-Bloomington, Indiana University

Read more http://theconversation.com/how-far-should-organizations-be-able-to-go-to-defend-against-cyberattacks-110143

Metropolitan republishes selected articles from The Conversation USA with permission

Visit The Conversation to see more