us mulls new tactics to stem wave of cyberattacks
Last Updated : GMT 09:03:51
Almaghrib Today, almaghrib today
Almaghrib Today, almaghrib today
Last Updated : GMT 09:03:51
Almaghrib Today, almaghrib today

US mulls new tactics to stem wave of cyberattacks

Almaghrib Today, almaghrib today

Almaghrib Today, almaghrib today US mulls new tactics to stem wave of cyberattacks

As hacking attacks reach epidemic
Washington - AFP

 As hacking attacks reach epidemic proportions, the US cybersecurity community is looking at new ways to step up defense, including counterattacking the hackers themselves.
US cybersecurity firms have begun unprecedented levels of cooperation to shore up America's key computer networks, and some experts argue in favor of "hacking back," or using offensive tools to improve defense.
Last month, dozens of cybersecurity firms and partners pooled resources in an effort to root out malware believed to originate from a Chinese state-sponsored group, dubbed Axiom.
"We wanted to make absolutely sure we did something that caused them some level of pain," said Zachary Hanif at iSight Partners, one of the cybersecurity firms involved in the operation.
Although the operation stopped short of "hacking back," the coordination aimed to "throw a large wrench into their engine," according to iSight's Brian Bartholomew, by coordinating defense to remove malicious software from and fortify defenses. The group cleaned up some 43,000 infections over two weeks.
Some experts argue tougher defense is not enough, and that some kind of offensive action is needed to halt the worst attacks in cyberspace.
Stewart Baker, a former assistant secretary of homeland security who now practices law in Washington, argues that limited "hacking back" could be justified, even though the legal issues are unclear.
- Morally justified? -
Baker said any actions a company takes outside its own network could be viewed as illegal, but there is a strong case to be made for reaching out to networks of third parties used by hackers to transit stolen data.
"I think you are morally justified for sure" in taking such actions, Baker told AFP. "And I think the probability of being prosecuted is very low."
Baker said if a firm can locate its stolen data and has a way to recover it, "they would be crazy not to."
"They can't wait for the government to get a court order. By the time that happened, everything is going to be gone."
But going beyond that, such as seeking to take out a hacker network, would mean "taking on risks" of legal liability.
US Justice Department guidelines caution against any retaliation.
Baker said the guidelines "don't quite say it's illegal, they say it's a bad idea."
A 2013 presidential commission report on intellectual property theft suggested some types of retaliatory actions should be legal.
"Without damaging the intruder's own network, companies that experience cyber-theft ought to be able to retrieve their electronic files or prevent the exploitation of their stolen information," the report said.
American firms wrestle with legal and other implications of any type of cyber-retaliation.
"We have the capability to hack back," said Jody Denner, a cybersecurity and digital forensics consultant for Hewlett-Packard who has worked with government agencies and the corporate sector.
"The same open-source tools that are available to these state-sponsored groups are also available to everyone else."
Denner said he is aware of some "cyber-bandit" firms that will take offensive measures, keeping the matters quiet.
In the meantime, other governments are active on this front.
"The services of such 'mercenaries' are actively purchased by third-world governments like Pakistan and Nigeria," said Denis Makrushkin of the security firm Kaspersky.
- 'A lot like counterespionage' -
Kristen Eichensehr, a national security law specialist at the University of California-Los Angeles and former State Department adviser, said private firms appear to be expanding their range of actions.
"The terms 'hacking back' or 'active defense' are used to describe a variety of actions ranging from planting fake data to 'beaconing' proprietary data so that it can be tracked if taken off a corporate network," she said on the Just Security blog.
"Depending on where on the spectrum a 'hacking back' action is, the private entity's actions could look a lot like counterespionage, law enforcement, or even military action."
The US military's Cyber Command charged with protecting the country's "critical infrastructure," which includes computer networks for finance, utilities and transportation, often gets blamed when there are gaps in cyber defenses.
Admiral Mike Rogers, who heads the Pentagon's Cyber Command as well as the National Security Agency, said recently the military is eyeing a policy of "deterrence," the same concept used for avoiding nuclear war.
Rogers said that as part of his role leading Cyber Command, he wants potential cyber-attackers to know there are consequences for their actions and that the US holds powerful weapons it can use.
But James Lewis, a cybersecurity specialist at the Center for Strategic and International Studies, said deterrence is unlikely to work.
"The idea of a deterrent effect is not plausible because you can't deter espionage and crime," Lewis said.
"What is the threat to get them to stop breaking into banks? There is no threat."
American officials are hesitant to carry out an offensive cyberattack "because what happens if they accidentally turn off the electricity at a hospital and kill a dozen people?"
With no easy answers, Lewis said improving cybersecurity will require not only better hardware, software and coordination, but diplomatic measures.

 

almaghribtoday
almaghribtoday

Name *

E-mail *

Comment Title*

Comment *

: Characters Left

Mandatory *

Terms of use

Publishing Terms: Not to offend the author, or to persons or sanctities or attacking religions or divine self. And stay away from sectarian and racial incitement and insults.

I agree with the Terms of Use

Security Code*

us mulls new tactics to stem wave of cyberattacks us mulls new tactics to stem wave of cyberattacks

 



Name *

E-mail *

Comment Title*

Comment *

: Characters Left

Mandatory *

Terms of use

Publishing Terms: Not to offend the author, or to persons or sanctities or attacking religions or divine self. And stay away from sectarian and racial incitement and insults.

I agree with the Terms of Use

Security Code*

us mulls new tactics to stem wave of cyberattacks us mulls new tactics to stem wave of cyberattacks

 



Almaghrib Today, almaghrib today Skincare PR Performance Full Year 2017

GMT 09:22 2018 Monday ,22 January

Skincare PR Performance Full Year 2017
Almaghrib Today, almaghrib today New hunt for flight MH370 gets under way

GMT 11:03 2018 Wednesday ,24 January

New hunt for flight MH370 gets under way
Almaghrib Today, almaghrib today Modern colorful bedroom renovation

GMT 10:57 2017 Thursday ,21 December

Modern colorful bedroom renovation
Almaghrib Today, almaghrib today Puigdemont candidate for Catalan president

GMT 13:56 2018 Tuesday ,23 January

Puigdemont candidate for Catalan president
Almaghrib Today, almaghrib today Turkey detains dozens more

GMT 10:47 2018 Wednesday ,24 January

Turkey detains dozens more

GMT 09:57 2016 Wednesday ,23 March

cartoon two

GMT 09:58 2016 Wednesday ,23 March

cartoon four

GMT 10:22 2016 Wednesday ,23 March

cartoon twelve

GMT 10:18 2016 Wednesday ,23 March

cartoon eight

GMT 06:08 2013 Tuesday ,30 July

Elaine Khalaf marries her manager

GMT 08:17 2017 Monday ,27 November

Hind Sabry proud of Faten Hamama award

GMT 13:17 2013 Tuesday ,15 January

Sienna gets pretty in pink

GMT 18:33 2018 Tuesday ,23 January

France says it fell short on greenhouse gas emissions

GMT 00:49 2014 Saturday ,30 August

Daum to launch North Korean map service

GMT 20:16 2011 Friday ,05 August

Khartoum blocks S. Sudan oil shipment

GMT 07:43 2012 Wednesday ,17 October

Qatar University inaugurates new library

GMT 09:01 2017 Wednesday ,27 September

Brazil oil field auction to test government's ambitions
Almaghrib Today, almaghrib today
 
 Almaghrib Today Facebook,almaghrib today facebook  Almaghrib Today Twitter,almaghrib today twitter Almaghrib Today Rss,almaghrib today rss  Almaghrib Today Youtube,almaghrib today youtube  Almaghrib Today Youtube,almaghrib today youtube

Maintained and developed by Arabs Today Group SAL.
All rights reserved to Arab Today Media Group 2025 ©

Maintained and developed by Arabs Today Group SAL.
All rights reserved to Arab Today Media Group 2025 ©

.almaghribtoday .almaghribtoday .almaghribtoday .almaghribtoday
almaghribtoday almaghribtoday almaghribtoday
almaghribtoday
بناية النخيل - رأس النبع _ خلف السفارة الفرنسية _بيروت - لبنان
almaghribtoday, Almaghribtoday, Almaghribtoday