U.S. urged to let companies 'hack-back' at IP cyber thieves
Best defense against American IP theft may be legalizing cyber offense, U.S. commission says
Computerworld - U.S. companies should be allowed to take aggressive countermeasures against hackers seeking to steal their intellectual property, contends the private Commission on the Theft of American Intellectual Property.
The 100-page report, released this week, stops just short of recommending that the U.S. allow businesses to actively retrieve stolen information from within an intruder's network and to disable or destroy it without any limitations.
However, the report makes clear that some so-called hack-back options should be available if simpler attempts to deter IP theft fail, which will likely gain the attention of rights advocacy groups.
The commission is co-chaired by Dennis Blair, former U.S. director of National Intelligence and Jon Huntsman, former U.S. ambassador to China.
The report, released Wednesday, largely blames China for the what it says is the theft of hundreds of billions of dollars worth of U.S. intellectual property each year. Such theft leads to significant U.S. revenue loss while hurting U.S. innovation and jobs, the report noted.
"The American response to date of hectoring governments and prosecuting individuals has been utterly inadequate to deal with the problem," the commission said in the report.
Data from court cases, the U.S. trade representative and from specialized firms and industry groups show that Chinese cybercriminals account for roughly 70% of all IP theft today.
The stolen IP is used to help Chinese companies and the Chinese government close the technology gap with the U.S. That finding is similar to one cited in the recently released Department of Defense Annual Report to Congress.
Countries like India and Russia are also seen as posing a strong threat to American IP, the reports said.
Existing laws and IP protection provisions in international trade agreements have failed to address the issue so far. Similarly, emerging cybersecurity laws and policies implemented by the Obama administration to tighten U.S. economic espionage laws will only have limited effect, the IP commission argued.
In order to better deter intellectual property theft, U.S. companies should be allowed to implement measures that make it more costly for someone to steal their property, the report said.
"Effective security concepts against targeted attacks must be based on the reality that a perfect defense against intrusion is impossible," the IP commission said. It argued that it's more important to raise the stakes for cybercriminals than to create more laws aimed at stopping all attacks.
For instance, the commission said that federal laws should allow U.S. owners of intellectual property to recover or render inoperable any IP that's stolen over the Internet. Such laws would allow companies to consider a broader use of "meta-tagging," "beaconing" and "watermarking" tools to digitally mark any files containing proprietary data.
- NSA defends collecting data from U.S. residents not suspected of terrorist activities
- Groups fear bill would allow free flow of data between private sector and NSA
- Google's move into home automation means even less privacy
- Bill to require warrant for email searches gains ground in House
- Coming soon to a fridge near you -- targeted ads
- Snowden leaks prompt tech firms to tout privacy, transparency policies
- License reader lawsuit can be heard, appeals court rules
- Is EU's 'right to be forgotten' really the 'right to edit the truth'?
- Tails 1.0: A bootable Linux distro that protects your privacy
- Privacy jitters derail controversial K-12 big data initiative
- EndPoint Interactive eGuide In this eGuide, Network World, Computerworld, and CIO examine two endpoint trends - BYOD and collaboration - and offer tips and advice on...
- Mobile First: Securing Information Sprawl Learn how the partnership between Box and MobileIron can help you execute a "mobile first" strategy that manages and secures both mobile apps...
- Cybersecurity Imperatives: Reinvent your Network Security The Rise of CyberSecurity
- Surescripts Case Study- Securing Keys and Certificates Surescripts implemented Venafi's Trust Protection Platform™ to secure digital keys and certificates, ensure the privacy and confidentiality of electronic clinical information for its...
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities.
- Deep Dive into Advanced Networking and Security with Hybrid Cloud Security and networking are among the top concerns when moving workloads to the cloud. VMware vCloud® Hybrid Service™ enables you to extend your... All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!