U.S. urged to let companies 'hack-back' at IP cyber thieves
Best defense against American IP theft may be legalizing cyber offense, U.S. commission says
Computerworld - U.S. companies should be allowed to take aggressive countermeasures against hackers seeking to steal their intellectual property, contends the private Commission on the Theft of American Intellectual Property.
The 100-page report, released this week, stops just short of recommending that the U.S. allow businesses to actively retrieve stolen information from within an intruder's network and to disable or destroy it without any limitations.
However, the report makes clear that some so-called hack-back options should be available if simpler attempts to deter IP theft fail, which will likely gain the attention of rights advocacy groups.
The commission is co-chaired by Dennis Blair, former U.S. director of National Intelligence and Jon Huntsman, former U.S. ambassador to China.
The report, released Wednesday, largely blames China for the what it says is the theft of hundreds of billions of dollars worth of U.S. intellectual property each year. Such theft leads to significant U.S. revenue loss while hurting U.S. innovation and jobs, the report noted.
"The American response to date of hectoring governments and prosecuting individuals has been utterly inadequate to deal with the problem," the commission said in the report.
Data from court cases, the U.S. trade representative and from specialized firms and industry groups show that Chinese cybercriminals account for roughly 70% of all IP theft today.
The stolen IP is used to help Chinese companies and the Chinese government close the technology gap with the U.S. That finding is similar to one cited in the recently released Department of Defense Annual Report to Congress.
Countries like India and Russia are also seen as posing a strong threat to American IP, the reports said.
Existing laws and IP protection provisions in international trade agreements have failed to address the issue so far. Similarly, emerging cybersecurity laws and policies implemented by the Obama administration to tighten U.S. economic espionage laws will only have limited effect, the IP commission argued.
In order to better deter intellectual property theft, U.S. companies should be allowed to implement measures that make it more costly for someone to steal their property, the report said.
"Effective security concepts against targeted attacks must be based on the reality that a perfect defense against intrusion is impossible," the IP commission said. It argued that it's more important to raise the stakes for cybercriminals than to create more laws aimed at stopping all attacks.
For instance, the commission said that federal laws should allow U.S. owners of intellectual property to recover or render inoperable any IP that's stolen over the Internet. Such laws would allow companies to consider a broader use of "meta-tagging," "beaconing" and "watermarking" tools to digitally mark any files containing proprietary data.
- NSA defends collecting data from U.S. residents not suspected of terrorist activities
- Groups fear bill would allow free flow of data between private sector and NSA
- Google's move into home automation means even less privacy
- Bill to require warrant for email searches gains ground in House
- Coming soon to a fridge near you -- targeted ads
- Snowden leaks prompt tech firms to tout privacy, transparency policies
- License reader lawsuit can be heard, appeals court rules
- Is EU's 'right to be forgotten' really the 'right to edit the truth'?
- Tails 1.0: A bootable Linux distro that protects your privacy
- Privacy jitters derail controversial K-12 big data initiative
- Top 10 Reasons to Strengthen Information Security with Desktop Virtualization Regain control and reduce risk without sacrificing business productivity and growth
- Preventing Sophisticated Attacks: Anti-Evasion & Advanced Evasion Techniques McAfee Next Generation Firewall applies sophisticated analysis techniques specifically to detect advanced evasion techniques (AET).
- The Security Industry's Dirty Little Secret The debate over advanced evasion techniques (AETs) This report summarizes the findings of a McAfee commissioned research group to determine the level of understanding IT security professionals have about AETs...
- Demand More, Get the Most from the Move to a Next-Generation Firewall Beyond the basics in a next generation firewall, to protect your investment you should demand other valuable features: intrusion prevention, contextual rules, advanced...
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different....
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!