Commission wants to turn tables on IP thieves by crippling PCs with extortion-style lock-outs
'What the hell are these guys thinking?' asks critic after panel suggests using 'ransomware' tactics
Computerworld - Buried in a 100-page report issued last week by the Commission on the Theft of American Intellectual Property was a recommendation to copy a tactic cyber scammers use to extort money from innocent victims.
The IP Commission -- a private panel of politicians, military and defense officials and technology leaders -- is co-chaired by Jon Huntsman, former governor of Utah and former U.S. ambassador to China, and Dennis Blair, a retired U.S. Navy admiral and former Director of National Intelligence.
Among more than 20 recommendations, the commission suggested that companies be allowed to lock files and cripple computers.
Under a heading of "Support efforts by American private entities both to identify and to recover or render inoperable intellectual property stolen through cyber means," the commission said, "Software can be written that will allow only authorized users to open files containing valuable information.
"If an unauthorized person accesses the information, a range of actions might then occur," the commission continued. "For example, the file could be rendered inaccessible and the unauthorized user's computer could be locked down, with instructions on how to contact law enforcement to get the password needed to unlock the account."
In a nutshell, that's the same tactic used by scammers who try to panic users into paying a ransom fee to regain control of their computers.
Variously labeled "ransomware" and "scareware," such malware cripples a PC or encrypts its files, then displays a ransom note demanding payment to restore control to the owner. The technique, flatly called "an extortion racket" by Symantec in late 2012, has been in use since at least 2006. Until last year, however, it was rare and ineffective, and seen mostly in Eastern Europe.
In fact, a common hacker stratagem is to deliver on-screen messages to victims that appear to be from law enforcement agencies, just as the commission proposed.
Last December, for example, Symantec described how messages displayed on Americans' PCs by the "Ransomlock" malware masqueraded as warnings from the Federal Bureau of Investigation (FBI), while German users saw messages purportedly from the Bundesamt für Polizei, Germany's federal police.
The commission asserted that these ransomware-style techniques are legal. "Such measures do not violate existing laws on the use of the Internet, yet they serve to blunt attacks and stabilize a cyber incident to provide both time and evidence for law enforcement to become involved," the report contended.
Critics quickly jumped on the ransomware comparisons, and bludgeoned the proposal.
"Now we have the IP Commission suggesting that firms be allowed to use basically this same technique -- pop up on someone's computer because you believe they've stolen something from you, terrify them with law enforcement threats, and lock them out of their (possibly crucial) data and applications as well," said Lauren Weinstein, the co-founder of People For Internet Responsibility (PFIR), in a Friday post on his blog.
"What the hell are these guys thinking? Outside of the enormous collateral damage this sort of 'permitted malware' regime could do to innocents, how would the average user be able to tell the difference between this class of malware and the fraudulent variety that is currently a scourge across the Net?"
While the commission acknowledged that even more aggressive measures -- including so-called "hack-back" tactics -- would require changes in U.S. law, it said an offense-is-the-best-defense solution should be studied. The commission, however, declined to make specific recommendations on how companies should be allowed to counter-attack the computers of cyber thieves and hackers.
"New options need to be considered," the commission said.
The IP Commission report can be found on the organization's website (download PDF).
This article, Commission wants to turn tables on IP thieves by crippling PCs with extortion-style lock-outs, was originally published at Computerworld.com.
Gregg Keizer covers Microsoft, security issues, Apple, Web browsers and general technology breaking news for Computerworld. Follow Gregg on Twitter at @gkeizer, on Google+ or subscribe to Gregg's RSS feed . His email address is firstname.lastname@example.org.
Read more about Cybercrime and Hacking in Computerworld's Cybercrime and Hacking Topic Center.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Who's Spying on You? You're aware of the threats of malware to your business but what about the ever-changing ground rules? Cybercriminals today are launching attacks against...
- Pay-as-you-Grow Data Protection: IBM Tivoli's Full-featured Data Protection Suite for Small to Medium Businesses IBM Tivoli Storage Manager Suite for Unified Recovery gives small and medium businesses the opportunity to start out with only the individual solutions...
- Streamline Data Protection with IBM Tivoli Storage Manager Operations Center IBM Tivoli Storage Manager (TSM) has been an industry-standard data protection solution for two decades. But, where most competitors focus exclusively on Backup...
- Simplify and Consolidate Data Protection for Better Business Results Learn about IBM® Tivoli® Storage Manager Operations Center, which provides advanced visualization, built-in analytics and integrated workflow automation features that leapfrog traditional backup...
- Meg Whitman presents Unlocking IT with Big Data During this Web Event you will hear Meg Whitman, President and CEO, HP discuss HAVEn - the #1 Big Data platform, as well...
- The New Way to Work Knowledge Vault This Knowledge Vault focuses on how, in today's increasingly virtual world, it's more important than ever to engage deeply with employees, suppliers, partners,... All Cybercrime and Hacking White Papers | Webcasts