Hacking back will only get you in more trouble

RSA panel warns there is no easy solution to online IP theft in response to economic espionage.

The online theft of U.S. intellectual property (IP) by other nation states continues to be a big problem, a panel of experts agreed this week at the RSA conference in a session titled, “Responses to state-sponsored economic espionage.”

That much is obvious – awareness of economic cyber espionage has reached the mainstream, with CBS-TV’s newsmagazine “60 Minutes” even doing a segment on it last month, labeling it, “the great brain robbery of America.”

What to do about it is also a big problem. The panel agreed that the most tempting and instinctive response of “active defense” – more commonly known as “hacking back” – is not a good one.

stewartbaker.jpg

 

Stewart Baker, partner, Steptoe & Johnson

 

The debate over hacking back remains fierce overall in the security community, with a number of prominent advocates in favor of it, including Stewart Baker (also an RSA presenter), now a partner at Steptoe & Johnson but with a high-level government history as a former assistant secretary for policy in the Department of Homeland Security (DHS) and former general counsel at the National Security Agency.

But there wasn’t much debate on this panel.

“Hacking back doesn’t get your IP back,” said Christopher Painter, coordinator for cyber issues at the State Department, adding that attribution – determining who actually committed the theft – can be very difficult.

“It can be a bit like you trying to punch somebody, but they duck and you punch somebody else,” he said. “You don’t get the benefit and it can cause legal and international harm. It just doesn’t work very well.”

[ MORE FROM RSA: See all the news happening at the show ]

Mark Weatherford, chief cybersecurity strategist at vArmour agreed, noting that given the difficulties of attribution, a victim could be “punching an opponent you cannot see – and it might be a nation state.”

That, he said, could result in “unintended consequences,” including retribution from a much more powerful adversary, not to mention legal problems.

Christopher Painter, coordinator for cyber issues at the State Department

The only partial dissent was from Paul Rosenzweig, founder of Red Branch Law & Consulting and a former deputy assistant secretary for policy at the DHS. He said hacking back can work effectively sometimes.

But he agreed on the “legally complicated” part. He told of an unnamed corporate client that had retaliated against a hack and was then looking for legal help against the attacker from both the U.S. government and the government of the country where the attacker was located.

The problem, Rosenzweig said, was that the firm, “had committed crimes in both countries, so they were in a legal box they couldn’t get out of.”

“We basically agreed that they should just fix the hole and then never speak of it again,” he said.

That leaves less volatile responses – diplomacy, threats and agreements like the one between President Obama and Chinese President Xi Jinping announced with much fanfare last September. But while they are less risky, they also have not been very effective so far.

Painter said he thought some good has already come from the U.S.-China agreement. He said in the past China had not acknowledged any distinction between economic and political espionage, and now it has.

Also, while he said it will “take time to see if it works, it does set a standard of accountability – one that other G20 countries have agreed with.”

But Rosenzweig was less optimistic, saying the entire topic “makes me grumpy.”

That, he said, is because he believes economic espionage is “a policy problem, not a legal problem.”

Most countries have “robust” laws against the theft of IP, he noted, “but there is little enforcement.”

Besides that, those from other countries who steal from U.S. companies are frequently beyond the reach of the American justice system. “When, if ever, would we see extradition to the U.S.? The chances are pretty thin,” he said.

“So the law is inadequate – it has almost no utility unless you can bring people to justice.”

That, he said, leaves diplomatic avenues, including sanctions, “but the sanctions policy has yet to be used,” he said. “We’re in the middle of that story.”

Jessica Malekos Smith, law student at UC Davis School of Law, was also dubious about the effectiveness of available responses, again citing the difficulty of enforcing an agreement without foolproof attribution. She cited a Wall Street Journal article that she said called the U.S.-China agreement, “full of promise with no enforcement.”

The panelists agreed that more and better sharing of threat information might help, but Rosenzweig said most private sector firms, “don’t see the benefit as worth the cost – they see it creating more regulation and costing too much to put together the information.”

Join the CSO newsletter!

Error: Please check your email address.

Tags rsa

More about National Security AgencyRSAWall Street

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Taylor Armerding

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts

Market Place