White House cyber czar launching war on botnets

White House Cybersecurity Coordinator Howard Schmidt knows the cyber threat is an amorphous landscape that’s constantly changing, requiring him to always be reevaluating where to direct his most powerful resources. The latest foes in his crosshairs are botnets, and he’s convening federal agencies, private companies and other stakeholders to figure out the best way to deal with the threat.

Botnets – legions of computers that have been compromised and remotely controlled by hackers to carry out malicious activities – are one of the most common tools of the cyber crime trade. They’re also now the target of a federally led working group joining forces to create a unified cybersecurity front. But developing policies to govern an approach to combat them is going to be difficult.

“There’s been a lot of discussion about botnets…trying to identify how many are out there, what they’re doing, what they could do and what the impact could be. I’ve asked my office to engage in a private-public partnership to enhance the nation’s cybersecurity by fighting against bot networks,” Schmidt said April 11 at the McAfee Public Sector summit in Arlington, Va. “We’re teaming U.S. internet service providers, search engines, internet vendors, privacy rights advocates and groups and trade associations to tackle this on all fronts. We’re working on developing best practices and an industry code of conduct within the next 90 days.”

Schmidt said the group currently has four main goals: to develop principles for addressing the botnets; establish high-level strategies to increase public awareness on the botnets; leverage available consumer-focused information tools and resources to prevent the botnets from the beginning; and identify ways of measuring progress.

“A lot of times when we talk about this, it means different things to different people. It’s really tough to say, ‘How many resources are being put into it, and what place do we need to put them into?’” he said.

Botnets are an incredibly widespread, but still shadowy, problem in cybersecurity; currently most crime using botnets involves theft and fraud, sources say it’s possible they’ll be used for more destructive crimes in the U.S. It’s widely suspected that botnets were used in the cyber war that took down Estonian government, newspaper, banks and other websites in 2007.

The danger to the U.S. is imminent, especially as the government looks toward high-tech solutions and practices – such as the bring-your-own-device model that’s currently a hot topic inside the Beltway.

“We’re looking at what [botnets] might do to a business’s infrastructure, to personally identifiable information – identity theft, credit card fraud, et cetera – but it goes beyond that. What we’re beginning to see is about 4 million new botnet infections every month…it’s a moving target,” Schmidt said. “Roughly one in ten Americans has some kind of malicious software on their devices. Clearly, in an environment where bring-your-own-device is a good way to move forward, that potential for malware continues to grow.”

According to Schmidt, the time for action is now, and it’s critical.

“One of the clear issues we won’t be doing anymore is to just sit back and admire the problem. We’ve done that for too long. We’ve written strategy after strategy…it’s time to move beyond the strategies and actually move into an environment where we’re executing on these strategies,” he said.

About the Author

Amber Corrin is a former staff writer for FCW and Defense Systems.

Cyber. Covered.

Government Cyber Insider tracks the technologies, policies, threats and emerging solutions that shape the cybersecurity landscape.


Reader comments

Fri, Apr 13, 2012 Norm

Fix botnets? Here's how... 1) Offer a bounty for each botnet taken down, say $.05 per computer or whatever just under the blackmarket value of a PC. Bonus bucks for information leading to the conviction... (yada, yada). This way you'll get the good guys involved. Its cheaper to out-source. 2) On compromised computers clean-up the infection and display a pop-up screen (in many languages) they've been infected and prompt the to secure their PC better.

Thu, Apr 12, 2012

Looks like someone is under some pressure and needs to look like he is doing something. This issue has been going on for years and folks like the Chinese are probably reading all his thoughts as he types them up on his computer.

I suspect they will catch a few dumb grade school kids, media hype them to be the mastermind criminals they (the kids) wish they were, and pay raises and bonuses will be passed around to all the top folks. Meanwhile our friends in China and not so friends in N. Korea and a few other places will continue to quietly infiltrate any computer that touches the net, no matter how remote that connection is or how obscure the relationship.

In words used too many years ago to remember when they first were tossed out, "Less talk and more action" or "Talk is cheap".

Wed, Apr 11, 2012 Rezo NY, USA

It isn't a difficult task. The problem is, they are working in all of the wrong areas.

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group