Congress

Time for U.S. to gut 'malware kingpins'

Shutterstock image (by Sergey Nivens): information networks.

Cyber deterrence doesn't have to be a one-nation game. During a hearing of the House Armed Services Committee on Sept. 29, representatives of major cybersecurity firms and think tanks urged American leaders to get more aggressive and build an international cyber enforcement coalition.

"What is the acceptable level of [information] loss for this country?" asked Richard Bejtlich, chief security strategist at FireEye. "Simply by inaction we're tolerating quite a bit right now."

For too long, the U.S. has been like a department store that allows shoplifters to run wild with everything from sensitive personal information to intellectual property, Bejtlich said. But that can and should change.

"It was difficult for us to establish a norm saying we shouldn't steal from the other nations' private sectors," he added. But now that the U.S. and China have brokered a cyber pact that addresses the protection of intellectual property rights, Bejtlich said the U.S. should press the offensive and enlist a global coalition to fight cybercrime.

He added that there are only 100 or so "malware kingpins" worldwide capable of writing the most destructive code, and by working with other countries, the U.S. could gut many hacking organizations before they do more damage.

He argued for both retaliation against hackers and preemptive strikes.

"When something significant happens like [the Office of Personnel Management breach], we should take a response," Bejtlich said, noting that vigilant technologies could enable the military to identify cyberthreats and disrupt adversarial activity before it begins.

Although Bejtlich speculated that the Defense Department's cyber outfits could work with allies to disrupt hackers' capabilities preemptively, New America Foundation Senior Fellow Ian Wallace noted the power of political and economic pressure.

"The deterrence of cyberthreats doesn't have to happen in cyberspace," he said.

Wallace called DOD's revised cyber strategy a "necessary and welcome update" with an "admirable new level of transparency." But he said DOD needs to approach cybersecurity with revolutionary vigor and expose senior commanders to more of the nuts and bolts of cybersecurity.

"Rather than treating cyber operators off to the side as techies, [what's needed is] integrating cyber operators" and having them "go on to command full-spectrum operations," Wallace said.

Bejtlich also called for a U.S. chief information security officer, with authorities comparable to those of U.S. CIO Tony Scott and U.S. CTO Megan Smith.

Nevertheless, Wallace said DOD should not become the private sector's "default choice" for cyber protection.

"If the military becomes the first place that everybody turns to, that's going to become a burden that the military cannot bear in the long term," Wallace said.

DOD's role should largely be limited to alerting companies about incoming threats, he added.

Bejtlich largely agreed, though he said the military should step in to stop an attack on critical infrastructure.

And in the long run, cybersecurity operations might need to become a separate service branch.

"If you want to be able to keep and retain the best [skilled cyber warriors] for the longest term, you're going to need to break them off," Bejtlich said. "Strategic cyber is going to need to be its own service with its own culture."

About the Author

Zach Noble is a staff writer covering digital citizen services, workforce issues and a range of civilian federal agencies.

Before joining FCW in 2015, Noble served as assistant editor at the viral news site TheBlaze, where he wrote a mix of business, political and breaking news stories and managed weekend news coverage. He has also written for online and print publications including The Washington Free Beacon, The Santa Barbara News-Press, The Federalist and Washington Technology.

Noble is a graduate of Saint Vincent College, where he studied English, economics and mathematics.

Click here for previous articles by Noble, or connect with him on Twitter: @thezachnoble.


Rising Stars

Meet 21 early-career leaders who are doing great things in federal IT.

Featured

  • SEC Chairman Jay Clayton

    SEC owns up to 2016 breach

    A key database of financial information was breached in 2016, possibly in support of insider trading, said the Securities and Exchange Commission.

  • Image from Shutterstock.com

    DOD looks to get aggressive about cloud adoption

    Defense leaders and Congress are looking to encourage more aggressive cloud policies and prod reluctant agencies to embrace experimentation and risk-taking.

  • Shutterstock / Pictofigo

    The next big thing in IT procurement

    Steve Kelman talks to the agencies that have embraced tech demos in their acquisition efforts -- and urges others in government to give it a try.

  • broken lock

    DHS bans Kaspersky from federal systems

    The Department of Homeland Security banned the Russian cybersecurity company Kaspersky Lab’s products from federal agencies in a new binding operational directive.

  • man planning layoffs

    USDA looks to cut CIOs as part of reorg

    The Department of Agriculture is looking to cut down on the number of agency CIOs in the name of efficiency and better communication across mission areas.

  • What's next for agency cyber efforts?

    Ninety days after the Trump administration's executive order, FCW sat down with agency cyber leaders to discuss what’s changing.

Reader comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group