Congress

Time for U.S. to gut 'malware kingpins'

Shutterstock image (by Sergey Nivens): information networks.

Cyber deterrence doesn't have to be a one-nation game. During a hearing of the House Armed Services Committee on Sept. 29, representatives of major cybersecurity firms and think tanks urged American leaders to get more aggressive and build an international cyber enforcement coalition.

"What is the acceptable level of [information] loss for this country?" asked Richard Bejtlich, chief security strategist at FireEye. "Simply by inaction we're tolerating quite a bit right now."

For too long, the U.S. has been like a department store that allows shoplifters to run wild with everything from sensitive personal information to intellectual property, Bejtlich said. But that can and should change.

"It was difficult for us to establish a norm saying we shouldn't steal from the other nations' private sectors," he added. But now that the U.S. and China have brokered a cyber pact that addresses the protection of intellectual property rights, Bejtlich said the U.S. should press the offensive and enlist a global coalition to fight cybercrime.

He added that there are only 100 or so "malware kingpins" worldwide capable of writing the most destructive code, and by working with other countries, the U.S. could gut many hacking organizations before they do more damage.

He argued for both retaliation against hackers and preemptive strikes.

"When something significant happens like [the Office of Personnel Management breach], we should take a response," Bejtlich said, noting that vigilant technologies could enable the military to identify cyberthreats and disrupt adversarial activity before it begins.

Although Bejtlich speculated that the Defense Department's cyber outfits could work with allies to disrupt hackers' capabilities preemptively, New America Foundation Senior Fellow Ian Wallace noted the power of political and economic pressure.

"The deterrence of cyberthreats doesn't have to happen in cyberspace," he said.

Wallace called DOD's revised cyber strategy a "necessary and welcome update" with an "admirable new level of transparency." But he said DOD needs to approach cybersecurity with revolutionary vigor and expose senior commanders to more of the nuts and bolts of cybersecurity.

"Rather than treating cyber operators off to the side as techies, [what's needed is] integrating cyber operators" and having them "go on to command full-spectrum operations," Wallace said.

Bejtlich also called for a U.S. chief information security officer, with authorities comparable to those of U.S. CIO Tony Scott and U.S. CTO Megan Smith.

Nevertheless, Wallace said DOD should not become the private sector's "default choice" for cyber protection.

"If the military becomes the first place that everybody turns to, that's going to become a burden that the military cannot bear in the long term," Wallace said.

DOD's role should largely be limited to alerting companies about incoming threats, he added.

Bejtlich largely agreed, though he said the military should step in to stop an attack on critical infrastructure.

And in the long run, cybersecurity operations might need to become a separate service branch.

"If you want to be able to keep and retain the best [skilled cyber warriors] for the longest term, you're going to need to break them off," Bejtlich said. "Strategic cyber is going to need to be its own service with its own culture."

About the Author

Zach Noble is a staff writer covering digital citizen services, workforce issues and a range of civilian federal agencies.

Before joining FCW in 2015, Noble served as assistant editor at the viral news site TheBlaze, where he wrote a mix of business, political and breaking news stories and managed weekend news coverage. He has also written for online and print publications including The Washington Free Beacon, The Santa Barbara News-Press, The Federalist and Washington Technology.

Noble is a graduate of Saint Vincent College, where he studied English, economics and mathematics.

Click here for previous articles by Noble, or connect with him on Twitter: @thezachnoble.


The Fed 100

Read the profiles of all this year's winners.

Featured

Reader comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group