Congress

Time for U.S. to gut 'malware kingpins'

Shutterstock image (by Sergey Nivens): information networks.

Cyber deterrence doesn't have to be a one-nation game. During a hearing of the House Armed Services Committee on Sept. 29, representatives of major cybersecurity firms and think tanks urged American leaders to get more aggressive and build an international cyber enforcement coalition.

"What is the acceptable level of [information] loss for this country?" asked Richard Bejtlich, chief security strategist at FireEye. "Simply by inaction we're tolerating quite a bit right now."

For too long, the U.S. has been like a department store that allows shoplifters to run wild with everything from sensitive personal information to intellectual property, Bejtlich said. But that can and should change.

"It was difficult for us to establish a norm saying we shouldn't steal from the other nations' private sectors," he added. But now that the U.S. and China have brokered a cyber pact that addresses the protection of intellectual property rights, Bejtlich said the U.S. should press the offensive and enlist a global coalition to fight cybercrime.

He added that there are only 100 or so "malware kingpins" worldwide capable of writing the most destructive code, and by working with other countries, the U.S. could gut many hacking organizations before they do more damage.

He argued for both retaliation against hackers and preemptive strikes.

"When something significant happens like [the Office of Personnel Management breach], we should take a response," Bejtlich said, noting that vigilant technologies could enable the military to identify cyberthreats and disrupt adversarial activity before it begins.

Although Bejtlich speculated that the Defense Department's cyber outfits could work with allies to disrupt hackers' capabilities preemptively, New America Foundation Senior Fellow Ian Wallace noted the power of political and economic pressure.

"The deterrence of cyberthreats doesn't have to happen in cyberspace," he said.

Wallace called DOD's revised cyber strategy a "necessary and welcome update" with an "admirable new level of transparency." But he said DOD needs to approach cybersecurity with revolutionary vigor and expose senior commanders to more of the nuts and bolts of cybersecurity.

"Rather than treating cyber operators off to the side as techies, [what's needed is] integrating cyber operators" and having them "go on to command full-spectrum operations," Wallace said.

Bejtlich also called for a U.S. chief information security officer, with authorities comparable to those of U.S. CIO Tony Scott and U.S. CTO Megan Smith.

Nevertheless, Wallace said DOD should not become the private sector's "default choice" for cyber protection.

"If the military becomes the first place that everybody turns to, that's going to become a burden that the military cannot bear in the long term," Wallace said.

DOD's role should largely be limited to alerting companies about incoming threats, he added.

Bejtlich largely agreed, though he said the military should step in to stop an attack on critical infrastructure.

And in the long run, cybersecurity operations might need to become a separate service branch.

"If you want to be able to keep and retain the best [skilled cyber warriors] for the longest term, you're going to need to break them off," Bejtlich said. "Strategic cyber is going to need to be its own service with its own culture."

About the Author

Zach Noble is a staff writer covering digital citizen services, workforce issues and a range of civilian federal agencies.

Before joining FCW in 2015, Noble served as assistant editor at the viral news site TheBlaze, where he wrote a mix of business, political and breaking news stories and managed weekend news coverage. He has also written for online and print publications including The Washington Free Beacon, The Santa Barbara News-Press, The Federalist and Washington Technology.

Noble is a graduate of Saint Vincent College, where he studied English, economics and mathematics.

Click here for previous articles by Noble, or connect with him on Twitter: @thezachnoble.


Featured

  • Telecommunications
    Stock photo ID: 658810513 By asharkyu

    GSA extends EIS deadline to 2023

    Agencies are getting up to three more years on existing telecom contracts before having to shift to the $50 billion Enterprise Infrastructure Solutions vehicle.

  • Workforce
    Shutterstock image ID: 569172169 By Zenzen

    OMB looks to retrain feds to fill cyber needs

    The federal government is taking steps to fill high-demand, skills-gap positions in tech by retraining employees already working within agencies without a cyber or IT background.

  • Acquisition
    GSA Headquarters (Photo by Rena Schild/Shutterstock)

    GSA to consolidate multiple award schedules

    The General Services Administration plans to consolidate dozens of its buying schedules across product areas including IT and services to reduce duplication.

Stay Connected

FCW Update

Sign up for our newsletter.

I agree to this site's Privacy Policy.