Justin Lynch
Can companies unmask hackers through offensive cyber operations?
/arc-anglerfish-arc2-prod-mco.s3.amazonaws.com/public/ENCLFBYCAVFJ5NQNBDXDRODA4Y.jpg)
“Hack back” can have a number of meanings to observers — from active defense to destroying a hacker’s infrastructure as a retaliation for a cyberattack. But the various definitions of the idea have been proposed to deter hackers from attacking businesses.
Experts have been skeptical the idea could work.
“This could get out of hand very quickly,” Pete Cooper, a nonresident senior fellow at the Atlantic Council, told Fifth Domain. He said that mounting offensive cyber operations is more complex than firms realize, and if they go wrong they will quickly lead to unintended diplomatic and intelligence consequences, Cooper said.
“I understand that people are getting frustrated; getting cybersecurity right is hard. But turning around and saying the solution is commercial organizations going on offense is not helpful. There are well-established and effective ways for organizations to work with international law enforcement agencies and disrupt adversaries in a more ‘joined up’ and strategic manner.”
The comments on whether businesses should take active defense against hackers come as the United States has pledged to become more aggressive in cyberspace.
The U.S. national cybersecurity strategy, released in September, says that it will “attribute and deter unacceptable behavior in cyberspace.”
Industry officials have told Fifth Domain that the new cyber strategy has included increased coordination with the private sector, which could lead to U.S. Cyber Command taking more offensive actions on behalf of businesses.
No comments:
Post a Comment