{"id":15053,"date":"2014-08-05T12:15:27","date_gmt":"2014-08-05T02:15:27","guid":{"rendered":"http:\/\/www.aspistrategist.ru\/?p=15053"},"modified":"2014-08-06T10:20:59","modified_gmt":"2014-08-06T00:20:59","slug":"vigilantism-on-the-cyber-frontier","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/vigilantism-on-the-cyber-frontier\/","title":{"rendered":"Vigilantism on the cyber frontier"},"content":{"rendered":"
<\/a><\/p>\n Cybercrime is presenting law enforcement agencies worldwide with new and evolving legislative problems and operational challenges. Identifying and stopping nefarious online actors, many of whom are based thousands of kilometres away on foreign soil, is a challenging, endless and often thankless task. But this is now being complicated by a trend towards increasing vigilantism on the cyber frontier.<\/p>\n Frustrated by relentless and increasingly sophisticated infiltration attempts, businesses and corporate heavyweights are discussing with increasing vigour how to return fire.<\/p>\n Defence is a comparatively weak strategy in cyberspace\u2014it\u2019s only a matter of when, not if, most networks will be infiltrated. Savvy firms aware of this reality are employing several pre-emptive tactics such as planting misleading information on their own servers or creating endless rabbit holes to lure in intruders and keep them occupied.<\/p>\n Dubbed<\/a> by some as \u2018active cyber defence\u2019, that approach works to raise the overall cyber resilience of companies. It\u2019s a lawful and proactive way to guard against cybercrime\u2014the equivalent of strengthening the bank vault in a Wild West town. But it must remain confined to company networks.<\/p>\n Some businesses are moving off their own servers and pursuing more aggressive, retaliatory tactics against cybercriminals. That is, they\u2019re not just hardening and hiding the vault, but actively pursuing bank-robbers. And that\u2019s creating problems for law enforcement and governments.<\/p>\n Some corporations are unhappy with strategies restricted to their own networks, deriding it as \u2018passive cyber defence\u2019. Former US Ambassador to China, Jon Huntsman, is the latest<\/a> to lend his voice to the chorus, calling for more freedom to pursue stolen information through cyberspace. In June, campaigners were even advocating<\/a> for the broad application of the Second Amendment to the online environment.<\/p>\n While \u2019hacking-back\u2019 and directly attacking cybercriminals may seem just and gratifying, that strategy is illegal in most countries and counter to the norm of a stable and crime-free cyberspace that\u2019s being pushed so vehemently by Western countries.<\/p>\n Many of the computers used to penetrate company networks are often legitimate private computers that have been hijacked by criminal organisations to route their attacks through. Illegal botnets comprised of ensnared private computers can be similarly used to automatically probe for network weaknesses.<\/p>\n Counter-attacks against those computers are extremely unlikely to help regain stolen corporate information or intellectual property and can adversely impact an innocent third party.<\/p>\n If those third-party systems turn out to be controlling critical national infrastructures or belong to major corporations, the knock-on effects and implications of any damage to those networks could be calamitous.<\/p>\n In short, any form of offensive attack, against innocent users or otherwise, has the potential to land IT departments and contractors in hot water. Any unauthorised movement into the private network of another holds significant legal implications in some countries, in particular the United States, where the intent of the user in hacking cases is irrelevant.<\/p>\n When speaking to an American Bar Association panel about hacking back, a representative of the US Justice Department explained<\/a> that the first reaction of his team was \u2019Oh wow \u2013 now I have two crimes.\u2019<\/p>\n In Australia, the legislative waters surrounding hacking back are murkier. But as a signatory<\/a> to the Budapest Convention Australia is obligated to work with foreign governments to pursue hackers within our jurisdiction and potentially extradite them, as the treaty outlaws private retaliation.<\/p>\n We\u2019re yet to see the extradition of anyone under the convention, but it\u2019ll be interesting to see how the Australian Government would handle such a request from a foreign government, particularly if crime wasn\u2019t the primary motivation of the hacker.<\/p>\n Improving cyber resilience should continue to be a high-level goal for businesses world-wide. But countering cybercrime shouldn\u2019t come at the cost of the safety of \u2018innocent\u2019 third parties. Disruptive techniques within the realms of one\u2019s own server are acceptable, but it\u2019s when vigilantism spreads that fight to the servers of others that the Western norm of a stable cyberspace is threatened.<\/p>\n Jessica Woodall is an analyst in ASPI\u2019s\u00a0International Cyber Policy Centre<\/a>. Image courtesy of Alex Eylar<\/a>.<\/i><\/p>\n","protected":false},"excerpt":{"rendered":" Cybercrime is presenting law enforcement agencies worldwide with new and evolving legislative problems and operational challenges. Identifying and stopping nefarious online actors, many of whom are based thousands of kilometres away on foreign soil, is …<\/p>\n","protected":false},"author":133,"featured_media":15054,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[531],"tags":[95,484,902],"class_list":["post-15053","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security-2","tag-cyber-security","tag-private-sector","tag-vigilantism"],"acf":[],"yoast_head":"\n