Free Republic
Browse · Search
Bloggers & Personal
Topics · Post Article

Skip to comments.

Hitting Back At Hackers: Why "Strikeback" Is Doomed To Fail
ReadWrite ^ | 4-9-2013 | Corey Nachreiner

Posted on 04/10/2013 4:17:51 AM PDT by Sir Napsalot

(snip) Considering this deluge of aggressive and costly security breaches, it’s no wonder that some people are getting frustrated enough to contemplate striking back directly against our attackers. While giving cyber criminals a taste of their own medicine certainly sounds appealing, most forms of so-called "Strikeback" have no place in private business. ......

What’s Wrong With Strikeback?

Unfortunately, direct strikeback measures have huge inherent risks:.

Targeting: The biggest problem with strikeback is that the Internet provides anonymity, making it very hard to know who’s really behind an attack. It's all too likely that strikebacks could impact innocent victims. For example, attackers have started to purposely plant false flags into their code, suggesting it came from another organization in order to sabotage that company.

Geography: Another key issue is that Internet crimes tend to pass through many geographies and legal jurisdictions. Domestic strikebacks invite potential legal problems, but cross-border actions have even wider ramifications.

Legal: Additionally, most strikeback activity is illegal. It is against the law for the average person to track down and punish a burglar who ransacked a house, and the same principles hold true for cybercrimes. If an organization uses a booby trapped document to install a Trojan on the attacker’s network, it is technically breaking the same type of computer fraud and abuse laws that the attacker broke to steal information in the first place.

Revenge: When it comes down to it, strikeback is simply revenge. If a network has already been breached, striking back against the attacker typically doesn’t recover stolen data or repair damage that has already been done. It's almost always better to pursue legal investigations and prosecutions through the proper channels.

(Excerpt) Read more at readwrite.com ...


TOPICS: Computers/Internet
KEYWORDS: cyberespionage; cybersecurity; cyberterrorism; cyberwarfare
(Conclusion from article):

Strikeback simply doesn’t belong in private business. It offers no real advantages to most organizations, and it carries serious risks that far outweigh the short-lived satisfaction of revenge. Instead, companies should focus their security strategies on well-implemented, carefully monitored, multi-layer defenses designed to keep cyber criminals from breaching their networks in the first place.

1 posted on 04/10/2013 4:17:51 AM PDT by Sir Napsalot
[ Post Reply | Private Reply | View Replies]

To: Sir Napsalot
Awww shucks. I was beginning to warm up to the cruise missile idea.
2 posted on 04/10/2013 4:24:56 AM PDT by no-to-illegals (Scrutinize our government and Secure the Blessing of Freedom and Justice)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Sir Napsalot

Passive Defense only works for so long. Eventually if you want this to stop then companies and governments are going to go on the offensive. Either position has it’s advantages and disadvantages.

The second for me, seems to be the one more fraught with unintended consequences. Mainly for the Law-abiding user on ‘net’ services.


3 posted on 04/10/2013 4:31:35 AM PDT by The Working Man
[ Post Reply | Private Reply | To 1 | View Replies]

To: no-to-illegals

I’m working on a new internet protocol to address this problem: EMP/IP.


4 posted on 04/10/2013 4:33:16 AM PDT by Doug Loss
[ Post Reply | Private Reply | To 2 | View Replies]

To: Doug Loss

This just saddens me to no end this A.M. I really thought the cruise missile option was the best one.


5 posted on 04/10/2013 4:40:28 AM PDT by no-to-illegals (Scrutinize our government and Secure the Blessing of Freedom and Justice)
[ Post Reply | Private Reply | To 4 | View Replies]

To: The Working Man
That's thing.

So far these cyber attacks have not been officially recognized as ‘legitimate’ warfare. In the past it "hasn't hit" general public in their purse, in their welfare.

But I wholeheartedly agree with your “Passive Defense only works for so long.” statement.

6 posted on 04/10/2013 4:42:37 AM PDT by Sir Napsalot (Pravda + Useful Idiots = CCCP; JournOList + Useful Idiots = DopeyChangey!)
[ Post Reply | Private Reply | To 3 | View Replies]

To: no-to-illegals
So the previous ‘news’ of tracing back to a bogus business/grey building in Shanghai, manned by Chinese Liberation Army, is legit?
7 posted on 04/10/2013 4:46:21 AM PDT by Sir Napsalot (Pravda + Useful Idiots = CCCP; JournOList + Useful Idiots = DopeyChangey!)
[ Post Reply | Private Reply | To 5 | View Replies]

To: The Working Man; Doug Loss
Doug is working on an idea of EMP/IP. That idea might work. We could take out the drones, being used, too.
8 posted on 04/10/2013 4:48:14 AM PDT by no-to-illegals (Scrutinize our government and Secure the Blessing of Freedom and Justice)
[ Post Reply | Private Reply | To 3 | View Replies]

To: Sir Napsalot

I know nothing ... nothing.


9 posted on 04/10/2013 4:48:56 AM PDT by no-to-illegals (Scrutinize our government and Secure the Blessing of Freedom and Justice)
[ Post Reply | Private Reply | To 7 | View Replies]

To: no-to-illegals

Sorry, I promptly forgot what I was talking about.

I know nothing either.


10 posted on 04/10/2013 4:56:52 AM PDT by Sir Napsalot (Pravda + Useful Idiots = CCCP; JournOList + Useful Idiots = DopeyChangey!)
[ Post Reply | Private Reply | To 9 | View Replies]

To: Sir Napsalot

Death Penalty for virus writers


11 posted on 04/10/2013 5:09:21 AM PDT by Mr. K (There are lies, damned lies, statistics, and democrat talking points.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Sir Napsalot

Ultimately what’s going to happen (what is happening) around the world is gov’t control of the internet under the guise of protecting all the people.

So all the people will have their internet use severally restricted, while the same cyber criminals operate freely.

Smoking, public transportation, large soft drinks, pot, gun control, all use the same gov’t control template that works so well.


12 posted on 04/10/2013 5:29:44 AM PDT by PoloSec ( Believe the Gospel: how that Christ died for our sins, was buried and rose again)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Sir Napsalot; All
http://orlandodoctrine.com/
13 posted on 04/10/2013 6:56:02 AM PDT by gura (If Allah is so great, why does he need fat sexually confused fanboys to do his dirty work? -iowahawk)
[ Post Reply | Private Reply | To 1 | View Replies]

To: gura

Thanks for the link. Again it says

1) ‘doesn’t belong in private business’ ==> MAD (or close to MAD) as in the two Dutch companies case

2) up to policy makers ==> PoloSec’s scenario comes true


14 posted on 04/10/2013 7:14:36 AM PDT by Sir Napsalot (Pravda + Useful Idiots = CCCP; JournOList + Useful Idiots = DopeyChangey!)
[ Post Reply | Private Reply | To 13 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
Bloggers & Personal
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson