(Press-News.org) CHAMPAIGN, Ill. — Cyberattacks loom as an increasingly dire threat to privacy, national security and the global economy, and the best way to blunt their impact may be a public-private partnership between government and business, researchers say. But the time to act is now, rather than in the wake of a crisis, says a University of Illinois expert in law and technology.
According to a study by Jay Kesan, the H. Ross and Helen Workman Research Scholar at the College of Law, an information-sharing framework is necessary to combat cybersecurity threats.
"Cybersecurity is a big deal, and the protection of critical network infrastructure is a matter of national security," said Kesan, who directs the Program in Intellectual Property and Technology Law at Illinois. "If nothing else, cyberattacks are very expensive, costing the global economy almost a half-trillion dollars per year, according to some estimates. For either of those reasons alone it should be given more attention."
Meaningfully improving cybersecurity and ensuring the resilience of systems will require cooperation between members of the private sector and the government, according to the paper. To that end, Kesan and co-author Carol M. Hayes, a research associate with U. of I. College of Law, propose a framework for the sharing of information about threats and solutions that they believe reconciles the competing concerns of privacy and cybersecurity, Kesan said.
"Privacy and cybersecurity are not mutually exclusive, but balancing the two interests may require cooperation and the occasional compromise," Kesan said. "We believe that cybersecurity can be enhanced without creating an Orwellian, Big Brother world, and encourage the development of what we call a 'Circle of Trust' that brings the public and private sectors together to resolve cybersecurity threats more effectively."
The goal is to foster trust between the private and public sectors, he said.
"When the public sector shares information with the private sector, that encourages the private sector to trust the public sector, and vice versa," Kesan said. "Our proposed framework advances this notion of trust even further by allowing both sides to preserve a degree of secrecy – for example, government secrecy for classified military activities and geopolitical information, and private-market secrecy for consumer information, including information about consumers' online activities. It functions to assure participants that overreach by either side will be limited."
Private cybersecurity researchers could benefit from information about intrusion attempts and details about vulnerabilities uncovered by government actors, and government agencies could benefit from up-to-date information about private cybersecurity innovations and the identification of vulnerabilities by private firms, the researchers say.
Although some existing laws would need to be revised to implement the proposal, "both sides could benefit from information sharing about different security measures and their rate of success," Kesan said.
To emphasize the importance of cooperation, the paper presents case studies of two recent government proposals to address cyber threats: the proposed Cyber Intelligence Sharing and Protection Act (CISPA), and the presidential executive order that outlines procedures to establish voluntary cybersecurity standards.
Both proposals would create a way for qualified members of the private sector to obtain security clearances to receive classified cyber-threat information from the government, and CISPA also would allow the private sector to share cyber-threat information with government agencies.
But according to Kesan, efforts to address cyber threats may be hindered if policymakers rely solely on voluntary compliance.
"Both CISPA and the executive order take a voluntary approach, and we argue that a purely voluntary mandate is undesirable in both contexts," Kesan said.
Under each system as currently proposed, participation by private firms is purely voluntary and there is no penalty for non-compliance.
"Voluntary programs can be effective in some situations, but they may ultimately be interpreted only as aspirational guidelines," Kesan said. "In the sensitive context of cybersecurity, aspirational guidelines for security standards could lead to low levels of compliance, the withholding of valuable information by those who do not participate, and a greater risk of overshare by those who do participate."
On the other hand, mandatory programs with effective enforcement mechanisms are likely to result in higher levels of compliance, the authors note. This may be especially true when the program concerns highly complicated subject matter, as previous research has indicated that voluntary compliance may not be as effective in those situations.
"Government intervention with the free market should be minimized, but when cybersecurity issues have implications for national security, some degree of mandatory regulation would be beneficial," Kesan said. "The Obama administration recognized this through the issuance of the executive order on improving critical cybersecurity infrastructure, and Congress has recognized this as well."
Unfortunately, cybersecurity has proved to be a much more partisan issue than it should be, and Congress has not yet come together to take meaningful steps to protect the cyber infrastructure, Kesan said.
"Advocates for private enterprise have discouraged the imposition of meaningful cybersecurity requirements on privately owned critical infrastructure, while advocates for civil liberties and privacy invariably react with alarm to regulation that involves the collection of information about threats," he said.
Both Kesan and Hayes believe it is unlikely that Congress will pass effective cybersecurity legislation in the current session, which is scheduled to end on January 3, 2015. Although the presidential executive order and their proposed cybersecurity framework could provide some helpful first steps, the authors say that it is neither feasible nor desirable to rely solely on executive power to shore up the cyber defenses of the government and the private sector.
"Ideally, our proposed cybersecurity framework would be implemented alongside supporting legislation to ensure that cybersecurity actions and standards are subject to the checks and balances of our system of government," Kesan said. "CISPA could be easily revised to accompany our framework."
The authors also contend that it is important to ensure that this issue is subject to deliberate and careful decision-making by policymakers before a massive cyber catastrophe forces the government to act quickly and without adequate safeguards. They point to to the history of the Patriot Act, which was hastily passed in the aftermath of 9/11, and has been the target of significant criticism on civil liberties grounds over the last thirteen years.
"It's vital that these issues are addressed soon while there is still a chance to prevent a catastrophic cyber event," Kesan said. "It would be ill-advised to rely solely on executive power or on legislation that is hastily drafted and enacted after an emergency."
INFORMATION:
Editor's note: To contact Jay P. Kesan, call 217-333-7887; email kesan@illinois.edu.
The paper, "Creating a 'Circle of Trust' to Further Digital Privacy and Cybersecurity Goals," is available online.
To deter cyberattacks, build a public-private partnership
2014-08-25
ELSE PRESS RELEASES FROM THIS DATE:
Learning by watching, toddlers show intuitive understanding of probability
2014-08-25
Most people know children learn many skills simply by watching people around them. Without explicit instructions youngsters know to do things like press a button to operate the television and twist a knob to open a door. Now researchers have taken this further, finding that children as young as age 2 intuitively use mathematical concepts such as probability to help make sense of the world around them.
In a study led by researchers at the University of Washington, toddlers could tell the difference between two different ways an experimenter played a game, with one strategy ...
Fires above the Great Slave Lake in Canada
2014-08-25
Updates from NWTfire.com report that there are 133 active fires in the North Slave Region of the Northwest Territories. No new fires reported in the past 24 hours. Fire danger is moderate to high. Smoke may be an issue in some communities.
The Birch Lake Complex of fires are in an area approximately 80 km south of Behchoko and extending to within 30 km north of Fort Providence. Four crews will be working on hot spots and mopping up at Moraine Point this week. Mop-up continues many areas of complex's fire perimeter. The total fire complex area is estimated at 650,000 ...
Zombie ant fungi 'know' brains of their hosts
2014-08-25
A parasitic fungus that reproduces by manipulating the behavior of ants emits a cocktail of behavior-controlling chemicals when encountering the brain of its natural target host, but not when infecting other ant species, a new study shows.
The findings, which suggest that the fungus "knows" its preferred host, provide new insights into the molecular mechanisms underlying this phenomenon, according to researchers.
"Fungi are well known for their ability to secrete chemicals that affect their environment," noted lead author Charissa de Bekker, a Marie Curie Fellow in ...
Sweet! Glycocongugates are more than the sum of their sugars
2014-08-25
There's a certain type of biomolecule built like a nano-Christmas tree. Called a glycoconjugate, it's many branches are bedecked with sugary ornaments.
It's those ornaments that get all the glory. That's because, according to conventional wisdom, the glycoconjugate's lowly "tree" basically holds the sugars in place as they do the important work of reacting with other molecules.
Now a chemist at Michigan Technological University has discovered that the tree itself—called the scaffold—is a good deal more than a simple prop.
"We had always thought that all the biological ...
Increased risk of stroke in people with cognitive impairment
2014-08-25
People with cognitive impairment are significantly more likely to have a stroke, with a 39% increased risk, than people with normal cognitive function, according to a new study published in CMAJ (Canadian Medical Association Journal).
"Given the projected substantial rise in the number of older people around the world, prevalence rates of cognitive impairment and stroke are expected to soar over the next several decades, especially in high-income countries," writes Dr. Bruce Ovbiagele, Chair of the Department of Neurology, Medical University of South Carolina, Charleston, ...
Knee surgery shows no benefit for people with mild osteoarthritis
2014-08-25
A new study indicates that there is no apparent benefit to arthroscopic knee surgery for age-related tears of the meniscus in comparison with nonsurgical or sham treatments. The study, published in CMAJ (Canadian Medical Association Journal), provides evidence that middle-aged or older patients with mild or no osteoarthritis of the knee may not benefit from the procedure.
As people age, the meniscus in the knee thins and becomes less flexible and more susceptible to tearing. When the meniscus tears, it can cause pain and mechanical symptoms. Arthroscopic knee surgery ...
Knee surgery not needed for mild osteoarthritis: Study
2014-08-25
Their study, published in the Canadian Medical Association Journal (CMAJ) today, says middle-aged or older patients with mild or no osteoarthritis of the knee may not benefit from the procedure of arthroscopic knee surgery. Each year more than four million such keyhole surgeries are performed worldwide for degenerative meniscus tears.
Doctors need to be carefully weighing the costs and benefits when deciding who should undergo such surgery, says Dr. Moin Khan, principal investigator for the study and research fellow in orthopedic surgery in the Michael G. DeGroote School ...
Yellow pigment in eye may aid vision through haze, suggests Optometry and Vision Science
2014-08-25
August 25, 2014 – Individuals with greater amounts of yellow pigment in the eye may be better able to see distant objects in hazy conditions, suggests a study in the September issue of Optometry and Vision Science, official journal of the American Academy of Optometry. The journal is published by Lippincott Williams & Wilkins, a part of Wolters Kluwer Health.
Increased macular pigment (MP) may help in filtering out "blue haze," thus making distant objects more visible, according to the experimental study by Laura M. Fletcher, MS, and colleagues of University of Georgia, ...
New research: Parents of anxious children can avoid the 'protection trap'
2014-08-25
Tempe, Ariz. (Aug. 25, 2014) - Parents naturally comfort their children when they are scared, but new research shows that some reactions may actually reinforce their children's feelings of anxiety.
A new Arizona State University study shows that parents whose children suffer from anxiety often fall into the "protection trap" that may influence their child's behavior. The paper, "Variations in the Influence of Parental Socialization of Anxiety among Clinic Referred Children," was published in the journal, "Child Psychiatry and Human Development," by ASU graduate student ...
Happy Camper and July Fire Complexes in California
2014-08-25
The Happy Camp Complex of fires began as a lightning strike on August 12, 2014. Currently the fire has consumed 22,670 acres and is 20% contained. There are close to 2,000 personnel working on this fire at present. It consists of many small fires and a number of large ones. Most of the small fires have been contained and only account for about 100 acres. An inversion layer settled over the fire area throughout the morning and early afternoon on August 24, keeping fire activity moderate. As the inversion lifted in the afternoon, fire activity continued to the south. ...