(Press-News.org) CHAMPAIGN, Ill. — With the threats of cybercrime, cyberterrorism and cyberwarfare looming over our hyper-connected world, the best defense for the U.S. might be a good offense, says new research by a University of Illinois expert in technology and legal issues.
Law professor Jay P. Kesan warns that an active self-defense regime, which he terms "mitigative counterstriking," is a necessity in cyberspace, especially to protect critical infrastructure such as banking, utilities and emergency services.
"The threats from cyber-attacks are real, and the harm of a potential attack can be far greater than what we can currently combat," Kesan said.
Kesan's analysis, co-written with former U. of I. law student Carol M. Hayes and published in a forthcoming issue of the Harvard Journal of Law and Technology, concludes that mitigative counterstriking against attacks instead of simply relying on passive defense options (firewalls, patches and anti-virus software) is legally justifiable as self-defense, although a more exhaustive legal framework needs to be implemented.
"The principles of mitigative counterstriking are legally justifiable under several areas of domestic and international law, and can be made consistent with other areas of law by amending or reinterpreting the law," he said.
Kesan says an active defense regime consists of three distinct elements: detecting intrusions, tracing the attack back to the attacker, and executing a counterstrike.
A counterstrike can be characterized in one of two ways: retributive counterstrikes, which punish the attacker; and mitigative counterstrikes, which minimize the damage to the victims' information-technology infrastructure.
According to the authors' study, there currently is no effective domestic or international legal apparatus to deter cyber-attacks. Criminal law enforcement is complicated by the lack of a consistently enforced international law, jurisdictional issues and the difficulty of identifying an attacker in a manner specific enough to justify criminal prosecution. Resorting to civil litigation would likely be slow and impractical.
"Cyber-attacks are fundamentally different from crime," Kesan said. "The person may be physically very far away from you, and you may not be able to use traditional legal remedies against that person, since civil and criminal remedies require jurisdiction over a person. In those circumstances, what do you do?"
Kesan suggests that a government-affiliated agency, preferably a public-private partnership, should be responsible for an active defense program, including providing resources for private parties to detect and trace intrusions, and executing counterstrikes.
"We're at a particularly interesting moment in time because the technologies available to do this are getting better," Kesan said. "Trace-route and trace-back technologies – where we pinpoint where certain intrusions are coming from, even if they're going through intermediaries – are getting better. The swiftness of the technologies is getting better, which itself might be a deterrent."
Kesan says the confluence of better technology and inadequate legal protection provides a unique opportunity to think through the issues associated with creating new legal policy.
"Obviously, some sort of self-defense in cyberspace is justifiable," he said. "But how far do we go? Do we just block packets, or do we send them back? That's something we need to think carefully about."
Active defense, however, has been and continues to be a controversial subject. Kesan says the reason the government has been tentative is that, in some quarters, an active defense is viewed as tantamount to vigilantism. It also carries the risk of inflicting significant collateral damage.
"There will be consequences to engaging in that kind of conduct, so we don't want to take actions that are perceived as being lawless or could potentially cause lots of collateral harm," Kesan said. "Technologies are never 100 percent perfect or foolproof."
But if the U.S. is subject to an attack, "then we should have the ability to enact some measures to at least minimize the damage," he said. "Additionally, I would argue that a system to promote active defense and permit mitigative counterstriking should also include a liability rule to protect innocent third party intermediaries whose systems are compromised by attackers and counterstrikers."
Kesan says it's vital that formal policy is finalized soon, while there is still time for thoughtful deliberation and analysis of all of the potential implications of an attack.
"We rely on our online infrastructure for just about everything," he said. "That represents a good choke point, one that might be an attractive target for people who wish to do harm to us. If they were successful, it would have the potential to cause a great deal of economic hardship. That's why we need to be prepared before we are faced with the fallout from an attack."
INFORMATION:
Editor's notes: To contact Jay P. Kesan, call 217-333-7887; email kesan@illinois.edu.
The paper, "Mitigative Counterstriking: Self-Defense and Deterrence in Cyberspace," is available online.
Active self-defense strategy best deterrent against cyber-attacks
2011-06-28
ELSE PRESS RELEASES FROM THIS DATE:
Luis Miguel Del Amargue, International Bachata Star, To Perform At The 3rd San Francisco Bachata Festival
2011-06-28
Along with upcoming music star, Alex Wayne as the opening act, Luis Miguel Del Amargue, will not only perform his hit songs, but will be signing autographs promoting his music albums.
San Francisco Bachata Festival is known for featuring top notch bachata musicians, and is very proud to host the famous Luis Miguel Del Amargue this year.
"He is as popular as Aventura in Europe! I've been listening and dancing to the music of Mr. Amargue for many years. This is why I'm very excited that he will be performing at the festival's peak night, which is on Saturday, ...
Researchers find a keystone nutrient recycler in streams
2011-06-28
Researchers from the University of Georgia Odum School of Ecology have found that certain neotropical stream ecosystems rely almost entirely on a single fish species known as the banded tetra for the critical nutrient phosphorus. In a paper recently published in the journal Ecology, the researchers, led by Gaston E. "Chip" Small, explain why this particular species plays such a crucial role—and why these stream systems are vulnerable as a result.
"I initially set out to understand how different physiological factors—diet, fish elemental composition, stream chemistry—interacted ...
July 2011 in GSA Today: Clinker geochronology
2011-06-28
Boulder, Colorado, USA - July GSA Today science article authors Peter W. Reiners of the University of Arizona and colleagues have developed and successfully carried out a novel, extraordinary technique for learning how efficiently river channels cut and increase local topographic relief: They have used the exposure of "clinker" deposits in combination with highly refined dating techniques. Clinkers are baked coals; baking naturally occurs in shallow depths (tens of meters) and when the clinkers are exhumed during erosion and the development of topographic relief, they are ...
Tiny ring laser accurately detects and counts nanoparticles
2011-06-28
A tiny doughnut-shaped laser is the latest marvel of silicon microminiaturization, but instead of manipulating bits it detects very small particles. Small particles play a big — and largely unnoticed — role in our everyday lives. Virus particles make us sick, salt particles trigger cloud formation, and soot particles sift deep into our lungs and make it harder to breathe.
The sensor belongs to a category called whispering gallery resonators, which work like the famous whispering gallery in St. Paul's Cathedral in London, where someone on the one side of the dome can hear ...
New Research from Ventana Research Identifies Importance of Analytics for Small and Midsized Businesses
2011-06-28
To maintain and improve their market competitiveness, small and midsized businesses are turning to focused analytics that help them manage today's vastly greater information flows, operate more efficiently and make better decisions, new benchmark research from Ventana Research finds.
For these businesses the most important categories of metrics are financial (identified by 64% of participants), cost (62%) and operational (53%). However, the research indicates that despite viewing them as valuable and important, small and midsize businesses are maturing only slowly in ...
Baseball cheaters can't hide from the laws of physics
2011-06-28
PULLMAN, Wash.—Some baseball superstitions are accepted as cold, hard truth. But in the world of physics, the most accepted verities are subject to experimentation.
A corked bat hits the ball further? Not in Lloyd Smith's lab.
Baseballs today are livelier than in the past? See above.
Storing balls in a humidor can curb home run production? We'll grant you that one, but only because Smith has fired the balls through a cannon and measured their bounciness as they hit a bat.
Smith, an associate professor of in Washington State University's School of Mechanical and Materials ...
Cedars-Sinai surgeon shows simple cotton swab slashes
2011-06-28
LOS ANGELES (June 27, 2011) – A simple item found in almost every medicine cabinet – a cotton swab -- may be a key tool in the fight against post-surgical wound infections.
In a sentinel trial, Cedars-Sinai Medical Center surgeon Shirin Towfigh, MD, showed that painless and gentle probing of a wound with a dry cotton swab after surgery dramatically reduced infections in post-operative incision sites: only 3 percent of patients who had the daily probings contracted infections compared to 19 percent of those who didn't -- a rate more than six times higher than that of ...
Vinia & Walter Casuga Start Internet Home Based Business & Join Carbon Copy Pro
2011-06-28
Exciting news announced today that Vinia & Walter Casuga, established home based business owners & entrepreneurs, launched their Internet Home Based Business & partnered with Carbon Copy PRO, the world's top Internet marketing educational system & online community.
When asked why they joined Carbon Copy PRO, they replied, "Having previously come from a traditional network marketing company, we were looking for something that enabled us to truly work from home without having to build a list of friends, family, & co-workers. Also, having three ...
Ladybirds -- wolves in sheep's clothing
2011-06-28
CSIRO research has revealed that the tremendous diversity of ladybird beetle species is linked to their ability to produce larvae which, with impunity, poach members of 'herds' of tiny, soft-bodied scale insects from under the noses of the aggressive ants that tend them.Reconstructing the evolutionary history of ladybird beetles (family Coccinellidae), the researchers found that the ladybirds' first major evolutionary shift was from feeding on hard-bodied ("armoured") scale insects to soft-bodied scale insects.
"Soft-bodied scales are easier to eat, but present a whole ...
Metal particle generates new hope for H2 energy
2011-06-28
Tiny metallic particles produced by University of Adelaide chemistry researchers are bringing new hope for the production of cheap, efficient and clean hydrogen energy.
Led by Associate Professor Greg Metha, Head of Chemistry, the researchers are exploring how the metal nanoparticles act as highly efficient catalysts in using solar radiation to split water into hydrogen and oxygen.
"Efficient and direct production of hydrogen from solar radiation provides a renewable energy source that is the pinnacle of clean energy," said Associate Professor Greg Metha. "We believe ...