11:11 AM

Strike Back If China Steals IP, Companies Told

Bipartisan report argues that businesses should be allowed to retrieve stolen intellectual property from attackers' networks.

The Syrian Electronic Army: 9 Things We Know
(click image for larger view)
The Syrian Electronic Army: 9 Things We Know
When online attackers operating from China or other countries steal corporate secrets, let businesses strike back and retrieve stolen information from attackers' networks.

That gloves-off approach is just one of many recommendations for combating industrial espionage outlined in a new report from the Commission on the Theft of American Intellectual Property, which is headed by the former director of national intelligence, Dennis Blair, as well as Jon Huntsman, who's served as the governor of Utah as well as U.S. ambassador to China.

"China is two-thirds of the intellectual property theft problem, and we are at a point where it is robbing us of innovation to bolster their own industry, at a cost of millions of jobs," Huntsman told The New York Times. "We need some realistic policy options that create a real cost for this activity because the Chinese leadership is sensitive to those costs."

[ For another viewpoint, read Don't Blame China For Security Hacks, Blame Yourself. ]

The report offers 21 specific recommendations, including increasing the budget of the FBI and Department of Justice to investigate trade theft and amending U.S. counter-espionage laws to allow businesses that suffer intellectual property (IP) theft to sue foreign organizations for damages. It also advocates longer-term measures, such as rating countries on their ability to protect IP, as well as ensuring that U.S. officials "push to move China, in particular, beyond a policy of indigenous innovation toward becoming a self-innovating economy."

Indigenous innovation refers to the Chinese government's current policy of investing billions of dollars for research and development in Chinese technology businesses. But according to the Organization for Economic Cooperation and Development, too much of that money goes into development and not enough into research, creating an environment in which homegrown innovation fails to flourish, in part because of piracy.

The IP Commission's report echoes that assessment, noting that "with rare penalties for offenders and large profits to be gained, Chinese businesses thrive on stolen technology." According to estimates cited in the report, China accounts for between 50% and 80% -- depending on the industry -- of the world's IP theft.

"I've often told victims the quote by David Etue, that one only need worry about the enemy who understands that they can spend $1 billion to compete with you or $10 million to steal what you developed," said Nick Selby, CEO of StreetCred Software, on the Police-Led Intelligence blog. "This report bears that concept out."

But the report also urges U.S. businesses to take the information security threat more seriously, saying that too many organizations fail to master vulnerability management practices or layered defenses.

As noted, the commission's report calls for businesses to be allowed to recover stolen IP from attackers' networks -- "without damaging the intruder's own network" -- and to prevent stolen information from being used, through legal means. The report also calls on Congress to pass laws allowing businesses to pursue "a range of more aggressive measures that identify and penalize illegal intruders into proprietary networks," provided those measures avoid collateral damage.

"Only when the danger of hacking into a company's network and exfiltrating trade secrets exceeds the rewards will such theft be reduced from a threat to a nuisance," said the report.

The report comes as many businesses are seeking terms of engagement for responding to online attacks. Currently, businesses have some latitude in how they respond, such as being able to conduct reconnaissance of suspected malicious infrastructure or socially engineering attackers -- corporate counsel permitting. But questions remain. For example, can -- or should -- businesses be allowed to hire the equivalent of cyber-Pinkertons to take the fight to online attackers?

Not everyone agrees with the IP Commission's strike-back recommendations. "This is a remarkably bad idea that would harm the national interest," said James A. Lewis, senior fellow and director of the Technology and Public Policy Program at the Center for Strategic and International Studies (CSIS), in an essay titled "Private Retaliation in Cyberspace."

"Our goal is to make cyberspace more stable and secure, not less. Endorsing retaliation works against that goal in many ways, all damaging," he said.

Furthermore, state-sanctioned retaliation could backfire. "The United States is also a leading proponent of the Budapest Convention on Cybercrime, to which we and many other countries are signatories," Lewis said. "Under this convention, private retaliation would be a crime. The victim could reasonably ask the United States to assist in an investigation and extradite those found guilty. They could then bring suit against the perpetrators in U.S. courts."

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
User Rank: Apprentice
5/31/2013 | 7:57:33 PM
re: Strike Back If China Steals IP, Companies Told
I haven't looked at the report, but you've obviously pulled out an interesting piece of information regarding the 'strike-back' recommendation. I have to agree with Mr. Lewis - I just don't see how this wouldn't turn into the Wild West (and not in a good way).
Register for Dark Reading Newsletters
White Papers
Current Issue
Dark Reading Tech Digest September 7, 2015
Some security flaws go beyond simple app vulnerabilities. Have you checked for these?
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2015-10-09
The Telephony component in Apple OS X before 10.11, when the Continuity feature is enabled, allows local users to bypass intended telephone-call restrictions via unspecified vectors.

Published: 2015-10-09
The Safari Extensions implementation in Apple Safari before 9 does not require user confirmation before replacing an installed extension, which has unspecified impact and attack vectors.

Published: 2015-10-09
The API in the WebKit Plug-ins component in Apple Safari before 9 does not provide notification of an HTTP Redirection (aka 3xx) status code to a plugin, which allows remote attackers to bypass intended request restrictions via a crafted web site.

Published: 2015-10-09
The Intel Graphics Driver component in Apple OS X before 10.11 allows local users to gain privileges or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-5877.

Published: 2015-10-09
The Login Window component in Apple OS X before 10.11 does not ensure that the screen is locked at the intended time, which allows physically proximate attackers to obtain access by visiting an unattended workstation.

Dark Reading Radio
Archived Dark Reading Radio
What can the information security industry do to solve the IoT security problem? Learn more and join the conversation on the next episode of Dark Reading Radio.