Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

President's Plan To Crack Down On Hacking Could Hurt Good Hackers
Newest First  |  Oldest First  |  Threaded View
User Rank: Apprentice
1/23/2015 | 8:09:02 AM
Re: Proponent
Thanks for the voice of agreement.  I think that a small group of people who embrace the concept of leveraging the state legislative process could rather handily create this model.  Practicioners, rather than Security product vendors ought to be pushing the agenda.  Vendors are likely to see everything through the lense of their solution, whether they want to or not.  Legislators who are not trained in security should not be expected to understand the obvious implications of criminalizing the tools.  They don't see it is rather like criminalizing the posession of bricks because it is easy to use a brick to break into a car or building.  Some of the brilliant security researchers I know, are leery of the idea, because

1.) They don't want to take on the job of lobbying and organizing (even if it supports their own interests).  They are busy doing the fun job of security research.

2.) Because they are anti-establishment, they have decided that there is no solution for dim-witted legislators mucking up the water.

I think of this as one of the ultimate social engineering experiments, and a way to hack the parameters of reality as it is currently imagined. 

User Rank: Ninja
1/22/2015 | 2:09:10 PM
a ticket to ride
Think of it as you would a cissp or other such certification.  Plenty of professionals are willing to test for the certifications needed to land jobs.  I would be happy to have a White Hat/ Ethical hacking license.
Ericka Chickowski
Ericka Chickowski,
User Rank: Moderator
1/22/2015 | 2:03:01 PM
Re: Proponent
I really wonder how well that would fit within the security research community, given its culture? There are a lot of brilliant, ethical and very anti-establishment researchers who would be turned off by the whole process. I'm not sure that kind of mandatory licensing would fly. 
Marilyn Cohodas
Marilyn Cohodas,
User Rank: Strategist
1/22/2015 | 11:12:47 AM
What would work as a national cybersecurity policy?
Certainly not all of the recommendations are bad? Who can object to a 30-day breach disclosure law? 
User Rank: Ninja
1/22/2015 | 10:58:04 AM
Re: Proponent
That is an awesome concept!  We should have a license structure like you mention that offers us the ability to do the work we need to do, using the tools that can be used for both good and bad.  Like a locksmith.  Your analogy is spot on!

The concepts in the speech are not yet written into any kind of proposed law change so I can't really comment on how badly the politicians will muck it up.

It is very dangerous for us to trust this group of representatives to deliver comprehensive sensible legislation that does not give groups the right to go overboard on enforcement, or use it to further reduce the privacy of American citizens.


Ericka Chickowski
Ericka Chickowski,
User Rank: Moderator
1/22/2015 | 10:54:14 AM
Re: Classic failures
GonzSTL: You aren't the only one worked up on this, believe me. J.J. and Jeremaiah are just a subset of lots of security people who feel this is, put politely, misguided policy. But I think there are other choice words going around about it, too. 
User Rank: Apprentice
1/22/2015 | 10:36:31 AM
Re: Proponent
Very true.  We have to look at who benefits from such a law.  There is a law in Germany, I am told, that prohibits a very broadly defined category of "hacking tools."  This has not made anybody any safer.  It will definitely make it harder to do routine security testing.  If the client doesn't like your results, will they get you arrested for felony "Accessing authorized resources in an unauthorized way?" 

People are the answer.  Well-trained security staff, as well as training the rank and file workers to recognize odd behavior and report it.  Actual response-team policy might be a good idea, too. 

In the field of locksmithing, there are states like California that control the tools of the trade, making state licensure a cost of doing business for locksmiths.  IT Security Specialists could start pushing for licenture rules, as well.  The costs need not be high, but the license would be a defense against facing felony arrest because you are doing your job. 
User Rank: Ninja
1/22/2015 | 10:21:27 AM
Behind most detriments to an idea there is a postulated proponent. What does the government believe that instantiating this new verbiage and changing certain cyber security laws/rules will accomplish? Is there a report advocating the changes?
User Rank: Ninja
1/22/2015 | 10:16:57 AM
Classic failures
This is a classic case of politicians operating in a vacuum!

Meanwhile, another change to existing law around "computer and cell phone spying devices" makes it unlawful to manufacture, distribute, possess or advertise "electronic communication intercepting devices." Really? Simply reading those words tell me that my packet sniffer will now be illegal to simply possess. In fact, a broader interpretation could be that your wireless NIC will be illegal because in its attempt to determine if a wireless access point is in service, it "intercepts" a broadcast electronic communication.

"Thompson says it is clear that the proposed law changes were made without much input from the security industry". I realize that an overhaul of existing cybersecurity laws is certainly in order, but it should not be done without consultation with experts in that field. To be more precise, those "experts" should not simply be lawyers, aides, and advisors, but should also include people who actually work, live, and breathe IT security.

"Additionally, allocating dollars toward professional cybersecurity education as a vocation would give us the talent needed to execute these goals. Policies that protect real cybersecurity research and promote education would dramatically improve our defenses against cyberattacks." Providing scholarships to students who want to pursue an education in IT security is an initiative that I would wholeheartedly agree with and support as a wise use of my tax dollars.

I think the IT security community should be more vocal on this issue, and not just addressing the IT security community, but targeting the message to the politicians. In the attempt to strengthen IT infrastructures through legislation, that same legislation must not hinder our ability to properly assess the security posture of the infrastructure we wish to protect.

Maybe its too early in the morning and I haven't had my proper dose of coffee yet, but reading this article just got me a little worked up.

I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
Improving Enterprise Cybersecurity With XDR
Enterprises are looking at eXtended Detection and Response technologies to improve their abilities to detect, and respond to, threats. While endpoint detection and response is not new to enterprise security, organizations have to improve network visibility, expand data collection and expand threat hunting capabilites if they want their XDR deployments to succeed. This issue of Tech Insights also includes: a market overview for XDR from Omdia, questions to ask before deploying XDR, and an XDR primer.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2022-07-04
An issue was discovered in the Linux kernel through 5.18.9. A type confusion bug in nft_set_elem_init (leading to a buffer overflow) could be used by a local attacker to escalate privileges, a different vulnerability than CVE-2022-32250. (The attacker can obtain root access, but must start with an u...
PUBLISHED: 2022-07-04
Zoho ManageEngine ADSelfService Plus before 6203 allows a denial of service (application restart) via a crafted payload to the Mobile App Deployment API.
PUBLISHED: 2022-07-04
NVIDIA DGX A100 contains a vulnerability in SBIOS in the SmmCore, where a user with high privileges can chain another vulnerability to this vulnerability, causing an integer overflow, possibly leading to code execution, escalation of privileges, denial of service, compromised integrity, and informat...
PUBLISHED: 2022-07-04
NVIDIA DGX A100 contains a vulnerability in SBIOS in the SmbiosPei, which may allow a highly privileged local attacker to cause an out-of-bounds write, which may lead to code execution, denial of service, compromised integrity, and information disclosure.
PUBLISHED: 2022-07-04
NVIDIA DGX A100 contains a vulnerability in SBIOS in the IpSecDxe, where a user with elevated privileges and a preconditioned heap can exploit an out-of-bounds write vulnerability, which may lead to code execution, denial of service, data integrity impact, and information disclosure.