The legalities of hacking back

David Strom
David Stromfreelance IT writer and speaker, editorial and business consultant at David Strom Inc.
Hacking back:
What are the legalities and
implications?
David Strom
SecureWorld STL 9/18
david@strom.com
Agenda
• What is the current legal situation?
• Hacking back tech and legal history: Google, Lockheed
• Two major issues: attribution and intent
• Possible countermeasures
• Final thoughts
Who I am
The legalities of  hacking back
The legalities of  hacking back
The legalities of  hacking back
The legalities of  hacking back
The legalities of  hacking back
The legalities of  hacking back
The legalities of  hacking back
The legalities of  hacking back
The legalities of  hacking back
1. Proof of attribution
2. Proof of intent
Wait a moment!
Attribution problems
• Having as short an elapsed time from the
actual event is essential
• Lots of finger pointing
• Cat-and-mouse game
The legalities of  hacking back
The legalities of  hacking back
What potential countermeasures
could be used?
• Poison pills
• DDoS
• Real time attack disruption
• Remote access of hacker’s network and computers
• Create a “red team”
The legalities of  hacking back
The legalities of  hacking back
The legalities of  hacking back
The legalities of  hacking back
Private/public cooperation at
catching hackers
Final thoughts
You can find this presentation here:
http://slideshare.net/davidstrom
And reach me:
@dstrom on Twitter
david@strom.com
http://strominator.com
1 of 23

Recommended

Phishing: It’s Not Just for Pentesters Using Phishing to Build a Successful ... by
Phishing: It’s Not Just for Pentesters  Using Phishing to Build a Successful ...Phishing: It’s Not Just for Pentesters  Using Phishing to Build a Successful ...
Phishing: It’s Not Just for Pentesters Using Phishing to Build a Successful ...EC-Council
547 views36 slides
Global CISO Forum 2017: Privacy Partnership by
Global CISO Forum 2017: Privacy PartnershipGlobal CISO Forum 2017: Privacy Partnership
Global CISO Forum 2017: Privacy PartnershipEC-Council
137 views16 slides
ethics final project by
ethics final projectethics final project
ethics final projectVictoriya Poplavskaya
949 views20 slides
hackers by
hackershackers
hackersAya Eltayed
762 views47 slides
Ethical Hacking.pdf by
Ethical Hacking.pdfEthical Hacking.pdf
Ethical Hacking.pdfAhmadWali24
33 views15 slides
Have the Bad Guys Won the Cyber security War... by
Have the Bad Guys Won the Cyber security War...Have the Bad Guys Won the Cyber security War...
Have the Bad Guys Won the Cyber security War...Andrew Hammond
842 views35 slides

More Related Content

Similar to The legalities of hacking back

44CON 2013 - Surviving the 0-day - Reducing the Window of Exposure - Andreas ... by
44CON 2013 - Surviving the 0-day - Reducing the Window of Exposure - Andreas ...44CON 2013 - Surviving the 0-day - Reducing the Window of Exposure - Andreas ...
44CON 2013 - Surviving the 0-day - Reducing the Window of Exposure - Andreas ...44CON
682 views35 slides
Capture the Flag Exercise Using Active Deception Defense by
Capture the Flag Exercise Using Active Deception DefenseCapture the Flag Exercise Using Active Deception Defense
Capture the Flag Exercise Using Active Deception DefenseFidelis Cybersecurity
783 views29 slides
Hacking Presentation by
Hacking PresentationHacking Presentation
Hacking PresentationLaura Platt
1.2K views12 slides
Cybersecurity fundamental by
Cybersecurity fundamentalCybersecurity fundamental
Cybersecurity fundamentalSudipto Krishna Dutta
150 views30 slides
Cybersecurity Strategies - time for the next generation by
Cybersecurity Strategies - time for the next generationCybersecurity Strategies - time for the next generation
Cybersecurity Strategies - time for the next generationHinne Hettema
961 views65 slides
What is a Hacker (part 1): Types, tools and techniques by
What is a Hacker (part 1): Types, tools and techniquesWhat is a Hacker (part 1): Types, tools and techniques
What is a Hacker (part 1): Types, tools and techniquesKlaus Drosch
33 views5 slides

Similar to The legalities of hacking back(20)

44CON 2013 - Surviving the 0-day - Reducing the Window of Exposure - Andreas ... by 44CON
44CON 2013 - Surviving the 0-day - Reducing the Window of Exposure - Andreas ...44CON 2013 - Surviving the 0-day - Reducing the Window of Exposure - Andreas ...
44CON 2013 - Surviving the 0-day - Reducing the Window of Exposure - Andreas ...
44CON682 views
Capture the Flag Exercise Using Active Deception Defense by Fidelis Cybersecurity
Capture the Flag Exercise Using Active Deception DefenseCapture the Flag Exercise Using Active Deception Defense
Capture the Flag Exercise Using Active Deception Defense
Hacking Presentation by Laura Platt
Hacking PresentationHacking Presentation
Hacking Presentation
Laura Platt1.2K views
Cybersecurity Strategies - time for the next generation by Hinne Hettema
Cybersecurity Strategies - time for the next generationCybersecurity Strategies - time for the next generation
Cybersecurity Strategies - time for the next generation
Hinne Hettema961 views
What is a Hacker (part 1): Types, tools and techniques by Klaus Drosch
What is a Hacker (part 1): Types, tools and techniquesWhat is a Hacker (part 1): Types, tools and techniques
What is a Hacker (part 1): Types, tools and techniques
Klaus Drosch33 views
The death of enterprise security as we know it - Pukhraj Singh - RootConf 2018 by Pukhraj Singh
The death of enterprise security as we know it - Pukhraj Singh - RootConf 2018The death of enterprise security as we know it - Pukhraj Singh - RootConf 2018
The death of enterprise security as we know it - Pukhraj Singh - RootConf 2018
Pukhraj Singh1.2K views
Hunting: Defense Against The Dark Arts - BSides Philadelphia - 2016 by Danny Akacki
Hunting: Defense Against The Dark Arts - BSides Philadelphia - 2016Hunting: Defense Against The Dark Arts - BSides Philadelphia - 2016
Hunting: Defense Against The Dark Arts - BSides Philadelphia - 2016
Danny Akacki981 views
Cybercrime And Internet Hacking And Its Effect On The... by Amanda Barber
Cybercrime And Internet Hacking And Its Effect On The...Cybercrime And Internet Hacking And Its Effect On The...
Cybercrime And Internet Hacking And Its Effect On The...
Amanda Barber2 views
Cybersecurity: Do Your Have a Plan to Address Threats and Prevent Liability? by Codero
Cybersecurity: Do Your Have a Plan to Address Threats and Prevent Liability?Cybersecurity: Do Your Have a Plan to Address Threats and Prevent Liability?
Cybersecurity: Do Your Have a Plan to Address Threats and Prevent Liability?
Codero261 views
Mac129 med102 hackers lecture by Rob Jewitt
Mac129 med102 hackers lectureMac129 med102 hackers lecture
Mac129 med102 hackers lecture
Rob Jewitt411 views
Brown Bag: DMCA §1201 and Video Game Preservation Institutions: A Case Study ... by Micah Altman
Brown Bag: DMCA §1201 and Video Game Preservation Institutions: A Case Study ...Brown Bag: DMCA §1201 and Video Game Preservation Institutions: A Case Study ...
Brown Bag: DMCA §1201 and Video Game Preservation Institutions: A Case Study ...
Micah Altman2K views

More from David Strom

Spark Twitter fails Mar2023 by
Spark Twitter fails Mar2023Spark Twitter fails Mar2023
Spark Twitter fails Mar2023David Strom
7 views38 slides
Getting Your First Cybersecurity Job by
Getting Your First Cybersecurity JobGetting Your First Cybersecurity Job
Getting Your First Cybersecurity JobDavid Strom
279 views12 slides
Understanding passwordless technologies by
Understanding passwordless technologiesUnderstanding passwordless technologies
Understanding passwordless technologiesDavid Strom
562 views34 slides
What endpoint protection solutions are available on the market today? by
What endpoint protection solutions are available on the market today?What endpoint protection solutions are available on the market today?
What endpoint protection solutions are available on the market today?David Strom
125 views38 slides
Fears and fulfillment with IT security by
Fears and fulfillment with IT securityFears and fulfillment with IT security
Fears and fulfillment with IT securityDavid Strom
232 views33 slides
Protecting your digital and online privacy by
Protecting your digital and online privacyProtecting your digital and online privacy
Protecting your digital and online privacyDavid Strom
288 views41 slides

More from David Strom(20)

Spark Twitter fails Mar2023 by David Strom
Spark Twitter fails Mar2023Spark Twitter fails Mar2023
Spark Twitter fails Mar2023
David Strom7 views
Getting Your First Cybersecurity Job by David Strom
Getting Your First Cybersecurity JobGetting Your First Cybersecurity Job
Getting Your First Cybersecurity Job
David Strom279 views
Understanding passwordless technologies by David Strom
Understanding passwordless technologiesUnderstanding passwordless technologies
Understanding passwordless technologies
David Strom562 views
What endpoint protection solutions are available on the market today? by David Strom
What endpoint protection solutions are available on the market today?What endpoint protection solutions are available on the market today?
What endpoint protection solutions are available on the market today?
David Strom125 views
Fears and fulfillment with IT security by David Strom
Fears and fulfillment with IT securityFears and fulfillment with IT security
Fears and fulfillment with IT security
David Strom232 views
Protecting your digital and online privacy by David Strom
Protecting your digital and online privacyProtecting your digital and online privacy
Protecting your digital and online privacy
David Strom288 views
AI and cyber security: new directions, old fears by David Strom
AI and cyber security: new directions, old fearsAI and cyber security: new directions, old fears
AI and cyber security: new directions, old fears
David Strom813 views
How to market your book in today's social media world by David Strom
How to market your book in today's social media worldHow to market your book in today's social media world
How to market your book in today's social media world
David Strom228 views
​Understanding the Internet of Things by David Strom
​Understanding the Internet of Things​Understanding the Internet of Things
​Understanding the Internet of Things
David Strom292 views
How to make your mobile phone safe from hackers by David Strom
How to make your mobile phone safe from hackersHow to make your mobile phone safe from hackers
How to make your mobile phone safe from hackers
David Strom851 views
Implications and response to large security breaches by David Strom
Implications and response to large security breaches Implications and response to large security breaches
Implications and response to large security breaches
David Strom650 views
Using social networks to find your next job (2017) by David Strom
Using social networks to find your next job (2017)Using social networks to find your next job (2017)
Using social networks to find your next job (2017)
David Strom207 views
Security v. Privacy: the great debate by David Strom
Security v. Privacy: the great debateSecurity v. Privacy: the great debate
Security v. Privacy: the great debate
David Strom1.9K views
Using OpenStack to Control VM Chaos by David Strom
Using OpenStack to Control VM ChaosUsing OpenStack to Control VM Chaos
Using OpenStack to Control VM Chaos
David Strom521 views
Notable Twitter fails by David Strom
Notable Twitter failsNotable Twitter fails
Notable Twitter fails
David Strom625 views
How to make the move towards hybrid cloud computing by David Strom
How to make the move towards hybrid cloud computingHow to make the move towards hybrid cloud computing
How to make the move towards hybrid cloud computing
David Strom956 views
Listen to Your Customers: How IT Can Provide Better Support by David Strom
Listen to Your Customers: How IT Can Provide Better SupportListen to Your Customers: How IT Can Provide Better Support
Listen to Your Customers: How IT Can Provide Better Support
David Strom653 views
Network security practice: then and now by David Strom
Network security practice: then and nowNetwork security practice: then and now
Network security practice: then and now
David Strom292 views
Biggest startup mistakes by David Strom
Biggest startup mistakesBiggest startup mistakes
Biggest startup mistakes
David Strom244 views
Picking the right Single Sign On Tool to protect your network by David Strom
Picking the right Single Sign On Tool to protect your networkPicking the right Single Sign On Tool to protect your network
Picking the right Single Sign On Tool to protect your network
David Strom955 views

Recently uploaded

Evolving the Network Automation Journey from Python to Platforms by
Evolving the Network Automation Journey from Python to PlatformsEvolving the Network Automation Journey from Python to Platforms
Evolving the Network Automation Journey from Python to PlatformsNetwork Automation Forum
13 views21 slides
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N... by
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...James Anderson
85 views32 slides
Future of Indian ConsumerTech by
Future of Indian ConsumerTechFuture of Indian ConsumerTech
Future of Indian ConsumerTechKapil Khandelwal (KK)
21 views68 slides
The Research Portal of Catalonia: Growing more (information) & more (services) by
The Research Portal of Catalonia: Growing more (information) & more (services)The Research Portal of Catalonia: Growing more (information) & more (services)
The Research Portal of Catalonia: Growing more (information) & more (services)CSUC - Consorci de Serveis Universitaris de Catalunya
80 views25 slides
SAP Automation Using Bar Code and FIORI.pdf by
SAP Automation Using Bar Code and FIORI.pdfSAP Automation Using Bar Code and FIORI.pdf
SAP Automation Using Bar Code and FIORI.pdfVirendra Rai, PMP
23 views38 slides
Business Analyst Series 2023 - Week 3 Session 5 by
Business Analyst Series 2023 -  Week 3 Session 5Business Analyst Series 2023 -  Week 3 Session 5
Business Analyst Series 2023 - Week 3 Session 5DianaGray10
248 views20 slides

Recently uploaded(20)

GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N... by James Anderson
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
James Anderson85 views
SAP Automation Using Bar Code and FIORI.pdf by Virendra Rai, PMP
SAP Automation Using Bar Code and FIORI.pdfSAP Automation Using Bar Code and FIORI.pdf
SAP Automation Using Bar Code and FIORI.pdf
Business Analyst Series 2023 - Week 3 Session 5 by DianaGray10
Business Analyst Series 2023 -  Week 3 Session 5Business Analyst Series 2023 -  Week 3 Session 5
Business Analyst Series 2023 - Week 3 Session 5
DianaGray10248 views
AMAZON PRODUCT RESEARCH.pdf by JerikkLaureta
AMAZON PRODUCT RESEARCH.pdfAMAZON PRODUCT RESEARCH.pdf
AMAZON PRODUCT RESEARCH.pdf
JerikkLaureta26 views
PharoJS - Zürich Smalltalk Group Meetup November 2023 by Noury Bouraqadi
PharoJS - Zürich Smalltalk Group Meetup November 2023PharoJS - Zürich Smalltalk Group Meetup November 2023
PharoJS - Zürich Smalltalk Group Meetup November 2023
Noury Bouraqadi127 views
Case Study Copenhagen Energy and Business Central.pdf by Aitana
Case Study Copenhagen Energy and Business Central.pdfCase Study Copenhagen Energy and Business Central.pdf
Case Study Copenhagen Energy and Business Central.pdf
Aitana16 views
Serverless computing with Google Cloud (2023-24) by wesley chun
Serverless computing with Google Cloud (2023-24)Serverless computing with Google Cloud (2023-24)
Serverless computing with Google Cloud (2023-24)
wesley chun11 views
STPI OctaNE CoE Brochure.pdf by madhurjyapb
STPI OctaNE CoE Brochure.pdfSTPI OctaNE CoE Brochure.pdf
STPI OctaNE CoE Brochure.pdf
madhurjyapb14 views
handbook for web 3 adoption.pdf by Liveplex
handbook for web 3 adoption.pdfhandbook for web 3 adoption.pdf
handbook for web 3 adoption.pdf
Liveplex22 views

The legalities of hacking back

Editor's Notes

  1. Let’s talk about a growing trend in information security, being able to hack back or use various direct measures to attack your attackers. There are several issues: attributing an attack to the right source, understanding the attacker's intent, and developing the right red team skills. In this talk, I will talk about the ways that an enterprise can defend itself, and how to go about this process.
  2. Let’s start off with this fact: currently, a private company has no legal right to defend themselves against a cyberattack. Nada. But there are several laws on the books and new ones that are being proposed.
  3. Last month, two Democratic Senators introduced this bill, which will impose mostly financial sanctions on foreign attackers.
  4. is Georgia Senate Bill 315, which was vetoed earlier this summer by Governor Nathan Deal. The bill would have created a new crime of unauthorized access to a network, but didn’t include any definition of criminal intent. If enacted without any changes, it could have meant that security researchers would be liable for prosecution, just for entering a client’s network
  5. Canada is also considering allowing hacking back in its Communications and Security Establishment under Bill C-59. That bill is still working its way through Parliament. If passed, it would give this group the ability to conduct hacking back activities.
  6. The practice of hacking back isn’t new: the 1983 movie War Games inspired the Computer Fraud and Abuse Act of 1986, which prohibits anyone from knowingly accessing a computer without proper authorization.
  7. Rep. Tom Graves introduced last year the Active Cyber Defense Certainty Act (ACDC) (H.R. 4036) that modifies the older laws
  8. This reporter for Slate called it a highway to hell, and a bill that almost no one wants. It hasn’t gone anywhere in Congress since its introduction.
  9. Google made questionably legal use of discovery technologies back in 2009 to find the command and control servers in Taiwan which were running the Operation Aurora attacks, as documented in this report from George Washington University researchers published last year.
  10. And a security researcher was fired from his job after doing some hacking back to investigate a 2003 Lockheed Martin breach in Orlando, documented in a recent New Yorker article. The researcher took Lockheed to court and sued for damages, and won the suit.
  11. These are two major issues with hacking back. With Google and Operation Aurora, they could prove who did it, thanks to their own telemetry on their networks. They used questionable techniques that could have compromised privacy, but they do that more and more anyway.
  12. Attribution is a very elusive target to achieve so your error ratio can be quite high,” says Dudu Mimran, chief technology officer at Telekom Innovation Laboratories in Israel. Timeliness matters, he says, especially if you can analyze an attack in progress and connect the dots. The more time that lapses after an attack, the harder the attribution process becomes.
  13. Attribution is also very much a cat-and-mouse game, as attackers get more adept at hiding their origins or deliberately mislead researchers by including someone else’s code to throw them off the trail. Many hackers also employ obfuscation technologies so their malware can persist longer in corporate networks to do more damage.
  14. Second is understanding the intent of the attacker and the defender. For attackers, their intent could range from deliberate criminal action to a mistake in network configuration, so obviously it is important to determine this before any hacking back activity is permitted. And there is a similar assessment of intent for defenders too: are they trying to get their data back, monitor what the attacker is doing, cause harm to their attacker, or destroy illegal use of proprietary technology?
  15. Some proposed laws are considering the use of cyber poison pills as one of the countermeasures.
  16. If you are thinking about having a so-called Red Team, composed of security staff that are used for offensive measures, they don’t necessarily have to be hacking back -- they can be penetration testers that are trying to leverage their way in and identify weak points of leverage. You can either hire your own staff, find a MSSP to provide this service, or make use of various open source and paid tools to help.
  17. Here are four products that I tested that leverage the MITRE ATT&CK platform -- all operate somewhat differently, all are free. ATT&CK can look at the actual malware components and lay them out in detail. Most modern malware uses a combination of techniques to hide its operation, stage its exploits, evade detection, and leverage network weaknesses. How you find these various building blocks is a key defensive strategy.
  18. This is Caldera, one of the common open source tools. I wrote about this for CSOonline earlier this summer.
  19. Another way is for government to cooperate with private industry, as what happened when it came time to try to stem the tide of Somali pirates. The government eventually accepted the use of private security services by the commercial shippers, and having both work with insurers help to provide a solution to stop the numerous raids of ocean cargo in that part of the world. This public-private cooperation has the side benefit of being able to help improve attribution, according to another report published last year by the Carnegie Endowment.
  20. We still have a lot of work to do before hacking back is both a legal and an acceptable response to a data breach or cyberattack. But as technologies get better at figuring out attribution and in proving the intent of both parties, it could become a regular weapon for IT and security managers to use.