A Call to Arms Against the Hacker Hordes

What’s happening this week at the intersection of management and technology.

Reading Time: 4 min 

Topics

Tech Savvy

Tech Savvy was a weekly column focused on new developments at the intersection of management and technology. For more weekly roundups for managers, see our Best of This Week series.
See All Articles in This Series
Already a member?
Not a member?
Sign up today
Member
Free

5 Free Articles per month, $6.95/article thereafter. Free newsletter.

Subscribe
$75/Year

Unlimited digital content, quaterly magazine, free newsletter, entire archive.

Sign me up

Attribution and retribution in the fight against cybercrime: Imagine being enthroned at the end of the long table in the C-suite. You’ve got riches beyond imagination at your disposal; tens of thousands of vassals are toiling day and night for you. Your knights surround you, awaiting your command. And, at this very moment, some evil-minded jester with a computer and an Internet connection is breaching the castle walls.

But wait, is that a war horn you hear in the distance? Yes, it’s the lawyers from Steptoe & Johnson riding to your rescue. Enough, says partner Stewart Baker and trusty clerk Victoria Muth in an article for Brink. “It’s pretty clear that building higher walls around our networks is a dead end. So is tighter scrutiny and control over what happens on the network,” they write. “Government is failing us…, too.” The solution? Fight back.

Attribution and retribution are the weapons in this counterattack. “It might mean building ‘beacons’ into documents so that when they are opened by attackers, they phone home to alert defenders that their information was compromised,” suggest Baker and Muth. “It might mean using information provided by beacons to compromise the attackers’ network and gather evidence as to the attackers’ identities. It might mean stopping a DDOS attack by taking over the botnet, or by patching the vulnerability by which the botnet conscripted third-party machines.”

And, of course, you’ll need more lawyers. “We need to bring private resources to bear on retribution as well as attribution — not by endorsing network attacks, but by encouraging retribution within the law,” the authors continue. “Luckily, once an attack has been attributed, legal remedies begin to look quite realistic.”

“In short, you don’t have to sit and take it anymore,” conclude Baker and Muth. “There are plenty of risks in trying to go beyond passive network defenses, but there may be more risk in doubling down on an approach to network defense that has been failing ever more spectacularly for 30 years.”

Oh yeah, we’re going all “Game of Thrones” on hackers.

Technologically enhanced facilities management: Can brute force build a gigafactory in Elon Musk time? The Wall Street Journal reports that Tesla is doubling the construction workforce at its $5 billion battery factory in Sparks, Nevada, in hopes of opening it two years ahead of schedule.

Read the Full Article

Topics

Tech Savvy

Tech Savvy was a weekly column focused on new developments at the intersection of management and technology. For more weekly roundups for managers, see our Best of This Week series.
See All Articles in This Series

More Like This

Add a comment

You must to post a comment.

First time here? Sign up for a free account: Comment on articles and get access to many more articles.