In the aftermath of the Target breach announced last month, there has been understandable anxiety on the part of consumers and understandable concern by lawmakers about how to respond to large-scale breaches of this type.
Because it’s not enough to improve our ability to clean up the mess after a breach occurs—we also need to focus on doing more at the front end to identify and punish hackers and to stop stolen data from ever being used.
So why isn’t this happening right now?
Because the Justice Department’s view is that the Computer Fraud and Abuse Act (CFAA)— the statute used to prosecute hackers—technically could be violated if a company were to take the kind of steps I just described. DOJ also believes that allowing these kinds of measures by victim companies—sometimes called “active defense” but often derisively referred to as “hacking back”— is bad policy, because companies could end up damaging computers owned by innocent third parties that have been taken over by the hackers and used to facilitate their crimes. I used to share that view when I was at DOJ, but my views have changed considerably— I guess you could say this is preaching by the converted.
But even if DOJ’s budget for cybercrime were doubled tomorrow, that still would not be the solution, because law enforcement cannot investigate and prosecute its way out of this problem. Instead, we need to rely on the combined resources and capabilities of the government and the private sector.
The reality is that cybercrime is not a problem that law enforcement can solve on its own. While at DOJ, during a 2011 hearing on cybersecurity, I told a Senate Judiciary subcommittee that the scope of the cybercrime problem far outpaced the resources available to pursue it. That was certainly true back in 2011, but it is even more so today, after years of hiring freezes, the sequester and an extremely challenging budget environment.
But even if DOJ’s budget for cybercrime were doubled tomorrow, that still would not be the solution, because law enforcement cannot investigate and prosecute its way out of this problem. Instead, we need to rely on the combined resources and capabilities of the government and the private sector. As one of my colleagues likes to say, the government has clear authority to go after hackers but not enough resources, while the private sector has the resources but lacks clear authority.
So how can Congress help address this problem?
There can certainly be debate among reasonable people about the precise types of active defense measures that companies should be permitted to take, and about how coordination with law enforcement should work both legally and practically, but we need to have that debate. And we need Congress, informed by that debate, to make clear that some sort of active defense is permissible, so innocent victim companies can take appropriate action without worrying that they will be treated as criminals.
Congress can resolve the issue by amending the CFAA to clarify the authority of companies to take measures to trace and recover or disable their stolen data, without fear of criminal exposure. This can be done in a reasonable, responsible way, in coordination with law enforcement.
There is no one silver bullet for the problem of data breaches and other cyber-attacks. We need strong, well-resourced law enforcement. We need good consumer protection measures. We need companies to adopt sensible cybersecurity measures. But we also need companies to be able to take reasonable actions to track down and delete or disable their stolen data—whether we’re talking about 40 million credit and debit card numbers or a company’s trade secrets or other intellectual property—before the hackers can do further harm. And we need to use the information developed along the way to help law enforcement punish those hackers and deter others.
One other aspect of the early reaction to the Target breach is noteworthy, and frankly a bit troubling. The focus on breach notification and FTC authorities, and the tenor of some of the public comments made by folks on the Hill, seem to reflect an assumption that the breach is Target’s fault. Target is being treated as if it’s guilty until proven innocent or, I should say, “negligent until proven reasonable.” That’s simply unfair.