The '10 Commandments' of modern cyber security

Nonprofit CISO shares policy recommendations at 2014 Black Hat conference


Aug. 08--At the Black Hat USA 2014 conference at Las Vegas' Mandalay Bay Resort and Casino, security is the main event. And in that vein, Dan Geer, the chief information security officer of nonprofit investment firm In-Q-Tel, shared 10 cybersecurity policy recommendations during his keynote speech on Wednesday, Aug. 6.

Geer, the conference's first and only keynote speaker, framed his recommendations within the context of today's confusing, precarious cybersecurity landscape amid diminishing personal privacy and increased government spying and surveillance.

He read an hour-long essay to thousands in attendance, addressing a crowd who represented, in his opinion, an industry that's becoming more and more prominent in public policy because of software's ubiquitous presence in every facet of modern life. The security of the technology that supports society is something no one can ignore, but cyberthreats are so constant and pervasive that accomplishing total privacy and security seems futile

Geer opened his talk by reading aloud the abstract for his speech, which summed up the importance of cybersecurity policy, even as strong cybersecurity itself seems almost impossible to achieve.

"Power exists to be used. Some wish for cyber safety, which they will not get. Others wish for cyber order, which they will not get," Geer said. "Some have the eye to discern cyber policies that are, 'The least worst thing.' May they fill the vacuum of wishful thinking."

Geer's cybersecurity advice was comprehensive and called for more accountability -- and less legal leeway -- for software vendors and their technology's source code.

Geer said that the following 10 policy proposals were his and his alone, based on his experience in the industry. He also gave a verbal disclaimer that listeners were free to disagree and attempt to prove him wrong on these ideas, in the interest of greater legal and personal agency in the never-ending cybersecurity effort.

1. Create a mandatory reporting system for severe breaches, similar to how the United States Centers for Disease Control and Prevention has a mandatory reporting system for medical diseases. If the breaches are less severe, then reporting should be voluntary.

2. Offer Internet service providers one of two net neutrality options. Providers can charge customers for service, but that also makes the providers responsible for the harmful content within that service. Providers can alternatively choose a "common carrier" option that frees them from liability for damaging content, but they're unable to inspect or act on the contents of what they carry.

3. Make software developers legally liable for their source code. Under the regulation procedures, developers should give buyers the ability to disable pieces of code they don't want to use, and the developers are held liable for any damage their software causes under normal usage.

4. Strike back at attackers when necessary with cyber counter attacks or targeting campaigns to truly identify the attackers. The ability to do this, however, will require entities to share infrastructure and resources because not every organization has the power of Microsoft or the federal government.

5. If people have no way to remotely shut down computer systems when necessary because those systems are too deeply embedded, then those embedded systems should be designed with the ability to self-terminate after a fixed amount of time has passed, and computer systems that can be remotely controlled should be designed with the ability to refuse certain remote commands for security purposes.

6. The government should pay people competitively for finding vulnerability exploits, and then make those exploits public.

7. Uphold people's right to be forgotten and operate autonomously, even as a connected society makes this increasingly more difficult, and give people the ability to misrepresent themselves online under certain circumstances to confound those who would "watch" them digitally.

This content continues onto the next page...