{"id":59,"date":"2008-07-18T10:36:06","date_gmt":"2008-07-18T15:36:06","guid":{"rendered":"http:\/\/blogs.law.harvard.edu\/publius\/2008\/07\/18\/michael-barrett-cybercrime-and-what-we-will-have-to-do-if-we-want-to-get-it-under-control\/"},"modified":"2008-11-18T16:37:07","modified_gmt":"2008-11-18T21:37:07","slug":"barrett-cybercrime","status":"publish","type":"post","link":"https:\/\/archive.blogs.harvard.edu\/publius\/2008\/07\/18\/barrett-cybercrime\/","title":{"rendered":"Cybercrime &#8211; and what we will have to do if we want to get it under control"},"content":{"rendered":"<p>Essay By <a href=\"https:\/\/www.thepaypalblog.com\/2008\/04\/a-practical-app\/\">Michael Barrett<\/a> with companion pieces by <a href=\"http:\/\/publius.cc\/2008\/06\/06\/beau-brendler-malware-the-great-equalizer\/\">Beau Brendler<\/a> and <a href=\"http:\/\/publius.cc\/2008\/06\/10\/david-clark-what-would-a-more-secure-future-look-like\/\">David Clark<\/a>.<\/p>\n<p>Continue the security conversation with <a href=\"http:\/\/publius.cc\/2008\/06\/10\/john-clippinger-on-technology-security-personhood-and-privacy\/\">John Clippinger<\/a> and <a href=\"http:\/\/publius.cc\/2008\/08\/08\/the-right-to-privacy-again\/\">Dembitz<\/a>.<\/p>\n<p>As I write this, in the spring of 2008, we have recently passed a milestone &#8211; on April 22nd, 1993, Mosaic 1.0 was released by the <a href=\"http:\/\/www.ncsa.uiuc.edu\/\">National Center for Supercomputing Applications (NCSA)<\/a> .  This was the first web browser used by the general public, making the World Wide Web more than just a tool for academics.<\/p>\n<p>How many Internet users are there today?  <a href=\"http:\/\/www.internetworldstats.com\/stats.htm\">Conservative estimates<\/a> exceed one billion people. In a decade and a half we have gone from minimal Internet usage to approximately 20% of the world\u2019s population now being online.  Moreover, the bulk of that growth has occurred since the year 2000.  <\/p>\n<p>In this essay, I will explore two themes: first, how societies adopt new technologies and second, how governance and regulation may co-evolve with new technologies.  I\u2019ll use two historical examples \u2013 the road system and airplanes \u2013 to ask what lessons they may provide for the Internet.<\/p>\n<p>In addition to being the 15th anniversary of Mosaic, 2008 is also the 100th anniversary of the introduction of the Ford Model T.  There had certainly been other motor cars available prior to 1908, but the Model T revolutionized how Americans viewed cars and dramatically increased the number of cars on the road, necessitating a new approach to regulation.  Pre-Model T regulation can be described as quirky: men walking in front of cars with red flags, 20 MPH speed limits, and so on.  However, shortly after 1908, regulation began to change rapidly.  For example, in 1918 New York introduced three color traffic lights.  A year later, the League of Nations established a committee to harmonize aspects of road system regulation, and its recommendations were accepted and implemented by a number of countries.<\/p>\n<p>New York\u2019s original traffic lights were based on the earlier signaling used on railroads, which were themselves based on maritime signaling.  In other words, there\u2019s an established history of stealing good ideas for safety equipment, and re-applying it to a new niche.  There\u2019s also a long history of mandating safety equipment via regulation.<\/p>\n<p>Aviation also teaches us useful lessons.  The Wright Flyer of 1903 had the same impact on aviation that the Model T had on automobiles.  The US Government established the <a href=\"http:\/\/history.nasa.gov\/naca\/\">National Advisory Committee for Aeronautics<\/a> in 1915 ; the Airmail Act was passed in 1925, and the Air Commerce Act was passed in 1926.  Less than 25 years after the first flight, there was an extensive regulatory infrastructure in place.  Still, contemporary debate centered around a general distrust of regulation, and a sense that the government wouldn\u2019t be able to deal effectively with new technology.  But the pressure for regulation was sufficiently strong: accidents were commonplace and the public regarded aviation as novel, fascinating and unsafe.<\/p>\n<p>The other lesson to be learned from aviation is that while each country manages its own process, there is considerable standardization.  This is at least in part due to ICAO (the <a href=\"http:\/\/www.icao.int\/\">International Civil Aviation Organization<\/a>).  ICAO was formed in 1948 under the auspices of the United Nations.   The rationale for such harmonization is obvious \u2013 if an airplane is going to fly from one continent to another, the equipment in question needs to be deemed safe in both the origin and destination; the licenses and certifications of the pilots need to be accepted universally, and so on.  Commercial aviation has implemented more standardization than many other areas of global commerce.<\/p>\n<p>In the cases of both automobiles and aviation, accidents were the primary force behind regulation.  While private industry certainly played a very significant part, it\u2019s no exaggeration that the road and air transportation networks that we take for granted would never have existed without government regulation, and could not exist without it. Can we expect the Internet to be different?<\/p>\n<p>Internet regulation over the past fifteen years has been minimal.  I\u2019d argue that there\u2019s a single reason for this: the forcing function that accidents represented for road and air transportation has not existed for the Internet.  I\u2019d further argue that e-crime will play this role.<\/p>\n<p>I have been working in Information technology for years and I can vividly remember when the first viruses were written, often by security researchers.  Security technology failures have gone through a rather predictable sequence: initial discovery by security professionals, followed by wide scale abuse by teenage vandals, and finally appropriation by wholly criminal enterprises.  Now that the teenage vandals have largely dropped away, we are left with attacks motivated solely by money.<\/p>\n<p>This phenomenon has only been a feature of the information security landscape since about 2004.  In less than five years, e-crime has changed from an anomaly into an industry.  A <a href=\"http:\/\/www.gartner.com\/\">recent Gartner report<\/a> suggested that the global \u201ctake\u201d from just one form of e-crime, phishing, was $3.2 billion in 2007 (and this may be an underestimate).   This is impressive for an industry created less than five years ago.  Worse, there is no reason to believe that e-crime is under any effective control.  This is not due to inertia or lack of interest.  Companies such as my own employer, PayPal, invest substantially in the security of our own applications and infrastructure; we have state of the art fraud management systems; we work with law enforcement to catch, prosecute, and convict criminals whenever possible.  <\/p>\n<p>The problem, however, is that there is a huge asymmetry at work.  In many jurisdictions, there is no chance of e-criminals being detected, arrested, indicted, convicted, or punished.  <\/p>\n<p>Nonetheless, we are cautiously optimistic that phishing can be controlled.  If other companies adopt the same strategies we have at PayPal, we\u2019re confident that phishing will become substantially more difficult and less financially rewarding.  Unfortunately, there\u2019s also strong evidence that criminals will simply switch from phishing to malware.<\/p>\n<p>I have spent the last three years looking for a clear answer to a very simple question \u2013 \u201cHow many PCs globally are infected by malware?\u201d  Perhaps surprisingly, it\u2019s very difficult to get an answer to this from commercial sources.  However, the topic has become interesting to academics, and their <a href=\"http:\/\/www.gtisc.gatech.edu\/pdf\/attackOfZombie_NYT_010707.pdf\">conclusions <\/a>are downright frightening \u2013 12%.  <\/p>\n<p>Worse, 12% refers to an average of PCs owned by both consumers and businesses.  Because businesses employ people (like me) to ensure the security of their computers, infection by malware is particularly disturbing.  By contrast, consumers are on their own when it comes to PC security: most of them purchased a machine that appears to be capable of magic, and they have no clue as to what represents safe vs. unsafe behavior.  We exhort them to \u201cbuy a firewall\u201d, \u201cturn on auto-updates\u201d, \u201cbuy an anti-virus package\u201d and so on, but there are no apparent consequences if they do not.  Further, there\u2019s direct evidence that consumers think they know how to protect themselves \u2013 but don\u2019t, as evidenced by a common belief that phishing e-mails can be spotted by their poor quality graphics, and abysmal grammar and spelling.  This is why <a href=\"http:\/\/www.internetbusiness.co.uk\/01102007\/uk-least-affected-by-malware-in-europe\">data from ISPs suggests<\/a> that anywhere from 25% to 30% of consumer PCs <a href=\"http:\/\/www.networkworld.com\/news\/2007\/110207-one-in-six-pcs.html\">have been compromised<\/a>. <\/p>\n<p>By now, I may have convinced the reader that I am of the Chicken Little mentality.  But my fear may be warranted: it\u2019s pretty clear that the criminals are only just starting to flex their muscles \u2013 the monetization of e-crime is so new that they\u2019ve only been plying their trade for a very short time.  If we collectively take no action, then we have perhaps five to ten years before criminal greed literally takes the Internet away from us.  If e-crime continues its rise, consumer confidence will be eroded, possibly leading to popular abandonment of the Internet and e-commerce.<\/p>\n<p>However, if things start getting bad enough, society will demand change and, as the histories of other industries teach us, legislators and regulators will step in and mandate change.  The obvious question is what that change should look like.  <\/p>\n<p>I believe that a very good case can be made for using the road system as an analogy for the Internet.  The question we need to ask ourselves is: \u201cWho\u2019s responsible for making the roads safe?\u201d<\/p>\n<p>Drivers are responsible for:<br \/>\n&#8211;\tBeing appropriately trained and licensed to operate a vehicle;<br \/>\n&#8211;\tEnsuring that the vehicle is properly licensed, safe to operate, and insured;<br \/>\n&#8211;\tFollowing all appropriate regulations about safe driving.<\/p>\n<p>Private industry is responsible for:<br \/>\n&#8211;\tOffering safe vehicles for sale;<br \/>\n&#8211;\tProviding safe road equipment to government agencies;<br \/>\n&#8211;\tBuilding roads to specifications provided by government agencies;<br \/>\n&#8211;\tOffering affordable vehicle insurance to drivers.<\/p>\n<p>Governments are responsible for ensuring that:<br \/>\n&#8211;\tRoads are designed to be safe, and are maintained to ensure safety;<br \/>\n&#8211;\tEquipment used in the road system is safe (have you ever noticed that traffic lights don\u2019t fail with all directions showing green?);<br \/>\n&#8211;\tDrivers are trained and tested to meet standards of safe driving;<br \/>\n&#8211;\tUnsafe drivers are targeted by law enforcement officials;<br \/>\n&#8211;\tThere is a minimum level of safety equipment built into personal vehicles;<br \/>\n&#8211;\tThere is a robust market for affordable &amp; effective vehicle insurance.<\/p>\n<p>The analogous question is: \u201cWho\u2019s responsible for making the Internet safe?\u201d  I\u2019d argue that there should be a shared responsibility among government, private industry and consumers.  However, almost none of these regulatory elements are in place today.  We need to develop a model framework for Internet governance, and we need to do it soon.  <\/p>\n<p>If you are driving a car on the public roads, an entirely different set of standards apply than if you are driving \u201coff road.\u201d  Similarly, if you connect your PC to the Internet, it should be appropriately protected by either a hardware or software firewall and an anti-virus product.  If you connect an unprotected device to the Internet, you should be liable for any financial losses that you might incur from e-crime, as well as for possible damages that your PC might cause to others.  This is regulation at the individual level.<\/p>\n<p>At the level of private industry, ISPs could be responsible for determining whether the PCs of their customers have been compromised, and if they have, refusing to connect them to the Internet.  Such determination could be made directly by the ISP concerned, as there are now tools that enable this, or by reports from reliable organizations.  Additionally, website hosts and operators should be liable for damages their sites may inflict (even unintentionally) on visiting PCs.<\/p>\n<p>Finally, it\u2019s clear that governments need to act:<\/p>\n<p>We need a globally harmonized framework of legislation against e-crime.  Governments need to agree on the definitions of e-crime and of phishing so that attackers from all jurisdictions can be aggressively pursued in the criminal justice system.  In order to achieve this, it\u2019s quite possible that a new global governance organization is needed. <\/p>\n<p>Governments need to substantially increase their investment in e-crime law enforcement.  The Internet is a global entity.  Either we need to find a way to enable global law enforcement teams to cooperate effectively, or we should give up on attempting to police the Internet locally, and establish the \u201cInterNetPol.\u201d<\/p>\n<p>Action is needed and we must act soon.  I don\u2019t want to minimize the sheer difficulty of what we\u2019re facing.  But, I do know this: we must change the way we work before e-criminals take away this shining thing we call the Internet.<\/p>\n<p><em><a href=\"https:\/\/www.thepaypalblog.com\/2008\/04\/a-practical-app\/\">Michael Barrett<\/a> is the chief information security officer at <a href=\"https:\/\/www.paypal.com\/\">PayPal<\/a>, where he oversees the information systems and services that protect the integrity and confidentiality of customer and employee information . Previously, he has served as vice president of security and utility strategy at American Express, and  president of the Liberty Alliance, where he co-chaired the Identity Theft Prevention Working Group. He has twice been named one of the 50 most powerful people in networking by Network World magazine and was recently listed as one of ITSecurity.com\u2019s 59 top influencers in the security industry. He is also an advisor to the Berkman Center&#8217;s <a href=\"http:\/\/www.stopbadware.org\/home\">StopBadWare <\/a>project.<\/em><em><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Essay By Michael Barrett with companion pieces by Beau Brendler and David Clark. Continue the security conversation with John Clippinger and Dembitz. As I write this, in the spring of 2008, we have recently passed a milestone &#8211; on April 22nd, 1993, Mosaic 1.0 was released by the National Center for Supercomputing Applications (NCSA) . [&hellip;]<\/p>\n","protected":false},"author":1815,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2650,2652,2755,3593],"tags":[],"class_list":["post-59","post","type-post","status-publish","format-standard","hentry","category-beau-brendler","category-david-clark","category-michael-barrett","category-protection-from-harm"],"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/archive.blogs.harvard.edu\/publius\/wp-json\/wp\/v2\/posts\/59","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/archive.blogs.harvard.edu\/publius\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/archive.blogs.harvard.edu\/publius\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/publius\/wp-json\/wp\/v2\/users\/1815"}],"replies":[{"embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/publius\/wp-json\/wp\/v2\/comments?post=59"}],"version-history":[{"count":0,"href":"https:\/\/archive.blogs.harvard.edu\/publius\/wp-json\/wp\/v2\/posts\/59\/revisions"}],"wp:attachment":[{"href":"https:\/\/archive.blogs.harvard.edu\/publius\/wp-json\/wp\/v2\/media?parent=59"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/publius\/wp-json\/wp\/v2\/categories?post=59"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/publius\/wp-json\/wp\/v2\/tags?post=59"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}