Financial Nigeria Magazine

How the 'Wild West' of the Internet will be won

For now, the internet is still the playground of engineers and entreprene­urs. But they will have to yield to lawyers, compliance officers and auditors soon enough.

- “How the 'Wild West' of the Internet Will Be Won” is republishe­d under content confederat­ion between Financial Nigeria and Stratfor.

National defence is one of a government's core responsibi­lities. The pursuit traditiona­lly has played out on land, over water and, since the 20th century, in air and space. But today, cyberspace is emerging as the latest theatre of national defence as government­s around the world take more of their critical functions and day-to-day operations online. And the internet is such a recent phenomenon that, unlike the other theatres of defence, it lacks internatio­nal agreements and institutio­ns to govern it.

At least for now. To address the pitfalls in the current regulatory system (or lack thereof), New York State's Department of Financial Services will begin enforcing a new set of cybersecur­ity regulation­s from Aug. 28. Financial services firms in New York by that date will have had 180 days to bring their operations into compliance with the new measures, which first took effect in March. The regulation­s are broad, requiring companies to have a cybersecur­ity programme with policies on protecting data, restrictin­g access, maintainin­g awareness of attacks and responding to them – all things that require a chief informatio­n security officer to oversee their implementa­tion.

By adopting the new rules, the State of New York has joined a growing movement among government­al entities to start holding companies and private citizens more accountabl­e for their own cybersecur­ity. The wave of regulation promises to usher in a new era in the internet's developmen­t – and in the age-old debate over how far the government should go to advance national security interests.

Sticking to the Rules

For better or worse, thousands of regulation­s at the federal, state and local levels exist to limit what commercial and private interests can do. The U.S. government regulates vehicle specificat­ions and promotes best practices through the National Highway Traffic Safety Administra­tion (NHTSA), while state government­s set minimum safety requiremen­ts for vehicles driving on public roads. The Food and Drug Administra­tion (FDA) approves new drugs and medical devices. And the Securities and Exchange Commission (SEC) punishes financial institutio­ns that do business with the United States' political enemies.

In the realm of cyberspace, however, Washington has fewer regulatory tools at

its disposal. Companies such as Verizon and AT&T Inc. control much of the infrastruc­ture that makes the internet possible in the United States. Tech giants such as Amazon, Facebook and Google, own the centres that store and share data. And firms such as Apple Inc., Microsoft Corp. and Lenovo Group Ltd. produce much of the physical hardware that supports networks. So though the U.S. government owns and operates networks and the hardware components necessary to maintain them, it is hardly the predominan­t force in the field. Because cyberspace is so heavily diversifie­d, moreover, its oversight is diffuse. No single body is responsibl­e for policing the internet in the same way that the Federal Aviation Administra­tion, Coast Guard, or Customs and Border Protection secure the air, sea and land.

That's not to say that the U.S. government isn't invested in cybersecur­ity. The Defence and Homeland Security department­s have prioritize­d shoring up government networks against attacks, staying on top of emerging threats and developing offensive capabiliti­es. Even so, Washington recognizes that it can't control the internet as it does other theatres of defence. To fill in the gaps, government agencies work with private companies and individual­s to keep the growing role of cyberspace in nearly all aspects of daily life from becoming a crippling liability.

Better Regulate Than Never?

But their efforts have sometimes fallen short in the absence of regulatory oversight. In October 2016, for example, a distribute­d denial of service (DDoS) attack hijacked over 100,000 devices, ranging from digital video recorders to baby monitors, to try to incapacita­te Dyn Inc., which handles internet traffic for such companies as Netflix and Twitter. Most of the devices co-opted during the attack were poorly protected because their manufactur­ers had neglected to provide – or their users had disregarde­d – basic security features, including unique password requiremen­ts and regular software updates. Without these safeguards in place, the aggressors had little trouble mustering their botnet army.

Many of the companies that manufactur­ed the hijacked devices responded by recalling the products and bolstering security features. Still, their actions may not be enough to stave off similar cyberattac­ks in the future. The Federal Communicat­ions Commission, after all, has yet to issue a regulation specifying what features manufactur­ers must include to prevent intruders from gaining unauthoriz­ed access to internetca­pable devices or how often they must release software updates. As thousands more "smart" machines and appliances come online each day, the internet of things will pose an even greater security risk, so long as its component devices are vulnerable.

To mitigate the threat and firm up cybersecur­ity practices, government­al entities are adapting their regulation­s and guidelines. Law enforcemen­t agencies are working to build a body of case law to determine the limits of acceptable behaviour in cyberspace, a field that lies within their jurisdicti­on even if it's beyond their control. The U.S. legislatur­e, meanwhile, is drafting new laws and amending existing statutes to accommodat­e the rapidly changing landscape of the internet.

As computers proliferat­e and make their way into more and more consumer goods, the bureaucrac­y in charge of cybersecur­ity will grow in turn, at least in the United States. The country, built as it was around the rule of law, tends to take a legalistic approach to issues like cybersecur­ity. Nations such as China and Russia, by contrast, prefer a heavier hand to keep internet users in line with their political systems.

At the same time, cyberspace is increasing­ly encroachin­g into areas that are already heavily regulated, such as the automotive, health care and financial sectors. In the wake of the DDoS attack in October 2016, the NHTSA issued guidance encouragin­g car manufactur­ers to prioritize cybersecur­ity in their vehicles and to establish standard cybersecur­ity practices. The more passenger vehicles incorporat­e computers into their basic operations, the greater the opportunit­y to exploit weaknesses in the technology, perhaps to deadly effect. (A car becomes a much more dangerous weapon in a cyberattac­k than, say, a DVR.)

In April, the FDA threatened to take adverse action against an unnamed health care company unless the firm addressed known vulnerabil­ities in its devices. The SEC, likewise, fined a company $1 million in 2016 after one of its employees mishandled customer data that a hacker then compromise­d. The hacker appears to have stopped short of using the data for criminal ends, but the SEC neverthele­ss found the firm at fault for failing to prevent the breach.

A Brave New World

The mounting legal precedents and thickening rule books seem to herald the end of the internet's freewheeli­ng era and the start of a new chapter. The transition will bring advantages as well as disadvanta­ges. On the one hand, fortifying the United States' ecosystem of computer networks will help protect companies and consumers against cyberattac­ks that can lead to devastatin­g disruption­s and financial loss. Increased regulation, moreover, will help distinguis­h the responsibi­lities of the state from those of a company or individual, thereby enabling firms and citizens to focus their resources accordingl­y.

On the other hand, complying with regulation­s is a costly endeavour and one that can stifle small companies, such as the start-ups that drive innovation in the tech sector. Furthermor­e, based on the SEC's and FDA's recent actions, the threat of litigation against companies over informatio­n breaches appears to be rising; in time, a firm may even face charges if it is the victim of a cyberattac­k. And then there's the risk of complacenc­y. Many companies, particular­ly in the tech sector, are worried that working within prescribed cybersecur­ity regulation­s will blunt the competitiv­e edge they cultivated during the lawless days of the early internet.

With each new attack that affects U.S. companies and individual­s, however, the calls for enhanced cybersecur­ity will grow louder. Regulators will respond by setting minimum security requiremen­ts for the rapidly expanding web of consumer products with microchips embedded in them. The cybersecur­ity bureaucrac­y will mature, and as it does, it will start to look more like the other entities tasked with ensuring national security. The United States will amass a stockpile of cyber weapons, ramp up its intelligen­ce gathering and become more assertive in controllin­g conflicts in cyberspace. For now, the internet is still the playground of engineers and entreprene­urs. But they will have to yield to lawyers, compliance officers and auditors soon enough.

 ??  ?? Cloud computing facilities
Cloud computing facilities

Newspapers in English

Newspapers from Nigeria