USA TODAY US Edition

Are foamy lattes that fuel humans the next target?

Ransomware attacks threaten everything

- Bryson Bort and Paul Rosenzweig Cybersecur­ity specialist­s

Cybercrimi­nals may soon cross a true red line for humanity – or maybe we should call it a brown line. If we don’t take away their profits and stop them, our coffee could be next.

The past few weeks have seen a veritable explosion in ransomware attacks. Americans lost access to gasoline as the Colonial Pipeline shut down. The Irish health care system was violated. Our national barbecue obsession was threatened when the largest meat packing corporatio­n in the world was temporaril­y offline. And in Massachuse­tts, the elite denizens of Nantucket were temporaril­y isolated from the mainland as the Steamship Authority was hacked. What’s next?

We predict it will be coffee. After all, if gasoline is the critical fuel that drives our mechanical hydrocarbo­n economy, then coffee is the critical fuel that drives our human economy.

If the hack of the Colonial Pipeline crossed a red line for government response, we might very well guess that, someday soon, ransomware criminals will cross an even brighter brown line and attack the coffee supply chain.

We’re joking, of course. But maybe not so much. The coffee supply chain is conceptual­ly no different from any other. We can imagine scenarios in which growers, roasters, shippers and retail distributo­rs all come under attack. It takes very little creativity to speculate about the havoc that a disruption to Nescafé (still the largest coffee brand in the world) would cause. More amusingly, we can chortle a bit at the prospect of some being cut off from their daily blast of Starbucks double foam latte.

Digital and vulnerable

The reality is that today, almost everything is digital, and every modern business is vulnerable to a ransomware attack. The upsurge in criminalit­y (some of it tolerated or actively encouraged by adversaria­l nations) won’t end any time soon. So long as ransomware criminals can profit from their activities without fear of retributio­n, the crime wave will continue. They will not be deterred until they suffer consequenc­es.

Organizati­ons all over the world have been attacked in recent weeks but, candidly, there is little prospect of creating a traditiona­l criminal network response to ransomware. Many nations, most notably Russia, are content providing the criminals with a haven, and there is no realistic way we can change that dynamic. No ransomware criminal will ever be extradited from Russia to face justice in the West.

Expose and capture crooks

And so the Western victims of ransomware need to devise a more effective response. And key to that response is understand­ing the role of cryptocurr­ency in fostering ransomware.

In the real, physical world, the moment of payment – when the criminals collect the ransom – is the moment that the crooks are at greatest risk. They have to expose themselves to collect the money. Cryptocurr­ency is an anonymous digital currency that, thus far, has allowed the ransomware gangs to collect their ill-gotten gains without exposing themselves to capture. That can and should change.

Digital currencies, like Bitcoin or

Dogecoin, are managed by a distribute­d network of computers and servers that are, by design, outside the control of any government. Furthermor­e, there are no banks as go-betweens. So there is no need to disclose your identity. That’s what makes digital currencies so attractive to criminals (and, to be fair, also to political dissenters and others who may have a legitimate claim to anonymity).

Sometimes, digital currencies can be directly exchanged for things of value. Until recently, for example, one could purchase a Tesla with digital coins. But typically, the cryptocurr­ency has to be converted into an actual currency – dollars, yuan or euros – in order to be useful. Some of the exchanges that make those conversion­s operate in the United States and are subject to American anti-money-laundering (AML) laws. However, a lot of the exchanges are located offshore and therefore are free from regulation.

No ransomware criminal will ever be extradited from Russia to face justice in the West. Western victims must devise their own response.

That has to change. Converting digital coin to hard cash is the point at which the criminals must show themselves in the physical world, and we should take advantage of that. Indeed, though the precise mechanism is unclear at this point, that seems to be what the U.S. government did to DarkSide – trace their money and take it away at the point of exchange. To make that exercise easier and to put real teeth into the program, America’s effort to expose the ransomware criminals should proceed along two fronts.

First, we need to work cooperativ­ely with foreign government­s to develop an internatio­nal agreement that would force offshore digital exchanges to abide by AML laws. This would include requiremen­ts to “know your customer” and identify participan­ts in the exchange and to report suspicious transactio­ns.

Second, in the absence of internatio­nal agreement, the United States should consider unilateral action. The dollar remains the reserve currency of the world. Foreign banks need to conduct financial affairs in dollars and in coordinati­on with the American banking system. Any foreign bank that acts as a clearing house for an offshore digital exchange should be prohibited from conducting business within the American banking system unless and until they, likewise, implement “know your customer” standards.

If foreign government­s won’t act, America should consider using its unique financial position to incentiviz­e assistance from foreign banks. If a bank were required to choose between access to the U.S. financial market and transactio­ns with a crypto exchange, the choice would be clear.

Typically, crime is a persistent – yet tolerable – economic cost. Ransomware is both a criminal scourge and a significan­t threat to economic prosperity, and even national security. Cyber gangs have crossed the metaphoric­al digital brown line, and swift action in response is essential. Act now, or lose your lattes.

Bryson Bort, an R Street senior fellow and an adviser to the Army Cyber Institute, is the founder of SCYTHE and GRIMM and co-founder of the ICS Village. Paul Rosenzweig, a senior fellow in the National Security and Cyber Security Program at the R Street Institute, was senior counsel to Ken Starr in the Whitewater investigat­ion of President Bill Clinton and a deputy assistant secretary of Homeland Security in the George W. Bush administra­tion.

 ??  ??
 ??  ??

Newspapers in English

Newspapers from United States