NSA Chief Warns Companies Against Revenge Hacking

NSA Director Adm. Michael Rogers NSA Director Adm. Michael Rogers Lauren Victoria Burke/AP

Businesses, under siege from hackers looking to steal sensitive information, increasingly want to take matters into their own hands. But the head of the National Security Agency is warning them not to become hackers themselves.

"Be very careful about going down that road," Adm. Michael Rogers, the NSA director, said Tuesday at a cybersecurity event hosted by the U.S. Chamber of Commerce. "As a nonlawyer, I would tell you, wow, think about the legal implications of this."

Some business groups are tired of focusing only on defensive measures as hackers breach their systems. They want to retaliate and damage the hackers' computer systems.

Advocates of "hacking back" say that punishing attackers can be an effective tool for a company to protect itself.

But the Computer Fraud and Abuse Act makes it illegal to break into a computer network without permission. There's no exemption for counterattacks.

Rogers said he understands the desire to hire "cyber mercenaries" to go after hackers. But he argued that companies should instead trust federal law enforcement to prosecute cyber criminals.

Stewart Baker, a former general counsel for the NSA, said companies should get careful legal advice before doing anything to a computer system they don't own.

"But I've given such advice, and there is more flexibility to the law than many government officials imply," Baker told National Journal. "And a good thing, too. It would be preposterous for the U.S. Justice Department to say, 'We can't protect Americans from foreign hackers, but we can prevent Americans from protecting themselves.' "

Of course, Rogers's advice doesn't apply to himself or other government officials. The NSA and U.S. Cyber Command (which Rogers also heads) have long prepared for "offensive cyber operations" to disrupt enemy computer systems or conduct surveillance.

According to documents leaked by Edward Snowden, the U.S. conducted 231 cyberattacks in 2011.

At Tuesday's event, Rogers said Defense Department officials are continuing to work to update military rules of engagement in cyberspace. Too many foreign nations and individuals apparently think that attacking U.S. networks is a low-risk proposition, Rogers said.

"That is not in our best interests in the long term as a nation for others to have that perception," Rogers said. "We need to change that."

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
FROM OUR SPONSORS
JOIN THE DISCUSSION
Close [ x ] More from GovExec
 
 

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Forecasting Cloud's Future

    Conversations with Federal, State, and Local Technology Leaders on Cloud-Driven Digital Transformation

    Download
  • The Big Data Campaign Trail

    With everyone so focused on security following recent breaches at federal, state and local government and education institutions, there has been little emphasis on the need for better operations. This report breaks down some of the biggest operational challenges in IT management and provides insight into how agencies and leaders can successfully solve some of the biggest lingering government IT issues.

    Download
  • Communicating Innovation in Federal Government

    Federal Government spending on ‘obsolete technology’ continues to increase. Supporting the twin pillars of improved digital service delivery for citizens on the one hand, and the increasingly optimized and flexible working practices for federal employees on the other, are neither easy nor inexpensive tasks. This whitepaper explores how federal agencies can leverage the value of existing agency technology assets while offering IT leaders the ability to implement the kind of employee productivity, citizen service improvements and security demanded by federal oversight.

    Download
  • IT Transformation Trends: Flash Storage as a Strategic IT Asset

    MIT Technology Review: Flash Storage As a Strategic IT Asset For the first time in decades, IT leaders now consider all-flash storage as a strategic IT asset. IT has become a new operating model that enables self-service with high performance, density and resiliency. It also offers the self-service agility of the public cloud combined with the security, performance, and cost-effectiveness of a private cloud. Download this MIT Technology Review paper to learn more about how all-flash storage is transforming the data center.

    Download
  • Ongoing Efforts in Veterans Health Care Modernization

    This report discusses the current state of veterans health care

    Download

When you download a report, your information may be shared with the underwriters of that document.