Battling Cyber Hackers with Public and Private Cooperation

Except those who are simply not following the election cycle or are living without television, we are all battling cyber hackers. The scandal of Hillary Clinton and using a private email server for classified information as Secretary of State is a big deal.  Additionally, she allegedly deleted over 30,000 emails and scrubbed the server a day before being called before Congress on the matter.  This is a serious matter.

Cyber offense in battling cyber hackersCyber security is growing more important and complex, but the government seems to be lagging behind in proper protection and security steps, leaving some of our most vulnerable secrets at risk.

WikiLeaks as already proven itself adept at hacking into servers and posting information, some of it classified, to the general public without fear of retribution.

The hacking group Anonymous has already proven itself more than adept at hacking into almost any server and website with only a minimal amount of time, and only recently someone managed access into North Korea’s Internet only to discover the citizens have access to a total of 28 sites.

What is interesting to note about the two previous examples is these are private citizens who are using less than advanced techniques to reach into sites and even an entire country.  If this is possible, why then does the government hesitate to do the same in battling cyber hackers?

Political appointees and cronyism is a likely start.  Deep pockets make for strong connections.  Stronger, more secure servers and networking is certainly possible, but if the best and most reasonable choice is from a polar political party or outside of a sphere of connections, influence and activism, other choices will be made out of political necessity and prevention of political suicide.

The Problem in Battling Cyber Hackers

China and Russia.  Both countries may feign interest in the U.S., particularly because we import so much from China, but there is too much evidence of malfeasance on the part of China and Russia with our secure servers.  The government knows the two countries are there, but very little is done about it until well after the breach is discovered.  By then, naturally, it is too late to do much except backtrack and learn what happened.

Most will immediately assume there are no solutions, throw hands up and condemn the entire situation to hackers who will in no time cause serious havoc throughout the governmental networks and Internet.  There are solutions, sound and valid, which are not as difficult to find as one may think.

Tap the Public Sector

Let’s not get into the public/private argument, but instead focus on what is important – the security needed in battling cyber hackers.  The private sector often is not as limited to budgetary constraints and limitations like some governmental agencies.  Some agencies certainly do not lack funds or funding each year, but other, small and more insignificant agencies may.  After all, there is a U.S. Halibut Commission as well as many other small groups in the territories and such.  Chances are these groups do not have the same degree of cyber security as the Supreme Court.

Fight Fire with Fire in Battling Cyber Hackers

Many years ago, a young hacker’s punishment was to create a program wherein should another hacker gain entrance into the system, the system would not allow the hacker to exit.  Thus, the hacker was held, in a sense, until found and taken into custody.

We have the similar capabilities, and more importantly, the people to do it.  Rather than be passive with cyber warfare, enact more punitive solutions.  Turn back to the above-mentioned suggestions for a set of plans, programs and solutions to combat and punish those who would enter U.S. cyber space without permission.

This is not by any means a complete list of options that can be used.  Instead, we elicit your suggestions and ideas.  What are some possible sectors we could use for cyber security, and how can we be more aggressive on battling cyber hackers – offensive and defensive?