Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Latest News

      White House Sanctions Attempt to Hit Cyber-Crime in the Pocketbook

      Written by

      Wayne Rash
      Published April 2, 2015
      Share
      Facebook
      Twitter
      Linkedin

        eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

        An Executive Order signed by President Barack Obama on April 1 is the latest in a series of moves by the U.S. government to help impede cyber-criminal activity aimed at the United States.

        The order gives the Treasury Department, working with the Attorney General and the State Department, the power to block the transfer of funds between entities inside and outside the U.S. that attack computers or networks to steal money, trade secrets, personal information or other data to the detriment of the government and its citizens.

        The order officially declares an emergency and includes other broad powers, such as the ability to block travel to the U.S. by people involved in such attacks. The order specifically includes the ability to block donations to groups that carry out such activities.

        The action is clearly aimed at providing greater consequences for people or organizations that break into U.S. computers in an attempt to profit from the activity. This would include groups that steal credit card numbers or other personal information in cyber-attacks, such as those launched again Home Depot or Target.

        The order also covers attempts to steal corporate information, such as the endless attacks by the Chinese army against U.S. defense contractors and it would even include Distributed Denial of Service attacks against Websites and networks in the U.S.

        The order’s specific goals are described in a sort of FAQ published by the White House along with the order. In that document, the White House explains that the new order would limit the ability of organizations involved in such attacks to do business with U.S. companies in addition to their ability to transfer money out of the U.S.

        While the activities of ransomware operations are not specifically mentioned, this order would allow the Secretary of the Treasury to target Bitcoin exchanges that are used as a way to pay those ransoms.

        For the most part, however, the attention of the government will be aimed at cyber-attacks against critical infrastructure, major networks and Websites. It’s worth noting that the order specifically protects people who are innocent participants, such as those who have computers that are used by botnets, and extends protection to security researchers.

        In a statement issued in conjunction with the EO, Lisa Monaco, the President’s assistant for cyber-security and counterterrorism, said that the order was first and foremost intended to hurt criminals in the pocketbook.

        “Malicious cyber activity—whether it be stealing sensitive information, including personal identifiers, or trade secrets—is often profit-motivated,” Monaco said in a prepared statement. “Because those responsible want to enjoy the ill-gotten proceeds of their activities, sanctions can have a significant impact. By freezing assets of those subject to sanctions and making it more difficult for them to do business with U.S. entities, we can remove a powerful economic motivation for committing these acts in the first place.”

        White House Sanctions Attempt to Hit Cyber-Crime in the Pocketbook

        Monaco also said that law-abiding U.S. companies have nothing to worry about. “We will never use it to try to silence free expression online or curb Internet freedom,” Monaco said. This raises the question about those who donate to help fund activities such as WikiLeaks, an organization that clearly fits the description of organizations that would fall under the sanctions of the order.

        The U.S. Supreme Court has repeatedly ruled, most recently in the Citizens United decision, that donations of money equate to speech and are protected under the First Amendment. Would those donations be sanctioned? Monaco’s statement would indicate that they would not, but nothing in the order says that.

        The bigger question, of course, is whether this Executive Order will actually accomplish anything. The answer is, “maybe.” The problem with issuing sanctions against most state operated attackers is the issue of diplomacy and practicality. The problem with issuing sanctions against most cyber-criminals is finding them. Neither of those problems is made easier by the EO.

        In the case of state-sponsored attacks, such as the Chinese army’s constant attempts to steal trade secrets, classified information, email addresses or anything else that is not nailed down, is it a practicality? Can you really issue trade sanctions against China? Not without risking a trade war that damages both sides. And if you try to issue sanctions against the Chinese army, what exactly would you block?

        While it’s possible that this order might provide a way to block some activities, it’s hard to see how it will accomplish much on its own. However, as an important weapon in the much larger arsenal of cyber-weapons at the disposal of the U.S. government, it provides an important capability. One can, after all, accomplish a great deal by following the money.

        An excellent example from an earlier time is the conviction of the famous gangster Al Capone on tax evasion charges. Capone was never tried for the vast array of crimes for which he was responsible, but he was caught by his own money trail. Because he didn’t pay taxes on his ill-gotten gains, he spent most of the rest of his days in the slammer.

        This sort of approach does have possibilities in fighting cyber-crime. After all, most such crime is aimed at making a profit, but if those criminal organizations can’t get access to the money, there’s no point in being in that business. Assuming, of course, that the Treasury Department can find a place in the money trail to cut things off.

        For those organizations, cutting off the flow of money is like cutting off the air they breathe. They will soon die. But that’s not the case with state-sponsored attacks—after all, they have their own supply of money.

        Wayne Rash
        Wayne Rash
        https://www.eweek.com/author/wayne-rash/
        Wayne Rash is a content writer and editor with a 35-year history covering technology. He’s a frequent speaker on business, technology issues and enterprise computing. He is the author of five books, including his most recent, "Politics on the Nets." Rash is a former Executive Editor of eWEEK and a former analyst in the eWEEK Test Center. He was also an analyst in the InfoWorld Test Center and editor of InternetWeek. He's a retired naval officer, a former principal at American Management Systems and a long-time columnist for Byte Magazine.

        Get the Free Newsletter!

        Subscribe to Daily Tech Insider for top news, trends & analysis

        Get the Free Newsletter!

        Subscribe to Daily Tech Insider for top news, trends & analysis

        MOST POPULAR ARTICLES

        Artificial Intelligence

        9 Best AI 3D Generators You Need...

        Sam Rinko - June 25, 2024 0
        AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
        Read more
        Cloud

        RingCentral Expands Its Collaboration Platform

        Zeus Kerravala - November 22, 2023 0
        RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
        Read more
        Artificial Intelligence

        8 Best AI Data Analytics Software &...

        Aminu Abdullahi - January 18, 2024 0
        Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
        Read more
        Latest News

        Zeus Kerravala on Networking: Multicloud, 5G, and...

        James Maguire - December 16, 2022 0
        I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
        Read more
        Video

        Datadog President Amit Agarwal on Trends in...

        James Maguire - November 11, 2022 0
        I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
        Read more
        Logo

        eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

        Facebook
        Linkedin
        RSS
        Twitter
        Youtube

        Advertisers

        Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

        Advertise with Us

        Menu

        • About eWeek
        • Subscribe to our Newsletter
        • Latest News

        Our Brands

        • Privacy Policy
        • Terms
        • About
        • Contact
        • Advertise
        • Sitemap
        • California – Do Not Sell My Information

        Property of TechnologyAdvice.
        © 2024 TechnologyAdvice. All Rights Reserved

        Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

        ×