cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
Caute_cautim
Community Champion

Cyber Letters of Marque

Hi All

 

Do you agree with this approach, whereby letters of Margue are provided, so one can hack back at the attackers themselves?  What re-precussions would you expect?  What safeguards would you put in place?

 

https://www.usni.org/magazines/proceedings/2019/october/grant-cyber-letters-marque-manage-hack-backs

 

Regards

 

Caute_Cautim

 

 

2 Replies
Steve-Wilme
Advocate II

Dangerous idea.  This suggests correct attribution has been arrived at for cyber attacks.  Since attacks may come from a compromised third party and may be cloud hosted infrastructure subscribed to by that third party, hacking back is frought with difficulties.

 

-----------------------------------------------------------
Steve Wilme CISSP-ISSAP, ISSMP MCIIS
Caute_cautim
Community Champion

@Steve-Wilme    I agree, hence my request for comments - if they use proxies, they could be state owned proxies sanctioned through a number of different channels, all pointing in the wrong direction.

 

Regards

 

Caute_cautim