Feedback due on gov't proposal around botnet notification

Share this article:
Many view internet service providers (ISPs) as the entity with the most ability to do something about the botnet scourge.

That's why the U.S. Commerce and Homeland Security departments are seeking feedback on a program that would build incentive-driven codes of conduct for ISPs to voluntarily detect, notify and possibly assist in the removal of malware on consumers' machines.

Public comments are due by Friday.

“In our country, we always have this debate whether the government should take a stronger hand or whether market forces are enough,” Cameron Kerry, general counsel at the U.S. Department of Commerce, said during a recent discussion on the topic, organized by the Center for Strategic and International Studies (CSIS). “We've run out of time to have that conversation, at least on some level. We have to get something done.”

Right now, the government's role is merely facilitator. How each stakeholder – which also includes end-users, security firms and potentially tool, operating system and application vendors – fits into the process is unclear.

Already, a number of U.S.-based ISPs, and at least one wireless carrier – given the concern around mobile malware – offer notification and remediation services for consumers, said Michael O'Reirdan, chairman of the Messaging Anti-Abuse Working Group. But there is no formal model in place, as exists in other countries, namely Germany, Japan and Australia.

Any model here must be certain to include awareness, prevention and privacy components, some participants at the CSIS discussion said. And Kate Dean, executive director of the U.S. Internet Service Provider Association, said the partnership must take into consideration the uniqueness of each ISP.

“Technology varies from company to company,” she said. “Whatever it is that comes out of the idea of creating new security must be one that the ISP can create on their own and can implement across their network.”

Share this article:
You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters

More in News

CryptoWall surpasses CryptoLocker in infection rates

CryptoWall surpasses CryptoLocker in infection rates

A threat analysis from Dell SecureWorks CTU says that CryptoWall has picked up where its famous sibling left off.

Professor says Google search, not hacking, yielded medical info

Professor says Google search, not hacking, yielded medical ...

A professor of ethical hacking at City College San Francisco came forward to clarify that he did not demonstrate hacking a medical center's server in a class.

Syrian Malware Team makes use of enhanced BlackWorm RAT

Syrian Malware Team makes use of enhanced BlackWorm ...

FireEye analyzed the hacking group's use of the malware, dubbed the "Dark Edition" of BlackWorm.