You are on page 1of 15

I N T E R N AT I O N A L J O U R N A L O F C R I T I C A L I N F R A S T R U C T U R E P R O T E C T I O N 3 (2010) 103–117

available at www.sciencedirect.com

journal homepage: www.elsevier.com/locate/ijcip

The economics of cybersecurity: Principles and policy options

Tyler Moore
Center for Research on Computation and Society, Harvard University, Maxwell Dworkin 110, 33 Oxford Street, Cambridge,
Massachusetts 02138, USA

A R T I C L E I N F O A B S T R A C T

Article history: Economics puts the challenges facing cybersecurity into perspective better than a purely
Received 3 June 2010 technical approach does. Systems often fail because the organizations that defend them do
Accepted 7 October 2010 not bear the full costs of failure. For instance, companies operating critical infrastructures
have integrated control systems with the Internet to reduce near-term, measurable costs
while raising the risk of catastrophic failures, whose losses will be primarily borne by
Keywords: society. As long as anti-virus software is left to individuals to purchase and install,
Information security there may be a less than optimal level of protection when infected machines cause
Economics trouble for other machines rather than their owners. In order to solve the problems
Payment card security of growing vulnerability and increasing crime, policy and legislation must coherently
Malware allocate responsibilities and liabilities so that the parties in a position to fix problems
Incentives have an incentive to do so. In this paper, we examine the economic challenges that
Information asymmetries plague cybersecurity: misaligned incentives, information asymmetries, and externalities.
Externalities We then discuss the regulatory options that are available to overcome these barriers in
Intermediary liability the cybersecurity context: ex ante safety regulation, ex post liability, information disclosure,
and indirect intermediary liability. Finally, we make several recommendations for policy
changes to improve cybersecurity: mitigating malware infections via ISPs by subsidized
cleanup, mandatory disclosure of fraud losses and security incidents, mandatory disclosure
of control system incidents and intrusions, and aggregating reports of cyber espionage and
providing them to the World Trade Organization (WTO).
c 2010 Elsevier B.V. All rights reserved.

1. Introduction scenarios, such as a cyber ‘Pearl Harbor’ where enemies shut


down the power grid, wreak havoc on the financial system,
Cybersecurity has recently grabbed the attention of policy- and pose an existential threat. Imagining such worst-case
makers. There have been persistent reports of foreign agents scenarios is useful for concentrating the minds of decision
penetrating critical infrastructures, computer compromise fa- makers and spurring them into action. However, there are
cilitating industrial espionage, and faceless hackers emptying downsides to focusing on the most extravagantly conceived
thousands of bank accounts. Furthermore, information secu- threats—it gives the false impression that the situation is so
rity is now increasingly viewed as a matter of national se- dire that only radical intervention might help.
curity. The US military has even recently established Cyber In fact, many of the problems plaguing cybersecurity
Command to defend the domestic Internet infrastructure and are economic in nature, and modest interventions that
organize military operations in cyberspace. align stakeholder incentives and correct market failures
When considering the national security implications of can significantly improve a nation’s cybersecurity posture.
cybersecurity, it is tempting to think in terms of worst-case Systems often fail because the organizations that defend

E-mail address: tmoore@seas.harvard.edu.


1874-5482/$ - see front matter ⃝c 2010 Elsevier B.V. All rights reserved.
doi:10.1016/j.ijcip.2010.10.002
104 I N T E R N AT I O N A L J O U R N A L O F C R I T I C A L I N F R A S T R U C T U R E P R O T E C T I O N 3 (2010) 103–117

them do not bear the full costs of failure. Policy and legislation with fake invoices attached that triggered the installation of
must carefully allocate responsibilities and liabilities so that malicious software [1].
the parties in a position to fix problems have an incentive to Once the banking credentials have been obtained,
do so. miscreants need a way to convert the stolen credentials to
In this paper, we outline the key insights offered by an cash. One option is to sell them on the black market: someone
economic perspective on information security, and detail who can collect bank card and PIN data or electronic banking
actionable policy recommendations that can substantially passwords can sell them online to anonymous brokers at
improve the state of cybersecurity. In Section 2, we describe advertised rates of $0.40–$20.00 per card and $10–$100 per
four crucial aspects of cybersecurity, for which we later bank account [2]. Brokers in turn sell the credentials to
propose policy solutions. The first is online identity theft, specialist cashiers who steal and then launder the money.
which is the primary way cyber criminals steal money Cashiers typically transfer money from a victim’s account
from consumers. The second is industrial espionage, where to an account controlled by a ‘money mule’. The mules
trade secrets are remotely and often undetectably stolen. are typically duped into accepting stolen money and then
The third is critical infrastructure protection. The control forwarding it. The cashiers recruit them via job ads sent in
systems regulating power plants and chemical refineries are spam emails [3] or hosted on websites such as Craigslist or
vulnerable to cyber attack, yet very little investment has been Monster [4]; these ads typically offer the opportunity to work
made to protect against these threats. Finally, we consider from home as a ‘transaction processor’ or ‘sales executive’.
botnets, a popular method of attack that impacts nearly all Mules are told they will receive payment for goods sold or
aspects of cybersecurity. services rendered by their employer and that their job is to
In Section 3, we describe the high-level economic chal- take a commission and forward the rest, using an irrevocable
lenges to cybersecurity: misaligned incentives, information payment service such as Western Union. After the mule has
asymmetries, and externalities. In Section 4, we study how sent the money, the fraud is discovered and the mule becomes
policy may be used to overcome these barriers. We review the personally liable for the funds.
different ways liability is assigned in the law, giving an ex-
tended discussion on how the law has tackled various Inter- 2.2. Industrial cyber espionage
net vices by exerting pressure on intermediaries, principally
Internet service providers (ISPs) and the payment system. Fi- The rise of the information economy has meant that valuable
nally, we make four concrete policy recommendations that intellectual property of firms is increasingly stored in digital
can improve cybersecurity. form on corporate networks. This has made it possible
for competitors to remotely gain unauthorized access to
proprietary information. Such industrial espionage can be
difficult to detect, since simply reading the information does
2. Cybersecurity applications
not affect its continued use by the victim. Nonetheless, a
few detailed cases of espionage have been uncovered. In
While the intent of this article is to provide generalized advice
2005, 21 executives at several large Israeli companies were
to help strengthen cybersecurity, it is useful to consider
arrested for hiring private investigators to install spyware
particular applications where cybersecurity is needed. We
that stole corporate secrets from competitors [5]. In 2009, the
describe four of the most prescient threats to cybersecurity:
hotel operator Starwood sued Hilton, claiming that a Hilton
online identity theft, industrial cyber espionage, critical
manager electronically copied 100,000 Starwood documents,
infrastructure protection, and botnets.
including market research studies and a design for a new
hotel brand [6]. Researchers at the Universities of Toronto and
2.1. Online identity theft Cambridge uncovered a sophisticated spy ring targeting the
Tibetan government in exile [7,8]. Employees at embassies
One key way in which malicious parties capitalize on across the globe were sent emails purporting to be from
Internet insecurity is by committing online identity theft. Tibetan sympathizers. When the employees opened the email
Banks have made a strong push for customers to adopt attachment, their computers were infected with malware that
online services due to the massive cost savings compared stole documents and email communications.
to performing transactions at physical branches. But the Many within government and the defense industrial base
means of authentication have not kept pace. Banks have argue that industrial cyber espionage is rife. The UK security
primarily relied on passwords to identify customers, which service MI-5 warned British businesses that Chinese spies
miscreants can obtain by simple guessing or by installing were systematically targeting them [9]. The security company
‘keystroke loggers’ that record a password as it is entered on Mandiant has claimed that an ‘advanced persistent threat’
a computer. Another way to steal passwords takes advantage originating in China is being used to systematically steal
of the difficulties in authenticating a bank to a consumer. intellectual property from businesses by infected computers
Using a ‘phishing’ attack, miscreants masquerade as the with malware [10]. An anonymous survey of 800 CIOs revealed
bank and ask the customer for credentials. Phishing sites are that many believed they were targeted by espionage, with
typically advertised via spam email purporting to come from each firm reportedly losing $4.6 million annually [11]. On the
the bank. Keystroke loggers can be installed using a more record, however, businesses have remained mum, refusing to
general ruse—for instance, fraudsters sent targeted emails acknowledge that the problem poses a significant threat to
to the payroll departments of businesses and school districts their profits.
I N T E R N AT I O N A L J O U R N A L O F C R I T I C A L I N F R A S T R U C T U R E P R O T E C T I O N 3 (2010) 103–117 105

2.3. Critical infrastructure protection Botnets are typically crafted for a particular purpose,
which varies based on the preferences of the miscreant
It is widely known that the process control systems that controlling the botnet, called a ‘botnet herder’. Many botnets
control critical infrastructures such as chemical refineries are designed to simply send spam at the behest of the
and the power grid are insecure. Why? Protocols for botnet herder. For example, the Reactor Mailer botnet ran
communicating between devices incorporate little, if any, from 2007 to 2009, at its peak sending more than 180 billion
authentication, which potentially allows anyone who can spam messages per day, 60% of the global total [15]; at least
communicate on these networks to be treated as legitimate. 220,000 infected computers participated in the Reactor Mailer
Consequently, these systems can be disrupted by a series of botnet each day. The Zeus botnet, by contrast, uses key logger
crafted messages. The potential for harm was demonstrated software to steal online credentials that are relayed back to
by researchers at Idaho National Laboratory who remotely the botnet herder; the botnet is estimated to be as large as
destroyed a large diesel power generator by issuing SCADA 3.6 million computers [16]. Botnets can also be used to carry
commands [12]. out denial-of-service attacks. Here, the herder directs the
In order to carry out an attack, the adversary needs to infected computers to make connections to the same website,
know quite a bit of specialist knowledge about the obscure overloading the targeted site. Botnets were employed to carry
protocols used to send the messages, as well as which out denial-of-service attacks in Estonia [17] and Georgia [18].
combination of messages to select. The attacker also needs
access to the system. This latter requirement is becoming
easier for an attacker to meet due to the trend over the 3. Economic barriers to improving cybersecu-
past decade to indirectly connect these control systems to rity
the Internet. The main motivation for doing so is to ease
remote administration. A related type of convergence is that Each of the cybersecurity threats discussed in Section 2
the networks themselves are becoming IP based. That is, has distinct technical characteristics, stakeholders, and legal
the lower-level network and transport protocols used to send constraints. However, some commonalities remain, notably in
control messages are now the same as for the wider Internet. the economic barriers that inhibit optimal levels of security
This trend also makes it easier for an attacker, once access investment. We now discuss the crucial common traits first;
has been gained, to start sending spurious messages. A few in Section 4, we will examine the legal and policy options
specialist control system engineers understand the transport available for each application.
protocols used by SCADA systems, whereas huge numbers of
IT technicians and computer scientists understand Internet 3.1. Misaligned incentives
protocols. This lowers the technical bar for carrying out
attacks. Information systems are prone to fail when the person or
While many agree that critical infrastructures are firm responsible for protecting the system is not the one who
vulnerable to cyber attack, few attacks have been realized. suffers when it fails. Unfortunately, in many circumstances
Anonymous intelligence officials have reported that Chinese online risks are allocated poorly. For example, medical records
and Russian operatives have regularly intruded into the systems are procured by hospital directors and insurance
US electrical grid [13]. Note, however, that no official has companies, whose interests in account management, cost
gone on the record to describe the intrusions. Nonetheless, control, and research are not well aligned with the patients’
the vulnerability cannot be disputed, and the worst-case interests in privacy. Electricity companies have realized
possibility has been demonstrated. substantial efficiency gains by upgrading their control
systems to run on the same IP infrastructure as their IT
2.4. Botnets networks.
Unfortunately, these changes in architecture leave sys-
Malware is frequently used to steal passwords and compro- tems more vulnerable to failures and attacks, and it is society
mise online banking, cloud, and corporate services. It is also that suffers most in the event of an outage. Banks encourage
used to organize infected computers into a ‘botnet’: a net- consumers and businesses to bank online because it mas-
work of thousands or even millions of computers under the sively reduces branch operating costs, even if the interfaces
control of an attacker that is used to carry out a wide range are not secure and are regularly exploited by attackers. As
of services. The services include sending spam, committing pointed out by Anderson and Moore [19], misaligned incen-
online-advertising fraud, launching denial-of-service attacks, tives between those responsible for security and those who
hosting phishing attacks, and anonymizing attack traffic. Bot- benefit from protection are rife in IT systems. Consequently,
nets are different from the previous three categories because any analysis of cybersecurity should begin with an analysis of
they represent an attack method rather than a target. Botnets stakeholder incentives.
can be employed in attacks that target all three categories. For A natural tension exists between efficiency and resilience
instance, some phishing attacks carried out by the rock-phish in the design of IT systems. This is best exemplified by the
gang use a botnet infrastructure [14]. The GhostNet/Snooping push over the past decade towards network ‘convergence’.
Dragon espionage of Tibetan authorities utilized a specialized Many critical infrastructure systems used to be operated
botnet [7,8]. Finally, botnets are useful for providing anony- on separate networks with incompatible protocols and
mous cover for cyber attacks such as those that might harm equipment—SS7 protocols managed the phone system,
critical infrastructure assets. SCADA protocols controlled electrical grids, and so on. It is
106 I N T E R N AT I O N A L J O U R N A L O F C R I T I C A L I N F R A S T R U C T U R E P R O T E C T I O N 3 (2010) 103–117

far cheaper to employ and train engineers whose expertise However, the combination of secrecy and FUD (fear,
is in TCP/IP, and run the many disparate applications over uncertainty, and doubt) is dangerous. To understand why,
a common Internet infrastructure. The downside, however, consider how the used car market works. George Akerlof won
is that the continued operation of the Internet has become a Nobel prize for describing how markets with asymmetric
absolutely essential for each of these previously unconnected information, such as the market for used cars, can fail [21].
sectors, and failure in one sector can have spillover effects in Suppose a town has 50 good used cars (worth $2000 each) for
many other sectors. Yet, an individual company’s decision to sale, along with 50 ‘lemons’ (worth $1000 each). The sellers
reduce its operating IT costs does not take into account such know which type of car they have, but the buyers do not.
an increase in long-term vulnerability. Reconciling short-term What will be the market-clearing price? One might initially
incentives to reduce operating costs with long-term interest expect $1500. But at this price no one with a good car will
in reducing vulnerability is difficult. sell, and so the market price quickly ends up near $1000.
Perfect security is impossible, but even if it were, it Consequently, the market is flooded with lemons, since no
would not be desirable. The trade-off between security and one with a good car would agree to sell at $1000. The key
efficiency also implies that there exists an optimal level of insight is that buyers are unwilling to pay a premium for
insecurity, where the benefits of efficient operation outweigh quality they cannot measure, which leads to markets with
any reductions in risk brought about by additional security low-quality products.
measures. For instance, consumers benefit greatly from the In 2001, Ross Anderson pointed out that the market for
efficiency of online banking. The risk of fraud could be secure software is also a ‘market for lemons’: security vendors
reduced to nothing if consumers simply stopped banking may assert that their software is secure, but buyers refuse
online. However, society would actually be worse off because to pay a premium for protection, and so vendors become
the added cost of conducting banking offline would outweigh disinclined to invest in security measures [22]. A similar effect
the total losses due to fraud. When misaligned incentives is triggered by the refusal to disclose data on losses due to
arise, however, the party making the security–efficiency security incidents. The lack of reliable data on the costs of
trade-off is not the one who loses out when attacks occur. information insecurity makes it difficult to manage the risk.
This naturally leads to suboptimal choices about where to Unreliable information takes many forms, from security
make the trade-off. Unfortunately, such a misalignment is vendors overstating losses due to cyber crime to repeated
inevitable in many information security decisions. warnings of digital Armageddon caused by the exploitation
of process control system vulnerabilities while suppressing
3.2. Information asymmetries the discussion of realized or attempted attacks. The existence
of an information asymmetry does not necessarily mean
Many industries report a deluge of data. Some complain of that society is not investing enough in security, nor that
being overwhelmed. However, in the security space there is a too much money is being allocated. Rather, it simply means
dearth of relevant data needed to drive security investment. that it is likely not investing in the right defenses to the
Testifying before the US Congress on March 20, 2009, ideal proportion. Ill-informed consumers and businesses
AT&T’s Chief Security Officer Edward Amoroso estimated that are prone to invest in snake-oil solutions if they do not
the annual profit of cyber criminals exceeds $1 trillion [20]. possess an accurate understanding of threats and defenses.
$1 trillion is a lot of money; it is bigger than the entire IT Meanwhile, security companies may not be pressured to bring
industry, and is approximately 7% of US GDP. It is also likely new technologies to market that protect against the most
to be an extreme overestimate, perhaps triggered by a need substantial threats. If we do not address the lack of reliable
to attribute enormous sums to any threat when competing information soon, we are liable to end up with decision
for Congress’s attention during this time of trillion-dollar bail- makers in industry and government who refuse to implement
outs. the necessary protections because data that clarifies the
Note, however, we said it is likely an overestimate. The magnitude and nature of the most significant threats is just
fact is we do not know the true cost of cyber crime because not there.
relevant information is kept secret. Sure, we may never gain
access to the miscreants’ bank accounts. But we do know that 3.3. Externalities
most of revenue-generating cyber crime is financial in nature,
and that US banks are not revealing how much they are losing The IT industry is characterized by many different types of
to online fraud. externality, where individuals’ actions have side effects on
There is an incentive to underreport incidents across the others. We discuss three types in turn: network externalities,
board. Banks do not want to reveal fraud losses for fear of externalities of insecurity, and interdependent security.
frightening away customers from online banking; businesses The software industry tends toward dominant firms,
do not want to cooperate with the police on cyber espionage thanks in large part to the benefits of interoperability.
incidents because their reputation (and their stock price) may Economists call this a network externality: a larger network,
take a hit; operators of critical infrastructures do not want or a community of software users, is more valuable to each
to reveal information on outages caused by malicious attack of its members. Selecting an operating system depends not
for fear it would draw attention to systemic vulnerabilities. only on its features and performance but also on the number
The reticence to share information is only countered by the of other people who have already made the same choice.
overenthusiasm of many in the IT security industry to hype This helps explain the rise and dominance of Windows as
threats. an operating system, as well as the dominance of iTunes in
I N T E R N AT I O N A L J O U R N A L O F C R I T I C A L I N F R A S T R U C T U R E P R O T E C T I O N 3 (2010) 103–117 107

online music sales and Facebook in online social networks. regulatory efforts involving information security concern
Furthermore, it helps explain the typical pattern of security financial institutions that face considerably more regulatory
flaws. When a platform vendor is attempting to build market scrutiny. Ex ante safety regulation is designed to prevent
dominance, it must appeal to vendors of complementary accidents by prescribing safeguards before accidents occur.
products as well as to its direct customers. It is more difficult The bulk of information security regulation (both industry
to develop applications for a secure operating system, so and government led) is compliance driven, a type of ex ante
security is not emphasized until market dominance has been regulation. Firms adopt security policies and ‘best practices’
achieved. Likewise, the opportunities made possible by being and test their own compliance with these rules.
first to market explain why insecure software is hurriedly One example of ex ante regulation can be found in
pushed to market, and why software today is issued in the Financial Services Modernization Act of 1999 (also
perpetual ‘beta’, or test, mode. known as the Gramm–Leach–Bliley Act), which obliges banks
Network externalities also help explain why many of the to ‘protect the security and confidentiality’ of customer
secure upgrades to Internet protocols, such as DNSSEC and S- information. Federal banking regulators implemented this
BGP, have failed to be adopted widely. The security benefits requirement by specifying processes that banks must
of such protocols are not realized until many other users comply with, such as adopting a written information
have also upgraded, which has discouraged early adoption. security program and establishing programs to assess and
SSH and IPSec, by contrast, have been much more successful manage operational risks. Notably, such regulations avoid
because they provide immediate internal benefits to those technical prescriptions in favor of forcing compliance with
who adopt them. organizational requirements. A process-based approach has
Insecurity creates negative externalities. A compromised the advantage of being less dependent on rapidly changing
computer that has been incorporated in a botnet can pollute technologies, as well as making the job of compliance
the Internet, harming others more than the host. As described verification easier for regulators. On the other hand, the
in Section 2.4, botnets send spam, host phishing scams, effectiveness of compliance-driven security policies has been
launch denial-of-service attacks, and provide anonymous called into question [25]. Given the poor state of cybersecurity,
cover for attackers. In each case, the target of the malicious compliance-driven security is at best a qualified failure.
activity is someone other than the host computer. The The alternative to proactive ex ante regulation is to assign
societal losses due to control systems failure, such as ex post liability for failures to the responsible party. Here, the
prolonged power outages, exceed the financial loss to an hope is that the threat of monetary damage arising from
individual utility in terms of lost revenue. Because the private legal actions will encourage actors to take the necessary
risks facing utilities are less than the social risks, we would precautions to make failures unlikely.
expect an underinvestment in protections against the social Section 5 of the Federal Trade Commission Act (15 USC
risks. Finally, we must also consider the positive externalities §45) grants the FTC authority to take action against unfair
of Internet use that go squandered when people are afraid to or deceptive acts and practices that affect commerce. Since
use the Internet due to its insecurity. 2005, the FTC has occasionally charged companies with
A final type of externality relevant to cybersecurity is acting ‘unfairly’ by failing to adopt reasonable information
interdependent security. Kunreuther and Heal [23] note security practices. Most of their efforts to date have been
that security investments can be strategic complements: aimed at non-financial companies that have suffered massive
an individual taking protective measures creates positive breaches of personal information, including BJs Wholesale
externalities for others that in turn may discourage their own Club, DSW, and ChoicePoint. Notably, the FTC’s awareness
investment. Free-riding may result. Varian [24] pointed out of these security failures stems from the proliferation of
that free-riding is likely whenever security depends on the mandatory breach disclosure regulations adopted by many US
weakest link in the chain: firms do not bother investing in states.
security when they know that other players will not invest, Software companies have long avoided ex post liability for
leaving them vulnerable in any case. vulnerabilities in their own products [26]. Many have argued
that making Microsoft liable for the consequences of exploits
targeting Windows operating systems would give it a strong
4. Prospective solutions incentive to secure its products. This is undoubtedly true,
but the question is whether it is too blunt an instrument
The economic barriers just discussed – misaligned incentives, to incentivize good behavior. For instance, Microsoft has
information asymmetries, and externalities – suggest that already made huge investments in improving the security of
regulatory intervention may be necessary to strengthen Windows, leading to significant delays in the deployment of
cybersecurity. We review several different approaches, assess Windows Vista. This happened without the threat of liability,
their suitability to the cybersecurity problem, and outline a although one can argue that it was easier for Microsoft
series of concrete proposals for regulating cybersecurity. to spend money on security after having established its
dominant market position.
4.1. Overview of regulatory options A blanket assignment of liability to software developers
– say by voiding all contract terms that disclaim liability for
4.1.1. Ex ante safety regulation versus ex post liability defects – is no panacea. First, introducing software liability
Much of the IT industry has thus far avoided significant would create significant negative side effects. The principal
regulation. Hence, many of the examples of existing negative effect would be a reduction in the pace of innovation.
108 I N T E R N AT I O N A L J O U R N A L O F C R I T I C A L I N F R A S T R U C T U R E P R O T E C T I O N 3 (2010) 103–117

If each new line of code creates a new exposure to a lawsuit, is now available to the public online (www.epa.gov/tri), and
it is inevitable that fewer lines of code will be written. A move citizens can search the database by ZIP code to learn about
towards software liability will also damage the flourishing the chemicals and the companies that released them by ge-
free software community. Graduate students might hesitate ographic region. Mandatory information disclosure initiatives
to contribute code to a Linux project if they have to worry such as the TRI are well positioned as a lightweight regulatory
about being sued years later if a bug they introduce leads alternative to ex ante regulation or ex post liability.
to a critical vulnerability. Resistance to software liability is Another example relevant to cybersecurity is the flurry
one of the few points of agreement between open-source and of privacy breach notification laws adopted in 44 states, led
closed-source advocates. A second reason is that it is not by California in 2002 (California Civil Code 1798.82). Both
obvious that introducing liability would make software secure public and private entities must notify affected individuals
overnight, or even in the long term. This is because software when personal data under their control has been acquired
development is inherently buggy. Even responsible software by an unauthorized party. The law was intended to ensure
companies that rigorously test for weaknesses do not find all that individuals are given the opportunity to protect their
the bugs before a product ships. To expect all software to ship interests following data theft, such as when 45 million
free of vulnerabilities is not realistic. credit card numbers were stolen from T.J. Maxx’s information
A better approach, then, is to encourage responsible technology systems [30]. Breach-disclosure laws are also
software development by vendors. Software companies might designed to motivate companies to keep personal data secure.
be required to demonstrate that its software development Unquestionably, firms are now more aware of the risks
lifecycle includes adequate testing. The best policy response of losing personal information, and have directed more
is to accept that security failures are inevitable, and to investment in preventative measures such as hard drive
instead emphasize robust responses to security incidents encryption [31].
(as exemplified by Recommendation 1 in Section 4.2). Researchers have also found evidence that the information
Furthermore, given the long-standing success of the IT disclosure requirement has both punished violators and
industry in disclaiming software liability, this report focuses reduced harm. Acquisti et al. [32] found a statistically
on alternative regulatory arrangements that are more likely to significant negative impact on stock prices following a
receive broad stakeholder support. Ex post liability may still be reported breach. Meanwhile, Romanosky et al. [33] examined
a viable strategy for other aspects of the cybersecurity, notably identity theft reports obtained from the FTC from 2002 to
process control system security. 2007. Using time differences in the adoption of state breach
Legal scholars have studied the trade-offs between ex disclosure laws, they found a small but statistically significant
post liability and ex ante regulation regimes. Shavell [27] and reduction in fraud rates following each state’s adoption.
Kolstad et al. [28] find that the best outcome occurs when A final benefit of breach disclosure laws is that they
both are used simultaneously. However, they also find that contribute to the availability of data on security incidents
ex ante regulation does not work well when the regulator in the public domain. This has reduced the information
lacks information about the possible harm or is uncertain asymmetry among firms pertaining to the prevalence and
what the minimum standards should be. Unfortunately, severity of leakages of personal information. Unfortunately,
both these conditions hold in the context of cybersecurity: there is currently no central clearinghouse for breach reports
security incidents are swept under the rug by affected firms like the Toxic Release Inventory. Instead, the volunteer
and regulators have yet to find a compliance regime that website datalossdb.org aggregates reports identified from
has significantly improved cybersecurity. Meanwhile, ex post news reports and letters sent to victims. Despite these
liability runs into trouble when firms are not always held limitations, privacy breaches offer the most empirical
liable for harms created or when firms cannot pay full evidence among all classes of cybersecurity incidents, directly
damages. These conditions, too, often hold for cybersecurity. as a result of information-disclosure legislation.
Given this grim reality, we have to consider an alternative However, there are important differences between the
approach: information disclosure. circumstances facing toxic chemical and privacy breach
disclosures and the types of cybersecurity topics identified
4.1.2. Information disclosure in Section 2. One key motivation of existing information
Since information asymmetries are a fundamental barrier to disclosure regimes is consumer empowerment. In other
improving cybersecurity, adopting policies that improve infor- words, there is a strong sense of a ‘right to know’—
mation disclosure may be helpful. Information disclosure has notification is required whenever personal information is
two primary motivations. First is the view, articulated by Louis lost, empowering consumers to check credit reports for any
Brandeis, that ‘sunlight is the best disinfectant’. Bringing un- suspicious activity. While consumers may also expect to
fortunate events to light can motivate firms to clean up their know about cybersecurity incidents, it is often the case
acts. Second, disclosure can be motivated by a sense of the that firms lack the requisite information on cyber incidents
community’s ‘right to know’. The Emergency Planning and necessary to invest in countermeasures. If the remote login to
Community Right-to-Know Act of 1986 forced manufacturers the control system of a power station is compromised and the
to disclose to the EPA (and, consequently, to the public) the utility keeps mum about what happened, then other power
amounts and types of toxic chemicals released into the en- companies will not fully appreciate the likelihood of attack.
vironment. The aggregated data, known as the Toxic Release When banks do not disclose that several business customers
Inventory (TRI), has been effective in reducing the amount of have lost millions of dollars due to the compromise of online
toxic chemicals discharged into the environment [29]. The TRI banking credentials, the customers that have not yet fallen
I N T E R N AT I O N A L J O U R N A L O F C R I T I C A L I N F R A S T R U C T U R E P R O T E C T I O N 3 (2010) 103–117 109

victim are ignorant of the need to take precautions. Thus, in fallen short of optimistic growth projections. For instance,
cybersecurity, we face information asymmetries across firms, a conservative forecast in 2002 predicted the global cyber
not just between consumers and firms. insurance market would rise to $2.5 billion by 2005. However,
Might information sharing and analysis centers (ISACs) the actual size of the market in 2008 was only 20% of the size
be a viable solution to the asymmetry that exists between that was forecasted for 2005 [36]. Furthermore, the biggest
firms? ISACs are closed industry groups where participants benefits ascribed to cyber insurance have not been realized.
can voluntarily share security-related information. ISACs
Rather than differentiate premiums by observed security
were set up by Presidential Decision Directive 63 in 1997 to
levels, insurance companies base their premiums on non-
enable the federal government to coordinate the protection
technical criteria such as firm size. Additionally, insurance
of critical infrastructures (telecommunications, transport,
companies have not amassed a large claims history that
water, chemical plants, banks, etc.), which are primarily
owned and operated by private entities. documents incidents.
While ISACs have been useful, they are no substitute for Why has the market for cyber insurance been such a
a policy of transparency and information disclosure. Many disappointment? Factors on both the demand and supply
ISAC meetings are classified, so incidents discussed at these sides offer an explanation. On the demand side, insurers
meetings are kept secret from many stakeholders as well as complain of a lack of awareness of cyber risks by firms. In
the public. The rationale is that companies are more likely fact, they point to mandatory breach disclosure legislation as
to voluntarily participate and be forthright if the information a significant step in the right direction, arguing that it has
is kept secret. While this may be true, it underscores the increased awareness at the executive level of this particular
value of the mandatory nature of the information disclosure
category of threat. Consequently, policies that increase the
efforts described above. (Occasionally, however, particularly
disclosure of cyber risks and incidents would help stimulate
egregious incidents are publicized, due to government
further growth in the cyber insurance market. However, not
prodding. For instance, in August 2009, the Financial Services
all demand-side challenges can be addressed by increased
ISAC issued a joint report with the FBI about business-level
online banking fraud, describing how criminals had made off awareness alone. The responsibility for dealing with cyber
with over $100 million, stealing hundreds of thousands of incidents must be clearly assigned to the appropriate party,
dollars from each victim.) A greater awareness of incidents, otherwise no claims will need to be made. For instance, there
including those that companies would rather keep hidden, is is no need for ISPs to take out insurance against computer
made possible by mandatory disclosure. Furthermore, in the infections such as viruses and malware when they are not on
cybersecurity domain, competitive interests often preclude the hook for mitigation. Legislation that clarifies the liability
voluntary private sector cooperation. For instance, security for cyber incidents would go a long way towards remedying
companies that remove fraudulent phishing websites do not the lack of demand for cyber insurance.
share their data feeds with each other, causing a much slower Barriers to the provision of cyber insurance extend
response [34].
to issues of supply. First, information asymmetries – in
In summary, information disclosure can be a powerful tool
particular, the difficulty of assessing the security of an
for reducing information asymmetries and adjusting mis-
insured party – can help explain why insurance companies
aligned incentives. However, simply righting an information
still do not differentiate premiums based on technical
asymmetry will not necessarily fix a problem when external-
ities are present. criteria. Certification schemes might help, but designing
security certifications that cannot be gamed is difficult.
4.1.3. Cyber insurance Examples of failed certifications include Common-Criteria-
Insurance is another mechanism for managing the risks certified ‘tamper-proof’ PIN entry devices broken by cleverly
presented by network and information security (see, e.g., [35]). placed paper clips [37] and more malicious websites receiving
A robust market for cyber insurance would offer several the TrustE seal of approval than legitimate sites [38]. The
benefits to society. Foremost, insurance could offer a other big supply side problem is that losses from many
strong incentive for individuals and organizations to take types of information security risks are globally correlated.
appropriate precautions. Insurance companies could reward Given the dominant market share of the Windows operating
security investments by lowering the premiums for less system, a new exploit that compromises Windows platforms
risky actors. Second, because insurance companies base will affect companies everywhere simultaneously. Whenever
their competitive advantage on risk-adjusted premium such correlations exist, then premiums must be raised, and
differentiation, they have an incentive to collect data on the rise in premiums often prices many firms out of the
security incidents where claims are made. Consequently,
market [39]. In practice, insurance companies have avoided
cyber insurance is often touted as a solution to the
such correlations in their claims by adding exclusions to
informational challenges outlined in Section 3.2. Third, like
coverage such as excluding damage incurred by untargeted
all types of insurance, cyber insurance can help firms smooth
attacks. Such exclusions make cyber insurance as offered
financial outcomes by accepting the small fixed present cost
of an insurance premium in place of future uncertainty of today a far less attractive solution to mitigating risk.
large losses. To conclude, cyber insurance may eventually be part of a
Despite these advantages, the market for cyber insurance long-term solution to improve cybersecurity, but it needs the
has remained small for many years, and has repeatedly right mix of policy to help make it viable.
110 I N T E R N AT I O N A L J O U R N A L O F C R I T I C A L I N F R A S T R U C T U R E P R O T E C T I O N 3 (2010) 103–117

4.1.4. Indirect intermediary liability operations. Note that the payment system has been used
Perhaps surprisingly to non-lawyers, liability does not have to as an intermediary in the fight against other online ills,
be placed on the party directly responsible for harm. Under including child pornography, controlled substances, and
indirect liability regimes, third parties are held responsible tobacco sales to minors (see [41] for a thorough explanation
for the wrongs of others. At least three actors are usually for how the law was applied in each case).
involved: the bad actor, the victim, and a third party. A Payment card fraud is one area of cybersecurity where
classic example of indirect liability comes from employment indirect liability is already used. The bad actors who commit
law: employers can be held liable for the actions of their account fraud victimize cardholders. Under the Truth in
employees. Why would indirect liability ever be desirable? Lending Act of 1968 (implemented by the Federal Reserve
Following the logic of Lichtman and Posner [40], a number of as Regulation Z), credit card holders are protected from
conditions can make indirect liability attractive. First, the bad liability for unauthorized charges on their accounts. Similarly,
actors could be beyond the reach of the law, either because the Electronic Funds Transfer Act (implemented through
Regulation E) protects debit card holders from liability for
they cannot be identified or because they could not pay up
fraudulent use. Instead, the obligation to repay falls on banks
even if caught. Second, high transaction costs could make
that operate the payment system, since the criminals are
designing contracts that assign responsibility infeasible. Once
often out of reach.
either of these conditions is met, two additional factors
It is instructive to examine how liability for payment
should be considered. First, indirect liability is attractive
card fraud has been allocated among intermediaries [42].
when a third party is in a good position to detect or prevent
In the case of fraud occurring at brick-and-mortar stores,
bad acts. Second, indirect liability is useful when the third
banks rather than merchants traditionally foot the bill. For
party can internalize negative externalities by reducing the
online transactions, however, the merchant has to pay. This
incidences of bad acts.
is because online transactions are riskier since the card is not
Lichtman and Posner [40] argue that these conditions hold
present. Banks and merchants have continued to fight over
for ISPs in the context of cybersecurity. We defer discussion
who should ultimately pay out in different circumstances.
of the suitability of assigning liability to ISPs for cybersecurity The Payment Card System Data Security Standard (PCI
to the next section. For now, we note that, while strict liability DSS) is a series of compliance requirements designed to
has been avoided in virtually all Internet contexts, there are improve the security of the payment system, particularly for
some areas where Internet intermediaries have been either merchants. Merchants found to be non-compliant with PCI
obligated or protected from taking actions. requirements are assigned liability for fraud under industry
Section 230 of the 1996 Communications Decency Act rules. Merchants complain of the high costs of compliance
(CDA) exempted Internet providers from liability for harmful and argue that PCI DSS is nothing more than a thinly veiled,
content contributed by its users. Until the CDA was passed, industry-led liability shift from banks to merchants. Banks
service providers were reluctant to moderate any user posts in turn argue that the issue is fairness, and that merchants
for fear that doing so would expose them to liability for all the must take responsibility for securing payment information
content contributed by users. Section 230 of the CDA offered and payment systems. A key point when considering what
immunity to service providers that chose to voluntarily delete to do about cybersecurity is that any legal ambiguity about
contributions from users that were deemed inappropriate. which intermediary must pay for remedies is undesirable and
Note, however, that the CDA made no obligation to remove can lead to nasty legal battles.
defamatory or slanderous content, even if it is illegal. In summary, Congress has acted to regulate illegal
The Digital Millenium Copyright Act (DMCA) of 1998 took a online activities by articulating what intermediaries can
different tack with respect to how service providers respond or must do. There is a range of intervention possible,
to online users who violate copyright restrictions. The DMCA from ‘Good Samaritan’ provisions that protect voluntary
also exempts service providers from liability for copyright countermeasures to obligations of action in order to gain
infringement carried out by their customers. However, there exemptions from liability. Most legislative interventions have
is a catch: ISPs must comply with ‘notice-and-takedown’ been hands-off and lightweight, but unafraid to enlist
requests from copyright holders by expeditiously removing the support of Internet participants to counter undesirable
the content in question in order to obtain the liability activity.
exemption.
ISPs are not the only intermediary enlisted by Congress 4.2. Recommendation 1: Mitigating malware infections
to help rid the Internet of ‘bad’ actors. Payment networks via ISPs by subsidized cleanup
(i.e., credit card networks such as Visa and MasterCard)
are often seen as another intermediary where pressure can As described in Section 2.4, botnets composed of computers
be applied. For instance, while early legislation aimed at that are infected with malware present a substantial threat
stopping Internet gambling focused on ISPs, in passing the to many aspects of cybersecurity. This is because botnets
Unlawful Internet Gambling Enforcement Act (UIGEA) of 2006, are a preferred tool for carrying out a variety of online
Congress ultimately settled on payment processors as the attacks. Therefore, in our first recommendation, we describe
intermediary to assign indirect liability. Payment processors a way to counter botnets by overcoming the economic
were obliged to implement procedures that stopped Internet barriers described in Section 3 using policies inspired by the
gambling transactions. Because Internet gambling operations regulatory options discussed in Section 4.1.
cannot proceed without credit card payments, leaning on Recommendation 1: Devise a program of malware remediation with
the payment processors was an effective way to shut down the following attributes:
I N T E R N AT I O N A L J O U R N A L O F C R I T I C A L I N F R A S T R U C T U R E P R O T E C T I O N 3 (2010) 103–117 111

– ISPs are obliged to act on notifications that their customers address these cases, Comcast has partnered with McAfee to
are infected with malware by helping to coordinate offer remediation services by skilled technicians for $89.95.
the cleanup of affected computers. In exchange for Australian ISPs recently announced a similar notification-
cooperation, ISPs receive an exemption from liability for based effort [45].
the harm caused by the infected machines. If ISPs do not Another ISP-based option is to ‘quarantine’ infected
cooperate, then they become liable for the harm caused by computers. While in quarantine, users are required to
the infected machines. download and install anti-virus software and malware
– The costs of cleanup will be shared between ISPs, removal tools. They are permitted to rejoin the wider Internet
government, software companies, and consumers. only after the security software is installed and the computer
– Reports of infections (including ISP, platform/operating passes a network-based scan for malware. Quarantine is
system, infection vector, time to remediation, and considerably more expensive than notification-only-based
remediation technique) must be maintained in a database interventions because special hardware must be installed at
and made publicly available on the data.gov website. ISPs and more customer-support calls are made. Some ISPs
– Software companies contribute financially to a cleanup use quarantine, but only for a minority of infected customers.
fund according to the number of reported infections Recently, Dutch ISPs announced a program that notifies and
that affect its software. Software companies receive an quarantines infected customers [46]. Note that in the Dutch
exemption from liability for the harm caused by the and Australian cases many ISPs have joined together in
infected machines in exchange for contributing to the common action. In part, this collective action is designed
fund. to allay the fear that customers might switch to a different
– Consumer contribution to cleanup is capped at a small provider rather than fix the underlying problem.
fixed amount. Consumers receive guarantees that they However, despite the increased interest among some ISPs,
will not be disconnected by their ISPs in exchange for by far the most common response by an ISP to a notification
cooperating with cleanup efforts. about a malware infection is to take no action. Why? The
A substantial portion of Internet-connected computers incentive for ISPs to intervene is very weak [47]. Malware
are infected with malware. Estimates range from a few harms many victims, from consumers whose credentials are
per cent to 25% or more. Malware is frequently used to stolen to the targets of DDoS attacks. However, ISPs are not
steal passwords and compromise online banking, cloud, affected much, apart from the prospects of being chided
and corporate services. It is also used to recruit infected by other ISPs if too many customer machines send out too
computers into botnets, which may used to send spam, much spam. By contrast, ISPs face significant tangible costs
commit online-advertising fraud, launch denial-of-service by intervening. Above all, the costs of customer support
attacks, host phishing attacks, or anonymize attack traffic. in dealing with the phone calls received after sending out
How does malware get cleaned up today? Sometimes notices or placing customers in quarantine are very high. For
the user will notice. If the user has installed anti-virus an ISP, it is much less costly to simply ignore the notifications.
software, then the software may detect the malware after Consequently, the status quo of malware remediation
receiving updated signatures. However, this often does not is unacceptable. Many ISPs choose not to act, and those
work because most malware tries to disable new updates to that do avoid cleaning up the hard cases. Notification-
the anti-virus software. Another option for Windows users is only approaches leave many computers infected, while
Microsoft’s Malicious Software Removal Tool (MSRT). While quarantine-based schemes can unfairly shut down the
far from comprehensive, the MSRT automatically detects Internet connections of consumers who have followed all the
and removes popular types of malware. If these measures steps but still remain infected. So what should the solution
fail, then the user often remains completely ignorant of look like?
the presence of malware. However, most malware-infected The first step in a comprehensive solution is to determine
computers leave a trail of malicious activity that can be who should be responsible for taking action, and how to
identified by third-party security companies that monitor assign the responsibility. The ISP is a natural candidate
Internet traffic. These companies often notify the relevant for assigning indirect intermediary liability for cleaning up
ISP of the activity. Some ISPs also actively detect computers malware. This is because the miscreants who are responsible
that participate in botnets [43] and pass lists of suspected IP for the infections are typically beyond the reach of the law.
addresses to the relevant ISPs. This cooperation stems from Furthermore, as discussed above, ISPs are in a good position
ISPs’ long-standing cooperation in fighting spam, which is to detect and clean up computers infected with malware. But
now sent via botnets. how should the liability be assigned?
After they are notified about malware on their customers’ Lichtman and Posner [40] argue that ISPs should take on
computers, ISPs have several options. At a bare minimum strict liability for the actions of their customers’ computers. In
they can inform consumers. In October 2009, Comcast other words, they suggest simply that the ISPs should take the
announced a trial program to notify infected customers blame for malware-infected customers, and let them choose
via browser pop-ups and provide them with instructions how they remedy the situation given the threat of legal
for removal [44]. Such notification-only schemes rely on responsibility. However, considering the exemptions ISPs
customers to take the necessary steps, which sometimes have historically secured from responsibility for the actions
works for tech-savvy users and malware detectable by tools of their customers in other contexts, such an aggressive
such as Microsoft’s MSRT. Inevitably, though, malware is approach is unlikely to succeed. Instead, we look to the
often not removed by users after they have been notified. To examples discussed in Section 4.1.3 for inspiration.
112 I N T E R N AT I O N A L J O U R N A L O F C R I T I C A L I N F R A S T R U C T U R E P R O T E C T I O N 3 (2010) 103–117

The most cautious approach would be to follow the some responsibility for cleaning up the mess. To that end,
lead of CDA §230 and make cleanup voluntary, explicitly we recommend that the costs of cleanup be shared by
stating that ISPs have no obligation to fix infected computers, ISPs, government, software companies, and consumers. ISPs
but that they are given legal leeway in the event they already pay as a result of the increased overhead in managing
choose to intervene. While some ISPs are already intervening the cleanup process. Governments and software companies
voluntarily, clarifying the legal right to do so might embolden should pay by contributing to a fund that will help subsidize
wary ISPs to act. However, there are distinct disadvantages the ISP cleanup process. There are already precedents for
to this approach. Notably, it does nothing to compensate for cost-sharing between third parties in the cybersecurity
the weak incentives that ISPs face in taking action, leading to context. First, Luxembourg is exploring the possibility of
incomplete remediation. Furthermore, by enshrining a lack of subsidizing malware cleanup [49]. Second, as mentioned
duty, ISPs may choose to intervene even less often than they in Section 4.1.3, banks have negotiated arrangements with
do in today’s more ambiguous environment. merchants to help pay for fraudulent transactions whenever
A more ambitious approach (and the one we recommend) standard security practices have not been met. For instance,
is to assign responsibility as has been done in the DMCA. Visa negotiated a payment of $40.9 million from TJX to
Under a DMCA-like arrangement, ISPs get safe harbor from reimburse banks following a breach that affected 46 million
liability if they clean up infected customer machines upon cardholders [30], while in January 2010 Heartland agreed
notification. Notification of infected computers can come to pay MasterCard $41 million following a breach of 100
from an ISP’s own efforts, detection by other ISPs, or from million credit card numbers [50]. Rather than negotiating one-
third-party security researchers, as already happens today. off settlements between intermediaries, given the persistent
Safe harbor is granted if ISPs begin the cleanup process upon nature of malware infections, we recommend establishing
notification. They can attempt automated notifications first, a fund that receives regular payments from software
and ratchet up their efforts if notifications fail to fix the companies.
problems. Quarantine may be tried next, followed by perhaps The government should pay for cleanup because it
sending technicians to remediate the machines. Legislation values clean networks and the reduction in denial-of-
would not be prescriptive in laying out the steps that must service attacks, corporate espionage, and identity theft made
be tried and their order; rather, the scheme should be flexible possible by malware. Software companies should pay because
enough to enable ISPs to try different approaches, as long as holes in their software make the compromises possible.
they are documented and the ultimate solution is a verified, To make participation more palatable, we recommend that,
timely cleanup of the affected computer. in exchange for helping to pay for the cleanup, software
ISPs that do not comply with notifications assume liability companies be granted safe harbor from any harm the
for the actions of the compromised machines. The amount compromised machines have caused prior to cleanup. The
of liability could be determined by the damages caused. payment could be distributed according to what caused the
Alternatively, since determining the harm caused by a infections. If the infection reports include the method of
particular machine is difficult, liability could be assigned as exploitation, then it is easy to identify if the culprit is
a fixed penalty per ignored infection. Fixed penalties are Windows XP (Microsoft pays) or Acrobat (Adobe pays). Once
used in other regulatory contexts. For example, in Europe, the scheme is up and running, the contributions for the
airlines are assigned fixed penalties for flight overbooking, succeeding quarter can be based on the share of cleanup costs
cancellations, and excessive delays. Fixed penalties are for the previous quarter. In this way, companies are rewarded
useful because they avoid the problem of quantifying losses for selling software that is more secure. In some cases (e.g.,
following every infringement. The threat of penalties should for open-source software), it will be difficult to track down
alter behavior so that, in practice, penalties are rarely issued. the party responsible for developing the software that has
Anderson et al. [48] have recommended that the European been exploited. In this case, the government can pay the
Commission introduce fixed penalties for ISPs that do not unclassified share.
expeditiously comply with notifications of compromised An absolutely critical component of the scheme is that
machines in their networks. Such an approach could be it be transparent. We recommend mandatory disclosure
effective in our context as well. of malware infections and cleanup in the same spirit as
Three additional caveats to the designed countermeasure the privacy breach notification laws. Rather than requiring
are still needed: a fair distribution of who pays for cleanup, companies to notify only consumers of infections, we
the transparency achieved through mandatory disclosure of recommend mandatory disclosure of all de-identified data
reported infections, and consumer protection that ensures regarding the notification of compromises and the cleanup
that Internet connectivity is not threatened by cleanup processes. Reports of infections (including ISP, machine
efforts. We discuss each in turn. operating system, infection vector, time to remediation, and
Assigning ISPs the responsibility of ensuring that their remediation technique) must be recorded in a database and
infected customers are cleaned up would impose a costly made publicly available on the data.gov website. The format
obligation on them. This is somewhat unfair, because it for the incident data could adhere to the IODEF standard
is not an ISP’s fault that a user has been infected. But (xml.coverpages.org/iodef.html).
indirect liability regimes need not be fair to be effective. Mandatory collection and publication of data is an
However, a fair allocation of responsibilities can help ensure essential component of the scheme and part of the grand
that the proposal has broad support. Surely, the software bargain between ISPs and software companies that would
companies that designed the insecure systems should bear receive liability exemptions in exchange for cooperation
I N T E R N AT I O N A L J O U R N A L O F C R I T I C A L I N F R A S T R U C T U R E P R O T E C T I O N 3 (2010) 103–117 113

with the cleanup process. Mandatory disclosure of infections In light of this reality, policy should focus on ensuring
would help address the information asymmetry that hampers that consumers are protected in the course of any cleanup
information security investment. Disclosure would put efforts. Consequently, we recommend that the financial
valuable security incident data in the public domain, and it responsibility placed on the user be limited. Again, we
is likely that it will trigger the same ‘sunshine effect’ as in have a precedent from the financial industry in Regulations
the case of environmental pollution due to the Toxic Release E and Z, where payment card holders are not liable for
Index and personal information protection as a result of fraudulent activity beyond a small fixed amount. A small
breach-disclosure laws. Some of the worst offenders (both remediation fee, capped at around $20 or so, would make
ISPs and software companies) will be uncovered, raising the cleanup process smoother for malware victims while
awareness of the problem and providing an incentive for minimizing the moral hazard for users. Perhaps, the fee
investment in defense. Progress will become measurable, not could be slightly higher for users who do not have anti-virus
only to insiders but also to outsiders, on the scale and quality software installed.
of cleanup efforts. Public disclosure will help companies It is also essential that ISPs have the burden to actually
gain trust in the level of financial contributions required for remedy infections. Disconnecting the Internet connections
assisting cleanup. Finally, transparent disclosure helps give of users is not an acceptable option, given the increasing
credibility to the claim that improving cybersecurity is taken reliance on the Internet for basic services. The only exception
seriously at the government level. If the US can demonstrate that permits disconnection could be if consumers do not
its commitment to cleaning up its own networks, then the cooperate with ISP cleanup efforts. Otherwise, ISPs should
resulting improvements in security can be used to apply have a duty to perform cleanup, thereby capping the out-of-
pocket expenses for consumers. This addresses the concern
pressure on other countries to follow suit.
that ISPs might find it cheaper to kick off less profitable
We have already staked out the roles for governments,
subscribers rather than clean up their machines.
ISPs, and software companies. What of consumer respon-
sibility? Even customers who adhere to all the best prac-
tices may become infected. According to Panda Secu- 4.3. Recommendation 2: Mandated disclosure of fraud
rity (www.pandasecurity.com/img/enc/infection.htm), 3.94%
losses and security incidents
of US computers scanned were actively running high-risk
Our second recommendation is considerably simpler than the
malware at the time of the scan; 8.21% of computers with-
first.
out anti-virus software were running high-risk malware, but
so did 1.64% of computers with anti-virus software. Further- Recommendation 2: Establish a program that regularly publishes
more, attackers may craft ‘zero-day’ exploits – attacks that the aggregated loss figures related to online banking and payment
exploit vulnerabilities previously unknown to the software cards on data.gov.
provider or anti-virus company – that no software can de- The aggregated loss figures would include the following:
fend against. Finally, contrary to popular belief, infections are – Incident figures: Number of incidents, total value stolen,
not always due to ‘irresponsible’ web browsing habits such as total value recovered for a specified number of incidents.
visiting disreputable websites or installing dubious programs – Victim bank demographics: Number of banks affected,
willy-nilly. A common method of compromise is the ‘drive-by- number of customer accounts impacted per bank,
download’, where miscreants compromise popular websites monetary loss per customer, bank type, precautions taken
so that, when unsuspecting users visit the website, the site by bank (e.g., two-factor authentication, back-end controls
secretly downloads and installs malware onto the computer. used).
In one study, researchers at Google found 3 million drive-by- – Victim customer demographics: Separate tally of incidents
download URLs, and that 1.3% of Google’s incoming search and monetary losses for business and retail customers.
queries return at least one drive-by-download link in its re- – Attack vector (where known): Number of incidents and
sults [51]. monetary losses for each attack vector (e.g., keystroke-
Taken together, the evidence points to a situation where logging malware, phishing, credit card skimming, payment
users cannot easily be blamed when malware takes over their network compromise).
computers. But in an economic analysis of liability, fairness – Business category: Number of incidents and monetary
takes a back seat to identifying the party in the best position losses for the categories of online banking, payment cards
to efficiently address the problem. Consumers are generally (transaction type: retail, card present, card not present),
not in a good position to defend themselves. They do not and ATM fraud.
write the buggy software, and so they cannot plug the holes; At present, no objective measures exist to answer the
they do not have a network-level view of Internet traffic, so following seemingly straightforward questions: Is online
they cannot determine whether or not they are infected (as identity theft increasing or decreasing? How many people and
ISPs can). At best, they can take some safety precautions businesses fall victim to fraud online, and how much money
such as patching their computers and installing anti-virus is lost? Are online banking and e-commerce less safe than
software. There is little more we can expect from consumers, transactions in the real world? Without a way to answer these
and even if all the consumers were to automatically install questions, effective policy cannot be developed to improve
patches and run anti-virus software, the problem would cybersecurity.
remain. Consequently, consumers are not in the best position Fortunately, a low-cost solution is readily available: require
to fix the problem. financial institutions to report back on fraud losses and
114 I N T E R N AT I O N A L J O U R N A L O F C R I T I C A L I N F R A S T R U C T U R E P R O T E C T I O N 3 (2010) 103–117

aggregate their responses. It is not as if this information A second motivation for mandated disclosure is that
has to be kept secret. Banks in Spain, Britain, and Australia payment systems exhibit significant network externalities.
regularly disclose aggregate information on payment card Visa, MasterCard, and American Express have cultivated
fraud. In 2009, for example, UK banks lost £440 million a very successful credit card network with millions of
(approximately $641 million) due to all forms of payment participating merchants and cardholders. The value of this
fraud, while £59.7 million ($87 million) was attributed user base is enormous, and it presents a significant barrier
to online banking in particular [52]. Richard Sullivan, an to would-be new entrants who might offer more secure
economist at the Federal Reserve, has argued that fraud payment alternatives. Having already invested heavily in
statistics should be published in order to get a better grip on a less secure payment technology and achieved market
fraud levels and provide information on whether investments dominance, existing payment networks may be reluctant to
to secure the payment card infrastructure are needed [53]. invest further in security mechanisms to reduce fraud that
Within the US, there are some existing efforts to collect is borne in part by third parties. Payment networks might
data on online fraud. David Nelson at FDIC has attempted argue that they are already investing in security, and point
to collect fraud figures from US banks on a voluntary basis. to the efforts undertaken in Europe to upgrade to PIN-based
He estimates that $120 million was collectively lost by US smartcard authentication.
banks due to malware infections targeting online banking Credible reporting of financial fraud losses can settle
services [54]. The FBI runs the Internet Crime Complaint disputes over whether enough is being done, and it can
Center (IC3), which invites members of the public to submit serve as useful motivation for funding improvements to the
reports on a wide variety of Internet scams. Some aggregate security of the financial infrastructure. For instance, banks
figures are made available by the IC3 in annual reports (see, and payment operators are weighing whether to upgrade the
e.g., [55]), but access to most of the IC3 data is available only payment network infrastructure to a more secure smartcard-
based system [42]. Comprehensive fraud statistics would
to law enforcement. The Financial Crimes Reporting Center
help banks and merchants determine if there has been
collects suspicious activity reports from banks, but these
a substantial increase in card-not-present fraud to justify
mainly focus on money laundering activities. The Financial
further security investments. Similarly, the National Strategy
Services ISAC shares confidential, high-level information on
for Trusted Identities in Cyberspace being pitched by the
threats between banks.
White House needs private sector buy-in to be successful, but
These efforts exhibit a number of significant limitations
this will not happen unless firms believe that improvements
compared with the mandatory disclosure scheme that we
to online authentication are needed. How can firms agree to
recommend. First, the reports are voluntary in nature, making
spend on security when they do not have an accurate picture
them incomplete, unrepresentative, and of limited use in
of how much is being lost due to presence of a less secure
drawing reliable trends. Very few privacy breaches were
infrastructure? Publishing regular statistics on losses now will
disclosed until the California law was passed, and we might
motivate future investments if the problem is truly as big as
suspect that the reports of online fraud are inaccurate
it is often claimed.
estimates of reality. In the case of IC3, the trouble is
that quantifying losses is difficult in many circumstances,
4.4. Recommendation 3: Mandated disclosure of control
primarily because it relies on self-reporting. Second, the
system incidents and intrusions
detailed reports are often secret—IC3 reports are shared
only within law enforcement, the FS-ISAC is closed, and so
Anonymous intelligence officials have released stark warn-
on. Finally, efforts such as the FDIC tally of fraud figures ings that Chinese and Russian operatives have regularly in-
are one-off samples, which make inferring trends over time truded into the US electrical grid [13]. In June 2010, a Belaru-
impossible. sian security firm uncovered Stuxnet, a worm possibly tar-
The principal justification for mandating the public geting Iranian control systems made by Siemens [56]. Apart
disclosure of incidents and losses is that the financial from Stuxnet, no documented case of a successful cyber at-
industry does not internalize all the costs of insecurity. tack on process control systems has been publicly presented.
Consumers are protected by Regulations E and Z, but (It is even unclear if Stuxnet should be viewed as ‘successful’
businesses are not, and merchants are expected to help attack, since no physical damage has been found to have been
cover the costs of fraud. If banks instead choose to cover caused by the worm.) In fact, when researchers from the Tuck
all losses, then publishing loss figures is less crucial. As School of Business interviewed an oil and gas refiner as part
it stands, banks do not internalize all costs, and so the of a field study [57], they were told by the VP for refining that
public deserves a fair and transparent accounting of the he ‘had never heard of’ a cyber incident shutting down a plant
share paid by each entity. This is why it is recommended to in the industry. The VP went on to state that he would con-
disclose, in addition to aggregated loss figures, a breakdown sider investing in process control systems security only after
of the numbers and average loss of incidents for consumers a similar-sized refinery was attacked.
and businesses. Additionally, it is important to know the Such different perspectives are hard to reconcile—
distribution of losses between banks and merchants. These attacks are supposed to be pervasive, but operators on the
types of information can help answer questions such as how ground have yet to observe a single incident. One possible
many people’s lives are being disrupted by online fraud, if any explanation is that the reports of incidents are exaggerated.
groups pay disproportionate shares, and if this changes over Many of the individuals who are sounding the alarm stand
time. to gain from increased security investments. Alternatively,
I N T E R N AT I O N A L J O U R N A L O F C R I T I C A L I N F R A S T R U C T U R E P R O T E C T I O N 3 (2010) 103–117 115

the existing mechanisms for exchanging information, i.e., agreement of the WTO. Deciding to bring cases to the WTO
the sector-specific ISACs, have failed. ISACs have been in is always politically delicate. However, if the US suspects that
operation for around a decade, which is sufficient time industrial espionage is rife, and largely coming from a single
to assess the effectiveness of the voluntary, closed-door country (i.e., China), then it may be worth the effort to prepare
information exchanges. Either ISACs have failed to effectively a WTO complaint. It is true that such a complaint could
communicate the severity of threats to relevant parties in negatively affect the stock prices of the firms that are named
industry, or there has not been much to report. as victims. Nevertheless, if espionage is anywhere near as
Fortunately, there is a reasonable way to get to the pervasive as what has been uncovered in the Google case,
bottom of this conundrum: require mandatory disclosure then it may be in the strategic interest of the US to take action.
of all cyber incidents and intrusions to regulators, with a
substantial public reporting capacity. If the intrusions are in
fact happening, the entities who detect the intrusions should 5. Conclusions
have a duty to report them. In fact, the ISACs could serve
as the organizations that receive the reports, provided that An economic perspective is essential to understand the
there is a clear duty on the part of the ISACs to produce public state of cybersecurity today, as well as how to improve it
reports that are widely disseminated. moving forward. In this paper, we have described several
Recommendation 3: Mandatory disclosure of control system key economic challenges: misaligned incentives, information
incidents and intrusions to the relevant ISACs who are responsible asymmetries, and externalities. We have also reviewed
for further public dissemination. the policy options available for overcoming these barriers,
There has been some tentative movement in this direction notably information disclosure and intermediary liability. Our
within the electricity industry. The self-regulatory body NERC principal recommendations are to encourage ISPs to take a
requires power companies to report to regulators whenever more active role in cleaning up infected computers, and to
they observe a disturbance that is suspected to have been collect and publish data on a range of security incidents.
caused by sabotage (NERC standard CIP-001). The reports These recommendations are designed to raise awareness
themselves are kept secret, and, as far as we know, are of cybersecurity issues and assign responsibility for action
not shared with other firms in the industry. This is a by the private sector so that the risks to society may be
useful start because it demonstrates an interest in keeping mitigated.
track of malicious disruptions. However, it is limited in Note that an earlier version of this paper appeared in the
the sense that reporting is only required when an outage Proceedings of a Workshop on Deterring Cyberattacks, National
occurs. Detecting that Chinese spies have penetrated the Academies Press, Washington, DC, 2010, pp. 3–23.
administrative interface of a SCADA system does not have to
be reported, unless it causes the power to go out. Also, there REFERENCES
is no explicit requirement to share the reported information
with other utilities, which does not help individuals such
as the oil refiner mentioned above who will not consider [1] L. McGlasson, FDIC warns of online fraud against banks,
investing in security until he hears about another industry small businesses, BankInfoSecurity, August 26, 2009,
entity being attacked. www.bankinfosecurity.com/articles.php?art_id=1732.
It is clear that mandatory disclosure is no panacea. [2] Symantec, Symantec global Internet security
Disclosure will help address the lack of information on threat report, Mountain View, California, 2008.
eval.symantec.com/mktginfo/enterprise/white_papers/b-
incidents, but the long-tailed nature of cyber attacks on
whitepaper_internet_security_threat_report_xiii_04-2008.en-
process control systems means that the effort could yield few
us.pdf.
reports. Furthermore, the problem of externalities persists. [3] T. Moore, R. Clayton, The impact of incentives on notice and
take-down, in: M. Johnson (Ed.), Managing Information Risk
4.5. Recommendation 4: Aggregate reports of cyber and the Economics of Security, Springer, New York, 2008,
espionage and provide reports to the WTO pp. 199–223.
[4] B. Krebs, ‘Money mules’ help haul cyber criminals’ loot, The
Washington Post, January 25, 2008.
Industrial espionage is claimed to be a significant problem for
[5] D. Urquhart, London couple remanded in Israel’s biggest
US companies. However, the affected companies are naturally industrial espionage case, The Guardian, May 31, 2005.
reticent to publicly discuss their experiences out of fear that [6] A. Clark, Starwood sues Hilton for ‘stealing trade secrets’, The
their stock prices may take hits. Perhaps, though, the thinking Guardian, April 17, 2009.
is starting to change. In January 2010, Google disclosed [7] Information War Monitor, Tracking GhostNet: inves-
that it had been the victim of a cyber attack focused on tigating a cyber espionage network, March 29, 2009.
industrial espionage that apparently originated in China [58]. www.scribd.com/doc/13731776/Tracking-GhostNet-
Investigating-a-Cyber-Espionage-Network.
Subsequently, it was revealed that at least 34 companies were
[8] S. Nagaraja, R. Anderson, The snooping dragon: social-
affected, including Yahoo, Symantec, Northrop Grunman, and
malware surveillance of the Tibetan movement, Tech-
Dow Chemical. nical Report UCAM-CL-TR-746, University of Cambridge
Unfortunately, since the trade secrets were believed to Computer Laboratory, Cambridge, United Kingdom, 2009.
be stolen by an international entity, the US Uniform Trade www.cl.cam.ac.uk/techreports/UCAM-CL-TR-746.pdf.
Secrets Act and Economic Espionage Act cannot easily be [9] Leppard, China bugs and burgles Britain, The Sunday Times,
enforced. This does, however, leave one option: the TRIPS January 31, 2010.
116 I N T E R N AT I O N A L J O U R N A L O F C R I T I C A L I N F R A S T R U C T U R E P R O T E C T I O N 3 (2010) 103–117

[10] Mandiant, Mandiant releases inaugural M-trends, Report [31] Mulligan, K. Bamberger, Security breach notification laws:
at US Department of Defense Cyber Crime Conference, views from chief security officers, Samuelson Law, Technol-
January 27, 2010. www.mandiant.com/news_events/article/ ogy and Public Policy Clinic, University of California–Berkeley
mandiant_releases_first_annual_m-trends_report_at_u.s._ School of Law, Berkeley, California, 2007. www.law.berkeley.
department_of_d/. edu/files/cso_study.pdf.
[11] McAfee, Unsecured economies: protecting vital informa- [32] A. Acquisti, A. Friedman, R. Telang, Is there a cost to privacy
tion, 2009. www.cerias.purdue.edu/assets/pdf/mfe_unsec_ breaches? An event study, in: Proceedings of the Twenty-
econ_pr_rpt_fnl_online_012109.pdf. Seventh International Conference on Information Systems,
[12] J. Meserve, Mouse click could plunge city into darkness, 2006. citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.73.
experts say, CNN, September 27, 2007. www.cnn.com/2007/ 2942&rep=rep1&type=pdf.
US/09/27/power.at.risk/index.html. [33] S. Romanosky, R. Telang, A. Acquisti, Do data breach
[13] S. Gorman, Electricity grid in US penetrated by spies, The
disclosure laws reduce identity theft? in: Proceedings of the
Wall Street Journal (April) (2009).
Seventh Workshop on the Economics of Information Security,
[14] T. Moore, R. Clayton, Examining the impact of website take-
2008. ssrn.com/paper=1268926.
down on phishing, in: Proceedings of the Anti-Phishing
[34] T. Moore, R. Clayton, The consequence of non-cooperation
Working Group eCrime Researchers Summit, 2007, pp. 1–13.
[15] H. Stern, The rise and fall of reactor mailer, in: Proceedings of in the fight against phishing, in: Proceedings of the Anti-
the MIT Spam Conference, 2009. Phishing Working Group eCrime Researchers Summit, 2008,
projects.csail.mit.edu/spamconf/SC2009/Henry_Stern. pp. 1–14.
[16] S. Vaughan-Nichols, Big botnets and how to stop them, [35] R. Böhme, G. Schwarz, Modeling cyber insurance: towards a
Computerworld, June 2, 2010. www.computerworld.com/s/ unifying framework, in: Proceedings of the Ninth Workshop
article/9177574/Big_botnets_and_how_to_stop_them. on the Economics of Information Security, 2010. weis2010.
[17] J. Davis, Hackers take down the most wired country in econinfosec.org/papers/session5/weis2010_boehme.pdf.
Europe, Wired Magazine 15 (9) (2007) www.wired.com/ [36] T. Bandyopadhyay, V. Mookerjee, R. Rao, Why IT managers do
politics/security/magazine/15-09/ff_estonia?currentPage=all. not go for cyber insurance products, Communications of the
[18] D. Danchev, Coordinated Russia vs. Georgia cyber attack ACM 52 (11) (2009) 68–73.
in progress, ZDNet, August 11, 2008. www.zdnet.com/ [37] S. Drimer, S. Murdoch, R. Anderson, Thinking inside the
blog/security/coordinated-russia-vs-georgia-cyber-attack-in- box: system-level failures of tamper proofing, in: Proceedings
progress/1670. of the IEEE Symposium on Security and Privacy, 2008, pp.
[19] R. Anderson, T. Moore, The economics of information 281–295.
security, Science 314 (5799) (2006) 610–613. [38] B. Edelman, Adverse selection in online ‘trust’ certifications,
[20] United States Senate, Statement of Edward Amoroso
in: Proceedings of the Eleventh International Conference on
before the United States Senate Committee on Com-
Electronic Commerce, 2009, pp. 205–212.
merce, Science and Transportation, Hearing on Im-
[39] R. Böhme, G. Kataria, Models and measures for correla-
proving Cybersecurity, Washington, DC, March 19,
tion in cyber insurance, in: Proceedings of the Fifth Work-
2009. commerce.senate.gov/public/?a=Files.Serve&File_
shop on the Economics of Information Security, 2006.
id=e8d018c6-bf5f-4ea6-9ecc-a990c4b954c4.
weis2006.econinfosec.org/docs/16.pdf.
[21] G. Akerlof, The market for “lemons”: quality uncertainty and
the market mechanism, The Quarterly Journal of Economics [40] D. Lichtman, E. Posner, Holding Internet service providers
84 (3) (1970) 488–500. accountable, in: M. Grady, F. Parisi (Eds.), The Law and
[22] R. Anderson, Why information security is hard: an economic Economics of Cybersecurity, Cambridge University Press,
perspective, in: Proceedings of the Seventeenth Annual New York, 2006, pp. 221–258.
Computer Security Applications Conference, 2001, pp. [41] M. MacCarthy, What Internet intermediaries are do-
358–365. ing about liability and why it matters, ExpressO, 2009.
[23] H. Kunreuther, G. Heal, Interdependent security, Journal of works.bepress.com/mark_maccarthy/1.
Risk and Uncertainty 26 (2–3) (2003) 231–249. [42] M. MacCarthy, Information security policy in the US retail
[24] H. Varian, System reliability and free riding, in: L. Camp, payments industry, in: Proceedings of the Ninth Workshop
S. Lewis (Eds.), Economics of Information Security, in: Ad- on the Economics of Information Security, 2010. weis2010.
vances in Information Security, vol. 12, Kluwer Academic econinfosec.org/papers/panel/weis2010_maccarthy.pdf.
Publishers, Boston, Massachusetts, 2004, pp. 1–15. [43] MAAWG, Mitigating large-scale bot infections in residen-
[25] Forrester Consulting, The value of corporate secrets: how tial networks, July 2009. www.maawg.org/sites/maawg/files/
compliance and collaboration affect enterprise perceptions news/MAAWG_Bot_Mitigation_BP_2009-07.pdf.
of risk, March, 2010. www.rsa.com/products/DLP/ar/10844_
[44] Comcast, Comcast unveils comprehensive “Constant Guard”
5415_The_Value_of_Corporate_Secrets.pdf.
Internet security program, October 8, 2009. www.comcast.
[26] D. Barnes, Deworming the Internet, Texas Law Review 83 (1)
com/About/PressRelease/PressReleaseDetail.ashx?prid=926.
(2004) 279–329.
[27] S. Shavell, A model of the optimal use of liability and safety [45] J. Hilvert, eSecurity code to protect Australians online, Inter-
regulation, RAND Journal of Economics 15 (2) (1984) 271–280. net Industry Association, Manuka, Australia, September 11,
[28] C. Kolstad, T. Ulen, G. Johnson, Ex post liability for harm 2009. http://iia.net.au/index.php/section-blog/90-esecurity-
vs. ex ante safety regulation: substitutes or complements? code-for-isps/757-esecurity-code-to-protect-australians-
American Economic Review 80 (4) (1990) 888–901. online.html.
[29] S. Konar, M. Cohen, Information as regulation: the effect of [46] G. Evron, Gadi, Dutch ISPs sign anti-botnet treaty, Dark
community right to know laws on toxic emissions, Journal Reading, September 29, 2009. www.darkreading.com/blog/
of Environmental Economics and Management 32 (1) (1997) archives/2009/09/dutch_isps_sign.html.
109–124. [47] M. van Eeten, J. Bauer, The economics of malware:
[30] Business Wire, Visa and TJX agree to provide US issuers security decisions, incentives and externalities, OECD
up to $40.9 million for data breach claims, November 30, Science, Technology and Industry Working Paper No. 2008/1,
2007. www.businesswire.com/portal/site/home/permalink/? Organisation for Economic Cooperation and Development,
ndmViewId=news_view&newsId=20071130005355. Paris, France, 2008.
I N T E R N AT I O N A L J O U R N A L O F C R I T I C A L I N F R A S T R U C T U R E P R O T E C T I O N 3 (2010) 103–117 117

[48] R. Anderson, R. Böhme, R. Clayton, T. Moore, Security Briefing, Federal Reserve Bank of Kansas City, Kansas City,
economics and European policy, in: M. Johnson (Ed.), Missouri, 2009.
Managing Information Risk and the Economics of Security, [54] R. McMillan, FDIC: hackers took more than $120M in
Springer, New York, 2008, pp. 55–80. three months, Computerworld, March 8, 2010. www.
[49] R. Clayton, Might governments clean-up malware? in: computerworld.com/s/article/9167598/FDIC_Hackers_took_
Proceedings of the Ninth Workshop on the Economics more_than_120M_in_three_months?source=rss_news.
of Information Security, 2010. weis2010.econinfosec.org/ [55] Internet Crime Complaint Center (IC3), 2009 Internet
papers/session4/weis2010_clayton.pdf. Crime Report, 2009. www.ic3.gov/media/annualreport/2009_
[50] N. Gohring, Heartland, MasterCard settled over data breach, IC3Report.pdf.
PCWorld, May 19, 2010. www.pcworld.com/businesscenter/ [56] R. McMillan, Siemens: stuxnet worm hit industrial sys-
article/196711/heartland_mastercard_settle_over_data_ tems, Computerworld, September 14, 2010. http://www.
breach.html. computerworld.com/s/article/print/9185419/Siemens_
[51] N. Provos, P. Mavrommatis, M. Rajab, F. Monrose, All your Stuxnet_worm_hit_industrial_systems?taxonomyName=
iframes point to us, in: Proceedings of the USENIX Security Network+Security&taxonomyId=142.
Symposium, 2008, pp. 1–15. [57] S. Dynes, E. Goetz, M. Freeman, Cybersecurity: are economic
[52] Payments News, UK card and banking fraud incentives adequate? in: E. Goetz, S. Shenoi (Eds.), Critical
losses down 28% in 2009 to £440.3M, March 2010. Infrastructure Protection, Springer, Boston, Massachusetts,
www.paymentsnews.com/2010/03/uk-card-and-banking- 2007, pp. 15–27.
fraud-losses-down-28-in-2009-to-4403mm.html. [58] A. Cha, E. Nakashima, Google China cyberattack part of
[53] R. Sullivan, The benefits of collecting and reporting payment vast espionage campaign, experts say, The Washington Post,
fraud statistics in the United States, Payment Systems January 14, 2010.

You might also like