What are the Alternatives to Punishing Individual Developers and Corporations

 Dealing With Low Corporate Cyber Security Performance in USA


We should favor positive strategies over punishments in achieving security gains. We should use punishments mostly where we can see intent to harm security or incentives are misaligned (for instance a weapons manufacturer intentionally leaking a weapon design resulting in a near peer adversary where none existed before in order to force a need for new weapons to be developed).

Cybersecurity and Infrastructure Security Agency (CISA) recently indicated they were pursuing liability against software developers to improve security performance in the USA. I interpret this as CISA saying they have exhausted options in dealing with specific corporate entities (hopefully in rare cases and not in the case of individual software developer persons). This comes from a space of concern about the security of the systems that are important to citizens from hard working CISA leadership.

CISA leadership have already clarified that they were talking about corporations not individuals having punitive liability for security problems with regard to Chinese incursion into critical infrastructure. Certainly individual engineers are unlikely to be able to overrule corporate leadership without a radical change in collective organization among software engineers. But what alternatives might make this security problem solvable other than individual liability or corporate liability? Should we even consider them as a matter of national policy?

I decided to write this article because I often use the tactic of "making it easier" for my teams when I am responsible for measured improvements in large infrastructures. I wanted to consider additional positive strategies available to nation state level administrators solving this problem out of sympathy for developers, administrators and security folks who face what is actually an important and difficult problem together. While many raised questions about how liability would work, I think its important to look at what alternatives could be useful to the administrator in addition.

Some alternatives

This shifts the paradigm from punishing teams that are hurting, to a cost of business that is consistently applied to profitable corporations who avoid national security work and costs.

A windfall profit has the benefit of not destroying an organization and avoiding deterring innovation because it is a tax on profits.


Why do I say we should have alternatives to a punitive approach


In general the idea of punishment suites a frustrated perspective, but there is not super strong evidence that applying harsh punishment to people is necessarily the most effective method to achieve compliance and change. Just because corporates don't like it doesn't make it the most performant way forward. That having been said the police power is useful in situations where you need to take immediate emergency action to reduce a situation. If the situation is not an emergency and non-punitive measures have been exhausted a punishment might be the only thing left to try - in that case harshness isn't required, but timeliness and reliability would be of more importance if the potential losses were serious such as loosing control of infrastructure such as nuclear or water infrastructure elements. In my opinion that should be directed at a corporation, since individual engineers are likely overridden by management and retaliation against individual developers is commonplace.

So when is punishment of use in security performance in my opinion? Typically only as part of a mixed strategy where other items of positive reinforcement have already been attempted in my opinion. In those cases reliability and timeliness are more important than being harsh when positive means and harm reduction have failed. So harsh punishments are not important in my strategies around this. A mixed strategy of deterrence and reward may actually be quite agreeable to both corporates, individual software engineers and academia and produce alignment in principle at least. 

My wish is that we can tackle this really quite difficult problem together and achieve new records on assurance and new positive capabilities never seen before from our corporate, open source and national security administrators in a way that supports our success and progress as a nation and as individuals. Perhaps a mixed strategy with an emphasis on positive rewards might help to make this agreeable and useful for administrators, citizens and software corporations. In general I would prefer our federal staff to find they are mostly seen as allies and a powerful resource in tackling these problems and preferably rarely a punitive element. I think that maintains our federal staff morale and creates cooperation more positively where its possible to select that option and its within our power to secure the infrastructure using positive methods.