82_FR_27154 82 FR 27042 - Promoting Stakeholder Action Against Botnets and Other Automated Threats

82 FR 27042 - Promoting Stakeholder Action Against Botnets and Other Automated Threats

DEPARTMENT OF COMMERCE
National Telecommunications and Information Administration

Federal Register Volume 82, Issue 112 (June 13, 2017)

Page Range27042-27044
FR Document2017-12192

The National Telecommunications and Information Administration (NTIA), on behalf of the Department of Commerce (Department), is requesting comment on actions that can be taken to address automated and distributed threats to the digital ecosystem as part of the activity directed by the President in Executive Order 13800, ``Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure.'' Through this Request for Comments (RFC), NTIA seeks broad input from all interested stakeholders--including private industry, academia, civil society, and other security experts--on ways to improve industry's ability to reduce threats perpetuated by automated distributed attacks, such as botnets, and what role, if any, the U.S. Government should play in this area.

Federal Register, Volume 82 Issue 112 (Tuesday, June 13, 2017)
[Federal Register Volume 82, Number 112 (Tuesday, June 13, 2017)]
[Notices]
[Pages 27042-27044]
From the Federal Register Online  [www.thefederalregister.org]
[FR Doc No: 2017-12192]


-----------------------------------------------------------------------

DEPARTMENT OF COMMERCE

National Telecommunications and Information Administration

[Docket No. 170602536-7536-01]
RIN 0660-XC035


Promoting Stakeholder Action Against Botnets and Other Automated 
Threats

AGENCY: National Telecommunications and Information Administration, 
U.S. Department of Commerce.

ACTION: Notice, request for public comment.

-----------------------------------------------------------------------

SUMMARY: The National Telecommunications and Information Administration 
(NTIA), on behalf of the Department of Commerce (Department), is 
requesting comment on actions that can be taken to address automated 
and distributed threats to the digital ecosystem as part of the 
activity directed by the President in Executive Order 13800, 
``Strengthening the Cybersecurity of Federal Networks and Critical 
Infrastructure.'' Through this Request for Comments (RFC), NTIA seeks 
broad input from all interested stakeholders--including private 
industry, academia, civil society, and other security experts--on ways 
to improve industry's ability to reduce threats perpetuated by 
automated distributed attacks, such as botnets, and what role, if any, 
the U.S. Government should play in this area.

DATES: Comments are due on or before 5 p.m. Eastern Time on July 13, 
2017.

ADDRESSES: Written comments may be submitted by email to 
[email protected]. Written comments also may be submitted 
by mail to the National Telecommunications and Information 
Administration, U.S. Department of Commerce, 1401 Constitution Avenue 
NW., Room 4725, Attn: Evelyn L. Remaley, Deputy Associate 
Administrator, Washington, DC 20230. For more detailed instructions 
about submitting comments, see the ``Instructions for Commenters'' 
section of SUPPLEMENTARY INFORMATION.

FOR FURTHER INFORMATION CONTACT: Megan Doscher, tel.: (202) 482-2503, 
email: [email protected], or Allan Friedman, tel.: (202) 482-4281, 
email: [email protected], National Telecommunications and 
Information Administration, U.S. Department of Commerce, 1401 
Constitution Avenue NW., Room 4725, Washington, DC 20230. Please direct 
media inquiries to NTIA's Office of Public Affairs, (202) 482-7002, or 
at [email protected].

SUPPLEMENTARY INFORMATION: 
    Background: The open and distributed nature of the digital 
ecosystem has led to unprecedented growth and innovation in the digital 
economy. However, it has been accompanied by risks that threaten to 
undermine that very ecosystem. These risks take many forms online, with 
different combinations of threats, vulnerabilities, and affected 
parties from those in the physical world. The President has directed 
the Departments of Commerce and Homeland Security to jointly lead an 
open and transparent process to identify and promote action by 
appropriate stakeholders to improve the resilience of the Internet and 
communications ecosystem and to encourage collaboration with the goal 
of dramatically reducing threats perpetrated by automated and 
distributed attacks.\1\ This RFC focuses on automated, distributed 
attacks that affect large sets of victims, and that put the broader 
network and its users at risk. These types of attacks have been a 
concern since the early days of the Internet,\2\ and were a regular 
occurrence by the early 2000s.\3\ Automated and distributed attacks, 
particularly botnets due to their ability to facilitate high-impact 
disruption, form a threat that is bigger than any one company or 
sector. Botnets are used for a variety of malicious activities, but 
distributed denial of service (DDoS) attacks, which can overwhelm other 
networked resources, are a critical threat and developing collaborative 
solutions to prevent and mitigate these attacks is a priority. As new 
scenarios emerge, including those exploiting a new generation of 
connected devices (so called ``Internet of Things'' (IoT) devices), 
there is an urgent need for coordination and collaboration across a 
diverse set of ecosystem stakeholders.
---------------------------------------------------------------------------

    \1\ Strengthening the Cybersecurity of Federal Networks and 
Critical Infrastructure, Exec. Order 13800, 82 FR 22391 (May 11, 
2017).
    \2\ See generally United States v. Morris, 928 F.2d 504 (2d Cir. 
1991) (discussing one of the first known computer worms to spread 
across the Internet).
    \3\ See Nicholas C. Weaver, Warhol Worms: The Potential for Very 
Fast Internet Plagues, Int'l Computer Science Inst. (Aug. 15, 2001), 
http://www1.icsi.berkeley.edu/~nweaver/papers/warhol/warhol.html.
---------------------------------------------------------------------------

    As part of this effort, the Department will also host a public 
workshop at the National Institute of Standards and Technology's 
National Cybersecurity Center of Excellence on July 11-12, 2017, 
entitled, ``Enhancing Resilience of the Communications Ecosystem.'' 
Outputs from this workshop will also help to guide implementation 
activities related to the President's Executive Order. More information 
about the workshop will be available on the NIST Web site at: 
www.nist.gov.
    The Federal government has worked with stakeholders in the past to 
address new threats as they arise. Previous efforts include the White 
House-led Industry Botnet Group \4\ (which led to an Anti-Botnet Code 
of Conduct \5\), the Communications Security, Reliability and 
Interoperability Council's (CSRIC) reports on ISP Network Protection 
Practices \6\ and Remediation of Server-Based DDoS Attacks,\7\ as well 
as the active and ongoing work by the Department of Justice and its 
many partners on attacking and ``sink-holing'' the infrastructure 
supporting these threats.\8\ These initiatives, and others like them, 
underscore the need for active collaboration between the public and 
private sectors.
---------------------------------------------------------------------------

    \4\ U.S. Dep't of Commerce, White House Announces Public-Private 
Partnership Initiatives to Combat Botnets (May 30, 2012), http://2010-2014.commerce.gov/news/press-releases/2012/05/30/white-house-announces-public-private-partnership-initiatives-combat-b.html.
    \5\ Working Group 7--Botnet Remediation, Communications 
Security, Reliability and Interoperability Council III, Final 
Report, U.S. Anti-Bot Code of Conduct (ABC) for Internet Services 
Providers (ISPs), Barrier and Metric Considerations (Mar. 2013), 
https://transition.fcc.gov/bureaus/pshs/advisory/csric3/CSRIC_III_WG7_Report_March_%202013.pdf.
    \6\ Working Group 8, Communications Security, Reliability and 
Interoperability Council I, Final Report, Internet Service Provider 
(ISP) Network Protection Practices (Dec. 2010), http://transition.fcc.gov/pshs/docs/csric/CSRIC_WG8_FINAL_REPORT_ISP_NETWORK_PROTECTION_20101213.pdf.
    \7\ Working Group 5, Communications Security, Reliability and 
Interoperability Council IV Working Group 5, Final Report, 
Remediation of Server-Based DDoS Attacks (Sept. 2014), https://transition.fcc.gov/pshs/advisory/csric4/CSRIC_IV_WG5_Remediation_of_Server-Based_DDoS_Attacks_Report_Final_(pdf)_V11.pdf.
    \8\ See, e.g., U.S. Dep't of Justice, Avalanche Network 
Dismantled in International Cyber Operation (Dec. 5, 2016), https://www.justice.gov/opa/pr/avalanche-network-dismantled-international-cyber-operation.
---------------------------------------------------------------------------

    The Department has played an important role in facilitating 
engagement around cybersecurity between public policy interests and the 
innovative force of the private sector. The Department was tasked to 
work with industry to develop a framework

[[Page 27043]]

for use by U.S. critical infrastructure to improve cybersecurity 
practices,\9\ leading to NIST's Cybersecurity Framework.\10\ Other 
initiatives include Green Papers developed by the Department built on 
industry input on cybersecurity \11\ and IoT.\12\ NTIA has also 
convened multistakeholder processes to identify consensus-based 
voluntary solutions on security vulnerability disclosure \13\ and IoT 
security patching and upgradability.\14\
---------------------------------------------------------------------------

    \9\ Improving Critical Infrastructure Cybersecurity, Exec. Order 
13636, 78 FR 11737 (Feb. 12, 2013).
    \10\ National Institute of Standards and Technology, Framework 
for Improving Critical Infrastructure Cybersecurity (Feb. 12, 2014), 
https://www.nist.gov/sites/default/files/documents/cyberframework/cybersecurity-framework-021214.pdf.
    \11\ Internet Policy Task Force, U.S. Dep't of Commerce, 
Cybersecurity, Innovation and the Internet Economy (June 2011), 
https://www.nist.gov/sites/default/files/documents/itl/Cybersecurity_Green-Paper_FinalVersion.pdf.
    \12\ Internet Policy Task Force & Digital Economy Leadership 
Team, U.S. Dep't of Commerce, Fostering the Advancement of the 
Internet of Things (Jan. 2017), https://www.ntia.doc.gov/files/ntia/publications/iot_green_paper_01122017.pdf.
    \13\ NTIA, Multistakeholder Process: Cybersecurity 
Vulnerabilities, https://www.ntia.doc.gov/other-publication/2016/multistakeholder-process-cybersecurity-vulnerabilities (last visited 
May 17, 2017).
    \14\ NTIA, Multistakeholder Process: Internet of Things (IoT) 
Security Upgradability and Patching, https://www.ntia.doc.gov/other-publication/2016/multistakeholder-process-iot-security (last visited 
May 17, 2017).
---------------------------------------------------------------------------

    The private sector is also playing a key role in tackling botnets. 
Internet service providers in the United States and around the world 
have been experimenting with how to notify customers that their devices 
may be involved in an attack. Standards bodies have offered guidance on 
how to mitigate some styles of attacks.\15\ Technology providers are 
innovating around tools to protect resources from DDoS attacks. 
Application and software manufacturers are working to eliminate 
exploitable vulnerabilities. This community has worked hard to address 
the threats over the last decade.
---------------------------------------------------------------------------

    \15\ See, e.g., P. Ferguson & D. Senie, Network Ingress 
Filtering: Defeating Denial of Service Attacks Which Employ IP 
Source Address Spoofing, Internet Engineering Task Force (May 2010), 
https://www.ietf.org/rfc/rfc2827.txt.
---------------------------------------------------------------------------

    The cybersecurity challenge is particularly vexing because it 
involves adaptive adversaries. Existing tools, institutions, and 
initiatives are critical, but we must acknowledge that the threat 
continues to evolve, and more progress is needed, at an accelerated 
rate, to address the current landscape. The DDoS attacks launched from 
the Mirai botnet in the fall of 2016, for example, reached a level of 
sustained traffic that overwhelmed many common DDoS mitigation tools 
and services, and even targeted a Domain Name System (DNS) service that 
was a commonly used component in many DDoS mitigation strategies.\16\ 
This attack also highlighted the growing insecurities in--and threats 
from--consumer-grade IoT devices. As a new technology, IoT devices are 
often built and deployed without important security features and 
practices in place.\17\ The issue is not the particular botnet, or the 
particular target, but the risks posed by botnets of this size and 
scope, and the expected innovation and increased scale and 
sophistication of future attacks. Meanwhile, old threats continue to 
evolve. The WannaCry ransomware that threatened to destroy the data of 
thousands of individuals and organizations, including hospitals, did 
not initially involve a botnet. It was spread by a worm-like mechanism 
similar to attacks of 15 years ago. However, criminals were later 
observed using the Mirai botnet to attack a key defense against the 
WannaCry ransomware.\18\
---------------------------------------------------------------------------

    \16\ U.S. Computer Emergency Readiness Team, Alert (TA16-288A): 
Heightened DDoS Threat Posed by Mirai and Other Botnets, https://www.us-cert.gov/ncas/alerts/TA16-288A (last revised Nov. 30, 2016).
    \17\ National Security Telecommunications Advisory Committee, 
Report to the President on the Internet of Things (Nov. 19, 2014), 
https://www.dhs.gov/sites/default/files/publications/NSTAC%20Report%20to%20the%20President%20on%20the%20Internet%20of%20Things%20Nov%202014%20%28updat%20%20%20.pdf.
    \18\ See Andy Greenberg, Hackers are Trying to Reignite Wannacry 
with Nonstop Botnet Attacks, Wired (May 19, 2017), https://www.wired.com/2017/05/wannacry-ransomware-ddos-attack/.
---------------------------------------------------------------------------

    It is difficult to predict what the next significant attack vector 
will be, but that should not preclude taking steps to mitigate the 
potential impact of those that are known. Left unchecked, without 
meaningful progress, these new classes of automated and distributed 
attacks could be a serious risk to the entire ecosystem. Since poorly 
considered action would likely create significant unnecessary costs and 
unintended consequences, substantial, carefully considered action must 
be considered, and it is most likely to be effective and efficient if 
built on engagement from all stakeholders across the ecosystem.

Request for Comments

    The goal of this RFC is to solicit informed suggestions and 
feedback on current, emerging, and potential approaches for dealing 
with botnets and other automated, distributed threats and their impact. 
The Department is interested in comments that address all aspects of 
this issue, but particularly those that address two broad approaches 
where substantial progress can be made:
     Attack Mitigation: Minimizing the impact of botnet 
behavior by rapidly identifying and disrupting malicious behaviors, 
including the potential of filtering or coordinated network management, 
empowering market actors to better protect potential targets, and 
reducing known and emerging risks.
      Endpoint Prevention: Securing endpoints, especially IoT 
devices, and reducing vulnerabilities, including fostering prompt 
adoption of secure development practices, developing practical plans to 
rapidly deal with newly discovered vulnerabilities, and supporting 
adoption of new technology to better control and safeguard devices at 
the local network level.
    Respondents are invited to respond to some or all of the questions 
below:
    1. What works: What approaches (e.g., laws, policies, standards, 
practices, technologies) work well for dealing with automated and 
distributed threats today? What mechanisms for cooperation with other 
organizations, either before or during an event, are already occurring?
    2. Gaps: What are the gaps in the existing approaches to dealing 
with automated and distributed threats? What no longer works? What are 
the impediments to closing those gaps? What are the obstacles to 
collaboration across the ecosystems?
    3. Addressing the problem: What laws, policies, standards, 
practices, technologies, and other investments will have a tangible 
impact on reducing risks and harms of botnets? What tangible steps to 
reduce risks and harms of botnets can be taken in the near term? What 
emerging or long term approaches may be promising with more attention, 
research, and investment? What are the public policy implications of 
the various approaches? How might these be managed, balanced, or 
minimized?
    4. Governance and collaboration: What stakeholders should be 
involved in developing and executing policies, standards, practices, 
and technologies? What roles should they play? How can stakeholders 
collaborate across roles and sectors, and what should this 
collaboration look like, in practical terms?
    5. Policy and the role of government: What specific roles should 
the Federal government play? What incentives or other public policies 
can drive change?
    6. International: How does the inherently global nature of the 
Internet and the digital supply chain affect how we should approach 
this problem? How can solutions explicitly address the international 
aspects of this issue?
    7. Users: What can be done to educate and empower users and 
decision-

[[Page 27044]]

makers, including enterprises and end consumers?
    Instructions for Commenters: NTIA invites comment on the full range 
of issues that may be presented by this inquiry, including issues that 
are not specifically raised in the above questions. Commenters are 
encouraged to address any or all of the above questions. Comments that 
contain references to studies, research, and other empirical data that 
are not widely published should include copies of the referenced 
materials with the submitted comments.
    Comments submitted by email should be machine-readable and should 
not be copy-protected. Comments submitted by mail may be in hard copy 
(paper) or electronic (on CD-ROM or disk). Responders should include 
the name of the person or organization filing the comment, as well as a 
page number on each page of their submissions. All comments received 
are a part of the public record and will generally be posted on the 
NTIA Web site, https://www.ntia.doc.gov, without change. All personal 
identifying information (for example, name, address) voluntarily 
submitted by the commenter may be publicly accessible. Do not submit 
confidential business information or otherwise sensitive or protected 
information. NTIA will accept anonymous comments.

    Dated: June 8, 2017.
Leonard Bechtel,
Chief Financial Officer and Director of Administration, Performing the 
Non-Exclusive Duties of the Assistant Secretary for Communications and 
Information, National Telecommunications and Information 
Administration.
[FR Doc. 2017-12192 Filed 6-12-17; 8:45 am]
 BILLING CODE 3510-60-P



                                               27042                          Federal Register / Vol. 82, No. 112 / Tuesday, June 13, 2017 / Notices

                                               with sections 751(a) and 777(i)(1) of the               email: mdoscher@ntia.doc.gov, or Allan                 coordination and collaboration across a
                                               Tariff Act of 1930, as amended.                         Friedman, tel.: (202) 482–4281, email:                 diverse set of ecosystem stakeholders.
                                                 Dated: June 8, 2017.                                  afriedman@ntia.doc.gov, National                          As part of this effort, the Department
                                                                                                       Telecommunications and Information                     will also host a public workshop at the
                                               Gary Taverman,
                                                                                                       Administration, U.S. Department of                     National Institute of Standards and
                                               Deputy Assistant Secretary for Antidumping                                                                     Technology’s National Cybersecurity
                                               and Countervailing Duty Operations.                     Commerce, 1401 Constitution Avenue
                                                                                                       NW., Room 4725, Washington, DC                         Center of Excellence on July 11–12,
                                               [FR Doc. 2017–12186 Filed 6–12–17; 8:45 am]
                                                                                                       20230. Please direct media inquiries to                2017, entitled, ‘‘Enhancing Resilience of
                                               BILLING CODE 3510–DS–P                                                                                         the Communications Ecosystem.’’
                                                                                                       NTIA’s Office of Public Affairs, (202)
                                                                                                       482–7002, or at press@ntia.doc.gov.                    Outputs from this workshop will also
                                                                                                                                                              help to guide implementation activities
                                               DEPARTMENT OF COMMERCE                                  SUPPLEMENTARY INFORMATION:                             related to the President’s Executive
                                               National Telecommunications and                            Background: The open and                            Order. More information about the
                                               Information Administration                              distributed nature of the digital                      workshop will be available on the NIST
                                                                                                       ecosystem has led to unprecedented                     Web site at: www.nist.gov.
                                               [Docket No. 170602536–7536–01]                          growth and innovation in the digital                      The Federal government has worked
                                                                                                       economy. However, it has been                          with stakeholders in the past to address
                                               RIN 0660–XC035
                                                                                                       accompanied by risks that threaten to                  new threats as they arise. Previous
                                               Promoting Stakeholder Action Against                    undermine that very ecosystem. These                   efforts include the White House-led
                                               Botnets and Other Automated Threats                     risks take many forms online, with                     Industry Botnet Group 4 (which led to
                                                                                                       different combinations of threats,                     an Anti-Botnet Code of Conduct 5), the
                                               AGENCY:  National Telecommunications                    vulnerabilities, and affected parties from             Communications Security, Reliability
                                               and Information Administration, U.S.                    those in the physical world. The                       and Interoperability Council’s (CSRIC)
                                               Department of Commerce.                                 President has directed the Departments                 reports on ISP Network Protection
                                               ACTION: Notice, request for public                      of Commerce and Homeland Security to                   Practices 6 and Remediation of Server-
                                               comment.                                                jointly lead an open and transparent                   Based DDoS Attacks,7 as well as the
                                                                                                                                                              active and ongoing work by the
                                                                                                       process to identify and promote action
                                               SUMMARY:   The National                                                                                        Department of Justice and its many
                                                                                                       by appropriate stakeholders to improve
                                               Telecommunications and Information                                                                             partners on attacking and ‘‘sink-holing’’
                                                                                                       the resilience of the Internet and
                                               Administration (NTIA), on behalf of the                                                                        the infrastructure supporting these
                                                                                                       communications ecosystem and to
                                               Department of Commerce (Department),                                                                           threats.8 These initiatives, and others
                                                                                                       encourage collaboration with the goal of
                                               is requesting comment on actions that                                                                          like them, underscore the need for
                                                                                                       dramatically reducing threats                          active collaboration between the public
                                               can be taken to address automated and
                                                                                                       perpetrated by automated and                           and private sectors.
                                               distributed threats to the digital
                                                                                                       distributed attacks.1 This RFC focuses                    The Department has played an
                                               ecosystem as part of the activity
                                                                                                       on automated, distributed attacks that                 important role in facilitating
                                               directed by the President in Executive
                                                                                                       affect large sets of victims, and that put             engagement around cybersecurity
                                               Order 13800, ‘‘Strengthening the
                                                                                                       the broader network and its users at                   between public policy interests and the
                                               Cybersecurity of Federal Networks and
                                                                                                       risk. These types of attacks have been a               innovative force of the private sector.
                                               Critical Infrastructure.’’ Through this
                                                                                                       concern since the early days of the                    The Department was tasked to work
                                               Request for Comments (RFC), NTIA
                                                                                                       Internet,2 and were a regular occurrence               with industry to develop a framework
                                               seeks broad input from all interested
                                                                                                       by the early 2000s.3 Automated and
                                               stakeholders—including private
                                                                                                       distributed attacks, particularly botnets                4 U.S. Dep’t of Commerce, White House
                                               industry, academia, civil society, and
                                                                                                       due to their ability to facilitate high-               Announces Public-Private Partnership Initiatives to
                                               other security experts—on ways to                                                                              Combat Botnets (May 30, 2012), http://2010-
                                                                                                       impact disruption, form a threat that is
                                               improve industry’s ability to reduce                                                                           2014.commerce.gov/news/press-releases/2012/05/
                                                                                                       bigger than any one company or sector.
                                               threats perpetuated by automated                                                                               30/white-house-announces-public-private-
                                                                                                       Botnets are used for a variety of                      partnership-initiatives-combat-b.html.
                                               distributed attacks, such as botnets, and
                                                                                                       malicious activities, but distributed                    5 Working Group 7—Botnet Remediation,
                                               what role, if any, the U.S. Government
                                                                                                       denial of service (DDoS) attacks, which                Communications Security, Reliability and
                                               should play in this area.                                                                                      Interoperability Council III, Final Report, U.S. Anti-
                                                                                                       can overwhelm other networked                          Bot Code of Conduct (ABC) for Internet Services
                                               DATES: Comments are due on or before                    resources, are a critical threat and                   Providers (ISPs), Barrier and Metric Considerations
                                               5 p.m. Eastern Time on July 13, 2017.                   developing collaborative solutions to                  (Mar. 2013), https://transition.fcc.gov/bureaus/
                                               ADDRESSES: Written comments may be                      prevent and mitigate these attacks is a                pshs/advisory/csric3/CSRIC_III_WG7_Report_
                                               submitted by email to counter_botnet_                                                                          March_%202013.pdf.
                                                                                                       priority. As new scenarios emerge,                       6 Working Group 8, Communications Security,
                                               RFC@ntia.doc.gov. Written comments                      including those exploiting a new                       Reliability and Interoperability Council I, Final
                                               also may be submitted by mail to the                    generation of connected devices (so                    Report, Internet Service Provider (ISP) Network
                                               National Telecommunications and                         called ‘‘Internet of Things’’ (IoT)                    Protection Practices (Dec. 2010), http://
                                               Information Administration, U.S.                        devices), there is an urgent need for                  transition.fcc.gov/pshs/docs/csric/CSRIC_WG8_
                                                                                                                                                              FINAL_REPORT_ISP_NETWORK_PROTECTION_
                                               Department of Commerce, 1401                                                                                   20101213.pdf.
                                               Constitution Avenue NW., Room 4725,                       1 Strengthening the Cybersecurity of Federal           7 Working Group 5, Communications Security,
                                               Attn: Evelyn L. Remaley, Deputy                         Networks and Critical Infrastructure, Exec. Order      Reliability and Interoperability Council IV Working
                                               Associate Administrator, Washington,                    13800, 82 FR 22391 (May 11, 2017).                     Group 5, Final Report, Remediation of Server-Based
nlaroche on DSK30NT082PROD with NOTICES




                                                                                                         2 See generally United States v. Morris, 928 F.2d    DDoS Attacks (Sept. 2014), https://
                                               DC 20230. For more detailed
                                                                                                       504 (2d Cir. 1991) (discussing one of the first        transition.fcc.gov/pshs/advisory/csric4/CSRIC_IV_
                                               instructions about submitting                           known computer worms to spread across the              WG5_Remediation_of_Server-Based_DDoS_
                                               comments, see the ‘‘Instructions for                    Internet).                                             Attacks_Report_Final_(pdf)_V11.pdf.
                                               Commenters’’ section of SUPPLEMENTARY                     3 See Nicholas C. Weaver, Warhol Worms: The            8 See, e.g., U.S. Dep’t of Justice, Avalanche

                                               INFORMATION.                                            Potential for Very Fast Internet Plagues, Int’l        Network Dismantled in International Cyber
                                                                                                       Computer Science Inst. (Aug. 15, 2001), http://        Operation (Dec. 5, 2016), https://www.justice.gov/
                                               FOR FURTHER INFORMATION CONTACT:                        www1.icsi.berkeley.edu/∼nweaver/papers/warhol/         opa/pr/avalanche-network-dismantled-
                                               Megan Doscher, tel.: (202) 482–2503,                    warhol.html.                                           international-cyber-operation.



                                          VerDate Sep<11>2014   14:58 Jun 12, 2017   Jkt 241001   PO 00000   Frm 00007   Fmt 4703   Sfmt 4703   E:\FR\FM\13JNN1.SGM   13JNN1


                                                                               Federal Register / Vol. 82, No. 112 / Tuesday, June 13, 2017 / Notices                                         27043

                                               for use by U.S. critical infrastructure to               targeted a Domain Name System (DNS)                      • Attack Mitigation: Minimizing the
                                               improve cybersecurity practices,9                        service that was a commonly used                      impact of botnet behavior by rapidly
                                               leading to NIST’s Cybersecurity                          component in many DDoS mitigation                     identifying and disrupting malicious
                                               Framework.10 Other initiatives include                   strategies.16 This attack also highlighted            behaviors, including the potential of
                                               Green Papers developed by the                            the growing insecurities in—and threats               filtering or coordinated network
                                               Department built on industry input on                    from—consumer-grade IoT devices. As a                 management, empowering market actors
                                               cybersecurity 11 and IoT.12 NTIA has                     new technology, IoT devices are often                 to better protect potential targets, and
                                               also convened multistakeholder                           built and deployed without important                  reducing known and emerging risks.
                                               processes to identify consensus-based                    security features and practices in                       • Endpoint Prevention: Securing
                                               voluntary solutions on security                          place.17 The issue is not the particular              endpoints, especially IoT devices, and
                                               vulnerability disclosure 13 and IoT                      botnet, or the particular target, but the             reducing vulnerabilities, including
                                               security patching and upgradability.14                   risks posed by botnets of this size and               fostering prompt adoption of secure
                                                  The private sector is also playing a                  scope, and the expected innovation and                development practices, developing
                                               key role in tackling botnets. Internet                   increased scale and sophistication of                 practical plans to rapidly deal with
                                               service providers in the United States                   future attacks. Meanwhile, old threats                newly discovered vulnerabilities, and
                                               and around the world have been                           continue to evolve. The WannaCry                      supporting adoption of new technology
                                               experimenting with how to notify                         ransomware that threatened to destroy                 to better control and safeguard devices
                                               customers that their devices may be                      the data of thousands of individuals and              at the local network level.
                                               involved in an attack. Standards bodies                  organizations, including hospitals, did                  Respondents are invited to respond to
                                               have offered guidance on how to                          not initially involve a botnet. It was                some or all of the questions below:
                                               mitigate some styles of attacks.15                       spread by a worm-like mechanism                          1. What works: What approaches (e.g.,
                                               Technology providers are innovating                      similar to attacks of 15 years ago.                   laws, policies, standards, practices,
                                               around tools to protect resources from                   However, criminals were later observed                technologies) work well for dealing with
                                               DDoS attacks. Application and software                   using the Mirai botnet to attack a key                automated and distributed threats
                                               manufacturers are working to eliminate                   defense against the WannaCry                          today? What mechanisms for
                                               exploitable vulnerabilities. This                        ransomware.18                                         cooperation with other organizations,
                                               community has worked hard to address                        It is difficult to predict what the next           either before or during an event, are
                                               the threats over the last decade.                        significant attack vector will be, but that           already occurring?
                                                  The cybersecurity challenge is                        should not preclude taking steps to                      2. Gaps: What are the gaps in the
                                               particularly vexing because it involves                  mitigate the potential impact of those                existing approaches to dealing with
                                               adaptive adversaries. Existing tools,                    that are known. Left unchecked, without               automated and distributed threats?
                                               institutions, and initiatives are critical,              meaningful progress, these new classes                What no longer works? What are the
                                               but we must acknowledge that the threat                                                                        impediments to closing those gaps?
                                                                                                        of automated and distributed attacks
                                               continues to evolve, and more progress                                                                         What are the obstacles to collaboration
                                                                                                        could be a serious risk to the entire
                                               is needed, at an accelerated rate, to                                                                          across the ecosystems?
                                                                                                        ecosystem. Since poorly considered
                                               address the current landscape. The                                                                                3. Addressing the problem: What
                                                                                                        action would likely create significant
                                               DDoS attacks launched from the Mirai                                                                           laws, policies, standards, practices,
                                                                                                        unnecessary costs and unintended
                                               botnet in the fall of 2016, for example,                                                                       technologies, and other investments will
                                                                                                        consequences, substantial, carefully
                                               reached a level of sustained traffic that                                                                      have a tangible impact on reducing risks
                                                                                                        considered action must be considered,
                                               overwhelmed many common DDoS                                                                                   and harms of botnets? What tangible
                                                                                                        and it is most likely to be effective and
                                               mitigation tools and services, and even                                                                        steps to reduce risks and harms of
                                                                                                        efficient if built on engagement from all
                                                                                                                                                              botnets can be taken in the near term?
                                                                                                        stakeholders across the ecosystem.
                                                  9 Improving Critical Infrastructure Cybersecurity,
                                                                                                                                                              What emerging or long term approaches
                                               Exec. Order 13636, 78 FR 11737 (Feb. 12, 2013).          Request for Comments                                  may be promising with more attention,
                                                  10 National Institute of Standards and

                                               Technology, Framework for Improving Critical               The goal of this RFC is to solicit                  research, and investment? What are the
                                               Infrastructure Cybersecurity (Feb. 12, 2014), https://   informed suggestions and feedback on                  public policy implications of the
                                               www.nist.gov/sites/default/files/documents/
                                                                                                        current, emerging, and potential                      various approaches? How might these
                                               cyberframework/cybersecurity-framework-                                                                        be managed, balanced, or minimized?
                                               021214.pdf.                                              approaches for dealing with botnets and
                                                                                                                                                                 4. Governance and collaboration:
                                                  11 Internet Policy Task Force, U.S. Dep’t of
                                                                                                        other automated, distributed threats and
                                               Commerce, Cybersecurity, Innovation and the                                                                    What stakeholders should be involved
                                                                                                        their impact. The Department is
                                               Internet Economy (June 2011), https://                                                                         in developing and executing policies,
                                               www.nist.gov/sites/default/files/documents/itl/          interested in comments that address all
                                                                                                                                                              standards, practices, and technologies?
                                               Cybersecurity_Green-Paper_FinalVersion.pdf.              aspects of this issue, but particularly
                                                                                                                                                              What roles should they play? How can
                                                  12 Internet Policy Task Force & Digital Economy       those that address two broad approaches
                                               Leadership Team, U.S. Dep’t of Commerce,                                                                       stakeholders collaborate across roles
                                                                                                        where substantial progress can be made:
                                               Fostering the Advancement of the Internet of Things                                                            and sectors, and what should this
                                               (Jan. 2017), https://www.ntia.doc.gov/files/ntia/                                                              collaboration look like, in practical
                                                                                                          16 U.S. Computer Emergency Readiness Team,
                                               publications/iot_green_paper_01122017.pdf.
                                                  13 NTIA, Multistakeholder Process: Cybersecurity      Alert (TA16–288A): Heightened DDoS Threat Posed
                                                                                                                                                              terms?
                                               Vulnerabilities, https://www.ntia.doc.gov/other-         by Mirai and Other Botnets, https://www.us-              5. Policy and the role of government:
                                               publication/2016/multistakeholder-process-               cert.gov/ncas/alerts/TA16-288A (last revised Nov.     What specific roles should the Federal
                                               cybersecurity-vulnerabilities (last visited May 17,      30, 2016).                                            government play? What incentives or
                                               2017).                                                     17 National Security Telecommunications
                                                                                                                                                              other public policies can drive change?
                                                  14 NTIA, Multistakeholder Process: Internet of        Advisory Committee, Report to the President on the
                                                                                                                                                                 6. International: How does the
nlaroche on DSK30NT082PROD with NOTICES




                                               Things (IoT) Security Upgradability and Patching,        Internet of Things (Nov. 19, 2014), https://
                                               https://www.ntia.doc.gov/other-publication/2016/         www.dhs.gov/sites/default/files/publications/         inherently global nature of the Internet
                                               multistakeholder-process-iot-security (last visited      NSTAC%20Report%20to%20the%20President                 and the digital supply chain affect how
                                               May 17, 2017).                                           %20on%20the%20Internet%20of%20Things                  we should approach this problem? How
                                                  15 See, e.g., P. Ferguson & D. Senie, Network         %20Nov%202014%20%28updat%20%20%20.pdf.
                                                                                                          18 See Andy Greenberg, Hackers are Trying to
                                                                                                                                                              can solutions explicitly address the
                                               Ingress Filtering: Defeating Denial of Service
                                               Attacks Which Employ IP Source Address Spoofing,         Reignite Wannacry with Nonstop Botnet Attacks,        international aspects of this issue?
                                               Internet Engineering Task Force (May 2010),              Wired (May 19, 2017), https://www.wired.com/             7. Users: What can be done to educate
                                               https://www.ietf.org/rfc/rfc2827.txt.                    2017/05/wannacry-ransomware-ddos-attack/.             and empower users and decision-


                                          VerDate Sep<11>2014   14:58 Jun 12, 2017   Jkt 241001   PO 00000   Frm 00008   Fmt 4703   Sfmt 4703   E:\FR\FM\13JNN1.SGM   13JNN1


                                               27044                          Federal Register / Vol. 82, No. 112 / Tuesday, June 13, 2017 / Notices

                                               makers, including enterprises and end                   FOR FURTHER INFORMATION CONTACT:                        also includes requirements governing
                                               consumers?                                              Eileen T. Flaherty, Director, (202) 418–                the manner and timing by which the
                                                  Instructions for Commenters: NTIA                    5326, eflaherty@cftc.gov; Frank                         two agencies must act after the receipt
                                               invites comment on the full range of                    Fisanich, Chief Counsel, (202) 418–                     of a complete submission under the
                                               issues that may be presented by this                    5949, ffisanich@cftc.gov; or Jacob                      rule, if they determine to issue such
                                               inquiry, including issues that are not                  Chachkin, Special Counsel, (202) 418–                   joint interpretation. In addition,
                                               specifically raised in the above                        5496, jchachkin@cftc.gov, Division of                   paragraph (e)(5) of Commission
                                               questions. Commenters are encouraged                    Swap Dealer and Intermediary                            regulation 1.8 provides that ‘‘[i]f the
                                               to address any or all of the above                      Oversight, Commodity Futures Trading                    Commission and the [SEC] do not issue
                                               questions. Comments that contain                        Commission, 1155 21st Street NW.,                       a joint interpretation within the time
                                               references to studies, research, and                    Washington, DC 20581.                                   period described in paragraph (e)(1) or
                                               other empirical data that are not widely                SUPPLEMENTARY INFORMATION:                              (e)(3) [of the rule], each of the
                                               published should include copies of the
                                                                                                       Statement                                               Commission and the [SEC] shall
                                               referenced materials with the submitted
                                               comments.                                                                                                       publicly provide the reasons for not
                                                                                                          On February 7, 2017, Commission
                                                  Comments submitted by email should                                                                           issuing such a joint interpretation
                                                                                                       staff received a letter from Breakaway
                                               be machine-readable and should not be                   Courier Corporation (‘‘Breakaway’’),                    within the applicable timeframes.’’ 6
                                               copy-protected. Comments submitted by                   through its counsel, requesting a joint                    Pursuant to paragraph (e)(5) of
                                               mail may be in hard copy (paper) or                     interpretation from the Commission and                  Commission regulation 1.8, the
                                               electronic (on CD–ROM or disk).                         the Securities and Exchange                             Commission is declining to issue a joint
                                               Responders should include the name of                   Commission (‘‘SEC’’, and, together with                 interpretation with the SEC in
                                               the person or organization filing the                   the Commission, the ‘‘Commissions’’)                    connection with Breakaway’s request.7
                                               comment, as well as a page number on                    pursuant to Commission regulation 1.8                   The Commission understands that the
                                               each page of their submissions. All                     as to whether a particular agreement is                 status of the RPAs is already subject to
                                               comments received are a part of the                     a swap, security-based swap, or mixed                   ongoing private litigation and that the
                                               public record and will generally be                     swap.1 Breakaway’s request relates to a                 petitioners’ request may bear directly on
                                               posted on the NTIA Web site, https://                   contract labeled as a Reinsurance                       that litigation. We believe that the
                                               www.ntia.doc.gov, without change. All                   Participation Agreement (‘‘RPA’’),                      Commission regulation 1.8 process is
                                               personal identifying information (for                   which it has previously executed with                   not an appropriate vehicle for litigants
                                               example, name, address) voluntarily                     Applied Underwriters Captive Risk                       such as Breakaway to obtain the views
                                               submitted by the commenter may be                       Assurance Company, Inc. (‘‘AUCRA’’).2
                                               publicly accessible. Do not submit                                                                              of the Commission in connection with
                                                                                                       According to Breakaway’s submission, it
                                               confidential business information or                                                                            issues in ongoing litigation, and we
                                                                                                       entered into two RPAs with AUCRA,
                                               otherwise sensitive or protected                                                                                therefore decline Breakaway’s request
                                                                                                       one of which has a stated effective date
                                               information. NTIA will accept                           of July 1, 2009, and the other of July 1,               that we state an interpretive position as
                                               anonymous comments.                                     2012.                                                   to the proper characterization of the
                                                                                                          The Commission and the SEC jointly                   RPAs.8
                                                 Dated: June 8, 2017.
                                               Leonard Bechtel,                                        adopted Commission regulation 1.8 and                     Issued in Washington, DC, on June 7, 2017,
                                               Chief Financial Officer and Director of                 Securities Exchange Act of 1934                         by the Commission.
                                               Administration, Performing the Non-                     (‘‘Exchange Act’’) 3 Rule 3a68–2 in                     Christopher J. Kirkpatrick,
                                               Exclusive Duties of the Assistant Secretary             2012 4 pursuant to Section 712(d)(4) of                 Secretary of the Commission.
                                               for Communications and Information,                     the Dodd-Frank Wall Street Reform and
                                               National Telecommunications and                         Consumer Protection Act (‘‘Dodd-Frank                     Note: The following appendix will not
                                               Information Administration.                             Act’’).5 The rules established a process                appear in the Code of Federal Regulations.
                                               [FR Doc. 2017–12192 Filed 6–12–17; 8:45 am]             for parties to request a joint
                                               BILLING CODE 3510–60–P                                  interpretation as to whether a particular
                                                                                                                                                                  6 Paragraph (e)(5) of SEC Rule 3a68–2 contains
                                                                                                       agreement, contract, or transaction (or
                                                                                                                                                               identical language (other than reversing the
                                                                                                       class thereof) is a swap, security-based                references to the two commissions). See 17 CFR
                                               COMMODITY FUTURES TRADING                               swap, or mixed swap. Among other                        240.3a68–2.
                                               COMMISSION                                              things, the rules set forth the                            7 Commission staff has consulted and coordinated

                                                                                                       information required to be included in                  with SEC staff and understands that the SEC will
                                               Commission Statement Concerning a                       a request and a process for withdrawing                 be issuing a separate statement on this matter.
                                                                                                                                                                  8 As we and the SEC explained when we jointly
                                               Request for an Interpretation as to                     a request. Commission regulation 1.8
                                                                                                                                                               adopted Commission regulation 1.8 in 2012 (as well
                                               Whether a Particular Agreement Is a                                                                             as the corresponding rule under the Exchange Act),
                                               Swap, Security-Based Swap, or Mixed                       1 See  17 CFR 1.8.                                    the purpose of Commission regulation 1.8 is to
                                                                                                         2A   copy of Breakaway’s submission may be
                                               Swap                                                                                                            ‘‘afford market participants with the opportunity to
                                                                                                       found at: http://www.cftc.gov/LawRegulation/            obtain greater certainty from the Commissions
                                               AGENCY:  Commodity Futures Trading                      DoddFrankAct/Dodd-FrankFinalRules/index.htm.            regarding the regulatory status of particular Title VII
                                                                                                         3 15 U.S.C. 78 et seq.
                                               Commission.                                                                                                     instruments under the Dodd-Frank Act. This
                                                                                                         4 See Further Definition of ‘‘Swap,’’ ‘‘Security-     provision should decrease the possibility that
                                               ACTION: Commission statement.                           Based Swap,’’ and ‘‘Security-Based Swap                 market participants inadvertently might fail to meet
                                                                                                       Agreement’’; Mixed Swaps; Security-Based Swap
nlaroche on DSK30NT082PROD with NOTICES




                                                                                                                                                               the regulatory requirements applicable to a
                                               SUMMARY:   The Commodity Futures                        Agreement Recordkeeping, 77 FR 48207 (Aug. 13,          particular Title VII instrument.’’ See Product
                                               Trading Commission (the                                 2012) (‘‘Product Definitions Adopting Release’’).       Definitions Adopting Release, 77 FR at 48295. We
                                               ‘‘Commission’’) is publishing this                        5 See Dodd-Frank Act, Public Law 111–203, 124         and the SEC also noted our belief that ‘‘it is
                                               statement concerning a request for an                   Stat. 1376 (2010). All references to ‘‘Title VII’’ in   essential that the characterization of an instrument
                                                                                                       this statement shall refer to Title VII of the Dodd-    be established prior to any party engaging in the
                                               interpretation as to whether a particular               Frank Act, which established a comprehensive new        transactions so that the appropriate regulatory
                                               agreement is a swap, security-based                     regulatory framework for swaps and security-based       schemes apply.’’ See Product Definitions Adopting
                                               swap, or mixed swap.                                    swaps.                                                  Release, 77 FR at 48297.



                                          VerDate Sep<11>2014   14:58 Jun 12, 2017   Jkt 241001   PO 00000   Frm 00009   Fmt 4703   Sfmt 4703   E:\FR\FM\13JNN1.SGM    13JNN1



Document Created: 2017-06-13 00:21:43
Document Modified: 2017-06-13 00:21:43
CategoryRegulatory Information
CollectionFederal Register
sudoc ClassAE 2.7:
GS 4.107:
AE 2.106:
PublisherOffice of the Federal Register, National Archives and Records Administration
SectionNotices
ActionNotice, request for public comment.
DatesComments are due on or before 5 p.m. Eastern Time on July 13, 2017.
ContactMegan Doscher, tel.: (202) 482-2503, email: [email protected], or Allan Friedman, tel.: (202) 482-4281, email: [email protected], National Telecommunications and Information Administration, U.S. Department of Commerce, 1401 Constitution Avenue NW., Room 4725, Washington, DC 20230. Please direct media inquiries to NTIA's Office of Public Affairs, (202) 482-7002, or at [email protected]
FR Citation82 FR 27042 
RIN Number0660-XC03

2025 Federal Register | Disclaimer | Privacy Policy
USC | CFR | eCFR