Posts in General
Page Content
Who is Hacking Whom? [Updated]
[tags]hacking, national security, China, cyber espionage[/tags]
Over the last week or two there have been several news items based on statements and leaks regarding on-going cyber espionage. For instance, two articles, one in the British Financial Times and another on CNN allege that Chinese agents had successfully broken into systems at the Pentagon resulting in a shutdown of unclassified mail systems. The London Times had an article on the Chinese Army making preparations for “Cyber War” and in New Zealand an official indicated that government systems had been hacked by foreign agents, implying Chinese involvement. An article in today's Christian Science Monitor noted that China has been attacking German and British government sites and industry, and another article in the Asia-Pacific news mentions France and Australia as targets.
Of course, these kinds of stories aren't new. There was a story in the Washington Post back in 2005 about alleged Chinese hacking, and another set of stories this past March including one in USA Today, There seems to be a thread going back to at least 2003, as reported in Time magazine.
Not to be outdone, and perhaps in a classic “Spy vs. Spy” countercharge, a Chinese official complained that their systems had been hacked into and damaged by foreign agents. That could very well be true, but the timing is such that we should be rather skeptical of these claims.
So, what is really going on? Well, it probably is the case that few people know the whole, real story -- and it is undoubtedly classified within each country where any part of the story is known. However, there are a few things we know for certain:
- Most government agencies and companies around the world use common products -- the same products that are so frequently penetrated by criminal hackers and malware. We have years of evidence that these systems are easy to hack and hard to defend. Furthermore, those systems are often not kept up-to-date with patches because they are mission-critical and patches can break existing applications.
- The Chinese have publicly stated that they are pursuing activities in the cyber espionage and warfare arena. Given the world situation, the US, Brits, Germany, and several other countries are likely targets -- not only for political and military espionage, but for economic and technical espionage. (The Chinese could certainly benefit by stealing plans on how to make lead-free toy coloring and toxin-free toothpaste, for instance. :-)
- The Chinese are almost certainly not the only country with resources, talent and motives to commit cyber espionage.
- It's possible (sometimes) to trace connections back to particular networks and machines, but it is difficult to know if those are the “final” machines in a chain. It is even more difficult to determine who is running those machines and whether those individuals are motivated by government orders, criminal intent, or simply a hobbyist's interest. All three groups are likely to be interested in access to the kinds of information that appear to be involved in these incidents; in some cases, there may be ties between organized crime and governmental entities, so activities of one benefit the other.
Given those 4 observations, we can be reasonably sure that not all the events being discovered are actually government sanctioned; that not all the actors are being accurately identified; and probably only a fraction of the incidents are actually being discovered. The situation is almost certainly worse in some ways than implied by the newspaper accounts.
Some of us have been warning about lax cyber security, especially coupled with poorly designed COTS products, for years. What is surprising is that authorities and the press are viewing these incidents as surprising!
It remains to be seen why so many stories are popping up now. It's possible that there has been a recent surge in activity, or perhaps some recent change has made it more visible to various parties involved. However, that kind of behavior is normally kept under wraps. That several stories are leaking out, with similar elements, suggests that there may be some kind of political positioning also going on -- the stories are being released to create leverage in some other situation.
Cynically, we can conclude that once some deal is concluded everyone will go back to quietly spying on each other and the stories will disappear for a while, only to surface again at some later time when it serves anoher political purpose. And once again, people will act surprised. If government and industry were really concerned, we'd see a huge surge in spending on defenses and research, and a big push to educate a cadre of cyber defenders. But it appears that the President is going to veto whatever budget bills Congress sends to him, so no help there. And the stories of high-tech espionage have already faded behind media frenzy over accounts about Britney being fat, at least in the US.
So, who is getting violated? In a sense, all of us, and our own governments are doing some of the “hacking” involved. And sadly, that isn't really newsworthy any more.
Updated 9/14
And here is something interesting from the airforce that echoes many of the above points.
[posted with ecto]
Purchasing Policies That Create a Barrier to Computing Diversity
Fun with Internet Video
[tags]network crime, internet video, extortion, streaming video[/tags]
Here's an interesting story about what people can do if they gain access to streaming video at a poorly-protected site. If someone on the other end of the phone is really convincing, what could she get the victims to do?
FBI: Strip Or Get Bombed Threat Spreads - Local News Story - KPHO Phoenix:
Cyberwar
[tags]cyber warfare, cyber terrorism, cyber crime, Estonia[/tags]
I am frequently asked about the likelihood of cyber war or cyber terrorism. I'm skeptical of either being a stand-alone threat, as neither is likely to serve the goals of those who would actually wage warfare or commit terrorism.
The incidents in Estonia earlier this year were quite newsworthy and brought more people out claiming it was cyber terrorism or cyber warfare. Nonsense! It wasn't terrorism, because it didn't terrorize anyone -- although it did annoy the heck out of many. And as far as warfare goes, nothing was accomplished politically, and the “other side” was never even formally identified.
Basically, in Estonia there was a massive outbreak of cyber vandalism and cyber crime.
Carolyn Duffy Marsan did a nice piece in Network World on this topic. She interviewed a number of people, and wrote it up clearly. I especially like it because she quoted me correctly! You can check out the article here: How close is World War 3.0? - Network World. I think it represents the situation quite appropriately.
[As a humorous aside, I happened to do a search on the Network World site to see if another interview had appeared without me hearing about it. I found this item that had appeared in December of 2006 and I didn't know about it until now! Darn, and to think I could have started recruiting minions in January. :-)]
8 Security Action Items to Beat “Learned Helplessness”
- Don't be a victim; don't surrender to helplessness. If you have limited energy to spend on security (and who doesn't have limits?), budget a little bit of time on a systematic and regular basis to stay informed and make progress on tasks you identify as important; consider the ones listed below.
- Don't be a target. Like or hate Windows, running it on a desktop and connecting to the internet is like having big red circles on your forehead and back. Alternatives I feel comfortable with for a laptop or desktop system are Ubuntu Linux and MacOS X (for now; MacOS X may become a greater target in time). If you're stuck with Windows, consider upgrading to Vista if you haven't already; the security effort poured into Vista should pay off in the long run. For servers, there is much more choice, and Windows isn't such a dominant target.
- Reduce your exposure (attack surface) by:
- Browsing the web behind a NAT appliance when at home, in a small business, or whenever there's no other firewall device to protect you. Don't rely only on a software firewall; it can become disabled or get misconfigured by malware or bad software, or be too permissive by default (if you can't or don't know how to configure it).
- Using the NoScript extension for Firefox (if you're not using Firefox, consider switching, if only for that reason). JavaScript is a vector of choice for desktop computer attacks (which is why I find the HoneyClient project so interesting, but I digress). JavaScript can be used to violate your privacy* or take control of your browser away from you, and give it to website authors, advertisers on those sites, or to the people who compromised those sites, and you can bet it's not always done for your benefit (even though JavaScript enables better things as well). NoScript gives you a little control over browser plugins, and which sources are allowed to run scripts in your browser, and attempts to prevent XSS exploits.
- Turning off unneeded features and services (OK, this is old advice, but it's still good).
- Use the CIS benchmarks, and if evaluation tools are available for your platform, run them. These tools give you a score, and even as silly as some people may think this score is (reducing the number of holes in a ship from 100 to 10 may still sink the ship!), it gives you positive feedback as you improve the security stance of your computers. It's encouraging, and may lift the feeling that you are sinking into helplessness. If you are a Purdue employee, you have access to CIS Scoring Tools with specialized features (see this news release). Ask if your organization also has access and if not consider asking for it (note that this is not necessary to use the benchmarks).
- Use the NIST security checklists (hardening guides and templates). The NIST's information technology laboratory site has many other interesting security papers to read as well.
- Consider using Thunderbird and the Enigmail plugin for GPG, which make handling signed or encrypted email almost painless. Do turn on SSL or TLS-only options to connect to your server (both SMTP and either IMAP or POP) if it supports it. If not, request these features from your provider. Remember, learned helplessness is not making any requests or any attempts because you believe it's not ever going to change anything. If you can login to the server, you also have the option of SSH tunneling, but it's more hassle.
- Watch CERIAS security seminars on subjects that interest you.
- If you're a software developer or someone who needs to test software, consider using the ReAssure system as a test facility with configurable network environments and collections of VMware images (disclosure: ReAssure is my baby, with lots of help from other CERIAS people like Ed Cates).


