Archive for the ‘Security Theater’ Category
The Information Security Business.. AKA The Cassandra Syndrome
I had an incident today that kind of epitomizes the security business for me… Well, one aspect of it that is. I call it the “Cassandra Effect” and it is more common than one might think. In my case, I am Cassandra and my prophetic insights are often unheeded or misunderstood as the rantings of a paranoid personality.
That is until the prophecies come true.. But by then its too late.
Today it was a manager within the company that I have been working for as a consultant who shrilly pushed back on findings that the company (X) did not have an incident response process in place that was documented and audit-able. Nevermind that my finding stemmed not only from asking for the documentation and them telling me they had none, but also by the fact that an incident had recently occurred and I watched as their incident response was muddled and likely would not have happened at all had I not been there to alert them to the malware causing the incident.
But… According to this manager, there was no need to document a process for incident response because they would not be audited by anyone like say for a SOX audit and be required to show their audit-able incident response documentation/processes.
Of course the SOX regs might say different huh?
Thankfully, I stopped myself from arguing this any further and trying to explain that this was indeed the case and that even if the SOX folks did not ask because they often suck at auditing, the PCI folks certainly would… I could hear the name whispered as the incident response post mortem call went on however.
“Cassandra”
Am I the only one who feels this way or is treated as such by clients who ask for security services? I mean, you go in, you do your job and document all the deficiencies, state the gaps and map them to regulations and still you get pushback saying
“Well, we don’t need to fix that”
Hell, this even happens after you exploit systems and steal their data and show them. They still look at you and say;
“Well, you do this professionally, this won’t ever happen in the real world”
Why? What is it that causes these cases of self delusion in certain C level execs? I really don’t understand their reasoning here. I certainly did not understand this person’s need for their responses being so confrontational. I mean, is it just that they feel that their job is on the line? Is it that they are not willing to spend more time and money? Because really, the only investment here would be time. Time to write the incident response plans and have them published.
So whats the deal here?
I attribute much of it to the fact that security, much like the appearance of a UFO to Neanderthal man instills fear into their hearts and minds. Simply, they see it all as magic and beyond their comprehension moving some to disbelief of what they see before them.
It could never happen here!
This is just too arcane!
Who’d want our data anyway?
Well, I have news for you, this is the future and the future is security my friends and we.. We are doomed.
I wonder what will happen tomorrow when I send them the links to the SOX requirements on documented processes such as incident response….
CoB
Weapons Of Mass Disruption: Cyberpocalypse-a-palooza
To avoid a digital doomsday, Clarke and co-author Robert Knake argue that America needs to treat cyberattack capabilities as nothing less than weapons of mass destruction that can “skip over the battlefield” to target civilian life. That sort of threat, like nuclear weapons, calls for a multi-tiered response: treaties, transparency, beefed-up defenses and a focused concern on rogue states.
Cyberwar treaties face a problem that traditional ones don’t. An enemy could easily hide the source of attacks by routing them through hijacked computers in another country or attributing them to independent criminals.
But Clarke contends that a government could be held accountable for helping to track down any cyberattack originating within its borders, just as the Taliban was held responsible for harboring Osama bin Laden. Although attribution on the Internet isn’t as simple as in traditional warfare, cyberattacks can be traced. Clarke says forensic hackers can follow the trail of bits when they’re given time and leave to breach enemy computers.
“The NSA can do that. And the NSA tells me that attribution isn’t actually a problem,” he says bluntly.
Full article HERE
Dick, Dick, Dick, I am with you in so many ways.. BUT, when you start talking about DPI of the WHOLE INTERNET, then you lose me pal.
Sorry *shrug*
I personally don’t want the whole of the internet being siphoned even MORE than it already is by DPI at every providers NOC with a NARUS STA6400 system installed.
Nope, no thank you.
Now, on the other things likes accountability for nations with server on their soil I am with you. If a server is public/private and is on your soil, there should be “some” responsibility there. At least there should be enough to enforce security practices be carried out to prevent it from becoming the botnet slave in the first place no? Of course Obama wussed out on that one here didn’t he? No rules will be created to enforce that type of accountability here in the private sector.. No sir! It would put an undue strain on the private sector!
*tap tap* Uhh sir, most of the infrastructure is in “private” hands… Umm without making them do some due diligence we are fucked mmmkay?
Yeah…
Meanwhile, lets talk to the italicized and BOLD text. Back in the days of yore, when pirates roamed the seas, there was a thing called a “Letter of Marque” basically, government would give a pirate hunter the letter and say “go git em” This is what we need today I think. Of course this is touchy, but, this is pretty much what Dick is alluding to. He says that he “knows” that were the NSA given a letter of marque, they could not only penetrate the systems involved, but also run the forensics to attribute where the perp really is.
“Whoa” to quote Neo…
Yes, it’s quite true. Not only the NSA could do this though. Go to the BlackHat or Defcon and you would have a plethora of people to choose from really. So this is no mysterious mojo here. Its just that this type of action could cause much more ire than the original attack maybe and lead us into that physical war with the nukes. Who knows.
I guess though, that what has been seen as the model for the future “internet” with cyber-geographic demarcations might just be the real future state we need. At least that is what Dick’s advocating here and I can sorta see that as a way to handle certain problems. If we break up cyberspace so to speak, into regions (like the whole .XXX debacle) then we can have set rules of governance. At present the internet is just a giant wild west stage complete with digital tumbleweeds and an old whore house.
*pictures the dual swinging doors and spurs jangling*
The one thing that rings true though, is that there needs to be some accountability.. Just what form that will take is anyone’s guess. For now though, we will continue on with the lame government jabbering and frothing with the lapdog that is the so called “press” lapping it all up and parroting it back to the masses.
Smoke em if ya got em…
CoB
Security experts: Don’t blame Internet for JihadJane and other recent terror scares
By Michael Booth, The Denver Post
Published: Saturday, March 13, 2010 11:15 PM ESTIt’s not the Internet. It’s the unstable surfer at the keyboard that constitutes the threat.
Internet terrorism and crime experts hedged their outrage when reacting to the arrest of Leadville’s Jamie Paulin-Ramirez, who was released Saturday without charges. Yes, they said, the Internet provides ample opportunity for disgruntled, lonely or violent people to meet up for criminal ends.
But social media, from chat rooms to Facebook, have become so widespread they are no more or less dangerous than society as a whole, these Internet observers said. And the technology cuts both ways: If alleged plotters like Paulin-Ramirez and “Jihad Jane” are using the Internet to plan crimes, rest assured law enforcement and watchdog groups successfully employ the same tools to foil them.
“Anyone who is trying to use the Internet for crime is falsely under the illusion that they are anonymous and won’t get busted,” said Steve Jones, author of “Virtual Culture” and a professor of communication and technology at the University of Illinois-Chicago. “Consider it an Internet-based `neighborhood watch.’ I’m not more concerned about the Internet than I am about the rest of the world.”
Internet connections can make for notorious nicknames and chilling chat-room transcripts, but the method of communication may not have that much impact on terrorism, said Jeremy Lipschultz, an expert in communications law and culture at the University of Nebraska-Omaha.
The rest HERE
Ummm yeah, Steve, you seem to be misunderstanding the problems faced here. Sure, there are people like me and others out there cruising the boards, but, the “authorities” are kinda behind the curve on this stuff.
Believe me Steve, I know. I have had dealings with the authorities.
So, yes, if you are on the internet and looking to do bad things AND you don’t know how to be stealthy, sure, eventually, you will be caught. However, if you are careful and you know what you are doing, then it may take some time if at all to be caught.
Case in point, look at our whole APT and cyber security debacle ongoing in the US. The CyberShockwave CNN mess is just the tip of the digital iceberg when talking about how inept our government and its minions are in dealing with the problems in cyberspace.
Better yet, lets look at the 559 million dollar haul recently cited by the FBI taken by cyber criminals. Any clues? Suspects? Not like they can round up the usual crew huh? It’s just not that easy with our current infrastructure to capture traffic and catch those who were committing the crime. Nor are the cops, even the Feds up to the task of trying to capture these offenders.
Here’s a quote for you from a recent exchange I had with the FBI:
“I don’t know anything about this stuff.. I do drug cases”
This from a field agent tasked with looking into a cyber oriented incident. What I am saying here is there is a big gap and the criminals and jihadi’s are using that to the most.
So Steve, you obviously don’t have a clue about cyber security issues. The real ones to worry about surely aren’t the guys and gals just using chat groups to talk to Jihadists, these “Jihobbyists” but let me remind you, it was a group of guys who were NOT cops or feds, that caught on to Jane and then reported her. Of course all of this AFTER she had activated and tried to whack a cartoonist. An act in which she failed mind you.
Oh, and Steve, did you know she was doing all this on YouTube? I mean really, just how friggin sooper sekret is that huh?
Duh.
Were Jane and others out there tech savvy or trained to be, they could be much more dangerous. In fact, the moniker “jihobbyist” has taken a turn in meaning. You see, the feds thought of Jane and others as “mostly harmless” but, as you can see they were wrong.
No, worry about the Jihadi’s who are technically savvy and trained in computer skills who know how to use a TOR router, encryption, email dead drops, etc. Those are the ones to worry about because even if one of us non cops are watching, we may not catch on. Never mind the cops/feds who are playing catch up.
CoB
The Real Meaning Of Cyberwarfare
Andy Greenberg, 03.03.10, 06:00 PM EST
Author Jeffrey Carr says we need to take a more measured approach to a new age of digital combat.
![]()
Jeffrey Carr
Connect the dots between reports of Chinese cyberspying, crippling network attacks in South Korea and Estonia and the U.S. military’s ramping up of cyber capabilities, and it would seem that a third World War is underway on the Internet.
Not so fast, says Jeffrey Carr, author of Inside Cyberwarfare, a plainspoken guide to cyber threats that was published by O’Reilly Media earlier this year. Carr, the chief executive of cybersecurity consultancy Grey Logic, takes a more measured approach to the new age of digital defense, starting with the definition of so-called “cyberwar.” In Carr’s view a war hasn’t begun until metal is flying through the air. That means the real threat to U.S. networks comes not from sleeper software planted by state-sponsored cyberspies, but from a combined attack of atoms and bits, or from cyber-enabled radical groups or criminals engaged in what’s more properly called “cyberterrorism.”
The rest HERE
I disagree with Mr. Carr. It’s exactly those sleeper software pieces and other cyberterror events that ARE cyberwar. War, as Sun Tzu framed it, is not only outright battle, but also the use of spies, understanding yourself and your enemy, and the terrain.
Mr. Carr lacks this perspective. I suggest he read The Art of War sometime.
The Chinese have been using the “Thousand Grains of Sand” approach to cyber affairs for some time now. They are patient, and they are methodical. Thus, we will be seeing the day perhaps that all of these precepts culminate in a battle won without “metal flying through the air” as Mr. Carr puts it. This is the essence of Sun Tzu.
So Mr. Carr, just wanted to say; “You’re doing it wrong”
CoB
How prepared are you for Cyber Attacks?
The AFCOM association, whose members include 4,500 administrators from 3,900 data centers around the world surveyed 436 data center sites last year. Some of the findings of the survey indicated that cyberterrorism is an increasing concern, mainframe deployment is on the decline, storage deployment is on the rise, and “green” technologies are definitely happening.
It was found that there is a shift in data centers away from mainframe computers and toward other types of servers.Just less than 40 percent of data centers run two or more mainframes, with 45.7 percent of such data centers planning to replace at least one of their mainframes in the next year. However 33 percent of those replacing mainframes plan to replace them with other types of servers.
The more worrying fact that this study conducted in July2009 has brought to light is that 60.9 percent of data centers worldwide officially recognize cyberterrorism as a real threat but ironically only about one-third of respondents included cyber terrorism in their disaster-recovery plans. The survey has unveiled a major void in data centers in terms of securing its critical data against a very real possibility of cyber attacks.The report goes on to note that currently only about one of every four data centers addresses cyberterrorism, and one in five has procedures in place to prevent an attack. That means the remaining 4 out of five data centers are left dangerously vulnerable . The problem becomes more critical as several data centers expect massive expansion due to dramatic increase in storage demands and aggressive business plans in the next five years. The study finds that 22.0% will utilize a
The rest HERE
I find it funny that in most of the movies that have a “hacker” content, there is usually a heavy reference to the “Mainframe” as being the target of attacks. Of course in real life, the mainframe is not much more employed by companies to store data or perform functions, instead it’s all distributed or now “cloud” computing based on servers.
What’s even more laughable is that when I worked for IBM and they needed someone to do audits on mainframes they made me the “mainframe guy” by handing me some manuals and saying read up. I ended up performing assessments on Z and 360 systems on the fly really. Once I had done some AS400 as well I was the go to guy by everyone else. Me? Really? I am now an SME? HA!
In time I got more acquainted with the AS400 but man, being thrown into something on site is a pain in the ass.
Anyway, now we are talking about mainframes and cyberterror huh? Hmm, well I can see how this might be appealing. How many of the kiddies out there know Z systems or 360? For that matter AS400? So maybe there is a little security by obscurity there, but, not really. Nope, in the end, I only see the advantage in being that there aren’t too many people programming malware for these operating systems.
On average, when I looked at mainframes out there as an auditor I found them to be lacking utterly in security being turned on. Most of the time you had maybe one or two people who knew how to run them, but not at all securely. So, do I have hope that a mainframe is more “secure” in the case of a cyberwar?
No.
Of course, just how many Z systems are out there now with the security module added on?
No idea.
How many of these “clouds” I keep hearing about actually use mainframe technology and LPARS?
Well, look at the numbers above. Nearly 50% of the data centers are offing their mainframes. This means that they will be running servers with either *NIX or, more likely, Microsoft.
*Shudder*
One would hope its the *NIX, but I can’t say for sure that will be the case.
Hmmm So IBM, did you maybe pay for this article?
Heh.
CoB
CyberShockwave = CyberFAIL Difference of Opinons
From TaoSecurity
I just finished watching Cyber Shockwave, in the form of a two hour CNN rendition of the 16 February 2010 simulation organized by the Bipartisan Policy Center (BPC). The event simulated, in real time, a meeting of the US National Security Council, with former government, military, and security officials role-playing various NSC participants. The simulation was created by former CIA Director General Michael Hayden and the BPC’s National Security Preparedness Group, led by the co-chairs of the 9/11 Commission, Governor Thomas Kean and Congressman Lee Hamilton.
The fake NSC meeting was held in response to a fictitious “cyber attack” against US mobile phones, primarily caused by a malicious program called “March Madness.” For more details, read the press releases here, or tune into CNN at 1 am, 8 pm, or 11 pm EST on Sunday, or 1 am EST on Monday.
The Rest HERE
So, I already see lots of comments on Twitter and elsewhere claiming Cyber Shockwave was lame or a waste of time. As you can see it raised a lot of issues that I consider very important. I’m glad BPC organized this event and that CNN televised it. At the very least people are talking about digital security. Posted by Richard Bejtlich at 22:11 7 comments
![]()
Bejtlich and I differ in opinions on a few things but I think he has some good points. I was reactive that night at the superciliousness of the exercise as presented by CNN. Now that I have had time to think a bit, let me put some more words around what I spewed out on Saturday in hopefully a more cogent way.
Tao’s thoughts will be followed by my own.
- Others have already criticized the technical realism of this exercise. I think that is short-sighted. If you have a problem with the scenario, insert your own version of a major technical problem that affects millions of people.
I still feel that this was no real exercise. One would hope that in such meetings today, we would have technically savvy people there on hand to talk to the technical aspects of what was happening and what course to take. If we do not have someone technical in the SITROOM then we are hosed from the get go. You need to have SME’s there to explain the situation technically.
- I think the real value of the exercise was revealing the planning deficiencies when cyber events are involved. Since this exercise supposedly occurred in the future, I was disappointed to not hear mention of the National Cyber Incident Response Plan, currently in draft.
I agree here. It would have been nice if they had talked about this response plan, but I am not so sure that this will get off the ground. Never mind the fact that were this type of attack to happen within say, the next 5 years, I am sure we would still not have the infrastructure to handle it properly as a country.
The turf wars that have started now likely will still be being fought and there will likely be no clear direction to follow. I really think that this country has yet to really hit by an attack from which it will learn and change. Until then, we will have talking heads in bunkers making bad decisions while the outside world goes to shit.
I was disturbed but not surprised to see the tension between preserving the Constitution, individual liberties, and property rights, vs “aggressive” action which is “ratified” following Presidential order. I was impressed by the simulated Attorney General’s defense of the law despite intimations by some of her colleagues that the President could pretty much do whatever he wanted.
This is classic talking head NSC blather. It was exacerbated by the fact that there were no technical SME’s on the panel to help the talking heads understand the complexities of the problem. When they started talking about the constitutionality of pulling cell phones offline as well as taking over telcos, I was just beyond rational thought.
Were they to start doing these things it would only lend to the pandemonium that this attack and the press chatter about it would have caused. This would only amp it up and make the nation go into panic mode.
Additionally, you could see as is pointed out above, that they seem to think that the president has carte blanche here to “protect the nation” but in doing these things, or even advocating them, they are doing this country a dis-service.
To complicate the situation, after the first hour news came of a bomb attack on two power stations, leading to or aggravating electrical grid failures on the east coast. I thought this was unnecessary. In the scenario wrap-up, the participants focused mainly on the cyber elements. I thought the exercise could have stayed focused on 100% cyber without bringing in a traditional terrorism angle.
Here I diverge again from Tao’s opinion. The cyber attack in question was a part of a larger attack that culminated with the explosion and taking down of the grid. Of course in the future this may not be necessary because the grid will be “smart” technology that is likely to be easily hacked and taken down in a massively larger plot. This would work even better because of the connectivity planned for these systems.
In this case though, if this were a nation state actor they likely would take out the northeast grid at a sensitive location to make things worse. Of course the NE has the economic center of NY, so you can see where I am going here. Tao seems to miss that point. It’s not all about the cyber. In fact, I am more worried about a blended attack than I am a straight cyber one simply because, as the panel said, the systems are disparate and segregated. You couldn’t take them all down at once. Unless that is, you have invested a lot of time hacking and back door-ing them all before the attack goes live.
This is another thing that was not talked about on the panel and may not have been apparent to many in the audience.
I thought the role of the simulated Cyber Coordinator revealed the weakness of the position. Most of the other participants relied on one, two, or three forms of authority when providing advice. They 1) offered specific expertise, e.g., the AG talking about the law; and/or 2) specific news, e.g., word from the Intel Community, and/or 3) explanations of what their agencies were doing, e.g., State describing interactions with other governments. The simulated Cyber Coordinator didn’t do much of those, and when he tried to apply expertise, he was wrong or wrong-headed. I cringed when he mentioned having ISPs require user PCs to be “secure” or to force them to apply patches. Just how would that happen? I could see a useful Cyber Coordinator be the person who knows the technology and its limitations, but outside of that role I have a lot of doubts.
Yes, there is no authority nor was there comprehension of the issues at hand by the one in charge. I think that we have much more to learn from episodes like this and yes, this was a learning experience, however, it need not have been on CNN. Unless this little event was a chance for the counterintel folks to pass out a healthy helping of “disinformation” we just let the world know pretty well how fubar we are where this attack type is concerned.
On the issue of Tao’s cringing at the desire for ISP’s etc to enforce secure practices online, I don’t agree fully. I think that we need to get educated, but do stop at forcing people to be secure. However, I do agree that forcing corporations, military, contractors, etc that interface with the “infrastructure” should be forced to practice security. By law we already have rules about securing credit card and personal data, why not go further and audit companies to such standards around INFOSEC in general?
After all, its all of these places that are the weak spots and getting hacked lately by the likes of China right? How about more legislation, oversight, and action here?
In closing, I just want to re-iterate that this CNN show was poorly thought out. The whole “War of the Worlds This is a simulation” crap was almost not necessary because it was so patently useless. So yes, it may have brought up some questions that may be usefull to those in power, but mostly, it just led to more FUD for the public.
CoB