cahwyguy: (Default)

userpic=observationsSaturday, and time to clear out the news links before a busy weekend. Hopefully, you’ll find something of interest in these:

 

This entry was originally posted on Observations Along The Road (on cahighways.org) as this entry by cahwyguy. Although you can comment on DW, please make comments on original post at the Wordpress blog using the link below; you can sign in with your LJ, FB, or a myriad of other accounts. There are currently comments on the Wordpress blog. PS: If you see share buttons above, note that they do not work outside of the Wordpress blog.

===> Click Here To Comment <==
(Click Here to Comment)

cahwyguy: (Default)

Observation StewThe smell of stew cooking in the crockpot reminded me I need to post a stew of my own; with vacation and such, it’s been a few weeks. So let’s clear out those links…

  • Burger Continental is Gone. We discovered this as we returned home from the Ren Faire a few weeks ago: BC has closed their doors. No more can Adrian, their long-time waiter (and one of the owners, from what I’ve heard) flirt with my wife. They were a reliable dinner when we were going to the Pasadena Playhouse. I’ll miss them.
  • Airline Safety, Take 1: Fitting In The Butts. As we all know, airlines are squeezing passengers closer and closer together, both through thinner seats and decreased pitch. The big problem: That may not be safe. A consumer advisory group has asked DOT to look into the matter.
  • Airline Safety, Take 2: Reading the Signs. An interesting airline risk has just come to light — significant if you are flying Boeing 787s. It appears there is a software glitch that could cause power units (APUs) to go into failsafe mode after running continuously for more than 8 months. Specifically, if all four APUs were started at the same time, and run for 248.55 hours… they shut down. 248.55 just happens to be the point where a signed 32-bit integer holding time in hundreths of a second overflows and goes negative. No problem: That age old advice still works: “Have you tried turning it off, and back on again?”
  • Cleaning Out the Stash. One of the problem when your parents die is cleaning out what they left at the house. That problem turns weird when you discover their adult stash — i.e., their porn collection. Yes, your parents think about sex — who do you think made you the horndog you are? Yes, I’m looking at you. Luckily, there is an adult bookstore in London that will take that porn off of your, umm, hands.
  • Ah, Catherine the Great. As you probably remember, I loved Steve Allen’s Meeting of Minds. Therefore, it is with sad news that I report the passing of Mrs. Steve Allen, better known as Jayne Meadows, who started in numerous episodes. She made it to 95 and had a good life. I thank her for her contributions.
  • Security and Maturity. Here’s an interesting metric: Brian Krebs on measuring a company’s security maturity level.
  • Damn. Yesterday was National Naked Gardening Day. Here’s an interesting article on a garden rework in Beverlywood that not only saves water, but grows vegetables. For future reference…
  • Where to Go For Dinner. Another “for future reference”: Here’s a listing of 20 recommended places to eat in the Valley. We’ve actually been to about 2/3s of these.
  • But What Will I Watch in Hawaii. I don’t know what you did when you visited Hawaii in your college years, but I…. programmed. I have fond memories of listening to the Jerry Lewis Telethon (back in the late 1970s, mind you) and programming for the UCLA Computer Club. Today’s children will have to find something else to do: MDA has cancelled the Labor Day Telethon. I’ll note that it had really gone downhill without Jerry Lewis and the folks he drew in, and MDA parted ways with him a few years ago.

That’s your stew for this Sunday. Now go work out….

This entry was originally posted on Observations Along The Road (on cahighways.org) as this entry by cahwyguy. Although you can comment on DW, please make comments on original post at the Wordpress blog using the link below; you can sign in with your LJ, FB, or a myriad of other accounts. There are currently comments on the Wordpress blog. PS: If you see share buttons above, note that they do not work outside of the Wordpress blog.

===> Click Here To Comment <==
(Click Here to Comment)

cahwyguy: (Default)

userpic=securityAs I sit here eating my lunch, I’m thinking about all the articles I’ve read over the last week concerning the Sony cybersecurity attack, the movie “The Interview”, and the reaction thereto. Thoughts are starting to gel together, so I thought I’d share them:

  • How Could America Give In Like This? This is a question I’ve seen throughout Facebook, with an appropriate share blaming Obama for all these troubles. The response, however, shows a lack of critical thinking — for it is asking the wrong question. America — at least the government — has no connection to the capitulation to the hacker’s threats. That’s squarely on Sony’s shoulders. Further, Sony isn’t necessarily completely wrong. Put yourself in Sony’s shoes. A hacking group — which you believe to be connected to an unstable government — makes threats intimating mass casualties at theatres showing this movie. Further, a number of your exhibitors are publicly deciding not to show the film.  So which is better: Show the film, and if god forfend an attack occurs, deal with all the lawsuits… or take the economic hit for pulling it now (and possibly have insurance cover the loss). Sony made the correct business decision. Where they erred was stating the film would never be released, in any form. That’s stupid. Release it on video-on-demand across multiple platforms — there’s no way the adversary can attack all those individual homes, or all the individual servers serving the media (ETA: of course, after Obama’s statement, now Sony says they may do that). Put CDs in every Target and Walmart and Costco. Pulling it 100% is giving in to FUD (Fear, Uncertainty, and Doubt). I’m not only looking at Sony here — Paramount pulling Team America has given into the same FUD. Want another perspective? Read Ken Davenport. Oh, and by the way, Obama says Sony shouldn’t have pulled it.
  • But this permits (name your county) to censor our movies! Oh, and you think your movies aren’t censored now? The government may not censor them, but studio executives do every day when they decide which projects to green light and which to stop. The MPAA does it when they rate movies and amp violence over sex. What happened here will not stop such movies from being made. What it will curtail is major studio distribution of such movies, making them harder to find. That, by the way, is where studios really “censor” — in what they agree to distribute or not. There are many movies that remain unseen for lack of a distribution partner.
  • But how could this happen? Isn’t the government supposed to protect us? The government’s job is to protect government systems. There have been repeated attempts to strengthen overall cybersecurity, but they have never made it through Congress as they would involve private corporations working closer with government, and sharing information. This also appears not to be the result of a simple cracker; this seems to be a targeted attack by a determined nation state. Bruce Schneier has a good analysis of this. He also has some very good conclusions:

For those worried that what happened to Sony could happen to you, I have two pieces of advice. The first is for organizations: take this stuff seriously. Security is a combination of protection, detection and response. You need prevention to defend against low-focus attacks and to make targeted attacks harder. You need detection to spot the attackers who inevitably get through. And you need response to minimize the damage, restore security and manage the fallout.

The time to start is before the attack hits: Sony would have fared much better if its executives simply hadn’t made racist jokes about Mr. Obama or insulted its stars­or if their response systems had been agile enough to kick the hackers out before they grabbed everything.

My second piece of advice is for individuals. The worst invasion of privacy from the Sony hack didn’t happen to the executives or the stars; it happened to the blameless random employees who were just using their company’s email system. Because of that, they’ve had their most personal conversations­, gossip, medical conditions, love lives­ exposed. The press may not have divulged this information, but their friends and relatives peeked at it. Hundreds of personal tragedies must be unfolding right now.

This could be any of us. We have no choice but to entrust companies with our intimate conversations: on email, on Facebook, by text and so on. We have no choice but to entrust the retailers that we use with our financial details. And we have little choice but to use cloud services such as iCloud and Google Docs.

So be smart: Understand the risks. Know that your data are vulnerable. Opt out when you can. And agitate for government intervention to ensure that organizations protect your data as well as you would. Like many areas of our hyper-technical world, this isn’t something markets can fix.

  • But why would they do this? A good question. This isn’t just because the movie makes fun of the leader of North Korea. That’s been done before. Vox has a good analysis of the reasons behind this. The short summary is: To show they can. North Korea gains much of its power through its military, and by presenting the appearance of that power outwardly and inwardly. Outwardly it does it through threats and intimidation; inwardly it does it to justify spending on military rather than the people. Vox summarizes it thusly:

This is belligerence meant to deter the much stronger South Korea and US, and to draw international attention that North Korea can use to bolster domestic propaganda portraying Kim Jong Un as a fearless leader showing up the evil foreign imperialists. It is meant to foment the isolation and tension that has allowed the Kim family to hold onto rule, impossibly, for decades. It has nothing to do with Sony’s film, however offensive it may be, with the film’s portrayal of Kim, or with free speech in America. In believing North Korea’s rhetoric strongly implying a connection, we are buying into the country’s strategy and helping Kim succeed.

[…]

This strategy of portraying itself as crazy is remarkably effective at securing North Korea’s strategic goals. But it is also quite dangerous. By design, the risk of escalation is high, so as to make the situation just dangerous enough that foreign leaders will want to deescalate. And it puts pressure on American, South Korean, and Japanese leaders to decide how to respond — knowing that any punishment will only serve to bolster North Korean propaganda and encourage further belligerence. In this sense, the attacks are calibrated to be just severe enough to demand our attention, but not so bad as to lead to all-out war.

Over on the Kapersky blog, they put it this way:

“It’s not about a movie or even Sony, at all,” wrote Immunity CEO and former NSA scientist Dave Aitel on the Daily Dave mailing list. “When you build a nuclear program, you have to explode at least one warhead so that other countries see that you can do it. The same is true with Cyber.”

  • So what is the long term impact? As with anything, I believe there will be both good and bad impacts. On the bad side, we may see artists reluctant to tackle hard subjects in major films, knowing they will have difficulty getting them through the studio system. We may also see studios much more reluctant to distribute controversial films (for example, film studio New Regency has cancelled its planned movie adaptation of acclaimed graphic novel Pyongyang). This may end up being a boon for Science Fiction films, as they can often make the same point using metaphors without naming real countries and real people. More significantly, on the bad side, is the message this sends: For the controversial stuff that gets through, are we going to see more threats and intimidation? If some fundamentalist group doesn’t like the subject of a movie, can they just threaten a 9/11-type attack and have it pulled? This is bad, very bad — and it might even lead to the death of large-screen cinema (as you can’t attack video-on-demand with such threats — only large groups of people). On the good side, it may make corporations much more aware of the need for Cybersecurity, and it may help government efforts related to cybersecurity. In fact, the senate and house just passed a new cybersecurity bill that will bolster cyber research and development, the cyber workforce through training and education and technical standards for cybersecurity through NIST. It’s a start. It may also move controversial subjects back onto the live stage, as such performances often attract much less attention.

 

 

This entry was originally posted on Observations Along The Road (on cahighways.org) as this entry by cahwyguy. Although you can comment on DW, please make comments on original post at the Wordpress blog using the link below; you can sign in with your LJ, FB, or a myriad of other accounts. There are currently comments on the Wordpress blog. PS: If you see share buttons above, note that they do not work outside of the Wordpress blog.

===> Click Here To Comment <==
(Click Here to Comment)

cahwyguy: (Default)

userpic=securityI’ve been at ACSAC all week, and it has been a great conference. The committee and the Universal Hilton have a lot of work to do to top this year’s conference at the Hyatt French Quarter. But I’m confident they/we will. So what is more appropriate than some security-related articles:

  • Remember Benford’s Law. Here’s an interesting summary of an article about how accountants are using Benford’s Law to fight fraud. Benford’s Law, for those that don’t recall it, refers to the frequency distribution of digits in many (but not all) real-life sources of data. In this distribution, 1 occurs as the leading digit about 30% of the time, while larger digits occur in that position less frequently: 9 as the first digit less than 5% of the time. Benford’s Law also concerns the expected distribution for digits beyond the first, which approach a uniform distribution. The accountants looked at a log of financial ATM transactions for an ATM with a limit of $50, and saw an abnormal number of first digits that were 4. This led them to find financial fraud. Think about this for analysis of audit trails…
  • Two-Factor Authentication. One point that has been continually made this conference relates to the value of two-factor authentication. We even heard from Avi Rubin on how to use two-factor in online poker. However, there is a major problem with two factor: what happens if you lose the second factor. Here’s an article that explains what to do. Now that you know what to do, you have no excuse. Enable two factor authentication.
  • Cyberphysical Attacks. One major theme of the conference has been cyberphysical security. You probably think it was Stuxnet. Wrong. A recent article points to a 2008 Turkish pipeline explosion, which was caused by a cyberattack that overloaded the pressure on the pipe. As Avi pointed out, as we get more and more devices in our houses and lives that are network connected, how susceptible will we be to cyberattacks.

Want to learn more about these problems? Come to the 2015 ACSAC, December 7-11 2015 at the Universal Hilton. Paper submissions, training submissions, workshop submissions, and similar stuff are all due around June 1, 2015. As Local Arrangements and Tutorial Chair, I look forward to seeing you for what will be my 25th ACSAC on the Conference Committee!

This entry was originally posted on Observations Along The Road (on cahighways.org) as this entry by cahwyguy. Although you can comment on DW, please make comments on original post at the Wordpress blog using the link below; you can sign in with your LJ, FB, or a myriad of other accounts. There are currently comments on the Wordpress blog. PS: If you see share buttons above, note that they do not work outside of the Wordpress blog.

===> Click Here To Comment <==
(Click Here to Comment)

cahwyguy: (Default)

userpic=masters-voiceToday’s weekly news chum stew leads off with a few items related to radio and items on the radio…. and goes rapidly downhill from there:

  • Living By The Clock. This is an article from a few weeks ago, but it’s still interesting: On November 18th, NPR changed their news magazine clocks. Now you probably have no idea what this means. The clocks are the second-by-second scheduling of what happens when during the newsmagazines, including newscasts, music beds and funding credits. They also affect when stations can insert their own local content. In announcing the date for implementing the clocks, NPR also said that it will not impose limits on stations’ ability to replace newsmagazine segments with programming from other producers. That proposal had prompted criticism from station programmers, who argued for control over programming choices, and producers, whose programs would be excluded under the rule. This directly relates to the next article: some of those producers are podcast producers, whose segments are often included in NPR news magazines (and thus, it brings them in money).
  • The Podcast Is The In-Thing. If you listen to podcasts (as I do), you know we’re in a new era of podcasts. The “This American Life” podcast has spun off a new #1 podcast, “Serial“. Roman Mars, of 99% Invisible (who was very concerned about the above clock change) used his Kickstarter success to create Radiotopia, and expanded it with this year’s Kickstarter to add new shows. Producer Alex Bloomberg left Planet Money to found a new podcast company, Gimlet Media, and is documenting the process in a new podcast. The Verge has an interesting article on this phenomena: “The New Radio Star: Welcome to the Podcast Age“. Never mind the fact that the “pod” has been discontinued, and no one really “casts” anymore. That’s like saying television is confined to networks over the air.
  • You Can Get Anything You Want. Traditions are funny thing. Who would think a TV show would span a tradition that revolves around a pole? Here’s another one for you: A tradition of listening to a particular song on Thanksgiving, simply because the event described in the song happened on Thanksgiving. This latter one, of course, is referring to Arlo Guthrie’s song “Alice’s Restaurant”. Here’s an interesting article about Arlo looking back on the song, which turned 50 this year.
  • Shaming and Discrimination is Never Acceptable. The events in Ferguson and in New York have finally started to make people aware about White Privilege, and being aware is the first step to doing something about the problem. But there’s another type of privilege people aren’t talking about: Thin Privilege. Our society is biased towards the thin — all it takes is one airplane ride or sitting at a booth in a restaurant to realize that. Thin Privilege can also be life threatening. Here’s an interesting article that explores that aspect of fat hatred: the particular fact that the auto industry refuses to make large-sized crash dummies, and so crashes are more likely to be fatal to the obese than the thin.
  • Fighting Antisemitism. Here’s an interesting Indiegogo project: Yaakov Kirschen of Dry Bones is fundraising to turn Dry Bones into an antisemitism fighting engine. If you’re not familiar with Dry Bones, look here. I haven’t yet decided if this is an effect tool in the fight, or an attempt by Yaakov to obtain steady funding (after the success of his Dry Bones Haggadah). Still, anything that fights is a good thing.
  • Your Username is Invalid. We’ve all been taught in security that you shouldn’t give away information in the login error message, and so you don’t indicate whether it was the user name or the password is bad. But here’s an article that points out that such care doesn’t buy you anything. It’s an interesting point of view.
  • Should I Upgrade? For years, I’ve been using Paint Shop Pro. I’m currently on the last JASC version, Paint Shop Pro 9. PCWorld has a very interesting review of the current Corel Paint Shop Pro X7,  and I’m debating upgrading. Thoughts?

 

This entry was originally posted on Observations Along The Road (on cahighways.org) as this entry by cahwyguy. Although you can comment on DW, please make comments on original post at the Wordpress blog using the link below; you can sign in with your LJ, FB, or a myriad of other accounts. There are currently comments on the Wordpress blog. PS: If you see share buttons above, note that they do not work outside of the Wordpress blog.

===> Click Here To Comment <==
(Click Here to Comment)

cahwyguy: (Default)

userpic=acsacWhen many people think about conferences, this media created image comes to mind of the conventions of yore that are pure boondoggles. But those who attend technical conferences and symposia know that the media image is far from the truth. Conferences are serious affairs during business hours with training sessions, papers, panels, keynote speakers. Much of that you could get through a web course or a book, but a conference goes beyond that and gives you something even more important: that chance to network and interact with your peers in the industry, and to make those connections that prove critical as you do your job.

I’m mentioning all of this because registration is now open for the 30th Annual Computer Security Applications Conference (ACSAC), being held December 8–12, 2014 at the Hyatt French Quarter in New Orleans, Louisiana. ACSAC is a great mid-size conference — it’s not the gigantic RSA or Blackhat with thousands of people making it impossible to network, nor is it a small symposium with a narrow technical focus and insufficient critical mass of attendees. ACSAC typically has an attendance around 200, and provides well rounded technical program with training and workshops on Monday and Tuesday, and papers, panels, speakers, and case studies on Wednesday through Friday. I’ve been attending the conference since the 4th ACSAC in 1989 in Tucson, and have continually found it to be of value in what I do.

Let me give some highlights for this year’s program:

You can see the full program at the ACSAC website; each session has links with more information. Information on conference registration and hotel registration is here. Please spread the word about the conference with your friends, colleagues, coworkers, and associates.

Disclaimer: If you know me at all (and I hope you do, if you are reading this), I’ve been involved with the Annual Computer Security Applications Conference (ACSAC) for a long time. I’ve been the chair of the training program since 1990, and over the years I’ve also done local arrangements and been general chair of the conference. I’m also the Secretary of the sponsoring organization, ACSA. ACSA, the sponsoring organization behind ACSAC, also runs the New Security Paradigms Workshop, and is the initiator and sponsor of the Scholarship for Women Studying Information Security (SWSIS).

P.S.: ACSAC 31 (and 32) will be at the Universal Hilton in Los Angeles near Universal City December 7-11, 2015 (and December 5-9, 2016). Mark your calendars now to “save the dates”. I’ll be doing local arrangements for those conferences, and would love to demonstrate why Southern California is the best draw for cybersecurity!

This entry was originally posted on Observations Along The Road (on cahighways.org) as this entry by cahwyguy. Although you can comment on DW, please make comments on original post at the Wordpress blog using the link below; you can sign in with your LJ, FB, or a myriad of other accounts. There are currently comments on the Wordpress blog. PS: If you see share buttons above, note that they do not work outside of the Wordpress blog.

===> Click Here To Comment <==
(Click Here to Comment)

cahwyguy: (Default)

userpic=securityAll this week, I’ve been following the news of the Heartbleed Flaw. If you haven’t heard if it — or if you have heard and don’t understand it — XKCD gives a good explanation. Basically, the flaw was an “old-school” programming error: someone allocated a buffer without clearing it first. In Orange Book terms, this was an “Object Reuse” error; the Common Criteria called it “Residual Information Protection”. Problems like this were common in old MS-DOS, where you could create a file, move the file pointer to some far out place, write a single character, and close the file. What would be left in the middle was whatever was lying on the disk. Heartbleed was the same thing:

Heartbleed Explanation When Heartbleed was first reported, panic ensued. You probably remembered this. This was the “Death of Commerce on the Internet!!!” Bruce Schneier (who I normally respect) said, “”Catastrophic” is the right word. On the scale of 1 to 10, this is an 11.” I, however, felt that panic wasn’t warranted. I’m pleased to see that, as time goes on, others are realizing that as well.

Does that mean this isn’t a serious problem? Au Contraire! Rather, it is a problem on the system owners end, who need to change all potentially exposed certificates. It is a problem for all the hardware devices that embedded OpenSSL in firmware in an unchangable and un-updatable way. All those devices have to be trashed and replaced. It’s a problem for all those who depend on others to maintain their web site. For example, I’m on Westhost. Here are their instructions to site owners regarding Heartbleed.

Why was this problem so great? OpenSSL was free code, so everyone thought it was good and used it. Forbes thinks this is indicative of a big problem with open source and its funding — there were about 4 people who were charged with maintaining this, all volunteer. Again, I disagree. The problem is not the funding or the maintenance, but the fact that the authors were not thinking about security from the get-go. They hadn’t been inculcated with secure programming practices that would have eliminated any object reuse issue. Being aware of how to write secure code eliminates many problems: boundary errors, object reuse errors, mishandling of input errors. All showed up here, and all are techniques any secure programmer worth their salt would know.

So, again, should you worry about this? You certainly shouldn’t panic. If you have an account on an affected site, then you might change your password if you are really worried about your data (e.g., I don’t care about Yahoo; my mail account there is only for spam) or you use that password elsewhere. If, by rare chance, you have exposure on a financial website or a government website, then do change your password.

Most importantly, get a little perspective. Although this is a lot of work for site owners, this isn’t anywhere near the headache of a Target breach, or the breaches we hear about every day where this database or that database of credit card numbers is exposed, or major medical databases are exposed. Worry about those. Most importantly, continue to consciously think about cybersecurity in whatever you do, and whenever you authorized information. For example, does the Facebook android app really need all those permissions it asks for?

 

 

This entry was originally posted on Observations Along The Road (on cahighways.org) as this entry by cahwyguy. Although you can comment on DW, please make comments on original post at the Wordpress blog using the link below; you can sign in with your LJ, FB, or a myriad of other accounts. There are currently comments on the Wordpress blog. PS: If you see share buttons above, note that they do not work outside of the Wordpress blog.

===> Click Here To Comment <==
(Click Here to Comment)

cahwyguy: (Default)

userpic=cardboard-safeYou would have to be hiding under a very big rock if you missed the two cybersecurity stories that have hit the mass media this week. For those unaware, I’m talking about the “death of XP” and the “Heartbleed” vulnerability. The level of froth is approaching that of a Starbucks coffee, so I thought I would try to impart a little realistic thinking.

When thinking about these problems — indeed, about any security issue — the following XKCD cartoon comes to mind:

In other words, discovery of the flaw does not necessarily mean exploitation. This is particularly important to think about with Heartbleed. Here’s some specifics: Heartbleed allows attackers to exploit a critical programming flaw in particular versions of OpenSSL—an open source implementation of the SSL/TLS encryption protocol. When exploited, the flaw leaks data from a server’s memory, which could include SSL site keys, usernames and passwords, and even personal user data such as email, instant messages, and files, according to Finland-based Codenomicon, the security firm that first uncovered Heartbleed in concert with a Google researcher. What I haven’t seen stated is any evidence that the flaw was being exploited before it was announced — in other words, even if the vulnerability was there, was it being exploited? Also not stated is the ease to which crackers would obtain the leaked data. I think there is some confidence that now that flaw is announced, it is being exploited.

[UPDATE: Later information shows that there may have been exploits based on this attack going on for the last few months. That's the bad news. However, it looks like private keys may not have been exposed, except in a very short window. Further, what could be eavesdropped on with Heartbleed hacks is dynamic stuff, stuff that was allocated only moments ago. So, yes, it could be passwords, but those aren't retained in memory for long, so I would think the likelihood of being able to catch a window with a password, and then identifying it as a password would be low. The article here gave a good explanation of how the Heartbeat extension was exploited: «Heartbeat allows a connected Web client or application to send messages to keep a connection active during a transfer of data. When a Heartbeat message is received, the server usually simply echoes back what it got to the sender. However, starting with the initial implementation of Heartbeat in OpenSSL 1.01 (and in all subsequent releases up to OpenSSL 1.01f, including the OpenSSL 1.0.2 beta) the extension could be fooled into sending back the contents of its memory buffer by sending a request that advertised itself as 64 kilobytes long but in fact had no content—resulting in “Heartbleed.” Any information still in that buffer from a previous session, such as decrypted usernames and passwords, could be obtained by an attacker in the response message.» So, the odds of getting a password would depend if the buffer from a previous session had usernames and passwords (meaning that ultimately, this was an object reuse/residual information error where buffers were not always cleared when they are allocated). This, friends, is why you clear on both deallocation and allocation. [ETA2: Another good explanation of Heartbleed may be found here.]]

What does this mean? You likely don’t need to change all your passwords, although regularly changing them is a good practice. The primary concern should be those sites you have used recently (remember, this exposes current memory, not passwords on disk), and sites where you have actually entered the password (the “keep me logged in” doesn’t expose the password on each access). When worrying about this, you should also factor in the value of the site itself — does it really make a difference if your password to read a support bulletin board system is exposed?

What I’m doing is guarded watching. I’ll make sure that financially-significant sites that I use have fixed the bug before I enter the password [ETA: Visit here to test a site]; if they are susceptible and I’ve used them very recently, I’ll think about changing things. Otherwise, I’m going to watch and monitor for reports of data grabs — and of course I’ll keep a close eye on credit card statements. As always, you should never use debit cards online because of the lack of protections. Other than that, good site guidance applies: change your passwords somewhat regularly, with a frequency appropriate for the information protected; enable two-factor authentication if you can; connect securely if you can to thwart casual eavesdroppers.

The other big FUD in the news is the “death” of Windows XP. This really isn’t a death: basically, the last patch release was yesterday, meaning it really isn’t out of date until the Patch Tuesday in May. But Microsoft has a vested interest in getting you to switch now, and so they have been pushing the date with the media. Should you worry? Yes and no.

There is likely greater risk in this case: XP has been in the wild for years, and there are many zero-day attacks just waiting for the lack of maintenance. This is a big concern if you are an organization likely to be targeted by an adversary. I cringe everytime I walk into my local YMCA and see XP still being used. But for an individual?

If you are an individual on XP, I think you should start thinking about a transition plan to Windows 7 or Windows 8.1 update. There are some good financial incentives, and reports are that the new 8.1 update is much better for the desktop than the original 8 or 8.1. Panic isn’t warranted, however, if you practice good hygene: run multiple malware scanners and keep them updated; remove administrator rights from any accounts used to access the internet or that uses external USB media; shutdown, hiberate, or suspend the system when you are not actively using it; limit the activities you do on the system; and if possible, keep it behind a hardware firewall or NAT. I have an XP system that I’m using as a print server, and that’s what I’m doing.

 

This entry was originally posted on Observations Along The Road (on cahighways.org) as this entry by cahwyguy. Although you can comment on DW, please make comments on original post at the Wordpress blog using the link below; you can sign in with your LJ, FB, or a myriad of other accounts. There are currently comments on the Wordpress blog. PS: If you see share buttons above, note that they do not work outside of the Wordpress blog.

===> Click Here To Comment <==
(Click Here to Comment)

cahwyguy: (Default)

userpic=cardboard-safeYesterday, my RSS feeds highlighted a provocative article: “STEM Stinks for Cybersecurity” (Forbes Magazine). In this article, the author argues that we don’t need more people with university degrees in science, technology, engineering, or mathematics — what we need is more people with Vocational Training (he calls it VoTech) who are familiar with the security tools and know how to run the security tools. I think this position misunderstands both STEM and Cybersecurity.

Let’s start with STEM. The author seems to believe that the emphasis on STEM is at the university level — that we only want STEM degrees. That’s wrong and misguided. Emphasizing STEM is important much earlier — from the first days of education to the end of high school. We need to be raising students that are unafraid — who perhaps even love — science, engineering, math, and technology. The ability to understand these disciplines is key to having adults who think critically, and who can recognize pseudo-science when they see it (and thus, believe neither the creationists nor the climate-change-denouncers). Being familiar with these disciplines is also key if you are going to exist in the modern world, where technology is everywhere (and technical terms are everywhere). They are particularly important even if you are going into VoTech — just because you are working with tools doesn’t mean you don’t apply scientific principles or use mathematics. In fact, most CNC tool programmers use mathematics regularly. Familiarity with technology is required in almost every field today — even the soft fields are making extensive use of technology.

Let’s now turn to the question of whether VoTech is sufficient for Cybersecurity. I’ll start by saying that I have no problem with encouraging vocational technology — I think it was a disaster when shop classes were removed from schools, and I’ll support vocational training. Having trained machinists and technicians and repair support is vital to the success of most operations (and it should go without saying that all need to be familiar with STEM). But with respect to Cybersecurity, my opinion differs.

Technicians trained in using tools are only as good as the tools they use. While this is fine in manufacturing, it’s not in Cybersecurity. Cybersecurity tools can only find what they are programmed to find — which are signatures of yesterday’s attack. VoTech Cybersecurity experts, as a result, can typically only find what the best of their tools find. Perhaps, as they gain lots of experience, they will be able to go outside of that box and identify additional attacks. The basic trainee won’t; our systems won’t have time to wait.

Cybersecurity requires individuals who are familiar with technology, systems, mathematics, engineering… and can think critically, and can present their thoughts and findings (which is where the arts come in, and why you see a movement from STEM to STEAM). Successful cybersecurity is much more than running vulnerability scans. It is getting in with the engineering team from day 0 — identifying the security requirements and how they trade off other engineering and mission requirements. These are skills you learn in engineering courses and software and system design courses, not vocational training. It is being able to recognize results and findings that just seem off, and having the ability to track down the root cause (and not just the symptom of the day). The ability to recognize that “this doesn’t smell right” is a critical thinking skill; I don’t believe a VoTech trainee will have that without significant experience. Successful cybersecurity is being able to assess your findings in the context of the larger system, mission, and business picture — a perspective that someone who is only familiar with tools will not have. Successful cybersecurity is looking at all aspects of the system from the low hardware up through the design layers, from operational procedures and processes to suppliers. An emphasis on tools alone does not give that ability. Lastly, cybersecurity requires individuals that can think out of the box, because that’s what the adversaries do. Stopping the script kiddies is easy; VoTech can easily catch the low-lying fruit. The real threat comes from the determined adversary, and they don’t do what you (or your tools) expect.

Don’t get me wrong — technicians are important. If that is the highest level of skill you can obtain, and you’ve had that K-12 STEM/STEAM education, go for it. Some people work best with their hands. But if you can go on and get that STEM/STEAM degree, you will be much more successful and much more useful in the field (plus, you’ll earn significantly more over your lifetime — enough, perhaps, to pay off your student loans :-)).

This entry was originally posted on Observations Along The Road (on cahighways.org) as this entry by cahwyguy. Although you can comment on DW, please make comments on original post at the Wordpress blog using the link below; you can sign in with your LJ, FB, or a myriad of other accounts. There are currently comments on the Wordpress blog. PS: If you see share buttons above, note that they do not work outside of the Wordpress blog.

===> Click Here To Comment <==
(Click Here to Comment)

cahwyguy: (Default)

userpic=cardboard-safeThe LA Times has an interesting article today on the payment card problem: it points out that the movement to EMV (chip and PIN) is painfully slow, that credit/debt card breaches are increasing, and that its going to get worse before it gets better. I’ve also been looking into the issue, finding the investigatory work of Brian Krebs regarding the Target incident fascinating. So what advice would I give based on all of this?

  1. Don’t Use Debit Cards. Debit cards are basically electronic checks. You have no protection in terms of fraudulent charges, although you might be able to get money back after the fact. I would tend to believe that Debit Cards are slightly riskier than checks, simply because the information on checks is not stored in databases as much as debit cards are.
  2. Monitor Your Credit Cards. Don’t wait for your monthly statement; check your credit card transactions every few days. This is easy to do if you use Quicken (or a similar service) and download transactions; you can also check with your card issuer on the web. As soon as you spot a fraudulent transaction, report it via phone to the credit card company and follow that up with a written report. Credit cards are better because you typically have this grace period to report transaction fraud without being liable, and often the cost of that fraud is born by the banks or the merchants.
  3. Don’t Fear the Internet. If you look at a lot of the breaches, the problem has not been the connection between your computer and the merchant — just make sure you have an encrypted connection and are talking to the merchant’s web site. The massive problems have been attacks on the merchant’s databases themselves — and these database often contain both web and physical transaction information. Work needs to be done to encourage merchants to improve their overall security stance — the PCI standards are just a start and focus on the transactions; the merchants needs to adopt appropriate risk management frameworks and security controls (see NIST SP 800-37 Rev 1, SP 800-53 Rev 4, SP 800-30, SP 800-39 Rev 1) to secure how they are storing their information.
  4. Check Where and How You Swipe Your Card. One of the easiest ways that adversaries gain information with our insecure mag-stripe cards is with credit card skimmers. When you are swiping your card (especially at ATMs), always look for skimmers over the reader and potential cameras to capture PINs.

You can never bring your personal risk of credit card fraud to zero (well, unless you only pay cash, and then you have a different set of risks). You can, however, transfer the risk to an acceptable level by using credit cards over debit cards, and further mitigate it down by being prudent where and when you use your card.

 

This entry was originally posted on Observations Along The Road (on cahighways.org) as this entry by cahwyguy. Although you can comment on DW, please make comments on original post at the Wordpress blog using the link below; you can sign in with your LJ, FB, or a myriad of other accounts. There are currently comments on the Wordpress blog. PS: If you see share buttons above, note that they do not work outside of the Wordpress blog.

===> Click Here To Comment <==
(Click Here to Comment)

cahwyguy: (Default)

Observation StewWhereas last week’s stew was thin and barely filling, this week’s is quite hearty. Although I had trouble finding groups of three articles to link with a theme, I had bunches of groupatwos with interesting subjects. So in this week’s stew you’ll find mini-themes on milk, money, connections, bones, security, plus some other random stuff for flavoring. Shall we begin?

 

This entry was originally posted on Observations Along The Road (on cahighways.org) as this entry by cahwyguy. Although you can comment on DW, please make comments on original post at the Wordpress blog using the link below; you can sign in with your LJ, FB, or a myriad of other accounts. There are currently comments on the Wordpress blog. PS: If you see share buttons above, note that they do not work outside of the Wordpress blog.

===> Click Here To Comment <==
(Click Here to Comment)

cahwyguy: (Default)

userpic=securityMonday’s seem to be my day to rant over something I saw while skimming the news at lunch. Today’s rant is prompted by the article “Report: Spy agencies collude to gather personal data from mobile apps” in PCWorld. Thanks to Snowden’s disclosures, the world appears to be up in arms that spy agencies are (heaven forfend) spying, and (heaven forfend again) spying quite possibly on them.

Guess what. That’s their job. It’s in their name. They are spy agencies.

Think about this: Imagine you are the head of a spy agency. Imagine you have been tasked to find enemies who are tasked with harming the country you are sworn to protect and defend. Wouldn’t you do anything you could think of to find them? In this quest, would you care at all about the other information gathered along the way that shows people who might be people? Probably not. That stuff is chaff, not the nuggets of grain you want. You have to sort through a hella lot of chaff to find the occasional grain.

So why is everyone up in arms about this? I opine there are two reasons.

First, there is a growing distrust of government and government agencies, egged on by the wackos and conspiracy theorists whose voices are amplified by the Internets. Read any newspaper during WWII. There were much much more flagrant violations of rights during those times than today, but they were swept under the rug. People no longer trust government, and no longer believe it is working in their interest. That’s why they are scared. It is also a significant concern independent of the spying — we need to restore the faith that the government is on the side of the people. [Or, as some might argue, we need to restore government that is on the side of the people. Both views beg the question of what "on the side of the people" means.]

Second, there is a growing surprise that the government can find out as much as they can. Part of that, my friends, is on all of our backs. We’ve been so eager to adopt new technology before it is mature, and before the security and privacy safeguards have been designed and are strong. Is it any surprise that designed-in weaknesses are exploited? Similarly, we have failed to keep our laws up to date with all the facets of technology. So is it any surprise that people are exploiting those laws?

So spy agencies spy. It’s the scorpion and the frog all over again. What should we do about it all?

First, work with lawmakers to enact updated laws that appropriately protect privacy while providing national security and dealing with current and future technology.

Second, vow not to adopt the latest and greatest until you know it provides you a level of protection that you want. Let companies know you’re willing to pay for security, not go cheap for compromises.

Third, understand where the threat lies. The government could care less about the chaff. Big business, on the other hand, loves the chaff. They mine it, research it, learn your habits, so that they can sell you more and more. Remember: if it is free, you are the product. Be careful who you give your information to.

 

This entry was originally posted on Observations Along The Road (on cahighways.org) as this entry by cahwyguy. Although you can comment on DW, please make comments on original post at the Wordpress blog using the link below; you can sign in with your LJ, FB, or a myriad of other accounts. There are currently comments on the Wordpress blog. PS: If you see share buttons above, note that they do not work outside of the Wordpress blog.

===> Click Here To Comment <==
(Click Here to Comment)

cahwyguy: (Default)

userpic=cardboard-safeThe news is reporting yet another problem with Target security: this time, the headline is screaming “Target says hackers took encrypted PIN data but can’t crack it“.

I can’t resist that headline, so I had to see how Target was doing an unbreakable encryption. Before I dive in, remember your encryption basics: Alice wants to talk to Bob, and they have a shared secret that they use to encrypt the data (called the plain text) using some algorithm. This shared secret can either be shared out of band, pre-installed, or via some secret-sharing protocol.

So, what is Target saying this time:

The PIN data is encrypted as it’s entered by a customer at a keypad at checkout, protected with what’s known as Triple DES encryption, according to Target.

The PIN information stays encrypted within Target’s system and “remained encrypted when it was removed,” the Minneapolis-based company said.

The code can only be cracked when the data is received by Target’s external, independent payment processor, according to the retailer.

“What this means is that the ‘key’ necessary to decrypt that data has never existed within Target’s system and could not have been taken during this incident,” the company said Friday.

First, let’s look at this shared secret. It must be known by both sides, meaning it has to be available to the independent payment processor and the keypad at checkout. There are three ways to do that: they could create a new secret each time and share it using a key exchange protocol (good, but expensive network-wise), they could store the secret on the Debit card (easy and flexible, and unique for each user, but vulnerable to readers, plus you need to send the card number in plaintext to retrieve the key), or they could store the secret in the device. Target doesn’t say which they were doing, but I’m guessing it is the same for every keypad device. This means: capture a keypad device, capture the key.

Next, they are using 3DES. While this is better than DES, it isn’t as good as AES. They also don’t state the key length they are using, and this is a big factor in the ability to break the key.

Next, think about the data itself. There is the card number and the pin likely being encrypted. If the badguys are capturing data, it is easy to get encryption of a number of known plaintexts, with a fixed key. You’ve now got a known plaintext attack.

In short: I wouldn’t trust Target’s platitudes here. If I had a debit card, I’d contact my bank to cancel it and get a new one. Yes, that will cost the bank, but they may convince Target to go to chip and pin. You simply don’t have any protection with a debit card.

Am I worried about Target and credit cards? Surprisingly, no. Target is no better or worse than any other American retailer, and you are still at greater risk giving your card to a strange waitcritter in a restaurant or over the phone when you order a pizza. Check your charges regularly, dispute any that aren’t valid, and if there is more than one disputed charge, cancel and get the card reissued. Enough of these problems, and the banks will move to chip and pin because it will be cheaper.

I’d welcome the thoughts of other cryptography folks on this one. Was my (admittedly limited) cryptographic analysis correct?

 

This entry was originally posted on Observations Along The Road (on cahighways.org) as this entry by cahwyguy. Although you can comment on DW, please make comments on original post at the Wordpress blog using the link below; you can sign in with your LJ, FB, or a myriad of other accounts. There are currently comments on the Wordpress blog. PS: If you see share buttons above, note that they do not work outside of the Wordpress blog.

===> Click Here To Comment <==
(Click Here to Comment)

cahwyguy: (Default)

userpic=acsacI just realized I never announced the training program for the Annual Computer Security Applications Conference (ACSAC). Let me correct that now, especially as registration for the conference is now open. We have a really great training program this year during the first two days — a program that emphasizes our “hard topics” theme of cyberphysical security. I should note that these courses are in addition to the TracerFIRE forensics training program, the two-day Layered Assurance Workshop, on Monday and Tuesday, and the Next Generation Malware Attacks and Defense Workshop on Tuesday. The courses we are offering on Monday and Tuesday are as follows:

Morning Afternoon
Monday,
12/9/13
M1.
Mobile Security: Securing Mobile Devices & Applications
Mr. David Lindner, Aspect Security
M2.
Integrating Security Engineering and Software Engineering
Dr. Antonio Maña Gomez, University of Malaga;
Dr. Ronald S. Ross, NIST;
Dr. Carsten Rudolph, Fraunhofer SIT;
Mr. Jose F. Ruiz, Fraunhofer SIT
M3.
Introduction to Reverse Engineering Malware
Dr. Golden G. Richard III, University of New Orleans
Tuesday,
12/10/13
T4.
Analysing Android Malware at Runtime
Dr Giovanni Russello, University of Auckland
T5.
Finding Data Leaks in Applications, Network Protocols, and Systems with Open Source Computer Forensics Tools
Dr. Simson Garfinkel, forensicswiki.org
T6.
Authentication & Authorization Standards for the Cloud
Dr. Hassan Takabi, University of North Texas
T7.
Cyber-Physical Systems Security
Dr. Alvaro A. Cárdenas, University of Texas, Dallas

This, of course is in addition to the excellent technical program we have the remainer of the week. In addition to the cyberphysical security focus, we’re going to have special tracks dealing with system security engineering (our National Interest topic), and loads of great speakers and panels. I’ll note that I’ll be chairing and participating in a panel that is looking at the Legacy of the TCSEC after 30 years, and you don’t want to miss that!

Some come join us in New Orleans the week of December 9. Move your theatre tickets if you have to (we did). This conference is a great way to keep up to date technically, and we’ll provide you with a certificate you can use to support your CISSP CEU claims.

This entry was originally posted on Observations Along The Road (on cahighways.org) as this entry by cahwyguy. Although you can comment on DW, please make comments on original post at the Wordpress blog using the link below; you can sign in with your LJ, FB, or a myriad of other accounts. There are currently comments on the Wordpress blog. PS: If you see share buttons above, note that they do not work outside of the Wordpress blog.

===> Click Here To Comment <==
(Click Here to Comment)

cahwyguy: (Default)

userpic=securityLast night, I wrote on Facebook that I had been invited to talk at ACSAC about the legacy of the “Orange Book” (TCSEC), as 2013 marks 30 years since it was first published. I was fishing for opinions from a number of people whom I respect (but I’d take them from folks I don’t respect as well :-) ), but got few response. So let me expand on my current thoughts… perhaps this will get folks thinking.

The TCSEC was a seminal publication in security … one of the first security criteria out there. It defined preset grouping of functionality and assurance requirements (what today we would call a package or a profile) that were well thought out. This was a strength, but it was also a problem as the pre-defined packages didn’t work well for anything other than monolithic operating systems. The assurance paradigm that it had was based on in-depth design analysis — increasing the level of design details and analysis, as well as testing, to ensure all problems were found.

How well did this all work out? Well, there was the mantra of “C2 by ’92″, which admittedly got more and more systems to have discretionary access control, object reuse, auditing, and I&A. This was one of the factors that led to Windows having more security — NT had to have stronger security to meet C2 by ’92, and Windows NT is the basis of today’s Windows systems. Could one argue that the TCSEC beat up Windows 98 in an alley fight? Perhaps.

However, the assurance paradigm was in some sense flawed, and may have gone down the wrong path. There was a naive assumption that if we could get commercial vendors to follow that path, we would have more secure systems. Did that work? Those working with evaluated systems can answer that question — we never saw higher assurance take off, because it went against commercial practice.

The chafing against the pre-set packages of the digraphs also led to an unbundling of functionality of assurance, eventually leading to the Common Criteria of today. I’d argue that this eventually gave us the “control” notion we now see in 800-53: pick the functional and assurance requirements you need to meet your threats. This is a good thing, but it is also a loss of the forethought that went into the bundling. We are seeing a return to bundling in some sense with the move to standard protection profiles and  CNSS 1253 baselines and controlled ways to modify things. Did the TCSEC show the value of these bundles?

The TCSEC, just like 800-53 and the CC, is a catalog of requirements; it is not an evaluation process. Yet the evaluation process that grew up around the TCSEC also has a legacy. That process established a very in-depth process that took far too long. The legacy of that process — and the analysis the TCSEC required — affected how the process is viewed today. We’re still seeing fights against a process that takes too long, and we still haven’t found the balance between better / faster / cheaper that is satisfactory for both the vendors and users of evaluated products.

I’d like to think that the TCSEC has a greater legacy than just perl. Hopefully, my preliminary thoughts above have gotten you thinking, and you’ll share your thoughts in the comments. I’m going to keep thinking on this so that I can work all of this together into a coherent presentation.

======

Additional musings added a few days later:

Thinking more about the TCSEC, I’m seeing a number of dimensions of impact (think like a tag cloud), other than (of course) perl. Here are some thoughts on each in alphabetic order — feel free to add more in the comments:

  • Assumptions. Familiarity with the TCSEC led to assumptions about functionality that didn’t propagate through to newer criteria. One can see this in the Common Criteria. Notions that were present in the TCSEC — such as protecting authentication data or having process separation — are no longer explicit in the CC. People assume they are there, but they are not. Are they tested for? 
  • Assurance. The TCSEC codified the notion of design assurance, but most people didn’t see design assurance because they didn’t see above C2. Although the design assurance transferred to the Common Criteria (CC), there it was more of a failure — precisely because it never became commercial practice for the vendors. Instead, documentation was developed after the fact, which doesn’t improve assurance. Today, is there more thought given to making the design small, simple, and minimized… or are things large and complex with multiple failure paths? Did the TCSEC avenues to assurance survive?
  • Awareness. Did the TCSEC make people more aware of security? Certainly, those working on the government side know what C2 security is — if only in terms of the functional requirements. But people in general? Most people probably don’t understand access control or audit — they never use the DAC mechanisms in Windows or Apple, and they’ve probably never looked at the event log. To most people, security is Passwords.
  • Bundling. One characteristic of the TCSEC is it bundled functions with assurance. This was also its downfall, as the bundling was designed for a monolithic world and assumed MLS was a need. Yes, MLS needs high assurance, but high assurance doesn’t demand MLS. That was a failure, and that notion led to the unbundled CC. But bundling is returning with the new standard Protection Profiles, the -53 baselines, and overlays. There is thought being given to what requirements belong together. This is good. The problem is there’s often no thought about what these requirements need in terms of assurance. Assurance is typically “best possible” (the standard PP approach), which doesn’t necessarily correspond to what the functions need in their environment. We’re still faced with the eternal problem: people don’t pay for invisible assurance.
  • Commercial Products. In my earlier part of this post, I argued that the TCSEC improved the security of some commercial products. Certainly it influenced Windows NT, and arguably influenced a number of Unixes, although whether any of those made it into the Unix base of today is a different question. But many products still think about security after the fact, or don’t incorporate it into the design process.
  • Confidentiality. The TCSEC’s focus was confidentiality — access controls to prevent disclosure. This focus remained for many years, and might have hurt trying to grow the focus to integrity and availability.
  • Controls. Did the TCSEC come up with the “control” paradigm, or did that exist in the financial world before 1983? Certainly the TCSEC began the Federal Criteria which begat the CC, and TCSEC requirements and CC requirements influenced the controls in NIST SP 800-53.
  • Developmental Assurance. The TCSEC had the notion that a well-thought out design would lead to a higher assurance product. Has that been borne out, or is it like FDA studies of marijuana? Is there empirical evidence of what design approaches do best, and did that agree with the TCSEC? Did commercial vendors ever actually follow the TCSEC processes?
  • Formal Methods. The TCSEC pushed the notion of formal methods at the higher levels. Yet we rarely see formal methods these days.
  • Government Development. Here the TCSEC had more influence. The notion of C2 by 92 led to pushes to use C2 functionality, and this was captured in the 8500.2 controls and 800-53 controls. Many of the security requirements for systems today come from C2. However, the focus on functionality led to a loss of focus on assurance, and that’s only lately being recovered. There was also the assumption problem above.
  • Multilevel Security. The TCSEC envisioned a world where MLS was everywhere. Yet MLS as a concept disappeared, reappeared under different names, and nowadays is present mostly in specialized guarding devices. Its become a dirty word — is that because of the TCSEC?
  • Product Evaluation. The TCSEC showed the value that could come from product evaluation in the overall accreditation process. Countless dollars were saved because operating systems and other products did not need to be reexamined in depth. Yet the original process in the US (TPEP) was very expensive for the government and took a lot of time. Think “Better / Faster / Cheaper”. We moved to a cheaper process of having labs do the work. People still complained it wasn’t faster. The CC came in, and we’ve been tinkering with the process to make it faster and faster because of Internet time scales. Have we made it better than we had it during the TCSEC? Are the requirements as well understood today? How did the legacy of the TCSEC process color today’s process.

These are just some areas. Perhaps as we explore the legacy, there should be an additional question asked: For those areas where the legacy shows a form of failure, are there places were we can learn lessons and perhaps improve where we are today. Given I’m dealing with the TL;DR generation, perhaps that should be a topic for a future post … or ACSAC talk.

 

This entry was originally posted on Observations Along The Road (on cahighways.org) as this entry by cahwyguy. Although you can comment on DW, please make comments on original post at the Wordpress blog using the link below; you can sign in with your LJ, FB, or a myriad of other accounts. There are currently comments on the Wordpress blog. PS: If you see share buttons above, note that they do not work outside of the Wordpress blog.

===> Click Here To Comment <==
(Click Here to Comment)

cahwyguy: (Default)

userpic=cardboard-safeA number of articles this week have gotten me thinking more about the NSA. I decided to write up my thoughts over lunch. There have been all the reports of Gen. Alexander’s speech at Blackhat, and the audience reaction thereto. Then there was this report of a woman who searched on pressure cookers, while her husband searched on backpacks, and they then got a bunch of government visitors. All of this has the various folks who were already suspicious of “the government” even more up in arms.

Now, I’m not denying there are problems. There is clearly a different between what is legal and what is right, and there are moves afoot to correct the imbalance that has existed since the overreaction to 9/11. That said, there is also clearly a misunderstanding of the NSA and the basic reason this is legal at all.

Let’s start by looking at the differences between agencies. The FBI is focused on law enforcement within the US. The CIA gathers intelligence on foreign soil. The NSA, which is an arm of the Department of Defense, was originally created to focus on signals intelligence for the DOD. It has later branched into electronic intelligence and security, including computer security. The NSA, just like the DOD, is limited by law regarding what actions it can take towards US citizens. Just like the DOD cannot conduct military actions within the US, the NSA cannot monitor the signals between two US citizens.

Next, let’s look at the Constitution. To whom does it apply? The answer is US citizens. Non-citizen — that is, foreign nationals — do not have constitutional protections. Unless other laws have extended protections, they are not protected from search and seizure. If you think about it, the reason is clear — you are dealing with someone who has allegiance to a different country, and so the presumption is that they will work in the interest of that country over that of the US. A lot of people seem to think there should be protections for everyone, but that is not how the law is written. As any game player knows, if something isn’t prohibited in the rules, someone will figure out a way to abuse it.

Put these two factors together, and you have the area in which NSA was working: doing legal investigations in support of monitoring of foreign nationals, and communications to foreign countries. We can — and should — debate how much protection a foreign national in the US should have, or how much a US citizen’s interaction with a foreign national should be protected. Attitudes regarding that question change over time, and technology has pushed the issue even more. But this is also something that most people in the US do not understand. Look closely at what Gen. Alexander said. He kept emphasizing that there was foreign involvement in all the monitoring NSA did. That’s the “F” in the FISA court – Foreign Intelligence.

This bothers some people, including groups such as the ACLU. An article in Boing Boing highlights this way of thinking when it quotes the ACLU’s thoughts on how NSA views “targeted”:

Americans need not worry about the program, the government says, because the NSA’s surveillance activities are “targeted” not at Americans but at foreigners outside the United States. No one should be reassured by this. The government’s foreign targets aren’t necessarily criminals or terrorists—they may be journalists, lawyers, academics, or human rights advocates. And even if one is indifferent to the NSA’s invasion of foreigners’ privacy, the surveillance of those foreigners involves the acquisition of Americans’ communications with those foreigners.

First, note that this makes clear the NSA is not looking at American citizen to American citizen communications — as I noted above, this is outside of their scope. Further, no one seems to have a problem with NSA (or the CIA) monitoring Foreign to Foreign communications. The concern is when there is one side foreign, and one side American citizen. Whose rights are paramount: the American side, or the Foreign side? Right now, it appears the emphasis is on protection. That’s legal under the current laws, as one side is foreign. Is it right? That’s for the people to decide, and express to their congresscritters.

It is these restrictions that makes the case of the family, the pressure cookers, and the backpacks even odder. Presumably, they are all US citizens. So if they were being monitored by an NSA program, why was it done? NSA is very careful about that. The answer is likely much less sinister. It appears it was some local terrorism task force (which tends to overreact). As for the monitoring, the NSA was not involved at all. It turns out that Michele Catalano’s husband’s boss tipped off the police after finding ‘suspicious’ searches (including ‘pressure cooker bombs’) in his old work computer’s search history. It is perfectly legal for an employer to review the usage of a work computer. Yet when this was first reported, what did everyone assume? Yeh. Right. The big bad government.

My point is this: take a deep breath. There is loads of paranoia about the government. Some of it is justified, but much of it isn’t. The government is not filled with men in black suits and Ray-bans out to get you. It is filled with people trying to do their best to protect America, keep it safe, and allow it to succeed. The key word is “people”, and people are (surprise) human. They screw up, and create imperfect laws and structures. Other people come around and then figure out how to exploit the imperfection for some purpose. It is our job not to reject something because it isn’t perfect the first time; it is our job to make steady progress towards perfection. If you don’t like how NSA is operating under the laws, then don’t run around with your head wrapped in tin foil — write your congresscritters — or better yet, run for congress yourself — and change the laws.

We’re also dealing with a congress that, in general, does not understand technology. Consider the constitutional rules on search and seizure. They were written in an environment where one had to go into someone’s house to search. That’s why warrants are required to search in a house. Wiretaps had a similar notion — the wires were in the house. When we’re dealing with cell phones, meta data, and search info, how does that apply? You give the search terms to an external computer. You willingly given the metadata to a centralized system to make a call. Is this personal data where you are going into a residence to seize it? See the problem. Our laws have not caught up to our technology, and you have people that do not understand the technology writing and applying the laws. Don’t believe me? Look at the recent rulings on the resale of digital recordings. It was ruled that you had to sell the media player with the digital media, because the law was based on physical manifestations of recordings. This article about recent attempts by the FBI (not the NSA) to monitor Internet metadata makes the same point: the laws currently do not treat metadata the same as the contents. Metadata is treated analogous to address information on an envelope — something freely visible and out in the open. By the way, note that using encrypted protocols does not solve this problem — addresses must remain unencrypted to permit messages to be routed.

Further, while you’re addressing the laws, remember to look at the entire picture. It is pointless to update surveillance and privacy laws and forget things like the Citizens United decision. As has been noted by folks like Bruce Schneier, the ability with which corporations with deep pockets can finance campaigns and causes makes it so that laws are written that serve the for-profit corporations instead of the individual citizen. It does no good to restrict what data the government can collect when corporations are free to collect even more data simply because of a one-time business relationship.

 

This entry was originally posted on Observations Along The Road (on cahighways.org) as this entry by cahwyguy. Although you can comment on DW, please make comments on original post at the Wordpress blog using the link below; you can sign in with your LJ, FB, or a myriad of other accounts. There are currently comments on the Wordpress blog. PS: If you see share buttons above, note that they do not work outside of the Wordpress blog.

===> Click Here To Comment <==
(Click Here to Comment)

cahwyguy: (Default)

Observation StewAfter my wonderful plumbing experience yesterday, my mind cannot make sense — or find a theme — in this collection of news articles. I’ll leave it to you to find the theme, or determine whether these items need to be tossed into the garbage disposal and washed away. Let’s just hope they don’t clog your pipes…

 

This entry was originally posted on Observations Along The Road (on cahighways.org) as this entry by cahwyguy. Although you can comment on DW, please make comments on original post at the Wordpress blog using the link below; you can sign in with your LJ, FB, or a myriad of other accounts. There are currently comments on the Wordpress blog. PS: If you see share buttons above, note that they do not work outside of the Wordpress blog.

===> Click Here To Comment <==
(Click Here to Comment)

cahwyguy: (Default)

userpic=keyboardThis week, everyone’s been upset with the NSA because of all the recent disclosures. So I thought I would share with you a story of something good that came from the NSA (well, at least most people think it is good). What prompted this story was a wonderful infographic on the history of programming languages. This great infographic shows the most popular languages, groups them by era (although it completely omits the 1960s and such wonderful languages as Algol 68 and my fave, PL/I). Below is the Infographic… and the story. [Credit: Infographic by Veracode Application Security]

Infographic by Veracode Application SecurityIf you look to the year 1987, you’ll see a youngish fellow in a Hawaiian shirt. That fellow is Larry Wall, and the language we’re talking about is the #10 language, perl. Yes, you have NSA to blame to perl.

Back in the mid-1980s, I was working for a little company in Santa Monica called System Development Corporation. Coworkers of mine were Larry, his brother-in-law Mark, and his other brother-in-law Jon. We were all working on this little program called BLACKER. The job of BLACKER was to build was is now called a VPN — basically, developing a way to layer one network on top of another (at different classifications). We were attempting to do this at a very high level of assurance — specifically, at the A1 level of the Trusted Computer Security Evaluation Criteria (TCSEC). Better known as the Orange Book, the TCSEC was developed by the NSA (the part that cares about computer security) to permit product evaluations, to encourage the introduction of security features, and to encourage the production of systems with greater confidence in those features. If you’ve heard of the Common Criteria, that’s a successor criteria to the TCSEC, and you’ll find aspects of the TCSEC in current security control catalogs such as NIST SP 800-53.

In an A1 system, there were many features and assurances required, such as Mandatory Access Control, Audit, Identification and Authentication, and Object Reuse. Assurance came from a very detailed design, formal methods, and control over that design from a technique called Configuration Management. I was one of the folks designing the operating system for one of the BLACKER components; Larry was our systems guy. Larry, Mark, and I were sharing an office; we were also carpooling together.

Larry was tasked with developing a Configuration Management system to support meeting A1. If you know Larry, you know he believes that the best programmers are lazy, impatient, and have excessive hubris. The CM system had to be able to support development at two locations (Santa Monica and Paoli), and produce CM reports. It had to allow people to review changes, and managers to approve them.

So what did Larry do? First, he decided to modify USENET News to handle the CM submissions. Having written rn, he worked up a version that supported synchronization of articles across the coasts and appending to an article. Now CM submissions could be posted to a local newsgroup, managers could review and approve the submissions. But how to produce reports? Awk (at the time) was not up to the task, as it couldn’t march through directories. The result: perl (originally to be named Pearl, after Larry’s wife Gloria, who is a pearl, but renamed perl and bacronymed to “Pathetically Eclectic Rubbish Lister”). Perl was developed to march through the CM directories and produce CM reports.

I was the first actual user of perl. I combined the use of perl and a menuing system I had worked on (Q-Menu) to drive our data dictionary. People could edit the nroff source of the data dictionary, and this would then be automatically extracted to form the include files used by the Pascal system that development was using. Single point documentation.

This, by the way, is why I’m perl’s paternal godparent, and Mark is perl’s maternal uncle. It is also why I wrote the history chapter in the original Camel book (and came up with the true footnote to history).

So, when people rag on the NSA, remember there are a bunch of people there who are working hard to ensure more secure computer systems for everyone, and that over 30 years ago, this work gave the world perl.

 

This entry was originally posted on Observations Along The Road (on cahighways.org) as this entry by cahwyguy. Although you can comment on DW, please make comments on original post at the Wordpress blog using the link below; you can sign in with your LJ, FB, or a myriad of other accounts. There are currently comments on the Wordpress blog. PS: If you see share buttons above, note that they do not work outside of the Wordpress blog.

===> Click Here To Comment <==
(Click Here to Comment)

cahwyguy: (Default)

userpic=observationsWell, it’s Saturday and you know what that means… it is time once again to clear out the links that didn’t form into a coherent theme over the last week:

  • Some Things Never Die. For all the work being done in newer programming languages such as Java, it is either comforting… or scary… to realize that the old languages never die. I don’t know if ALGOL or APL are still in heavy use, but I know FORTRAN is (and in fact, it was recently updated, and has supported object-oriented programming since 2003). Also recently updated is COBOL for mainframes, which can now support  cloud and mobile platforms. Here’s a hint for those going into programming — everyone knows the new languages. Become an expert in the older languages (FORTRAN, COBOL), and you’ll be a rarer commodity.
  • Some Things Do. Santa Monica is looking to tear down the Santa Monica Civic Auditorium and replace it with… hell, not even they know. The Santa Monica Civic is a 1960s box structure that is essentially a large multipurpose room. No one wants to do concerts there anymore, and it has been reduced to the level of hosting table-top craft shows.
  • Some Things I Don’t Want To Do. The Rio Hotel in Las Vegas is planning a new thrill ride: a zip-line ride running from the top of the tall Rio towers to the main Rio building. The attraction, dubbed the VooDoo Skyline, is expected to open in Summer 2013. Rides will start from the VooDoo Lounge, atop the Rio’s 50-story Masquerade Tower. Via the zip-line (which is 450′ in the air), guests will travel down 845 feet to the top of the 20-story Ipanema tower, reaching speeds of up to 33 mph. Riders will then make a return trip — upward through a motorized pulley system while traveling backward at 25 mph — to the starting point. The total ride covers nearly one-third of a mile and takes 1 minute and 10 seconds from start to finish. Cost is expected to be $25.
  • Some Things I Do. The LA Times has a really interesting article on a new course at UCLA: Physiological Sciences 7 – Food and Science — that looks at the chemical interactions that make our food what it is. The goal of the recent class was to do experimentation on the science behind apple pies to create an even better apple pie.
  • Some Things Technology Doesn’t Affect. An article from Kapersky on Credit Card security provides a nice discussion on the non-technology risks of credit cards. I’ve always said that people don’t understand risk — they are scared to use the Internet for a credit card, but willingly give it to a server they don’t know who takes it away for a while. This article explains some of those concerns pretty well. As for me, as long as I’m using a reputable site, I have no problem using a credit card on the net. But never a debit card.
  • Some Things Technology Does Affect. USA Today recently had an article on the tan losing its luster in Hollywood. However, one thing in the article caught my eye: “In Hollywood, technology gets some credit. When women like Blanchett started out in the industry, “it was tough,” Dougherty says. Studio lights washed out light faces and limbs, losing texture and depth — hence the desire for “everyone on set to be these neutral honey colors,” a la Jennifer Aniston. But “technology has come a long way,” Dougherty says. “Now, they can really light for these skin tones.”" In other words, tans for actresses are not out for health reasons or artificiality, but because they are no longer necessary to have faces show up on film. Those who are sufficiently old may remember odd makeup and color choices for actors specifically designed to pop on black and white film. Technology marches on.

Hmmm, maybe they did form a theme after all :-)

 

This entry was originally posted on Observations Along The Road (on cahighways.org) as this entry by cahwyguy. Although you can comment on DW, please make comments on original post at the Wordpress blog using the link below; you can sign in with your LJ, FB, or a myriad of other accounts. There are currently comments on the Wordpress blog. PS: If you see share buttons above, note that they do not work outside of the Wordpress blog.

===> Click Here To Comment <==
(Click Here to Comment)

cahwyguy: (Default)

userpic=headlinesToday I spent the day with my daughter, and got to meet two of her three roommates for her sophomore semester: Varsha and Hayden. We spent the day with Varsha and Erin visiting the Legion of Honor Fine Art Museum (for one of their Art History projects), and had dinner with Erin and Hayden. I’ll note that at the Legion of Honor, we saw one of the most moving holocaust memorials I have ever seen. So art and history are on my mind, plus a little bit of science and security…

In the history department, I have a few deaths (or potential deaths) of interest:

  • Yvonne Brill. The LA Times has an interesting writeup on Yvonne Brill, who died March 27 at age 88. Brill was a very important woman rocket scientist and engineer who developed a revolutionary propulsion system that remains the industry standard for keeping unmanned spacecraft in constant, stationary orbit. Later in her career, she became the director of the space shuttle’s solid rocket motor program for NASA. In the last quarter-century of her life, she strove to help others pursue careers in science and math and especially pushed for women to achieve scientific recognition. Still, at one point, she moved to the East Coast to support her husband’s career, noting “good jobs are easier to find than good husbands.”
  • Martyl Langsdorf. The St. Louis Post Dispatch is reporting the death last month of Martyl Langsdorf, who designed what has been called the world’s scariest logo — the Doomsday Clock of the Bulletin of the Atomic Scientists. Since its introduction in 1947, the drawing of the Doomsday Clock has kept watch as international incidents flared. The clock is a symbol of the nuclear age, whose minute hand moves closer to midnight— and presumed annihilation — with each major immediate danger. The clock hands can also move backward, if tensions cool. The hand has moved only 20 times during the past 65 years. It currently stands at five minutes to midnight.
  • CPI Corporation. You probably haven’t heard of CPI Corporation, which abruptly shut down last week. CPI Corporation is better known as the provider of photo studios in Sears and some Wal-Mart stores, and their shutdown deprives parents of an old-fashioned way of taking awkward photos of their children. Of course, there is always the cell phone.
  • Time Magazine. The Atlantic has an interesting article on how the death of Time Magazine may be soon, as they haven’t managed the Internet transition well.

Turning to the science side:  a number of interesting computer security articles. First, Israeli hackers have started attacking back at anti-Israel groups that have vouched to wipe Israel off the Internet. Next, researchers at Washington University in St. Louis have uncovered a way to fingerprint credit cards to address credit card fraud. Lastly, a data breech at a St. Louis supermarket chain have alerted a large number of people to the risks of how data is handled.

Finally, a PS: To my friends who are involved with Northern Faire: Erin is interested in going this year, so I’ll be glad to forward to her any information on how to get discount tickets &c. (and how to coordinate transportation). She’s also likely interested in Dickets. She’s at UC Berkeley.

Music: Alive Alive-O (Jose Feliciano): “The Comedy Bit”

This entry was originally posted on Observations Along The Road (on cahighways.org) as this entry by cahwyguy. Although you can comment on DW, please make comments on original post at the Wordpress blog using the link below; you can sign in with your LJ, FB, or a myriad of other accounts. There are currently comments on the Wordpress blog. PS: If you see share buttons above, note that they do not work outside of the Wordpress blog.

===> Click Here To Comment <==
(Click Here to Comment)

Profile

cahwyguy: (Default)
cahwyguy

June 2025

S M T W T F S
1234567
891011121314
15161718192021
22232425262728
2930     

Syndicate

RSS Atom

Most Popular Tags

Style Credit

Expand Cut Tags

No cut tags