This story appeared on Network World at


Is vulnerability an objective?


'Net Insider By Scott Bradner, Network World

January 03, 2012 12:01 PM ET


I ended last year with a death-of-the-Internet column, and I'm starting off the new year with a death-via-the-Internet one.


I spent time over the holiday reading "America the Vulnerable" by Joel Brenner. This is an activity that I recommend to anyone who does not mind a few sleepless nights.


Brenner served as the head of counterintelligence for the director of National Intelligence so he has reason to actually know what kind of threats the United States is under but, due to his previous government position, he is limited in what he can say to information already made public. Thus, he needed to provide public documentation to back up what he wanted to write about, and the book has 38 pages of references of that documentation. I shudder to think of what Brenner knows about active threats that he was not able to write about due to not being able to find a public document that disclosed the threats. (Read Network World's Senior Editor Ellen Messmer's take on this book.)


No doubt about it, we are exposed. Data about us as individuals is everywhere and totally out of our control; critical corporate data is wide open to everyone in the corporation, and too frequently, just to everyone; Internet service providers ignore compromised customer computers; utilities put the controls for their key systems directly on the Internet "protected" by security systems that would embarrass a maker of windup toys; the "best" security companies around have been breached and information about, or protecting, tens of thousands of their customers has been stolen; and our economic and political adversaries are getting good -- very, very good -- at exploiting these conditions.


Brenner details all of the above issues in great, and frightening, detail and includes some suggestions as to what government could do to mitigate some of the issues. I'll explore a few of them here:


*ISPs generally know when their customers' computers get infected and become botnet slaves, yet almost never let customers know they are toasted. Maybe ISPs should be required to let them in on the secret.


*Electric utilities too often put the controllers for their power generators, most of which have laughable security protections, directly on the Internet because it is convenient for their technicians. Of course, it is also convenient for remote hackers who might like to install software that could destroy the generators when it's convenient for the hackers (see The Aurora Project). Brenner lays out an all-too-feasible scenario of a future where a Chinese government blackmails the United States by destroying a few power generators as a demonstration of what it could do. (Note that the United States no longer builds this type of big generator -- we buy them from the Chinese.) Maybe it should be against the law, with criminal penalties, to connect such controls to the Internet.


*Why does just about everyone in your organization have direct access to just about all the company secret files? There is no reason that the person in the mailroom or, in most cases, the company president, should have such access. Take a look at WikiLeaks to see what goes wrong when there is too indiscriminate access.


The basic message of "America the Vulnerable" is that we are, almost willfully, handing over our secrets, economy and future to those who would do us harm. There are things we, as a country, as employees and as individuals should do to reduce the threats but we better get a move on or it will be too late. (It is too late in many cases, including with the technology used to quiet submarine propellers.)


Disclaimer: I had the privilege of attending a Harvard seminar with Mr. Brenner but the above book review, and situational report, is mine -- not the university's.


All contents copyright 1995-2012 Network World, Inc.