The following text is copyright 2012 by Network World, permission is hearby given for reproduction, as long as attribution is given and this notice is included.

 

Is vulnerability an objective?

 

By: Scott Bradner

 

I ended last year with a death-of-the-Internet column, I'm starting off the new year with a death-via-the-Internet one.  I spent time over the holiday reading "America the Vulnerable" by Joel Brenner.  This is an activity that I recommend to anyone who does not mind a few sleepless nights.

 

Joel Brenner served as the head of counterintelligence for the director of National Intelligence so he has reason to actually know what kind of threats the US is under but, due to his previous government position, he is limited in what he can say to information already made public.  Thus, he needed to provide public documentation to back up what he wanted to write about.  The book has 38 pages of references of that public documentation.  I shudder to think of what Mr. Brenner knows about active threats that he was not able to write about due to not being able to find a public document that disclosed the threats.

 

No doubt about it, we are exposed. Data about us as individuals is everywhere and totally out of our control; critical corporate data is wide open to everyone in the corporation, and too frequently, just to everyone; Internet service providers ignore compromised customer computers; utilities put the controls for their key systems directly on the Internet "protected" by security systems that would embarrass a maker of windup toys; the "best" security companies around have been breached and information about, or protecting, tens of thousands of their customers has been stolen; and our economic and political adversaries are getting good -- very very good -- at exploiting these conditions. 

 

Mr. Brenner details all of the above issues in great, and frightening, detail and includes some suggestions as to what government could do to mitigate some of the issues but I'll only explore a few of them here.

 

 ISPs generally know when their customer's computers get infected and become botnet slaves yet almost never let those customers know that they are toasted - maybe they should be required to let those customers in on the secret.

 

Electric utilities too often put the controllers for their power generators, most of which have laughable security protections, directly on the Internet because it is convenient for their technicians  -- it is also convenient for remote hackers who might like to install software that could destroy the generators when it was convenient for the hacker.  (see The Aurora Project http://www.youtube.com/watch?v=rTkXgqK1l9A)  Mr. Brenner has an all too feasible scenario in the book of a future where a Chinese government blackmails the US by destroying a few power generators as a demonstration of what they could do.  (Note that the US no longer builds this type of big generator, we buy them from the Chinese.) Maybe it should be against the law, with criminal penalties, to connect such controls to the Internet.

 

Why does just about everyone in your organization have direct access to just about all the company secret files?  There is no reason that the person in the mailroom or, in most cases, the company president, should have such access.  Take a look at Wikileaks to see what goes wrong when there is too indiscriminate access. (http://www.networkworld.com/columnists/2010/120110-bradner.html)

 

The basic message of America the Vulnerable is that we are, almost willfully, handing our secrets, our economy and our future over to those who would do us harm. There are things we, as a country, as employees and as individuals to reduce the threats but we better get a move on or it will be too late.  (It is too late in many cases, including the technology used to quiet submarine propellers.)

 

disclaimer: I had the privilege of attending a Harvard seminar with Mr. Brenner but the above book, and situational, report is mine - not the university's.