No, Department of Justice, 80 Percent of Tor Traffic Is Not Child Porn

No, Department of Justice, 80 Percent of Tor Traffic Is Not Child Porn

The debate over online anonymity, and all the whistleblowers, trolls, anarchists, journalists and political dissidents it enables, is messy enough. It doesn’t need the US government making up bogus statistics about how much that anonymity facilitates child pornography. At the State of the Net conference in Washington on Tuesday, US assistant attorney general Leslie Caldwell discussed what […]

The post No, Department of Justice, 80 Percent of Tor Traffic Is Not Child Porn appeared first on WIRED.



The FBI, Sony and the Attribution Problem, Part 1- Why?

The recent attack on Sony has publicly paraded one of the predominant problems in incident response. While the immediate issue in incident response is of course the remediation of compromised systems and bringing these systems and IT services back online, it is entirely human to look for somewhere to cast blame. Let’s begin by fleshing out the “why” of attribution before engaging with the “how”.

Why Attribution?

For an affected entity, and for the security professionals working within it, attribution of the attacker(s) is only an ancillary concern. Certainly steps taken (or not taken) during the direct remediation of the breach are important and even essential to the later attribution effort, but priority of work must be on restoration of service. After service is restored, and the breach points corrected, the attribution process begins. Here are some reasons to perform attribution:

1. Attacker Centered Defense– If the attacker can be identified or at least have their tactics, techniques and procedures characterized, it may be possible to take steps to make their next intrusion more difficult and time consuming.

2. Legal/Governmental Retribution– Bringing criminal charges or taking other action against the attacker may deter future attackers, or may have deterrence against the current attackers if they are in a jurisdiction where criminal charges cannot be brought, but are vulnerable to intergovernmental or other pressures.

3. “Hacking Back”– This is an operation pregnant with a host of legal and ethical concerns. It may appear advantageous in the midst of an attack to attack back, but the technical reasons for doing so need to be looked at carefully. There are two scenarios where hacking back could reduce the impact of an ongoing hacking attack. One of these is a DDOS attack, where hacking back into the command and control systems of the attributed botnet may be a viable method to stem the attack. In the second scenario, stolen data belonging to the attacked entity has been definitively located (through attribution efforts) on a server, and then the entity performs a hacking operation to delete that data before it can be copied or moved. Both of these operations are patently illegal in the U.S.  due to the Computer Fraud and Abuse Act. Both also carry a low probability of success or advantage for the attacked entity. If a DDOS operation is disrupted, other botnets can be easily employed by the attacker at short notice, or they may regain control of the compromised botnet. The command and control servers may also be innocent bystanders who are unknowingly playing host to malware. Taking down the servers of a hospital or local government  or foreign military could have extremely serious human and geopolitical downsides.  In the second scenario, the attacked entity would have to be extremely proactive to get the toothpaste back into the tube. In fact, it is so difficult it may as well be regarded as functionally impossible, and there is little chance of getting all the data before it is further disseminated.

Looking at the limited reasons for attribution  and given especially the weakness of the third reason, it may be entirely reasonable for an attacked entity to decide not to pursue attribution. In the end, even having your attacker arrested will not undo the damage caused in the attack. The process of attribution is also not cost free. Additionally, any major actions taken on the basis of the attribution performed may only result in more reputation damage for the entity as the original breach and security failure is further publicized.

Why Attribute the Sony Hack? 

Obviously an attack as devastating as Sony’s–which will probably involve hundreds of millions of dollars in damage to Sony Pictures Entertainment, in addition to a substantial erosion of their reputation and personal damage to many of their prominent employees–should be answered. To decide to not attribute the attackers would make their actions seem tacitly permitted, and probably contribute to further devastating attacks against other entities. This Public Order justification is the purview of the FBI, who has taken a lead role in the investigation of the attack. Sony, of course, probably wishes nothing more than for this incident to go away and may be leaning more towards active disinterest in attribution. It isn’t as if any future lawsuit will recover their lost capital, and their threats of legal action against those who published the more tabloid-friendly portions of their internal emails are at serious risk of the Streisand Effect.

Of course, SPE is not the only actor involved. There are cyber security companies and the U.S. Government at work here as well. Attribution is in the interests of cyber security companies for reputation and prestige reasons, as a proof of their aptitude and ability. On the government side attribution can be a marker of aptitude as well, however, retribution is also a significant influence. In the global and domestic political arenas strong attribution can aid in the pursuit of other interests. Attribution has been used by the U.S. Government previously to pressure the Chinese Government in regards to their cyber espionage campaigns, and charges have been filed in the U.S. against a number of their operators.  So it comes to this. The primary reasons for attribution are political, as support for past and future actions and as an instrument of geopolitical pressure. The actions supported by attribution may include legislative efforts, international sanctions, and even electronic and physical attacks.

In Part Two of this work, having established the interests of the actors involved in attribution, we will look at the “How” of the SPE hack attribution as far as it is known publicly.

 

 

 

 

 

Drunken Spy Satellite Agency Employee Crashed Drone on White House Lawn

The curious incident of the drone in the night-time has been made a bit less mysterious today, as the Secret Service revealed new details into their investigation—including a confession by the pilot himself. According to the Secret Service, an unnamed employee of the National Geospatial Intelligence Agency (NGA) claimed responsibility for crashing a remote-controlled quadrocopter into a tree on the grounds of the White House.

The yet-unnamed employee reported the incident to his superiors at NGA. He claimed to have been drinking at an apartment near the White House when he decided early Monday morning to fly a friend’s new DJI Phantom drone. He claimed that he then lost control of the drone. Soon after the drone slipped unnoticed over the White House fence, it was spotted flying low over the grounds before it crashed into a tree.

The White House has a radar system to detect incoming aerial threats, but it did not detect the drone, which has the radar cross-section of a large bird at best. According to The New York Times, the Secret Service has been studying ways for the past few years to develop a defense against small drones, which could conceivably carry small explosives or other threats.

Read 1 remaining paragraphs | Comments

US Expands Spy Program on American Drivers Beyond Border Region

Since at least 2010, the Drug Enforcement Agency (DEA) has been expanding a regional license plate reader (LPR) program to the entire United States. Previously the program was only known to be concentrated in the border region of the American Southwest.

The revelation comes from new documents obtained and published late Monday by the American Civil Liberties Union (ACLU) under the Freedom of Information Act. The documents also show the DEA captured over 793 million license plates from May 2009 through May 2013 with the stated goal of drug-related asset forfeiture.

“The government has essentially created a program of mass tracking,” Catherine Crump, a former ACLU lawyer who now teaches at the University of California, Berkeley, told Ars. “The US has created a system where the government can track you and the American public simply has to accept it as a fait accompli.”

Read 9 remaining paragraphs | Comments

Apple Releases OS X 10.10.2 with a Pile of Security, Privacy, and Wi-Fi Fixes

Apple has just released the final build of OS X 10.10.2, the second major update for OS X Yosemite since its release. Version 10.10.1, published just a month after Yosemite’s release, focused mostly on quick fixes for the new OS’ most noticeable problems. Apple has been issuing betas for 10.10.2 since November, though, and a longer testing period usually implies that there are more extensive fixes.

First up, the new release is supposed to fix more of the Wi-Fi problems that some users have been experiencing since Yosemite’s launch. 10.10.1 also included Wi-Fi fixes, though it apparently didn’t resolve the problems for all. The new update will also address “an issue that may cause webpages to load slowly” and improve general stability in Safari, all of which should go a long way toward improving Yosemite’s network and Internet performance.

Several privacy and security problems that we’ve reported on have been resolved in 10.10.2, as well. Though Apple will still share limited search and location information with Microsoft to enable Spotlight’s Bing-powered Web searching feature, the company has fixed a bug that caused Spotlight to “load remote e-mail content” even when the setting was disabled in Mail.app itself. Our original report describes why this is a problem:

Read 3 remaining paragraphs | Comments