Thursday, September 20, 2012

The US Must Enhance Cyber Threat Defenses, Offenses

US Must Enhance Cyber Defenses

Lockheed Martin in Bethesda, MD
It has been reported before that the US is currently not well defended against cyberattacks.  Some examples of US companies that have come under attack by Chinese hackers are Lockheed Martin, Google, and LinkedIn among others.  Of course, that's just the tip of the iceberg, there's tons more.
Take this hacking campaign against energy companies in December 2011.
Others, not publicly attributed to the group before, include a campaign against North American natural gas producers that began in December 2011 and was detailed in an April alert by the Department of Homeland Security, two experts who analyzed the attack said. In another case, the hackers first stole a contact list for subscribers to a nuclear management newsletter, and then sent them forged e-mails laden with spyware. 
In that instance, the group succeeded in breaking into the computer network of at least one facility, Diablo Canyon nuclear plant, next to the Hosgri fault north of Santa Barbara, according to a person familiar with the case who asked not to be named.

They Phished a Nuclear Plant

The Compromised Diablo Canyon Nuclear Plant
What strikes me is that hacking attempt against nuclear facilities wasn't particularly sophisticated.  This attack is straight out of the script kiddie playbook.  It concerns me that the natural gas producers e-mail filter didn't catch these spyware attachments.  I'm also shocked that people listed in a nuclear management newsletter lacked the sense to never open e-mails from suspicious sources on work computers.  I would have guessed that nuclear engineers and managers had more sense.
This concerns me, because a sophisticated security expert would have been far less overt.  If these hackers with adolescent tactics were able to compromise a nuclear plant, what could a better trained adversary accomplish.  I doubt the attack would have even been detected.
Symantec has published information about Chinese cyberattacks against US Defense contractors.  Indeed terabytes of data have been stolen from the DoD.  This is bad news, and we have to wonder how much technology, strategic plans, and information have been stolen from us.  The Chinese are not our friends.

Panetta is Weak on Cybersecurity

Panetta is having talks with China about “cyber issues.”  These aren't “cyber issues,” they are purposeful attacks on the US and private companies in the US to obtain information.  China is a state sponsor of cyber attacks throughout the western hemisphere, they must be called out on this issue.  This has gone on long enough. I am gravely concerned about our technology being turned against us, which is something that makes cyber attacks so dangerous.

They Could Compromise Our Weapons

F-22 Raptor in Flight
Modern aircraft require computers running a real-time operating system (RTOS) to fly.  The F-22 is a sophisticated fighter plane that can network using a system called Total Information Awareness (TIA) with other fighters in the air to produce a composite map using the combined sensor data.  It isn't too hard to imagine an adversary spoofing a friendly F-22 signature and either obtaining strategic battlefield information or providing false radar data.  Furthermore, like nearly all modern fighter jets, F-22s are digital fly-by-wire so it doesn't take a remarkable stretch of the imagination to envision fighters being taken over by remote control.  Though I hope that the engineers designing the aircraft implemented network air gaps to isolate the aircraft RTOS control systems from the TIA sensor systems.  However based on a quick mental overview of the data pipeline, the RTOS would need to talk to the TIA in order to adjust to manoeuvres.  Of course, any linkage between the TIA and RTOS would be create a vulnerability, since the input to the TIA could be manipulated by a rouge signal.

Hack Them Back

We must begin offensive hacking attacks (if we haven't already) against those that would seek compromise our systems.  The fight is no longer conventional; there is a cyber war going on at this very moment, and we must be prepared for enemies to use this vulnerability against us.  This will give us several advantages.  The main advantage will be to actively stop attacks before they happen, since we will be able to compromise the hackers systems and know how they will strike.  Secondly, we can implement back doors to provide us access and monitor systems and their uses, to come back whenever it is deemed necessary.

No comments:

Post a Comment