Wednesday, May 18, 2016

Moving from RansomWare to LeakWare

One of the trends I have observed on the Cyber Security threat landscape is the movement from "Ransonware" like CyrptoLocker, TeslaCrypt and CryptoWall to a new category of malware I am calling "LeakWare." This is a distinct category of malware that needs its own category, defenses and and special attention.

Simply defined, we can expect LeakWare will hold a user or company's data for ransom (maybe, probably) and if the ransom is not paid the data will then be leaked to the world via sites like pastebin, wikileaks, and others. The aim here is to up the ante beyond merely data loss to data exposure. Imagine the Sony-like impact of this potentially life/business-ending exposure. This will merit new and special attention to defense and prevention further driving the market for new and innovative technologies to guard against this and previously-seen  similar threats.

Thursday, March 31, 2016

The house judiciary committee hearing on FBI vs. Apple

The hearing listens like a user awareness training session boadcast via C-SPAN. This is a classic case of sacrificing the greater good for the emotional satisfaction (revenge?) of the few. It's cirtical during times like these when emotions run high to remember that two wrongs don't make a right. Obviously, this wrong choice won't make those crimes right either.

Congress, Please don't do this thing that can't be undone in an attempt to undo the crimes that can't be undone.

Monday, February 29, 2016

The FBI, Apple and privacy encryption: Why the FBI is putting pressure on Apple to hack a terrorist's iPhone

I've heard a lot of talk lately about why a federal agency would bother with a hardware and software vendor in the course of obtaining a known terrorists associates. Here's my analysis FWIW...

If you follow DOJ cases you'll notice a trend of late where in the course of establishing an air tight case judges are requesting very intimate details of how the FBI and others have come by their information

In one recent child porn ring case the FBI was asked to provide all Network Investigative Technique (NIT) methods including code for how they reverse engineered the dark web running on TOR to nail-down one site hosting over 80 percent of darkweb child porn called "PlayPen." But they didn't stop with taking down the site as in previous cases. Instead, they moved the site to their own data center and used it as click-bait to catch more bad guys.

Needless to say those methods and code will be entered into public record. The bad guys will patch the hole and the millions of dollars spent researching and developing said methods and code will be worthless.

Which brings us back to an iPhone and a shooter. My theory and that's really all it is at this point is this. The FBI doesn't really need Apple to crack the phone. Let's not fool ourselves into thinking the FBI and other federal agencies don't have the technical capability of cracking our personal devices. In fact the automatic update feature itself may be just that. Apple itself reports that the FBI has requested a "new version" of the OS that circumvents security features be installed on the phone. So rather  than take a gamble with revealing a high-value back door when the payoff is unknown the FBI is asking Apple to crack it for them. They don't want to show their cards yet.

Which brings us to how Apple will fight the Court order to hack the shooter's phone and Apple's 64-page response citing the unconstitutional nature of the order. Why is this case such a big deal? Why is seemingly everybody talking about it? In the grand scheme of things this case has the potential to have an incredibly profound impact on Constitutional law and will certainly shape the way we use technology and the privacy we (think) we enjoy in the years to come.

The case is slated to advance to a House Judiciary Committee for Encryption on March 1st.