woensdag 23 december 2020

The US has suffered a massive cyberbreach. It's hard to overstate how bad it is Bruce Schneier


The US has suffered a massive cyberbreach. It's hard to overstate how bad it is

This is a security failure of enormous proportions – and a wake-up call. The US must rethink its cybersecurity protocols

Wed 23 Dec 2020 11.45 GMT

R

ecent news articles have all been talking about the massive Russian cyber-attack against the United States, but that’s wrong on two accounts. It wasn’t a cyber-attack in international relations terms, it was espionage. And the victim wasn’t just the US, it was the entire world. But it was massive, and it is dangerous.

Espionage is internationally allowed in peacetime. The problem is that both espionage and cyber-attacks require the same computer and network intrusions, and the difference is only a few keystrokes. And since this Russian operation isn’t at all targeted, the entire world is at risk – and not just from Russia. Many countries carry out these sorts of operations, none more extensively than the US. The solution is to prioritize security and defense over espionage and attack.

Here’s what we know: Orion is a network management product from a company named SolarWinds, with over 300,000 customers worldwide. Sometime before March, hackers working for the Russian SVR – previously known as the KGB – hacked into SolarWinds and slipped a backdoor into an Orion software update. (We don’t know how, but last year the company’s update server was protected by the password “solarwinds123” – something that speaks to a lack of security culture.) Users who downloaded and installed that corrupted update between March and June unwittingly gave SVR hackers access to their networks.

This is called a supply-chain attack, because it targets a supplier to an organization rather than an organization itself – and can affect all of a supplier’s customers. It’s an increasingly common way to attack networks. Other examples of this sort of attack include fake apps in the Google Play store, and hacked replacement screens for your smartphone.

SolarWinds has removed its customers list from its website, but the Internet Archive saved it: all five branches of the US military, the state department, the White House, the NSA, 425 of the Fortune 500 companies, all five of the top five accounting firms, and hundreds of universities and colleges. In an SEC filing, SolarWinds said that it believes “fewer than 18,000” of those customers installed this malicious update, another way of saying that more than 17,000 did.

That’s a lot of vulnerable networks, and it’s inconceivable that the SVR penetrated them all. Instead, it chose carefully from its cornucopia of targets. Microsoft’s analysis identified 40 customers who were infiltrated using this vulnerability. The great majority of those were in the US, but networks in Canada, Mexico, Belgium, Spain, the UK, Israel and the UAE were also targeted. This list includes governments, government contractors, IT companies, thinktanks, and NGOs … and it will certainly grow.

Once inside a network, SVR hackers followed a standard playbook: establish persistent access that will remain even if the initial vulnerability is fixed; move laterally around the network by compromising additional systems and accounts; and then ex-filtrate data. Not being a SolarWinds customer is no guarantee of security; this SVR operation used other initial infection vectors and techniques as well. These are sophisticated and patient hackers, and we’re only just learning some of the techniques involved here.

Recovering from this attack isn’t easy. Because any SVR hackers would establish persistent access, the only way to ensure that your network isn’t compromised is to burn it to the ground and rebuild it, similar to reinstalling your computer’s operating system to recover from a bad hack. This is how a lot of sysadmins are going to spend their Christmas holiday, and even then they can’t be sure. There are many ways to establish persistent access that survive rebuilding individual computers and networks. We know, for example, of an NSA exploit that remains on a hard drive even after it is reformatted. Code for that exploit was part of the Equation Group tools that the Shadow Brokers – again believed to be Russia – stole from the NSA and published in 2016. The SVR probably has the same kinds of tools.

Even without that caveat, many network administrators won’t go through the long, painful, and potentially expensive rebuilding process. They’ll just hope for the best.

It’s hard to overstate how bad this is. We are still learning about US government organizations breached: the state department, the treasury departmenthomeland security, the Los Alamos and Sandia National Laboratories (where nuclear weapons are developed), the National Nuclear Security Administration, the National Institutes of Health, and many more. At this point, there’s no indication that any classified networks were penetrated, although that could change easily. It will take years to learn which networks the SVR has penetrated, and where it still has access. Much of that will probably be classified, which means that we, the public, will never know.

And now that the Orion vulnerability is public, other governments and cybercriminals will use it to penetrate vulnerable networks. I can guarantee you that the NSA is using the SVR’s hack to infiltrate other networks; why would they not? (Do any Russian organizations use Orion? Probably.)

While this is a security failure of enormous proportions, it is not, as Senator Richard Durban said, “virtually a declaration of war by Russia on the United States” While President-elect Biden said he will make this a top priority, it’s unlikely that he will do much to retaliate.

The reason is that, by international norms, Russia did nothing wrong. This is the normal state of affairs. Countries spy on each other all the time. There are no rules or even norms, and it’s basically “buyer beware”. The US regularly fails to retaliate against espionage operations – such as China’s hack of the Office of Personal Management (OPM) and previous Russian hacks – because we do it, too. Speaking of the OPM hack, the then director of national intelligence, James Clapper, said: “You have to kind of salute the Chinese for what they did. If we had the opportunity to do that, I don’t think we’d hesitate for a minute.”

We don’t, and I’m sure NSA employees are grudgingly impressed with the SVR. The US has by far the most extensive and aggressive intelligence operation in the world. The NSA’s budget is the largest of any intelligence agency. It aggressively leverages the US’s position controlling most of the internet backbone and most of the major internet companies. Edward Snowden disclosed many targets of its efforts around 2014, which then included 193 countries, the World Bank, the IMF and the International Atomic Energy Agency. We are undoubtedly running an offensive operation on the scale of this SVR operation right now, and it’ll probably never be made public. In 2016, President Obama boasted that we have “more capacity than anybody both offensively and defensively.”

He may have been too optimistic about our defensive capability. The US prioritizes and spends many times more on offense than on defensive cybersecurity. In recent years, the NSA has adopted a strategy of “persistent engagement”, sometimes called “defending forward”. The idea is that instead of passively waiting for the enemy to attack our networks and infrastructure, we go on the offensive and disrupt attacks before they get to us. This strategy was credited with foiling a plot by the Russian Internet Research Agency to disrupt the 2018 elections.

But if persistent engagement is so effective, how could it have missed this massive SVR operation? It seems that pretty much the entire US government was unknowingly sending information back to Moscow. If we had been watching everything the Russians were doing, we would have seen some evidence of this. The Russians’ success under the watchful eye of the NSA and US Cyber Command shows that this is a failed approach.

And how did US defensive capability miss this? The only reason we know about this breach is because, earlier this month, the security company FireEye discovered that it had been hacked. During its own audit of its network, it uncovered the Orion vulnerability and alerted the US government. Why don’t organizations like the departments of state, treasury and homeland security regularly conduct that level of audit on their own systems? 

The government’s intrusion detection system, Einstein 3, failed here because it doesn’t detect new sophisticated attacks – a deficiency pointed out in 2018 but never fixed. We shouldn’t have to rely on a private cybersecurity company to alert us of a major nation-state attack.

If anything, the US’s prioritization of offense over defense makes us less safe. In the interests of surveillance, the NSA has pushed for an insecure cellphone encryption standard and a backdoor in random number generators (important for secure encryption). The DoJ has never relented in its insistence that the world’s popular encryption systems be made insecure through back doors – another hot point where attack and defense are in conflict. In other words, we allow for insecure standards and systems, because we can use them to spy on others.

We need to adopt a defense-dominant strategy. As computers and the internet become increasingly essential to society, cyber-attacks are likely to be the precursor to actual war. We are simply too vulnerable when we prioritize offense, even if we have to give up the advantage of using those insecurities to spy on others.

Our vulnerability is magnified as eavesdropping may bleed into a direct attack. The SVR’s access allows them not only to eavesdrop, but also to modify data, degrade network performance, or erase entire networks. The first might be normal spying, but the second certainly could be considered an act of war. Russia is almost certainly laying the groundwork for future attack.

This preparation would not be unprecedented. There’s a lot of attack going on in the world. In 2010, the US and Israel attacked the Iranian nuclear program. In 2012, Iran attacked the Saudi national oil company. North Korea attacked Sony in 2014. Russia attacked the Ukrainian power grid in 2015 and 2016. Russia is hacking the US power grid, and the US is hacking Russia’s power grid – just in case the capability is needed someday. All of these attacks began as a spying operation. Security vulnerabilities have real-world consequences.

We’re not going to be able to secure our networks and systems in this no-rules, free-for-all every-network-for-itself world. The US needs to willingly give up part of its offensive advantage in cyberspace in exchange for a vastly more secure global cyberspace. We need to invest in securing the world’s supply chains from this type of attack, and to press for international norms and agreements prioritizing cybersecurity, like the 2018 Paris Call for Trust and Security in Cyberspace or the Global Commission on the Stability of Cyberspace. Hardening widely used software like Orion (or the core internet protocols) helps everyone. We need to dampen this offensive arms race rather than exacerbate it, and work towards cyber peace. Otherwise, hypocritically criticizing the Russians for doing the same thing we do every day won’t help create the safer world in which we all want to live.

-------------------------------------------------------------------

My Comments :

In spite of the clarifications (the Western offensive cyberprotection strategy) given by the author of this article, I still can hardly comprehend the apparent fact, that one of the most sophisticated security apparatus in the world has not been able to prevent shield not just thousands of private (including business) organisations, but also failed completely to shield a great variety of (also highly sensitive) gouvernemental organisations against a relatively simple (but highly effective and extremely compromising) intelligence hack.




Rutte schermt informatie af en dat is ongrondwettig

 

Rutte schermt informatie af en dat is ongrondwettig

Informatieplicht De Toeslagenaffaire bewijst dat het parlement zonder kennis van de informatie waar het kabinet over beschikt geen controle heeft. Rutte beschadigt de democratie, stelt 

22 december 2020

Premier Mark Rutte wordt gehoord door de Parlementaire ondervragingscommissie Kinderopvangtoeslag (PoK).
Foto David van Dam


De misplaatste opvatting dat openbaarheid van ambtelijke stukken tot het uiterste moet worden beperkt, is de laatste jaren leidend geworden bij het informeren van de Kamers. Door deze zogenoemde ‘Rutte-doctrine’ wordt het voor volksvertegenwoordigers stilaan moeilijker om informatie te krijgen over wat er zich bij de voorbereiding van besluiten en beleid afspeelt. Pottenkijkers zijn niet langer gewenst in de beleidskeuken.

Tijdens zijn verhoor op 26 november door de Parlementaire ondervragingscommissie Kinderopvangtoeslag lichtte Rutte zelf perfect de achtergrond van de naar hem genoemde doctrine toe: „[I]k ben van mening dat tussen ambtenaren onderling en tussen ambtenaren en bewindslieden, zolang er nog geen besluiten genomen zijn, stukken die daartussen rondgaan in de voorbereiding op besluiten – dan heb ik het niet over verslagen van vergaderingen, maar dan heb ik het dus over besluitvorming die nog niet heeft plaatsgevonden – dat dat vrij moet kunnen. Dat is mijn opvatting. […] mijn opvatting is dat, wil je in Nederland tot verstandige besluiten kunnen komen, het van groot belang is dat stukken moeten kunnen worden verspreid tussen ambtenaren onderling en ook tussen ambtenaren en bewindslieden, zonder dat er angst is dat die stukken allemaal naar buiten gaan, totdat het tot besluitvorming leidt of wanneer het zou gaan om bijvoorbeeld verslaglegging van gesprekken.”

Het gevolg van deze werkwijze is dat het parlement op grote achterstand wordt gezet en ernstiger: het doet afbreuk aan de democratie. Politiek gaat altijd over het maken van keuzes tussen verschillende opties. Als de opties die op tafel lagen niet meer in de openbaarheid komen doordat de Kamers voornamelijk nog het eindresultaat meegedeeld krijgen, dan is nauwelijks nog na te gaan hoe de besluitvorming tot stand is gekomen en wordt, tegelijkertijd, het meedenkende én controlerende vermogen van de volksvertegenwoordiging verzwakt.

Ook kiezers weten niet wat er achter de schermen gebeurde, welke informatie wel en niet is gebruikt of wie waarvoor stond en verantwoordelijk was. Dat past niet in een parlementaire democratie, het tast het vertrouwen en kritisch vermogen van burgers aan, alsook de rechtsstaat – zoals de recente Toeslagenaffaire laat zien. Doordat informatie bewust bij de Kamer werd weggehouden kon zeven jaar lang ‘Ongekend onrecht’ – zoals de onderzoekscommissie van het parlement het betitelde – voortwoekeren.

Schadelijke effecten

De Rutte-doctrine heeft nog andere schadelijke effecten. Het voedt een houding bij ambtenaren en beleidsvoorbereiders om informatie liefst zoveel mogelijk onder de pet te houden, om van informatievoorziening aan de Kamers een kat-en-muisspel te maken.

Ook de cijfers laten dat zien. In de afgelopen tien jaar werd de Kamer maar liefst 41 keer niet, niet volledig, of onjuist geïnformeerd. Dat is een toename van 58 procent ten opzichte van de jaren 2001-2009, een periode waarin het aantal informatie-incidenten al fors toenam.

Doordat het kabinet informatie bij de Kamers weghoudt, weten de Kamerleden ook steeds minder waarnaar ze moeten vragen. En als ze dat toch – soms noodgedwongen ongericht – doen, wordt hen nogal eens scoringsdrang en politieke spelletjes verweten en zó bij te dragen aan een onwerkbare hoeveelheid Kamervragen.

Die aantallen Kamervragen vallen trouwens reuze mee en zijn de laatste jaren redelijk constant: gemiddeld twee per bewindspersoon per week.

Die Rutte-doctrine om stukken die betrekking hebben op intern beraad per definitie niet te delen met de Kamers is ook in strijd met de inlichtingenplicht die artikel 68 van de Grondwet oplegt aan bewindslieden. Die plicht houdt in dat inlichtingen waar een of meerdere Kamerleden om vragen moet worden verstrekt, tenzij dat strijdt met het belang van de staat.

Weigering vanwege het belang van de staat hoort zeer uitzonderlijk te zijn en het kwam dan ook tot een aantal jaar geleden ook nauwelijks voor dat informatie om die reden aan de Kamer werd geweigerd.

Overheidsinformatie is de zuurstof voor het democratische leven

De hoogst enkele keer dat dat gebeurt – en toelaatbaar is – is bijvoorbeeld om het geheim van de ministerraad of het geheim van communicatie met de Koning te beschermen, de nationale veiligheid, bedrijfsgeheimen, of persoonlijke beleidsopvattingen van (met name) bewindspersonen.

Weigeringsgronden

Over die weigeringsgronden maakte de Kamer in 2002 (bevestigd in 2016) sluitende afspraken met de regering. Daarbij gaven ze een gezamenlijke interpretatie aan de grondwettelijke inlichtingenplicht op basis van de bedoeling van de grondwetgever (zoals blijkt uit de toelichting op de Grondwet van 1983).

Daaruit komt naar voren dat weigeren van informatie omdat daarin persoonlijke beleidsopvattingen van ambtenaren of gezagsdragers worden weergegeven, aanvankelijk mogelijk is. Maar dat die informatie toch gegeven moet worden als de Kamer doorvraagt – een stuk moet dan maar worden geanonimiseerd, of de identiteit onzichtbaar worden gemaakt. Een absolute weigeringsgrond is het dus niet.

Rutte gaat met zijn invulling veel verder – zoals ook de parlementaire ondervragingscommissie signaleert. Hij probeert alle voorbereiding en intern beraad achter de schermen te trekken. Dat is ongrondwettig en schadelijk voor onze democratie.

Het zou goed zijn als regering en Kamer de afspraken uit 2002 en 2016, gebaseerd op de duidelijke bedoeling van de grondwetgever, zouden herbevestigen. Want in een volwassen democratische rechtsstaat is kennis van de informatie waarover de overheid beschikt wezenlijk om die – al dan niet via bemiddeling van het parlement – te kunnen controleren. Overheidsinformatie is de zuurstof voor het democratische leven, en ook eigendom van burgers. Zonder openheid kan een democratie niet zijn wat ze moet zijn, dat wil zeggen: bestuur van, voor en door de burgers.

https://www.nrc.nl/nieuws/2020/12/22/rutte-schermt-informatie-af-en-dat-is-ongrondwettig-a4024861

White supremacists plotted attacks on US power plants, FBI alleges


White supremacists plotted attacks on US power plants, FBI alleges

  • Ohio teen ‘suggested buying ranch for militant training’
  • Court documents mistakenly unsealed last week
An Ohio teenager, who was 17 at the time, shared plans about a plot to create a power outage by shooting rifle rounds into power stations in the south-eastern US. Photograph: Justin Lane/EPA

Associated Press

Wed 23 Dec 2020 13.06 GMT

White supremacists plotted to attack power stations in the south-eastern US, and an Ohio teenager who allegedly shared the plan said he wanted the group to be “operational” on a fast-tracked timeline if Donald Trump were to lose his re-election bid, the FBI alleges in an affidavit that was mistakenly unsealed.

The teen was in a text group with more than a dozen people in the fall of 2019 when he introduced the idea of saving money to buy a ranch where they could participate in militant training, according to the affidavit, which was filed under seal along with a search warrant application in Wisconsin’s eastern US district court in March.

The documents were inadvertently unsealed last week before the mistake was discovered and they were quickly sealed again.

The teenager wanted the group to be “operational” by the 2024 election because he believed it was likely a Democrat would win, but “the timeline for being operational would accelerate if President Trump lost the 2020 election,” according to the affidavit. An informant told investigators that the teen “definitely wanted to be operational for violence, but also activism”.

The Ohio teen, who was 17 at the time, also shared plans with a smaller group about a plot to create a power outage by shooting rifle rounds into power stations in the south-eastern US. The teen called the plot “Light’s Out” and there were plans to carry it out in the summer of 2021, the affidavit states.

One group member, a Texas native who was a Purdue University student at the time, allegedly sent the informant a text saying “leaving the power off would wake people up to the harsh reality of life by wreaking havoc across the nation”.

The affidavit identifies three people by name and references others who were allegedly communicating with or part of the group. The Associated Press is not naming any of the individuals because charges have not been publicly filed.

None of the three men immediately replied to emails, texts or voicemails left on Tuesday seeking comment. The father of one of the men had no comment.

Federal prosecutors in Ohio are taking the lead on the case. Jennifer Thornton, a spokeswoman for the US attorney’s office in the southern district of Ohio, said she could not provide additional information because the investigation is ongoing, but “we want to emphasize that there is no imminent public safety threat related to this matter.”

The affidavit details an investigation into group members, who allegedly share white supremacist ideology.

The document outlines how they communicated over encrypted messaging applications before three of them eventually met up in person. They also allegedly shared recommended reading on white supremacist literature, required a “uniform” to symbolize their commitment and talked about making weapons. The affidavit says the Ohio teen put Nazi flags in his room, but his mother told him to take them down.

Some group members also indicated that they were prepared to die for their beliefs. One man from Oshkosh, Wisconsin, allegedly told the Ohio teen: “I can say with absolute certainty that I will die for this effort. I swear it on my life.” The teen replied: “I can say the same,” the court documents state.

According to the affidavit, the Wisconsin man also told an undercover FBI employee in February that the group was interested in taking “direct action” against the system and said, “If you truly want a fascist society I will put in the effort to work with you but recruitment is long and not going to be easy.”

He then outlined a “radicalization” process to instill a “revolutionary mindset” which ended with recruits proving they are more than just talk. He allegedly wrote that if it seemed too tough, “I recommend leaving now, we are extremely serious about our goals and ambitions.”

The affidavit says the Ohio teen also spoke numerous times about creating Nazi militant cells around the country like those of the neo-Nazi network the Atomwaffen Division.

Atomwaffen Division members have promoted “accelerationism”, a fringe philosophy espousing mass violence to fuel society’s collapse. More than a dozen people linked to the group or an offshoot called the Feuerkrieg Division have been charged with serious crimes in recent years.

This investigation apparently began after a fourth man, from Canada, was stopped while trying to enter the US. The man told border agents that he was going to visit the Ohio teen, whom he had recently met over an encrypted app, according to the affidavit. Agents found Nazi and white supremacist images on his phone.

https://www.theguardian.com/world/2020/dec/23/white-supremacists-plotted-attacks-us-power-plants-fbi-alleges