Use “Google juice” for privacy

The NYT Bits Blog has posted Part I: Answers to Questions About Internet Privacy.

Jen King at the UC Berkeley School of Information pointed me to this specific answer:

First, encourage your local court to join the privacy movement. Second, build a positive online presence that will push your private financial information off the first page of Google search. The majority of Web searchers don’t look past the first page of Google, so if you can control the first page, then you can limit how many people see your foreclosure. Start by building personal profiles on sites like LinkedIn, Twitter and other popular communities. You may also consider building a personal blog. Arrange to have your name in the URL of each Web property to maximize its “Google juice”. Maybe join a site that lists people in your industry or profession. By carefully linking these sites to one another, you can often make these positive profiles come up at the top of a search for your name.

Many years ago at the 2003 Blackhat conference a presentation was given on how to remove all traces of an identity on the Internet. It was great stuff but clearly a task for Sisyphus.

From that point on I have actively advocated that people who want privacy should actually push and manage information online in the same way celebrities and politicians manage theirs. Some choose to fight and erase objectionable traces but this will eventually fail. Most create press kits and photos, with careful appearances, for public consumption. Both face the threat of paparazzi and tabloids but the latter group seems to have found the least-cost and most secure path (i.e. data integrity).

It is much harder to remove everything than to bury something, a lesson also learned from digital forensics.

The best strategy is to build up online reputation and credibility — pro-actively create a reflection of true persona that can withstand an accusation, incident or even a campaign…and on that note how many know the ruling on Arthur Andersen was actually overturned?

US legalizes jailbreaking iPhone

Apple filed an objection but the US Copyright Office appears to have ignored it and sanctions iPhone jailbreaking

IPhone users can now legally hack their phones to download applications that aren’t in Apple’s App Store.

The U.S. Copyright Office, a division of the Library of Congress, has authorized several new exemptions to the Digital Millennium Copyright Act (DMCA), one of which will allow mobile phone users to “jailbreak” — or hack into — their devices to use apps not authorized by the phone’s manufacturer. The new rules will be published on Tuesday in the Federal Register.

Their position is not just for applications; they continued to uphold the right to hack the phone to subscribe to another network

The Copyright Office also renewed and expanded its 2006 decision allowing mobile phone users to jailbreak their phones in order to switch carriers. Previously, the office allowed firmware updates to enable network-switching; this week, it added a provision allowing software hacks as well. In other words, iPhone users can now legally download software that will enable their phones to join a non-AT&T network.

FISMA II Debate: Writing Versus Securing

This is not to be confused with FISMA Phase II, which had to do with NIST credentials for FISMA assessors. The new FISMA II proposal is said to bring an emphasis on security and not just compliance.

While FISMA originally may have been a good idea to introduce some standards across the federal government as they look at how they secure their networks and how they secure their information, it turned into a lot of more paperwork-compliance exercise than really addressing the core issues of securing networks and securing data, said Michael Markulec, chief operating officer at Lumeta, a network mapping and discovery company.

“While initially a very positive step in terms of standardizing practices across the federal government, I think it has gotten a little bit out of control,” Markulec said. “My hope is for FISMA II and some of these streamline reporting is that some of the dollars that are being spent on the reporting compliance side can go back to really supporting securing the network and securing the underlying data to make sure that our critical infrastructure is protected.”

This is a common problem with compliance initiatives. A giant list of action items is created. No one in security will want to take the job of running through hundreds of hours of spreadsheets. Instead a project manager is assigned as the lead. This project manager, depending on their desire for executive status, often hires a huge number of staff to help collect and file papers on compliance as they too are unhappy just writing and filing reports — spread the pain around. Soon enough the project becomes an exercise in just collecting artifacts and checking boxes on a list. A giant gap is created between technical staff who can verify a control and the non-technical staff who file the evidence of a control. The project management office for compliance then will start to claim ownership of all things security related and the actual security staff will fade into this shadow.

The FISMA II proposal and discussion, found in testimony of Alan Pallar, suggests a shift to “real time” monitoring will bring balance back to more technical security staff.

Here is a problem I see with this proposal. I remember how GM proved, to the loss of billions, that automation will fail unless management of technology can be improved prior to automation. I think Paller misses this crucial step. He first lays out a critique of FISMA:

Continuous monitoring enables government agencies to respond quickly and effectively to common and new attack vectors. The Department of State has demonstrated the effectiveness of this security innovation. Most major corporations use it. This model is the future of federal cyber security. As our response to attacks becomes faster and more automated, we will take the first steps toward turning the tide in cyberspace, and protecting our sensitive information. The original FISMA did just the opposite — it slowed down every process and took key resources away from projects that would allow agencies to act and react more quickly.

Why did it slow down monitoring? What caused the failure? Paller says the answer is that FISMA itself created a non-technical group of auditors whose job is just to collect information:

GISRA and FISMA rewarded ineffective behaviors and created a cadre of people who call themselves security professionals but who proudly admit they cannot implement security settings on systems and network devices or find a programming
flaw. Most of these paper?warriors have no depth of understanding of current threats, cannot do an effective risk assessment, nor select the right controls to
protect systems against the increasingly sophisticated attacks.

I would not be so certain that FISMA rewarded ineffective behavior. My sense is that management was already thinking this way, FISMA just brought it to our attention. More to the point:

The head of security at a major southern power company told me last Friday, “I had to hire a writer rather than a security person because writing compliance reports is seen by management as more important than actually securing the systems.”

I wrote about about a giant gaping hole between those who collect evidence of controls and those who test controls. This example by Paller is actually a worse scenario. He shows that some companies (utilities) actually think they have to choose between testing security and documenting security.

They need both; can’t pick just one. That is the failure of management I am talking about. It existed before FISMA. That is what needs to change.

Paller also makes note of the fact that “paper-warriors” are said to get paid 50-80% more than “people who actually secure systems and networks and applications.”

While his argument here might be that technical expertise is undervalued, this is not a situation that should be seen as isolated to the security industry. The lesson from the data might actually be that security professionals should learn essential writing and reporting skills if they wish to boost their income by 50-80%. I often see that advice in other professions. The entire problem with FISMA might therefore boil down to the fact that security professionals who actually secure things need to develop broader skills. Another explanation could be that staff able to perform an assessment should not be passed over in favor of staff who can only report second-hand information albeit in a smoother package.

Back to my reference about GM and the failure of automation, Paller concludes:

What we need instead is a process that directs agencies to focus their cyber security resources on monitoring their information systems and networks in real time so that they can prevent, detect and/or mitigate damage from attacks as they occur. And oversight must be focused on the effectiveness of the agencies’ real-time defenses. The bill that you have introduced, Madam Chair, does exactly that. Anything less continues o waste scarce resources and leaves us unacceptably vulnerable.

I know “real time” technology might be appealing as a means to force more technical staff into the limelight, but that has not been my experience. It instead will fall right back into the “paper warrior” camp for one simple reason: professionals who actually secure things still face a need to turn large sets of data into meaningful reports. The need for the ability to write does not go away. Security professionals will still be called upon for analysis and synthesis, writing, presentation, and so forth. Paller does not explain how a smooth-talking “paper warrior” will be any less able to steal the show. A new danger could emerge instead as some might say there is no need for security professionals given the investment in a “real time” monitoring system that does all the “real work.”

I agree wholeheartedly with Paller’s emphasis, but I think his analysis and solutions are attacking symptoms instead of providing a cure. That is why I keep bringing up GM. They had “Robot Mania” under CEO Roger Smith, as explained by Case Study: GM and the Great Automation Solution.

“Automation came along just in time to save us.” — Roger Smith, 1980

The car company could have bought Toyota for the $45 billion it wasted trying to implement robotics to compete with them. The need for better management was not fixed by new technology or tools. The data was lost on groups unable to interpret and respond correctly.

Serious organizational change is what Paller is really calling for, which includes training, to increase productivity. A compliance manager who is lacks the skill to assess a control should be no more welcome than a financial audit manager unable to perform arithmetic.

However, given his argument that FISMA slowed down security by over-emphasizing writing and reporting, how does adding more data and more reporting with real-time technology feeds make things better? The question thus should not be about refocusing on security (one view) versus compliance (shared view requiring agreement). Compliance is still required. The question is who is trained and qualified today to manage security in a manner that is compliant. How many security professionals, in other words, are not only technically savvy but ready and able to manage compliance reporting for a large enterprise?

Krugman on Risk and Data Analysis

Paul Krugman gives his explanation of why people choose not to act despite data showing risk.

So it wasn’t the science, the scientists, or the economics that killed action on climate change. What was it?

The answer is, the usual suspects: greed and cowardice.

If you want to understand opposition to climate action, follow the money. The economy as a whole wouldn’t be significantly hurt if we put a price on carbon, but certain industries — above all, the coal and oil industries — would. And those industries have mounted a huge disinformation campaign to protect their bottom lines.

Thomas Friedman gives a very concrete security example in his analysis of the American paralysis to regulate the coal and oil industries.

Making our country more energy efficient is not some green feel-good thing. Retired Brig. Gen. Steve Anderson, who was Gen. David Petraeus’s senior logistician in Iraq, e-mailed to say that “over 1,000 Americans have been killed in Iraq and Afghanistan hauling fuel to air-condition tents and buildings. If our military would simply insulate their structures, it would save billions of dollars and, more importantly, save lives of truck drivers and escorts. … And will take lots of big fuel trucks (a k a Taliban Targets) off the road, expediting the end of the conflict.”

Friedman then comes to the same conclusion as Krugman

I have a much simpler but plausible ‘conspiracy theory’: the fossil energy companies, driven by the need to protect hundreds of billions of dollars of profits, encourage obfuscation of the inconvenient scientific results. I, for one, admire them for their P.R. skills, while wondering, as always: “Have they no grandchildren?”