Category Archives: Security

Organic White House angers MACA

La Vida Locavore points out a pointed letter from the Mid America CropLife Association (MACA) to the First Lady:

Did you hear the news? The White House is planning to have an “organic” garden on the grounds to provide fresh fruits and vegetables for the Obama’s and their guests. While a garden is a great idea, the thought of it being organic made Janet Braun, CropLife Ambassador Coordinator and I shudder. As a result, we sent a letter encouraging them to consider using crop protection products and to recognize the importance of agriculture to the entire U.S. economy. Read below for the entire letter.

MACA practically begs the First Lady to stop being organic, but their argument strays far away from organic issues and across a vast plain of technology. They mention everything from soil erosion and infrared weed detectors to four-wheel-drive tractors and GPS-enabled pesticide sprayers. Last time I checked, using a four-wheel drive tractor with high horsepower does not make a garden less organic. Likewise an infrared detector is surely acceptable. So what’s their beef? The “War of the Weeds” presentation on the maca.org site has fun facts like these:

Q: How many teens would it take to replace herbicides?
A: 220 million acres = 4 acres per teenager = 55 million!

So each teenager could kill 4 acres of weed (pun not intended). Apparently that’s based on data from the 1950s in Minnesota and North Dakota, when a program was started to keep kids from getting into trouble. I wonder if anyone considered this when they drafted the stimulus package.

MACA also takes a couple shots at California for requesting a hand weeding exemption. They argue hoes are less dangerous to your back than using your hand (er, pun not intended) and they say California organic growers claimed crop and profit loss if they were unable to use hand weeding. In fact, they say “hand weeding more dangerous to back than short handled hoe”. If I remember correctly, California actually banned the short-handled hoe in 1975 and then all short-handled tools in 1978 after employers tried to get around the original ban by using things other than hoes such as knives. Then in 2004 California banned hand-weeding after a long debate on how to close the loop-hole left by the 1978 rules. The state thus established protection for farm workers from back-breaking work, but also allowed options for organic growers to weed manually. A quick check of the California Code of Regulations, Title 8, Section 3456. Hand-Held Tools gives details:

(b) The use of a short-handled hoe or any other short-handled hand tool is prohibited in agricultural operations, as that term is defined in Section 3437, for weeding, thinning or hot-capping when such hoe or short-handled hand tool is used in a stooped, kneeling or squatting position. A long-handled hand tool used for these operations shall not be used as a short-handled hand tool in a stooped, kneeling or squatting position.

(c)(1) Hand weeding, hand thinning, and hand hot-capping in a stooped, kneeling or squatting position shall not be permitted in agricultural operations as defined in Section 3437, unless there is no readily available, reasonable alternative means of performing the work that is suitable and appropriate to the production of the agricultural or horticultural commodity.

(2) Upon inquiry made by the Division of Occupational Safety and Health personnel, the employer shall bear the burden of justifying that the use of hand weeding, hand thinning, or hand hot-capping was required due to the unsuitability of the use of a long-handled tool or other alternative means of performing the work.

This says to me that short-handled or long-handled tools can not be used when they are used in an unhealthy position, and hands also may not be used unless there is no alternative method found. Employers have to demonstrate their requirements, but most will fall out of regulation if they use nurseries or systems with plants less than 2-inches apart. Thus the MACA presentation seems to paint a somewhat deceptive anti-organic picture, which goes right back to their rambling letter to the White House. It seems to me they would rather express a passion against changes to their world rather than any coherent or logical argument with facts relevant to the issue at hand (pun not intended).

Social Media Breeding Extreme Right Wing in America

Crooks and Liars provides an emerging portrait of Richard Poplawski: a white-supremacist radical

Thanks to some sleuth work on the Internet, we’re starting to learn more about Richard Poplawski, the 23-year-old who killed three police officers yesterday in Pittsburgh, evidently out of fear that his guns were going to be taken away.

It appears that what police may be looking at is a budding white supremacist who frequented one of the most popular neo-Nazi websites and harbored an apocalyptic dread of the federal government.

The Anti-Defamation League provides an in-depth review:

Following the Super Bowl victory of the Pittsburgh Steelers in early February 2009, Poplawski used the celebrations that occurred in Pittsburgh as an opportunity to “survey police procedure in an unrestful environment,” and reported the results of his reconnaissance to fellow Stormfronters. “It was just creepy seeing busses [sic] put into action by authorities, as if they were ready to transport busloads of Steeler fans to 645 FEMA drive if necessary.”

This last comment was a reference to popular right-wing conspiracy theories about Federal Emergency Management Agency (FEMA)-constructed prisons and concentration camps for U.S. citizens. Such conspiracy theories had long been staples of the militia movement, but received a reinvigorating shot in the arm following the election of Barack Obama as president. Almost overnight, right-wing conspiracists across the country revived all of their 1990s militia conspiracy theories about the “New World Order,” planned gun confiscations, and government plots against the citizenry. Once more, wild speculations about SHTF (“s–t hits the fan”) and TEOTWAKI (“the end of the world as we know it”) scenarios became rampant.

Although it is easy to get distracted by political affiliations (some bristle at the Missouri warning, which included third party bumper stickers as a clue) there are probably more clear indicators of unlawful and dangerous intent.

As early as November 2008, he inquired on a Pennsylvania firearms discussion forum about the legality of sawed off shotguns and mentioned that he had purchased body armor from a friend. In February, he posted to the same forum that “a group of friends and I are considering purchasing a lot of military surplus rifles.”

It is hard to process the situation and imagine what the two officers were thinking when they were invited by a woman to enter her home and confront her son, a violent and extreme right-wing youth with a troubled past including failure in military training.

Four months of online activity after November of 2008 indicate he was sliding from violent tendencies to paranoia and hatred.

By March 2009, Poplawski apparently felt himself at a crossroads of sorts. In his longest and most revealing post on Stormfront, Poplawski confirmed his belief that Jews controlled the U.S. government and his conviction that some sort of collapse of the “economic and social order” of the United States was inevitable, “poisoned by design by the moral decadence that is a direct byproduct of [Jewish control].”

The challenge is to identify these misguided and delusional threats and isolate them as individuals who need help, without restricting or scaring the groups they join that are itching for a reason to fight. That seems to be what the US DHS intended with their April 7th report, available here. From a historical perspective unemployed young men have always been an issue for countries in economic slump. The current American climate has veterans returning to no jobs while huge spending bills float through to special interests. The susceptibility of these young trained men to extremist groups is the topic, and the question is how to predict when rational, slow anger might be provoked into violent action and against whom. A January report by the DHS profiled the threat from left-wing extremists. Apparently both reports were initiated under the Bush administration.

Verizon 2009 Data Breach Report

Verizon has released their 2009 Data Breach Investigations Report. Perhaps someone can recommend a new name for next year so we don’t have to say “did you see DBIR?” This is pronounced “Da Bear” and seems to start all kinds of references to Chicago sports.

Back to the point, the numbers are up, as most security professionals probably already knew and expected:

The percentage of breaches in our caseload involving financial service organizations, targeted attacks, and customized malware all doubled in 2008. It’s sure to win me the “Captain Obvious Award” from the Securitymetrics list, but organized crime activity increased and was responsible for over 90% of the 285 million records compromised. The scales continue to tilt more and more toward servers and applications as the point of compromise.

Here are some key points I noted:

Verizon continues to maintain a vast majority (74%) of data breaches originate from external sources, yet the “involved multiple parties” category grew nearly 10%.

Almost all (98%) of the breaches were related to a misconfiguration (mistake), hacking, or malware installed to collect data. Speaking of mistakes, I have to point out Figure 11 on page 15:

Oh, well. Nothing like a mistake within a report on mistakes.

More seriously, there is significant growth in the malware development community. You might say this is an obvious trend in an industry where writing malware now generates large amounts of cash. Nine out of ten records exposed are due to malware and yet only one-third of incidents involved malware.

Default credentials (third-party remote access) and application-level attacks on the database were the most effective attack vectors used to place the malware. This makes sense if the systems with data are still targeted. If those systems become more secure, then I suspect the attacks will come more through phishing, attachments and other social engineering efforts. Right now, however, malware is installed by the attackers themselves 90% of the time. Keyloggers and spyware are the most common, followed by backdoor/shell, and then capture/store data software.

Note that a small percentage of attacks (17%) considered to be “highly difficult” accounted for nearly all (95%) of the records breached.

The large number of breaches and exposure of cardholder data seems to be having an effect on economics of the underground:

…market saturation has driven the price down to a point where magnetic-stripe information is close to worthless. The value associated with selling stolen credit card data have dropped from between $10 and $16 per record in mid-2007 to less than $0.50 per record today.

Verizon says this comes from data collected by their underground intelligence operations. I wonder why do they call it underground. Intelligence operations would have the same meaning, but maybe they want to distinguish themselves as dedicated to monitoring only the underground as opposed to law-abiding citizens.

PIN data is now highly targeted, and has many issuers scratching their head, as we know from the RBS Worldpay, Citibank/7-11 and related cases. Verizon suggests this is a natural evolution based on the deflated value of cards and higher value of PINs.

The higher value commanded by PIN data has spawned a cycle of innovation in attack methodologies. Criminals have reengineered their processes and developed new tools—such as memory-scraping malware—to steal this valuable commodity. This has led to the successful execution of complex attack strategies previously thought to be only theoretically possible.

This is an interesting problem. Either security has failed to the point where cardholder data has flooded the market, driving down prices and thus forcing criminals to seek more valuable data such as PIN…or security has worked on cardholder data and so criminals have had to shift to PIN data to steal money/goods.

Two-thirds of the breaches were never publicly reported, but are included in the study:

At the time of this writing, about a third of the breaches investigated by our team last year are publicly disclosed. More, especially those toward the end of the year, are likely to follow. Others will likely remain unknown to the world as they do not fall under any legal disclosure requirements.

Oh, this is just begging regulators to start investigating and to create more laws. Two-thirds is a high percentage to call an official breach yet never disclose.

Unlike the datalossdb.org information, Verizon says 31% of breaches were in retail and 30% were in financial services. The latter is said to have doubled its percentage since last year. Does this reflect Verizon’s customer profile more than neutral market data?

The increase of data breaches in the financial sector is indicative of recent trends in cybercriminal activity highlighted in the “State of Cybercrime” section. As will be discussed throughout this report, financial services firms were singled out and fell victim to some very determined, very sophisticated, and—unfortunately—very successful attacks in 2008. This industry accounted for 93 percent of the over 285 million records compromised. This finding reflects a few very large breaches investigated by our IR team in the past year.

That says both the financial sector was targeted more in the shift-to-PIN trend mentioned above, and financial services breaches are large, but also that it was who Verizon worked with more often. I think another way of saying this is that retailers represented the breach when it targeted acquiring banks, but issuing banks are categorized as financial services, so issuers are officially sharing in the 60% of all breaches landscape. The other 40% of breaches seem to be related to travel and products.

Insider breaches, although lower in frequency (11%), appear to expose more records per incident (100,000 median) than external breaches (43% with a median of almost 40,000). With that in mind, total records exposed by only external sources was more than two hundred times greater (267mil) than only internal sources (1.3mil). This is due to the average of external source breaches running nearly 6mil. Verizon takes this, tries to characterize it in terms of likelihood and impact, and concludes that things are “exactly opposite” from prior years:

The threats are said to be predominantly from East Europe and East Asia. If you include North America, you have 82% of all attack sources, although a large majority of investigations stopped with an IP and never assigned geographic data. Likewise, attacks are usually not traced to a specific entity but about 20 percent still were found to be known organized crime.

Insider attacks came as often a regular user as an administrator. I say this does not bode well for administrators, although Verizon seems to think they are proving why we should not “infer administrators acted more deliberately and maliciously”. Administrator attacks should be assumed much lower than user, if you ask me, but maybe that’s because I still think of administrators as those you would hold to a higher standard before giving them access. A user could be anyone. In any case, delays in shutting down access were said to be the attack vector.

Verizon says the vast majority of attacks are at the application level. Yet, for all the noise on cross site scripting attacks in recent years, the data shows that default credentials are still by far the biggest problem, followed by SQL attacks. XSS is barely even on the charts. This is echoed by the fact that breaches that exploited known vulnerabilities involved patches available for more than a year. The data provided makes it look as though if you can patch within six months, you would not appear in the Verizon report. Perhaps most dramatic is the claim that they saw only one wireless exploit for all of 2008.

I thought it interesting that the highest percentage of breaches by software was split 30/30 between POS and DB with application servers at 12%, yet percentage of total records was split 75/19 between DB and application servers. Thus, POS were often breached but only accounted for 6% of all records. This makes sense as the POS should be wiped of data immediately after authorization and only hold a small subset of transactions. Web servers, just to make a point, were ten percent of all breaches but disclosed 0.004% of records. Begs the question of why it was not 0%, since web servers do not store data. This also makes me question Verizon’s claim that “Our data set…is comprised only of incidents in which an actual breach occurred.” Laptops account for 4% of breaches and have 0.000% of records. Why are laptops included then?

The unknowns section actually surprised me. I thought unknown assets were a frequent problem, such as in the FAA breach. However, Verizon suggests unknown data is a bigger issue, followed by unknown privileges and then connections. In other words, people know they have an asset, but usually do not know it has regulated data, often do not know what accounts have access, and sometimes do not know who can connect to it.

Another surprise was this comment:

In the large majority of cases, it was the lax security practices of the third party that allowed the attack. It should not come as a surprise that organizations frequently lack measures to provide visibility and accountability for partner-facing systems.

Lack measures or lack incentive? My experiences have always been that IT organizations love to assume third party systems will take care of themselves even when they known it not to be the case. This is like a form of liability transfer with no documentation. When the chips are down, this continues with people claiming the third party should have known, done a better job, and so forth. The job of the security organization is often to point out that third parties and partners are not doing anything they said they would, or haven’t a clue with regard to risk, and to try and find someone who will take responsibility for the relationship. This latter step is often the core issue. Many regulators are getting wise to this ruse and assigning a formal liability statement to those who use partners, so ambiguity and excuses will be less convenient. For example the ARRA/HITECH of 2009 clamped HIPAA rules directly onto treatment of business associates, whereas before HIPAA only applied to regulated entities themselves.

The recommendations seem straightforward, but perhaps they could have organized it by PCI priority/requirement instead of creating a new list. I mean they do not even mention removing data, which is clearly an essential step to avoiding a breach:

1. Changing default credentials is key
2. Avoid shared credentials
3. User account review
4. Application testing and code review
5. Smarter patch management strategies
6. Human resources termination procedures
7. Enable application logs and monitor them
8. Define “suspicious” and “anomalous” (then look for whatever “it” is)

Finally, there is interesting data on the timing relative to breach and discovery. Rather than comment here I’ll likely do a webinar dedicated to this topic in the near future, as well as expand on the other comments above.

Flying on Algae

Spiegel Online interviewed a Boeing executive who says Algae Could ‘Supply Entire World with Aviation Fuel’

SPIEGEL ONLINE: One of the major points of concern is land use. Take, for example, jatropha, one possible source of biofuels. How many square kilometres of that plant would actually be necessary to fuel a flight over the Atlantic Ocean?

Glover: Good question, I never figured it out that way. We really do not expect that all of the world’s flights will be fuelled by jatropha plants exclusively.

SPIEGEL ONLINE: Than let us talk about algae. How big do these cultures need to be?

Glover: The optimists say, to supply the entire world with aviation fuel, you would perhaps need an area of the size of Belgium. We still need quite a bit of research and development work to really determine whether that is possible. So far, we are very pleasantly surprised by the innovation and the progress.

That is about 12,000 square miles (31,000 sq km) or about the size of the US state of Maryland, which seems like a tiny space in order to fuel all air transportation. I wonder how much total space is dedicated to coal and oil. The Sahara Desert is 8.6 million sq km so there is plenty of room available for such a scheme in a place no one will notice, another nice thing about biofuel compared with oil and coal. This also reminds me of the argument that solar panels in only 0.3 percent of the desert could meet all of Europe’s energy needs.