CS 3710

Introduction to Cybersecurity

 

Aaron Bloomfield (aaron@virginia.edu)
@github | |

 

Policy

Challenges

Narrowing our focus

Disclaimer

  • This topic is being presented in a non-partisan way
    • All sources are non-partisan
  • You are going to see that I have a dim view of some (but not all!) of our elected representatives and their ability to get anything done…
  • Sorry if that offends anybody!
    • I hope we don’t have a child of a senator or representative here…

Question…

  • What do you think are the challenges in US cybersecurity policy?

Challenge 1: lack of congressional tech savvy

  • Political leaders are not elected based on their computer science knowledge
    • Some are tech savvy, many are not
  • Consider the recent testimony of Facebook’s Mark Zuckerberg before Congress on April 10, 2018
  • The video on the next slide is 1:00 long (direct link)

direct link

Observations

  • That was Senator Orrin Hatch (Utah) questioning Zuckerberg in April 2018
    • He was then the longest serving senator and was then 84 years old (he retired in 2019)
  • Zuckerberg seemed shocked by the question, and at first didn’t know how to respond
    • His smile after his “we run ads” comment is hilarious…
  • Hatch didn’t seem to understand his response, but just said, “I see”

“It’s a series of tubes!”

  • Consider the late Senator Ted Stevens (Alaska)
    • On June 28, 2006, he was criticizing an amendment that was effectively an early form of net neutrality
    • At that time he was the chair for the Commerce, Science, and Transportation committee
      • The committee in charge of regulating the (US) Internet!
  • I suspect that a staffer was trying to use the “tubes” analogy to explain the Internet to him
  • The video on the next slide is 2:29 long (direct link)

direct link

Observations

  • Memorable quotes from that clip:
    • “What happens to your own personal Internet?”
    • “The Internet provided a new kind of long distance” (telephone service)
    • “An Internet was sent by my staff” [the other day] which “got tangled up by all these things going on the Internet commercially”
    • And, of course, [the Internet] is “not a big truck – it’s a series of tubes” that can be “filled”

Challenge 1: lack of congressional tech savvy

  • Consider the Burr-Feinstein Anti-Encryption Bill from April of 2016
    • It would require tech companies to decrypt any communication upon court order
    • This means that encryption would have to be developed that could be un-encrypted
  • Proper encryption does not work that way!
  • The bill was declared dead in May 2016
  • Sources: 1, 2, 3, 4, etc.

Challenge 2: rapid change in the field

  • This is a challenge for everybody, but especially for those who are not familiar with the field and not keeping up with it
    • In other words, senators and representatives

Challenge 3: slow gov’t response

  • The US gov’t is slow in response to these things
  • Consider the 2015 OMB’s HTTPS-Only Standard directive:
    • All federal gov’t websites had to move from http to https
    • They were given to December 31, 2016 – 18 months later!
    • It takes about 18 minutes to configure Apache with https, and most of that time is waiting for your certificate to be generated and issued

Challenge 4: well funded adversaries

  • Other countries have stepped up their cyberwar capabilities
    • Notably Russia, but also China
  • Many hacks originate from these countries
    • And many of those are from gov’t funded campaigns
  • The US would do this as well, but we aren’t as good at doing so…

Challenge 5: states’ rights

  • From the US Constitution’s Bill of Rights, amendment 10: > The powers not delegated to the United States by the Constitution, nor prohibited by it to the States, are reserved to the States respectively, or to the people
  • The framers of the constitution, not having foreseen computers and cybersecurity, did not, in fact, delegate cyber anything to the US gov’t

Challenge 5: states’ rights

  • Does the federal government still have a role?
    • Yes – the security of the country is still in the federal government’s powers
  • But many other things are not:
    • ISP regulation
    • Election machine security
    • Currently, net neutrality (kinda…)
    • Etc.

Challenge 6: US gov’t working against secure computing

Challenge 7: Who fixes this?

  • Executive branch: the president can issue an executive order
    • They are limited (by design) in their scope
    • Some of this power is relegated to certain departments, such as DHS
  • Legislative branch: let’s face it, they get nothing done, regardless of which party is in power.
  • Judicial branch: they interpret the law, not make it
  • So maybe… the states?
    • But those problems often tend to occur on the state level as well

Challenge 8: lobbying and money in politics

  • SOPA and PIPA from 2012, which were heavily lobbied by the MPAA and the RIAA, would have invalidated DNSSEC
    • We’ll see SOPA, PIPA, and DNSSEC shortly
    • SOPA and PIPA were indefinitely postponed in 2012
  • Some people in congress will adopt any view if enough money is paid to them…

Challenge 9: retaining knowledgeable people

  • In 2018, a typical starting salary for a good CS graduate with a bachelor’s:
    • About $120k in the industry
    • $53k in 2023 with the gov’t – yes, that’s fifty-three
      • A bachelor’s is GS-7 (or lower), calculated in the (very expensive!) DC area
    • Also, the gov’t gives very little vacation to start

Challenge 9: retaining knowledgeable people

Challenge 10: contradictory gov’t response

  • The US supports certain technologies for use by foreign individuals
    • Example: encryption for use by groups subjugated from oppressive regimes
  • … but they don’t want these to be used by US citizens
    • Since one cannot search a properly encrypted device

Challenge 11: repeated gov’t shutdowns

  • The 2018-2019 government shutdown lasted 35 days
  • With skeletal staffs, many gov’t agencies cannot do perform basic cybersecurity procedures
  • Thus, cybersecurity is one of many things being hurt by the shutdown
  • Also, gov’t agencies can’t get new https certificates, so https doesn’t work on many gov’t websites
  • source

Challenge Summary

  1. Lack of congressional tech savvy
  2. Rapid change in the field
  3. Slow government response
  4. Well funded adversaries
  5. States’ rights
  6. US government working against secure computing
  7. Who fixes this?
  8. Lobbying and money in politics
  9. Retaining knowledgable people
  10. Contradictory government response
  11. Repeated government shutdowns

Case Study: SOPA & PIPA

Introduction

  • SOPA = Stop Online Piracy Act (House bill 3261)
  • PIPA = Protect IP Act (Senate Bill 968)
  • Both were promoted in early 2012
  • This presentation focuses on SOPA, but they are pretty similar
  • Much of the content of this presentation (and all the images) comes from the Wikipedia article, as well as the pages linked to from there

Current status

  • SOPA and PIPA were “postponed” in 2012
    • Basically, a way to kill the bill without formally admitting to killing it
    • While these two bills will never become law, Congress does many similar things, which is why this is being discussed
    • Example: The Burr-Feinstein anti-encryption bill of 2016

Hosting user content

  • To date, sites that host user content…
    • Editable pages, such as on Wikipedia
    • User submissions, such as on Reddit
    • User comments, such as on Slashdot (and many other sites)
    • User reviews, such as on Amazon
  • … are not liable for an illegal posting …
    • Here ‘illegal’ means posting of copyrighted material
  • AS LONG AS the site takes the content down when notified in due course

SOPA and such sites

  • Under SOPA, any such site could be taken down for hosting illegal content without giving them the chance to take it down themselves
    • But upon an accusation only; no need for proof!
      • This is contrary to the whole concept of innocent-until-proven-guilty!
  • So one user post could take down an entire domain
  • Many sites would no longer be able to exist: etsy, flickr, vimeo, etc.

More on website take-down

  • Part of the issue is the wording in the bill is vague
  • eWeek stated: > The language of SOPA is so broad, the rules so unconnected to the reality of Internet technology and the penalties so disconnected from the alleged crimes that this bill could effectively kill e-commerce or even normal Internet use.

Users could be held criminally liable

  • It’s fine if you post a Youtube video of yourself
  • But if copyrighted material happens to be in the background…
    • … you left the TV on, for example…
    • … or you had a can of soda on the table…
  • … then you would be criminally liable under SOPA

Effect on pirate websites…

  • Almost none!
  • They just start posting their numeric IP addresses
  • And US law has no jurisdiction outside of the US, so piratebay.org can keep on operating, just like it has since 2003

Background: DNS

  • DNS (Domain Name Service) is what translates “www.cs.virginia.edu” into “128.143.67.11”
    • Computers only use numerical addresses; it’s only us humans that use text-based URLs
  • But how do you know you didn’t get a maliciously corrupted response (called DNS cache poisoning)?

Background: DNSSEC

  • DNSSEC (DNS SECurity) is a hash-based signature confirming that the response received is from a trusted source
    • It (mostly) prevents DNS cache poisoning
  • We will see all this in more detail in the encryption and networks slide sets

SOPA & DNS

  • SOPA provided a legal means to forcibly remove a site from DNS servers if a website was to be removed
    • And using DNS circumvention methods (foreign DNS, for example) would become illegal
  • Such a website would bounce to a different website that states that the original one was taken down per SOPA
    • (the bill sponsor agreed to remove these from the pending bill)

DNS failures…

  • Let’s say you go to amazon.com…
    • They do have user content (reviews) after all!
  • … and you don’t get there because of either:
    • The domain was removed pursuant to SOPA
    • There was DNS cache poisoning
      • i.e., somebody inserted an imposter site for amazon.com
  • How could you tell the difference?
  • Answer: you can’t. They are indistinguishable.

Irony

  • Online censorship circumvention tools are used by many groups in authoritative countries
    • And the US supports these tools - both their development, and financial support of their deployment
  • So the US gov’t would be supporting these tools for non-free countries, but outlawing them for the US

Deep-packet inspection

  • So you manage to bypass this DNS removal
    • By using the IP address directly, by using a foreign DNS, etc.
  • But now ISPs would be required to inspect EACH packet sent to see what website you are going to
    • That means https (and Tor and other network levels of encryption) would be illegal to use!
    • And let’s ignore the immense computational task of checking each IP packet against a (very large and dynamically changing) list
  • Those IP addresses would then be blocked

Deep-packet inspection arms race

  • This will cause people to find circumvention routines (masking the IP addresses, using foreign redirector sites, etc.)
    • As well as counters against the circumvention routines
    • An arms race!
  • Savvy users would be able to circumvent these
    • And the increased surveillance (aimed to catch these savvy users) would fall on the less-savvy users

SOPA & DNSSEC

  • DNSSEC requires browsers (really, application-level software) must continue searching DNS servers until it finds one – possibly overseas – that provides untampered results
  • But this would be illegal under SOPA
  • The attorney general can sue “any entity that knowingly and willfully provides … a product … for the circumvention or bypassing of” removed websites
    • Meaning nobody in the US could provide DNSSEC or use it

Internet protest

  • On Wed, Jan 17, 2012, many sites lodged a protest by blacking out logos, headers, content, etc.
    • Wikipedia, google, reddit, xkcd, the list goes on and on
  • This got significant press, and effectively shut down the bill in it’s current state
  • But the supporters of the bills have strong lobbyists and deep pockets, so they’ll be back…
  • Read here for more info

The bill was killed

  • SOPA and PIPA were “postponed” in 2012
    • Basically, a way to kill the bill without formally admitting to killing it
  • While these two bills will never become law, Congress does many similar things, which is why this is being discussed

A non-US example

  • The EU voted on Sep 12, 2018 for the Internet Copyright Directive
    • “The directive was subject to unprecedented lobbying and has been cited as a success for copyright industries”
  • Controversial parts:
    • A “link tax” that for sharing content that would disproportionally harm small websites
    • Sites with user content would have to “employ automated copyright systems … at the website owner’s expense”
      • This would harm Wikipedia, among others

History

History

1970’s

  • 1977: the GAO recommends “limiting the number of federal employees who can use a computer as a way to prevent network security breaches”
  • 1977: a bill is introduced which tries to define computer crimes
    • it fails to become law

1980’s

  • 1983: FBI raids homes, confiscating computers for the first time
  • 1983: hearings on the 414s and their cyberattacks
  • 1987: Computer Security Act of 1987 is passed, which intended to improve the security of federal computer systems
    • Was not particularly effective, and was repealed in 2002
  • 1988: Morris worm released
  • 1988: In response, CERT/CC is founded at CMU

1990’s

  • Viruses increase in power, and awareness of them increases
  • People start worrying (later panicking) about Y2K
    • Much money is spend by the gov’t and private companies
    • Yet no major disasters!
  • Few additional laws passed regarding cybersecurity
  • 1998: the DMCA passed to attempt to prevent Internet piracy
    • It weakened cybersecurity and research (details)

2000’s

  • 2000: Clinton releases the first cybersecurity strategy which is generally slammed
  • 2000: Various malware raises awareness, and DDOS attacks take down major websites
  • 2002: FISMA which focuses on federal agency information security
  • 2003: The 9/11 attacks spurred the creation of DHS, which created US-CERT based on CERT/CC
  • Decade-long events:
    • Home user’s bandwidth increased dramatically
    • Various laws passed dealing with cybersecurity

2010’s

2020’s

  • A bit too early to see any trends, but…
  • AI, especially generative AI, is going to play a big role in both the attacks and how the policies respond

Presidential Actions

US National Security Strategy

  • Abbreviated herein as “US NSS”
  • By President Trump in December 2017 (online PDF)
  • Has 4 “pillars”, each with multiple parts
    • Pillar I: Protect the American People, the Homeland, and the American Way of Life
    • Pillar II: Promote American Prosperity
    • Pillar III: Preserve Peace through Strength
    • Pillar IV: Achieve American Influence

US NSS: keep us safe

  • Formally, “Keep America Safe in the Cyber Era”
  • Priority actions
    • Identify and Prioritize Risk
    • Build Defensible Government Networks
    • Deter And Disrupt Malicious Cyber Actors
    • Improve Information Sharing and Sensing
    • Deploy Layered Defenses

US NSS: lead in tech

  • Formally, “Lead in Research, Technology, Invention, and Innovation”
  • Priority actions
    • Understand Worldwide Science and Technology (S&T) Trends
    • Attract and Retain Inventors and Innovators
    • Leverage Private Capital and Expertise To Build and Innovate
    • Rapidly Field Inventions and Innovations

US NSS: protect innovation

  • Formally, “Promote and Protect the U.S. National Security Innovation Base”
  • Priority actions
    • Understand the Challenges
    • Protect Intellectual Property
    • Tighten Visa Procedures
    • Protect Data and Underlying Infrastructure

US NSS: renew cyberspace capabilities

  • Formally, “Renew Capabilities: Cyberspace”
  • Priority actions
    • Improve Attribution, Accountability, and Response
    • Enhance Cyber Tools and Expertise
    • Improve Integration and Agility

NIST on enhancing cybersecurity

  • The charge of NIST’s Commission on Enhancing National Cybersecurity: > “[develop] actionable recommendations for securing and growing the digital economy by strengthening cybersecurity in the public and private sectors”
  • Their report listed 6 imperatives

NIST report imperatives

  • Protect, Defend, and Secure Today’s Information Infrastructure and Digital Networks
  • Innovate and Accelerate Investment for the Security and Growth of Digital Networks and the Digital Economy
  • Prepare Consumers to Thrive in a Digital Age
  • Build Cybersecurity Workforce Capabilities
  • Better Equip Government to Function Effectively and Securely in the Digital Age
  • Ensure an Open, Fair, Competitive, and Secure Global Digital Economy

US’s International strategy

  • International Strategy For Cyberspace (online pdf) by President Obama from 2011
  • Seven policy priorities
    • Economy: Promoting International Standards and Innovative, Open Markets
    • Protecting Our Networks: Enhancing Security, Reliability, and Resiliency
    • Law Enforcement: Extending Collaboration and the Rule of Law

US’s International strategy

  • Seven policy priorities, continued
    • Military: Preparing for 21st Century Security Challenges
    • Internet Governance: Promoting Effective and Inclusive Structures
    • International Development: Building Capacity, Security, and Prosperity
    • Internet Freedom: Supporting Fundamental Freedoms and Privacy

The problem with all of these…

  • … is that funding is limited
  • Ultimately significant funding comes from the House of Representatives
    • (yes, the president submits a budget, but the House still has to pass it)
  • Little funding has resulted, for multiple reasons:
    • Lack of understanding of the need
    • Desire to cut the budget, not increase spending
    • Other political priorities

3 letter agencies

Relevant 3 letter agencies

  • CIA: the spies in foreign countries
  • FBI: the equivalent of the US national police
  • DHS: overall homeland security
  • DOE: they control the nuclear arsenal
  • NSA:

Most of these slides deal with the NSA and CIA

Today’s slides…

  • Are an overview of NSA & CIA cybersecurity incidents
  • … are going to generate a wide variety of opinions
  • I have done my best to make them politically neutral
    • If you feel otherwise, please let me know!

Chelsea Manning: 2010

Manning: the reveal

Manning: errors made

  • She was in crisis due to various reasons
    • One of which was morally being opposed to the war
      • She was deployed to Iraq at this time
  • But is all this really avoidable?
  • Ultimately, a person with classified access and morally opposed to a war can do great damage

Manning: current status

  • Sentenced to 35 years (from 2010) in 2013
    • Commuted to 7 years in 2017
    • Released May, 2017
  • Now released from jail, she earns a living via speaking engagements

Edward Snowden: 2013

  • Edward Snowden was a contractor with Booz Allen Hamilton
    • Did work for the CIA and, later, the NSA
    • In 2013, he released information about the [NSA’s global surveillance](https://en.wikipedia.org/wiki/Global_surveillance_disclosures_(2013%E2%80%93present)
  • He now has asylum in Russia
    • Of course Putin got a copy of those documents…

Snowden: overview

Taken together, the [Snowden] revelations have brought to light a global surveillance system that cast off many of its historical restraints after the attacks of Sept. 11, 2001. Secret legal authorities empowered the NSA to sweep in the telephone, Internet and location records of whole populations.

Washington Post, Dec 23, 2013

Snowden: the reveal

  • The US gov’t (NSA) was working on global surveillance
    • Many other (well over a dozen) foreign gov’t agencies were helping by sending surveillance data to the US
    • Most (but not all!) was of non-US citizens

Snowden: the effects

  • Lots of angry people
  • Little effect on surveillance in the long-term
  • Foreign govt’s got lots of heat
    • Most of this is secret anyway, so who would know if it continued?
    • Some foreign gov’ts actually increased their surveillance in some situations (example: Germany)
  • States are doing their own surveillance
    • With little oversight

Snowden: errors made (1/3)

Snowden: errors made (2/3)

  • Snowden obtained the login credentials of 2 dozen employees
    • He claimed he needed them to do his job
    • Problem #2: No enforced policy against giving out login credentials
  • He was able to access lots of information
    • Problem #3: Insufficient compartmentalization of data
    • Granted, only some of the other login credentials could access this…

Snowden: errors made (3/3)

  • He then removed the data from the “secure site”
    • Downloaded? Removed on USB key? Burned CD-ROM / DVD-ROM? Unclear…
    • Problem #4: Data can be removed from “secure sites”
  • Many (but not all!) of these problems were fixed after the Snowden affair

Snowden: current status

  • He has asylum status in Russia
    • And full citizenship
  • He has lots of US arrest warrants out for him…

Shadow brokers: 2016

  • A mysterious group that released many NSA cyberweapons in 2016
    • Name is a reference to the Mass Effect video game
  • Many leaks were zero-day exploits
  • They signed all their messages with PGP

Shadow brokers: the effects

Shadow brokers: the effects

  • A lot more of very powerful cyberweapons available for anybody to download…
  • These weapons were used for the 2019 Baltimore ransomware attack
    • And previously Greenville, NC, which used the same tools

Shadow brokers: whodunit?

  • Nobody knows! (at least publicly)
  • Suspicion has fallen on Harold Martin III, a contractor for Booz Allen Hamilton
    • Yes, the same people as the Snowden leak
    • Was he digitally hoarding or stealing? The NSA still isn’t sure…
  • But it could have been somebody else
    • Possibly an inside job…

Shadow brokers: errors made

Shadow brokers: current status

  • That group exited the stage after the release
    • Likely operating under a different name
  • Martin ultimately agreed to plead guilty to hoarding in January 2018
    • Defense claimed it was a mental condition
    • This is not pleading guilty to releasing the information!

Reality Winner: 2017

Winner: the reveal

Election interference: timeline

  • March 2016: John Podesta, of the Clinton campaign, successfully gets phished
  • Summer 2016: hacked DNC emails released on Wikileaks
  • Fall 2016: Russia blamed for hacking DNC emails and “influencing” the campaign in favor of President Trump
  • June 5, 2017: The Intercept publishes a report on actual hacking of the election
    • Previously it was thought (publicly) to be “influencing” only, not hacking of election machines

Election interference:
the US does it too!

Election interference:
are they equivalent?

  • Some would say yes
  • Here is a non-equivalence:
    • The US / CIA has generally (but not always!) focused on overthrowing authoritarian leaders
    • Russia has generally focused on hurting democratic regimes

Election interference:
errors made

More election interference

  • Russia did it again in 2018
    • By generating discord on social media via highlighting social and economic differences > On August 2, 2018, the Director of National Intelligence … announced along with [the] FBI Director … that Russia is actively interfering in the 2018 elections, saying “It is real. It is ongoing.”
  • Buckle up, it’s going to be interesting…