You are viewing a read-only archive of the Blogs.Harvard network. Learn more.

Archive for the 'rants' Category

The Scenario

ø

First – IANAL. I am a technologist and someone who, unlike most of our elected officials, understands how the Internet works; both under the hood and in practice. That is why I am opposed to measures like SOPA and PIPA which put the power to degrade the Internet into the hands of corporations whose vested interest is not in th betterment of mankind and the freedom of the people of Earth to communicate, but in the profits of their shareholders. Rather than tackle the technical side of the Ineternet vis-a-vis SOPA/PIPA, let me give you a scenario that addresses the practical side.

—-

The Scenario

WEBSITE X has posted a video which is critical of U.S. SENATOR Z and presents evidence of wrong-doing. SENATOR Z is fighting to tamp down any talk of wrong-doing and this video, if people start to find it, could be a huge problem for him. So he sets his people to work on finding a way to downplay or, indeed, silence this annoyance before it goes mainstream. The problem is that WEBSITE X is in Norway.

Aides to SENATOR X point out to him that under the recently passed SOPA and PIPA laws, he can get WEBSITE X shut down, at least for the U.S. users of the Internet, if they can find or manufacture some sort of infringement. After hours of searching, an aide stumbles upon a 30 second clip from Mission Impossible 3 on a WEBSITE X user’s profile.

A representative from the MPAA, suddenly made aware by an ‘anonymous’ tip, cries foul and WEBSITE X is shuttered for U.S. users.

SENATOR X’s problem goes away. WEBSITE X has been silenced. Justice has been… taken into an alley and given a thrashing.

Simplistic? You bet. Plausible? You bet. The motion picture industry in America is something we can, overall, be proud of. (Yes, this bill gives this power to others as well, but the MPAA is its progenitor.) But giving them extra-normal powers and privileges in our laws and with our law enforcement agencies is not something to be proud of. While we love and embrace Hollywood and the entertainment they’ve given us, keep in mind that it is just that: entertainment.

The amount of revenue that they make up in the U.S. economy per year is not only less than the auto industry as a whole, it’s less than just Ford. We will trim far more from the Pentagon’s budget this cycle than their entire industry made in 2011. If my calculations are correct, they account for only a fraction of a percent of our $14.5 trillion economy (I come up with about .005%). yet our government has given them sweeping law enforcement access and is now tailor-making laws for them that infringe on the freedoms of every person who uses the Internet.

That’s not simplistic. That’s a travesty.

The Message

Stop SOPA. Stop PIPA. Intelligent, practical laws are not hastily put together and shoved through session as fast as possible at the behest of those who will benefit most. If the House and Congress want to truly protect intellectual property and curb piracy, they need to listen to those who understand the Internet, not fight against them. If Google and Reddit, two polar opposites in Internet culture, are both opposed to your bill? Your bill is wrong.

The Principle of Least Privilege – A Failure in MA

1

Disclaimer: I am not a lawyer, nor do my opinions represent that of Harvard Physics, Harvard Law or Harvard University. What I am is a computing professional and technologist. A sometimes outraged one. As a result, some of what follows may be a bit snide. I can’t apologize just yet for that. Past the outrage, I’m hoping that something good will come from this incident… although I rather doubt it.

The Incident:
On April 20th, 2011 around 1,500 computers in the Massachusetts labor department’s Departments of Unemployment Assistance (DUA) and Career Services (DCS) were found to be infected with a [allegedly] new variant of a well-known Windows worm (not a virus as has been reported) called W32.Qakbot. From some prior date — they say April 19th, but I don’t find the idea that they know when the initial infection occurred convincing given other facts — until around May 13th (or May 16th, according to another report), information entered or accessed on these machines may have been intercepted by the worm for transmission to an unknown recipient.

The Response:
The Executive Office of Labor and Workforce Development reported this incident on May 17th. That’s 28 days until they notified the public or state officials. Call it four weeks, call it nearly a month, but either way it’s too long and clearly at odds with state law which requires that any such break-in be reported to the Attorney General’s office “as soon as practicable and without unreasonable delay”. There is absolutely no reason this could not have been reported sooner… except, perhaps, incompetence and/or fear. In their official statement it’s claimed that “all possible actions have been taken to minimize the impact to the Commonwealth’s constituents”, but this is clearly in error as “all possible actions” would have included notifying the AG immediately.

And I’m afraid I have to take the Boston Globe to task too. In its report on the incident it said:

“The potential impact of the breach is dwarfed by other recent data thefts. In April, Sony Corp. suffered an attack on several of its networks used by consumers for video gaming, music, and movie downloads. In the same month, Texas e-mail marketing firm Epsilon Data Management LLC reported that hackers had raided its network and stolen the e-mail addresses of millions of US consumers.”

If anything, it’s the other way around. Those other episodes presented a low risk that actual sensitive data was released. The Sony breach, while involving more people, may have included names, email addresses and probably mailing addresses, but these sorts of scraps are something that criminals can often already buy or collect on their own from search engines. The Epsilon breach netted mostly email addresses. In all likelihood, that just means more phishing attempts; Something people are already inundated with unless their email provider is one of the better spam preventers.

But the labor department incident most likely included the transfer of critically sensitive information such as Social Security numbers, financial information, EINs, and work or personal history information. So let me be very clear in exactly what I’m stating. This incursion is more serious than the Sony or Epsilon breaches. It may affect tens or hundreds of thousands of MA residents and potentially thousands of MA businesses and, unlike the Sony breach, which may help identity thieves zero in on a target, the information gleaned from DUA/DCS might make it a trivial matter for thieves to hijack a person’s identity.

The initial response to the media from the labor department was a shrugging ‘Well you know… viruses, right?’ and a clearly implied wish that everyone will just move on and not make a big deal of it. As though virus/worm outbreaks are just part and parcel of having a computer. And some, it seems, including some of the media reporting the issue, are buying this wrong-headed idea. Why? Because… well, because lots of people have PCs and they get viruses all the time, right? Right. And Wrong. And part of the problem. The home computer user’s experience cannot and should not be projected onto the ‘enterprise’ computing environment. Despite the fact that the average PC user and the average business user are both using a boat with Windows written on the side does not mean that the water they sail on is the same.

That sort of thinking is what’s got us where we are. The proliferation of malware (viruses, worms, trojans, etc.) in the world is not a foregone conclusion. It’s not an endemic side-effect of owning a computer. It’s something that has grown and been fostered by a poor understanding of ‘security’, a leaning towards this sort of passive concession that it’s Computer Magic and beyond our ken and… frankly… laziness. That’s been followed up by an industry that’s happy to do the least they can get away with to band-aid the situation and entities who put their head in the sand and think slapping on an anti-virus client is good enough. And the cycle repeats. The only winners are the thieves. They win because a large portion of the United States computing population can’t be bothered to do better.

Let’s talk about particulars. One concept most PC users do not follow but every business PC environment that calls themselves security-conscious should is the ‘Principle of Least Privilege’ aka least-privileged user account (LUA). Given the notoriously malware-prone existence that Windows has lived, a corporate or government support entity who does not subscribe to this principle is just asking for it. The idea is very simple: The end-user should ordinarily be logged in with an account which has the least amount of administrative privilege possible which still allows them to do their work. In other words, require passwords and don’t log in with an administrator account. But… walk into any coffee shop in America and you can wager a safe bet that 80%-90% of the people there are doing just that.

Why is this so important? Why am I bringing it up here? And why do I assume the computers in question didn’t rely on this principle already? Simple: This one action, implementing this one policy, would have stopped the spread of this worm in the DUA/DCS computers. W32.Qakbot cannot extend its infection without the user having certain administrative privileges. And, in my opinion, this principle should not only be encouraged… it should be mandated, especially for computers that come into contact with sensitive information. I know mine are. And how many ‘inevitable’ virus/worm infestations have we dealt with in my tenure as head of this group? Zero.

I’m not saying this to imply that my network is beyond the reach of malicious computer thieves and black hat hackers. No network can ever be 100% secure. But there are certain principles and methodologies well-known and well-documented in annals of computer security that, if followed, reduce your susceptibility by leaps and bounds. But, sadly, many would rather cross their fingers, stick their heads in the sand and hope they get lucky. Well… the law of averages (another name for ‘luck’) is not on their side. Yes, your users will complain that they can’t install software without your help, but they won’t be complaining about a proliferation of viruses and malware. Because, and this is the crux of the whole principle of least privilege, if they can’t install software, malware can’t install itself. The malware only has as much privilege to modify the system as the user does (barring flaws in the operating system – that’s a wholly separate issue that we’ll not get into here). And you, the administrator, control that level of privilege.

Simple. Effective. And… ignored by the average IT outfit as being too ‘burdensome’ on the end-user. Sure, a firewall is the first line of defense when designing your network. But an anti-virus client is not the second defense, it’s the last line of defense. We’re not even concerned yet with what operating system is in the line of fire, much less what software it’s running. The second line of defense in this case is your policies and whether it’s more burdensome to inconvenience the user a little bit… or risk having the whole thing come down on your head like DCA and DCS are now experiencing.

  • If you approach your security policies as merely ‘keeping people out’, you have already failed.
  • If you approach them from the standpoint of ‘let’s assume they’re already in’, you have a chance at success.

So when CNET reports that “The agency is notifying people who may have been affected and is working with the Massachusetts attorney general’s office to investigate the breach”, I sincerely hope that part of the investigation will include looking into what made this possible from inside, not just from outside. Because there’s zero chance they’ll stop the thievery of this information. It’s already in the wild and catching the perpetrators is, now, a secondary concern given that there’s not taking back the damage. But as a MA state resident, right now I care very much about what my state government’s computing security policies are and why they’re not using every proven method available to them to safeguard our information. We have new and very specific laws in MA about how sensitive information can be transmitted, but how it’s stored and maintained by the state is equally as important.

And, as such, I feel that the Executive Office of Labor and Workforce Development has some explaining to do.

State House News Service report: Massachusetts officials disclose data breach in unemployment system
Official response: Executive Office of Labor and Workforce Development Reports…

The Crime Here Is ‘Flagrant Ignorance’

ø

Disclaimer: I am not a lawyer, nor do my opinions represent that of Harvard Law or Harvard University. What I am is a technologist. A very outraged technologist. As a result, some of what follows may be a bit snide. I can’t apologize just yet for that. Past the outrage, I’m thanking the high heavens for the EFF who are tackling the cause of my outrage.

Across town somewhere detective Kevin Christopher contends that his warrant to seize from Boston College student Riccardo Calixte anything “capable of storing digital data in any form” is justified because… well, mostly because he’s been told that Calixte is really good with computers. That can’t be good, right? The laundry list of things to be seized from this “master of his trade” (my, how horrific…) included such cutting edge technology as “zip drive disks”, “optical scanners”, “manuels (sic)” and “firewalls”. The EFF’s motion to quash was denied in District Court (I was quite surprised by this, actually), but that just means that now the Superior Court will have to hear it and, sorry BCPD, that’s even worse for you as it means more publicity.

According to Calixte, the confiscated items also included the Post-it he was writing on at the time to document what was happening. But that’s hearsay, right? Well, much of the ‘evidence’ which led to all this is hearsay as well. And a great deal of what is proffered as ’cause’ is, quite simply, not illegal and/or not tied to any criminal complaint. Specifically:

  • Performing “jail breaks” on a cell phone is not inherently illegal.
  • Calling someone a “hacker” doesn’t make them a criminal.
  • A computer science student who is considered “a master of the trade” is, presumably, the university’s goal (!) Isn’t that why he’s in school? Is a master carpenter also a nefarious n’er-do-well in the eyes of the police?
  • Using more than one operating system doesn’t make you suspicious… it makes you a typical computer science student and, in my book, a fellow traveler (see what I did there?).
  • Sending an email that is libelous or slanderous is a civil issue, not a criminal one. This is a criminal case you’re building.
  • Even if that message was sent anonymously, is that really cause for all this posturing? If the note were stapled to a public bulletin board, would there be some sort of criminal ‘fraud’ investigation? (Fraud? Seriously? That’s your angle? You’re going the ‘MySpace Mom’ route to nail some kid for being a jerk?)
  • If the person in question has supposedly, according to your single source in this un-related ‘crime’ who is also the aggrieved party, downloaded music and/or movies illegally, that’s a civil issue (he’s not being charged or even accused of trafficking, is he?).
  • He’s alleged to have, according to your aggrieved single source in this un-related issue, gotten into the university computers and changed grades — with no evidence whatsoever to support the allegation other than ‘some guy said’ and no inkling of validity from the university whose name is on your badge whether such a crime even exists.
  • And finally, although there are many more such idiotic instances in the documentation that I could go on about, the accused is supposed to have ‘fixed’ other peoples’ computers so that they can’t be scanned by police later for evidence. Can’t detective Christopher call someone in law enforcement (or the closest 14 year old) before putting that in official documents and making himself look even more technologically clueless? Call, for the love of Pete, if for no other reason than to give the computer forensics guys a good laugh at this fantastical magic trick some B.C. student has created despite the incredible improbability of it all.

I’m not saying that I think the Calixte is guilty or is not guilty of the original ‘crime’ (of sending an anonymous email that defamed someone). What I’m saying is “This whole railroading incident reeks of authoritarianism and I don’t want this to happen to me”, detective Christopher. It’s bad policing and it’s worse public policy. You’re setting precedents that could end up making a lot more ‘criminials’ out of otherwise innocent citizens. I use more than two operating systems, including the very much maligned and demonized by the ignorance of this officer, Ubuntu Linux. Am I suspicious now? In fact, our entire back-end infrastructure here runs on this apparently ‘evil’ Linux distro. Detective Christopher’s characterization of it as ‘rare’, much less somehow nefarious in nature, doesn’t hold water, especially on a college campus. In fact, Dell, maker of the frightening “white cover with gray trim” computer seized from the student, offers Ubuntu Linux as an option on many of its machines (and FreeDOS? “Free” DOS? What is this… communist Russia? *gasp*!). A fact any idiot with access to the Internet could suss out in about one minute. Two minutes, tops, if the Dell site is slow. Well, my dad has three sorts of hammers. You better lock him up now for being a seditious carpenter.

Had this been somehow related to mental health, a medical professional would no doubt have been consulted. If an airplane were involved, the FAA or NTSB. If a car were involved, at the very least I’m sure a mechanic would have been consulted. But in this case, detective Christopher seems to think he has a handle on this whole ‘computer’ thing, I assume because he’s touched one and watches television. But anything that’s not in his very narrow technological worldview is seen as suspicious and dark and must be made for nogoodniks. As a result, his cluelessness and inexperience in regards to computer crime is clearly and loudly spelled out in both the warrant and the supporting documentation surrounding the seizure of the student’s property. It’s jack-booted over-kill and it’s the kind of thing we need to stamp out; we can’t just wait until luddites like Christopher die off and are replaced by people who grew up with higher technology. We have to handle this now.

Christopher didn’t know what he was doing and he just did what he wanted because he felt he had the authority. It’s almost like something out of a bad movie (oh, wait, it is…). And to compound the thick-headedness of it all, he actually got a warrant for his flimsy excuse of a ‘probable cause’, thereby extending the trail of incompetence back to the magistrate’s office as well.

If Calixte has done something wrong, he needs to atone for it. But in proportion to the wrong and with law enforcement maintaining the high road of principle and justice. We can’t allow this in our society. This sort of “well meaning” overstepping of authority has no place in the republic that our laws provide for. Used like this, they become the tools of fascism and authoritarianism and that sort of thinking has no business whatsoever in Americas justice, much less a college police unit.

There’s a saying about pointing out a problem but offering no solution. Well, I hereby proffer up the attention of myself or my group (and the promise to enlist others) to help explain or demystify the technology and/or culture surrounding computing and the digital age when needed. Especially if it will help keep travesties like this one from happening. I don’t want to have my house raided because someone doesn’t understand the ‘magic’ of my trade and, scared by it, runs off to get the pitchforks and torches.

If you feel the same, I urge you to donate to the EFF (Electronic Frontier Foundation) — You never know when you might need them — and also to explain to others why this sort of thing isn’t keeping them safe, it’ just moving each of us closer to ‘criminal’ and polluting justice with ignorance.

About

ø

  • Maggie McFee is a technologist and computing engineer who joined Harvard in 2005.
  • In addition to technology, she enjoys comics, video editing & data wrangling and working in her hackerspace building robots and useless gadgets.