In comments justifying a requested $15 million operating budget increase for fiscal 2011, the Senate Sergeant-at-Arms stressed the need to improve computer security in the face of an extraordinary rise in security “events,” which reported went from 8 million per month in 2008 to 1.6 billion (yes, billion) per month in 2009, and still climbing. The Senate security operations center apparently sees nearly 14 million attempted attacks or other events every day. Managing the IT security for the Senate’s computing and network infrastructure is among the responsibilities of the Sergeant-at-Arms, which also provides a variety of support services to U.S. senators and Senate and committee offices, such as printing, direct mail, audio and video recording studios, and wireless telecommunications services through Verizon, the Senate’s preferred provider. With that kind of increase in attack activity directed at your environment, you’d want more resources too, but it might also be a good time to look at your environment to see if there are any architectural or design characteristics that are contributing to the volume of attacks coming in, particularly including the visibility of Senate network infrastructure to outsiders.
The core computing operations for the Senate Sergeant-at-Arms reside in the Postal Square building in the shadow of Union Station in northeast Washington, DC. From this central location, the Sergeant-at-Arms oversees a wide-area network providing connectivity not only to Senate offices on Capitol Hill, but also to all home-state Senate offices across the country. The computing infrastructure is segregated according to political party, at least since the 2004 incident when Republican Senate staffers allegedly took advantage of the fact that Democratic and Republican files were co-located on the same server to gain unauthorized access to Democratic files. The Senate, like many federal agencies both large and small, does not use network address translation (NAT) and instead assigns IP addresses to its servers from its allocated netblock. Both the primary public-facing Senate web servers (www.senate.gov) and its intranet servers (us.senate.gov) are hosted by the Senate Sergeant-at-Arms, in contrast to the House of Representatives, for example, whose network configuration directs users requesting www.house.gov to edge content servers hosted by Akamai. Even without the use of NAT-ed IP addresses, it is somewhat surprising that the primary IP address for the intranet appears in publicly accessible nameservers, including the sen-dmzp.senate.gov primary nameserver for the senate.gov domain. The simple fact that the intranet server IP address is so publicly accessible makes it far more likely for network probes and attempted intrusions to be launched against the Senate’s internal network.
None of these configuration or network characteristics are new, so they have little explanatory value in getting to the root of the 200-fold increase in a single year in potentially malicious network security activity. It seems likely that the change in administration and, specifically, the change in the political alignment of the Senate coupled with the significance of some of the items it has taken up on its agenda, would serve to heighten its visibility and therefore make the Senate more attractive as a target, whether threats are intended to cause denial of service, disrupt operations, or just call attention to information security weaknesses. In light of the increased demands on security operations personnel, devoting a portion of what amounts to a less than 7 percent budget increase seems unlikely to help the Sergeant-at-Arms really get a handle on its environment. It is possible that by distributing some of the perimeter infrastructure and network computing services more attention could be focused on traffic filtering and intrusion detection and prevention, while also insulating the core support infrastructure for the Senate from potential disruption, data corruption, disclosure, or other loss.
Homeland Security secretary Janet Napolitano emphasized in her keynote speech at the RSA conference last week the need for greater collaboration between the government and private sector in order to effectively address cybersecurity challenges facing the U.S. In what amounted to an open call for participation by the private sector, Napolitano announced DHS’ new National Cybersecurity Awareness Campaign Challenge, an initiative intended to come up with ideas on the best ways to raise security awareness not just among government agencies and private sector organizations, but among the public at large. The reiteration of what has become a consistent theme from administration officials comes amid an intensifying public debate about the state of information security in the U.S. and particularly the country’s ability to protect its critical infrastructure from a major cyberattack. In recent days senior officials from both the current and previous administration have taken sides on the issue of America’s position in the the “cyberwar.” Outspoken former director of national intelligence Michael McConnell’s took to the op-ed pages of the Washington Post last weekend to argue both that our country is engaged in a cyberwar, and that we’re losing. Current administration cyber czar Howard Schmidt responded during an interview with Wired magazine during the RSA conference, declaring “There is no cyberwar.” This debate was sparked to its current level of acrimony in part by the recently conducted Cyber Shock Wave exercise, some observers of which concluded that it exposed significant gaps in preparedness that called into question how effectively the government could respond to a large-scale incident if one occurred.
Leaving the semantic debate about the “cyberwar” aside, what seems unambiguous is the government’s intention to do more to establish and maintain situational awareness of the nation’s critical infrastructure. Given how much of that infrastructure is owned and managed in the private sector, there doesn’t seem to be a feasible approach to improving overall cybersecurity without the private sector playing an integral role. In this context it also seems non-coincidental that the government is giving public notice of its intention to someday provide comprehensive monitoring of all critical infrastructure, not just government networks. The mechanism for this would presumably be the Einstein program, administered by DHS but operated by the National Security Agency (NSA), which has long alarmed privacy advocates concerned about the prospect of the government potentially reading the personal communications of private citizens. Some in the media are now suggesting that cyber-hand-wringing by McConnell and others is really intended to garner public support for the expansion of telecommunications monitoring programs by the government. Whether or not you find this argument convincing, there is a pretty strong precedent in the form of the USA PATRIOT Act for the government using evidence of weaknesses in the national security posture to greatly extend government authority in the name of national security, at the expense of civil liberties and personal privacy rights.
Although it is one of the top-ranked schools in high-performing Montgomery County, Maryland, in the past few months Winston Churchill High School has been more noteworthy for the alleged hacking by students into the school’s grade reporting system, resulting in changes to as many as 54 grades. The investigation into the hacking incident is now a criminal one, and not all the details of the incident have been disclosed, but from what has been reported, several key issues emerge in terms of security practices (or the lack thereof) that may have facilitated the intrusion. These issues at a minimum provide food for thought for other organizations thinking about their own security controls, and they also offer valid points of reference for any organization conducting an assessment of its own computing environment.
The attack scenario described in published media reports suggests that up to 8 students were involved in first capturing teacher passwords to the grading system with the use of a keylogger or similar program contained on a USB drive attached to a school computer. Once the passwords were obtained, the students were able to gain access to the grading system on multiple occasions and make changes to grades. It seems that the students in question had routine authorized access to the computers used to access the grading system, and there is no mention of whether the grading system can be accessed remotely. Looking at the incident from a defense-in-depth perspective, there appear to have been exploitable vulnerabilities at multiple levels, including at least in the physical, platform, application, and user layers, and possibly the network layer as well.
The most positive aspect of this incident appear to be the simple fact that the unauthorized changes were discovered at all, although there is still some question as to how long the changes had been occurring. Subsequent news reports placed the number of teacher gradebooks involved in the unauthorized changes at 35, far more than originally reported. It may be that the student hackers were victims of their own ambition, and if they had changed fewer grades they might have escaped notice, or at least delayed the discovery of the intrusion.
While promoting the release of its Forefront Identity Manager product set during this week’s RSA conference in San Francisco, Microsoft announced its support for a prototype national ID card system in Germany that is designed to allow individual citizens to use a single ID card yet precisely control the personal information disclosed by individuals to the minimum necessary to perform a given function or complete a specific transaction. This is a practical implementation of claims-based identity management principles, which Microsoft (among many others) has been advocating for several years. Even without going to the level of a nationalized identity system, giving users the ability to manage all their identity attributes but limit the disclosure of personal data to just what’s needed is a promising approach within specific industry contexts such as healthcare. The U.S. federal government, through agency-specific initiatives as well as the efforts of the Identity, Credential, and Access Management (ICAM) Subcommittee of the Federal CIO Council, is pushing forward with federated identity management following a user-centric approach using open identity, while continuing to try to address some of the key security and privacy challenges associated with this approach.
Despite the dismissal-as-foolishness that such claims often bring, security start-up vendor InZero Systems is marketing a sort of hardware proxy device that it claims is hackproof.
As featured in an article in the March 8, 2010 issue of Business Week, the device operates using read-only memory and operating system execution, yielding no foothold for malware or other invasive threats to succeed. Users place the InZero device between their own computer and the Internet, presenting a protected outward facing interface while passing safe content through to users. The article likens using the device to using a webcam pointed at another computer to insulate yourself from anything malicious that might be out there. The company cites a fairly impressive list of penetration testers and other expert security evaluators, none of which apparently have been able to compromise the device.