Category Archives: Sailing

Chinese Attacks Raise Concerns

Let’s just get out of the way that there are many examples of wrongdoing by Chinese nationals. Take today’s clash with South Korea, for example:

A South Korean coastguard commando has been stabbed to death and another injured by Chinese fishermen detained for illegal fishing in the Yellow Sea.

Some might look at this story and say it’s an isolated example. Maybe we even can agree that these few fishermen, a tiny fraction of the total number of Chinese on the Yellow Sea, are the ones who do most of the damage. I phrase it that way because of a story I noticed today by the Associated Press: “A Few Chinese Hacker Teams Do Most US Data Theft

As few as 12 different Chinese groups, largely backed or directed by the government there, do the bulk of the China-based cyberattacks stealing critical data from U.S. companies and government agencies, according to U.S. cybersecurity analysts and experts.

This should be good news, right? Only 12 groups in China? Does that equate to something like 0.0001 percent of all the different Chinese groups?

I guess you could say “largely backed or directed by the government” is supposed to add an element of legitimacy, but anyone familiar with China knows that everyone there still is largely backed or directed by the government.

Now here’s the bad news. Despite the tiny number of suspects, officials in the U.S. are not hopeful that they can prove anyone in China actually guilty.

It is largely impossible for the U.S. to prosecute hackers in China, since it requires reciprocal agreements between the two countries, and it is always difficult to provide ironclad proof that the hacking came from specific people.

Always difficult to provide “ironclad proof”? They say it like it is a bad thing. Even if we accept that China has a small number of suspects and that it is always difficult to prove someone guilty I don’t follow the logic to the next part of the article. Enter the U.S. military:

“Right now we have the worst of worlds,” said [James Cartwright, a retired Marine general and former vice chairman of the Joint Chiefs of Staff]. “If you want to attack me you can do it all you want, because I can’t do anything about it. It’s risk free, and you’re willing to take almost any risk to come after me.”

The U.S., he said, “needs to say, if you come after me, I’m going to find you, I’m going to do something about it. It will be proportional, but I’m going to do something … and if you’re hiding in a third country, I’m going to tell that country you’re there, if they don’t stop you from doing it, I’m going to come and get you.”

First of all, this is a deterrence model, which I covered in my Dr. Stuxlove presentation based on the Dr. Strangelove movie by Stanley Kubrick. Deterrence is known to be far from a slam-dunk security strategy. It can create risks of its own which are larger and even much worse than the original threat of attack.

Second, he lost me at the “I’m going to find you”. If it is impossible to prove guilt in the first place then who are they going to find and threaten, people who aren’t proven guilty? I know it’s frustrating to follow loose threads but saying “I’m going to come and get you” can actually create a game in itself, as anyone familiar with Smurf attacks will remember. Someone could purposefully stage attacks to kick-off a premature and misguided escalation (i.e. back to the plot of Dr. Strangelove). The fix to Smurf redirects, incidentally (pun not intended), was not to threaten everyone with massive retaliation but to reduce risk through immunization that prevented the forwarding/relaying of attacks.

Back to the article, I noticed another strange comment that might be driven by an unfamiliarity with Chinese culture.

One of the analysts said investigations show that the dozen or so Chinese teams appear to get “taskings”, or orders, to go after specific technologies or companies within a particular industry. At times, two or more of the teams appear to get the same shopping list, and compete to be the first to get it, or the one with the greatest haul.

Motivated by what? It is tempting to say a paradigm of competition is a universal hacking mantra; perhaps the Chinese are now emulating the American system of competition. Again, however, it sounds very unlike Chinese philosophies and writing, such as the vision of success through following orders and looking backwards, as expressed in The Way of Lao Tzu.

I have three treasures. Guard and keep them.
     The first is deep love.
     The second is frugality,
     And the third is not to dare to be ahead of the world.
Because of deep love, one is courageous.
Because of frugality, one is generous.
Because of not daring to be ahead of the world,
One becomes the leader of the world.

I also am curious about who really believes it makes sense for China to hold a competition of only two groups out of twelve. If China has almost unlimited human resources, and can launch attacks “risk free”, why would they hold such tiny attack competitions? Why hold back? There must be some risk or there would be far more than twelve groups..if you add up all the arguments in the article, it really does not make much sense.

In any case, perhaps it helps some to compare the twelve groups in the AP article to the nine evil fishermen of the Yellow Sea. Always proceed with caution in building a response so as not to lose control of the situation. The risk of ruthless and underhanded attack has to be factored when investigating and responding to breaches; death of the South Korean commando is tragic. At the same time an opportunity to approach and win insider support from any/all remaining Chinese groups, the ones not attacking, should not be overlooked or underestimated.

Emperor Penguin Endangered

The Center for Biological Diversity today announced a formal petition to the U.S. government to protect the emperor penguin with the Endangered Species Act

In 2006, the Center filed a petition to list 12 penguin species as threatened or endangered. The Interior Department conducted status reviews for 10 of those species. After delays and ultimately a court order, the agency protected seven species but denied protection for the remaining ones, including the emperor. Today’s petition presents new scientific information demonstrating that emperor penguins are imperiled.

[…]

Listing under the Endangered Species Act would provide broad protection to these penguins, including a requirement that federal agencies ensure that any action carried out, authorized or funded by the U.S. government will not “jeopardize the continued existence” of the penguin species. For example, if penguins are listed, future approval of fishing permits for U.S.-flagged vessels operating on the high seas would require analysis and minimization of impacts on the listed penguins. The Act also has an important role to play in reducing greenhouse gas pollution by compelling federal agencies to look at the impact of the emissions generated by their activities on listed species.

BayThreat 2011: Sharpening the Axe

I will be presenting “Sharpening the Axe – How to Chop Down a Cloud” at BayThreat 2011

…the 2nd annual information security conference in the South Bay at The Hacker Dojo, December 9th, 10th & 11th.

My title is in reference to President Abraham Lincoln who was said to have once quipped:

If I had eight hours to chop down a tree, I’d spend six hours sharpening my axe.

The runner-up quote from Lincoln was

If this is coffee, please bring me some tea; but if this is tea, please bring me some coffee

…but I couldn’t figure out how to make it into a full presentation, let alone a title. Perhaps “if this is cloud, please bring me on-premise; but if this is on-premise, please bring me cloud”?

The axe title works fine, though, and also is in reference to Theseus’ paradox, sometimes known as the Ship of Theseus or my grandfather’s axe, which seems appropriate given this year’s badge.

At BayThreat this year, we’re giving attendees circuit board badges. These badges are plain boards to start, but on Sunday we will have a soldering workshop where everyone can work on their badges. We will have kits available for the badge.

The presentation is based on some of the material you will find in my new book soon to be published by Wiley on security in virtual environments. Hope to see you there.

BayThreat

USCG seizes squid boat after failed identity test

News from the waters near Alaska. A large fishing boat about 3,000 miles from the coast of Alaska was asked to identify itself was unable to do so. It was seized by the US Coast Guard but not brought to shore because of a rat infestation.

The vessel Bangun Perkasa didn’t have a valid flag state registration, and Coast Guard spokeswoman Lt. Sara Francis said it was seized Sept. 7 as a stateless vessel for allegedly violating U.S. laws.

[…]

…crewmen were trying to dump the net when the Coast Guard boarded the ship about 2,600 miles southwest of Kodiak. The Coast Guard retrieved the net, and then found 30 tons of squid and 30 shark carcasses on board, she said.

Officials did not find proper documentation on board, however.

“No license or permits, and no records of their catch,” Francis said.

The Coast Guard also discovered rats on board.

30 tons of illegal squid! That’s just what they kept on board. Illegal giant drift nets kill huge numbers of fragile marine life so who knows what the true toll was. Whales and turtles are devastated by these boats.

Dumping 10 miles of net like a piece of garbage overboard also is an incredibly malicious maneuver. All that aside I find the most interesting part of this story in the failure to provide a valid certificate and then the failed authentication process.

The ship’s crew initially claimed Indonesia as their flag state.

“When we contacted Indonesia, they said, ‘Nope, not ours,'” Francis said. “They became flagless at that point, and that’s when we seized them.”

Although, in terms of analysis, I also find this part amusing

“Given the catch they had, I would assume they were a squid boat.”

Not a rat boat?