Comments
US Military Officials, Defense Firms Targeted In 'Operation Pawn Storm'
Newest First  |  Oldest First  |  Threaded View
Robert McDougal
50%
50%
Robert McDougal,
User Rank: Ninja
10/27/2014 | 1:41:20 PM
Re: Data Nationalism
I will be honest with you, I am surprised that we haven't responded militarily yet.  China and Russia are both outright robbing us in broad daylight.  
securityaffairs
50%
50%
securityaffairs,
User Rank: Ninja
10/27/2014 | 7:02:34 AM
Re: Data Nationalism
Hi Thomas, are you referring to a proactive defense or what else?

Thanks Pierluigi
Thomas Claburn
50%
50%
Thomas Claburn,
User Rank: Ninja
10/24/2014 | 6:16:18 PM
Re: Data Nationalism
Well, if hacking gets really bad, there's no reason it couldn't prompt a military response. I expect that will happen sooner or later, if only to send a message.
SgS125
50%
50%
SgS125,
User Rank: Ninja
10/24/2014 | 4:24:03 PM
Re: Data Nationalism
It is time for us to limit the access these criminals have to our "free" resources.  Why do we allow anyone from the former Russian empire any access to our Internet resources?  They all seem to be criminals who can't be found or are protected by their Governments.  I suspect we like to have an open Internet because our "whitehat" boys in DHS like to hack back and get what they can as well.  From my perspective I say lets just shut off the pipe and control the access.  What value do the web resources of the "unfree" world offer us in America anyway?

 

Sure they can buy a server here and have at it, but once discovered we can at least shut it down.  Maybe we could even find them easier?

 
lancop
50%
50%
lancop,
User Rank: Apprentice
10/24/2014 | 1:33:06 PM
The internet has become such a threat platform that one wonders...
The problem with the "Information Economy" is that stealing information has become trivial for those with the resources to do it professionally, and the real economy, the capability to use what was once proprietary information to manufacture real things, has been outsourced to emerging market countries by the Wall Street Consensus. That means that emerging market countries, like China, are increasingly poised to become the new epicenter of the Global Supply Chain and older industrial countries are becoming less & less relevant to a globalized 21st century economy except as consumers. Add to this the beefing up of military capabilities and the increasing confidence in using newly acquired weapons technologies in projecting national political power, and you have a guaranteed recipe for international conflicts in both the geo-political & economic spheres over the decades ahead. Yes, it is time to re-think how we connect critical IT infrastructure to a globalized, increasingly insecure internet infrastructure that is disempowering our own society by making it trivially easy for our competitors & adversaries alike to simply steal our intellectual property, undermine our militiary security and leech off of our economic prosperity. It often appears that we are suffering from "too much connectivity" and all this connectivity is not actually improving our way of life, but simply distracting us from those things that are really important. We're increasingly vulnerable because of feature creep that opens up more & more of our life to remote hacking, while merely delivering the appearance of "cool" innovations that marketers love as selling points but security personnel realize are actually new security holes big enough to drive a truck bomb thru. More & more I see the Information Economy as resembling the Subprime Mortgage Bond Market: just another misbegotten child of the Wolves of Wall Street - always looking for something to hype, sell and walk quickly away from when it turns out to be just smoke & mirrors. But it is likely that we have way too much momentum behind this Information Economy B.S., so I expect that we will crash into the economic slowdown ahead while text messaging.
Kelly Jackson Higgins
50%
50%
Kelly Jackson Higgins,
User Rank: Strategist
10/24/2014 | 10:47:24 AM
Re: Data Nationalism
You raise a debate that has been raging in other nations, @Chrisitan Bryant. Your thoughts on this are provocative, for sure. I'd love to hear what other readers think about this. Let's debate!
Christian Bryant
50%
50%
Christian Bryant,
User Rank: Ninja
10/24/2014 | 3:28:49 AM
Data Nationalism
You might be surprised to hear me talk about a solution to issues like this from a perspective of data nationalism, being a GNU software user and Free Software Foundation supporter.  However, I am also about solutions to problems, and advanced forms of data nationalism are a direct approach to ending these types of network attacks and remote data breeches that cross continents.

The "world wide" web as we know it has reached its end, anyway.  It's time, as security analysts, to put on the tinfoil hats and take a few doses of paranoia.  First, access to the Internet is a service already, so start treating it more like one.  Federate the Internet (US, China, Canada, Brazil, etc.) and write interfaces between each unique instance of Internet ecosystems that cost money to access; expensive access, at that.

Once global networks and Internet providers are fractured and new standards and protocols are put in place to keep everyone with once open access out, hacking threats from other countries will initially be zero.  Of course, over time, the same hackers we worried about before will figure out ways to get in; however, now the pipe will be a single entry point and a small one, at that.  We can more easily monitor and prevent intrusion from non-USA would-be hackers.

Companies like Google and Facebook - who federated Internet supporters initially worried would never support such initiatives - could actually stand to benefit greatly from such changes, being able to demand high costs of countries like China and the EU whose users will want access to American Facebook and G+ users.  

It's another one of those tough decisions and unpopular ideas that holds incredible opportunity for control and security overall for American Internet-based companies and Government agencies and resources, but whose implementation just plain scares too many people.  It may be time to get over the fear.


6 Ways Greed Has a Negative Effect on Cybersecurity
Joshua Goldfarb, Co-founder & Chief Product Officer, IDRRA ,  6/11/2018
Weaponizing IPv6 to Bypass IPv4 Security
John Anderson, Principal Security Consultant, Trustwave Spiderlabs,  6/12/2018
'Shift Left' & the Connected Car
Rohit Sethi, COO of Security Compass,  6/12/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-12026
PUBLISHED: 2018-06-17
During the spawning of a malicious Passenger-managed application, SpawningKit in Phusion Passenger 5.3.x before 5.3.2 allows such applications to replace key files or directories in the spawning communication directory with symlinks. This then could result in arbitrary reads and writes, which in tur...
CVE-2018-12027
PUBLISHED: 2018-06-17
An Insecure Permissions vulnerability in SpawningKit in Phusion Passenger 5.3.x before 5.3.2 causes information disclosure in the following situation: given a Passenger-spawned application process that reports that it listens on a certain Unix domain socket, if any of the parent directories of said ...
CVE-2018-12028
PUBLISHED: 2018-06-17
An Incorrect Access Control vulnerability in SpawningKit in Phusion Passenger 5.3.x before 5.3.2 allows a Passenger-managed malicious application, upon spawning a child process, to report an arbitrary different PID back to Passenger's process manager. If the malicious application then generates an e...
CVE-2018-12029
PUBLISHED: 2018-06-17
A race condition in the nginx module in Phusion Passenger 3.x through 5.x before 5.3.2 allows local escalation of privileges when a non-standard passenger_instance_registry_dir with insufficiently strict permissions is configured. Replacing a file with a symlink after the file was created, but befor...
CVE-2018-12071
PUBLISHED: 2018-06-17
A Session Fixation issue exists in CodeIgniter before 3.1.9 because session.use_strict_mode in the Session Library was mishandled.