Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
President's Plan To Crack Down On Hacking Could Hurt Good Hackers
Newest First  |  Oldest First  |  Threaded View
Wolf6305
50%
50%
Wolf6305,
User Rank: Apprentice
1/23/2015 | 8:09:02 AM
Re: Proponent
Thanks for the voice of agreement.  I think that a small group of people who embrace the concept of leveraging the state legislative process could rather handily create this model.  Practicioners, rather than Security product vendors ought to be pushing the agenda.  Vendors are likely to see everything through the lense of their solution, whether they want to or not.  Legislators who are not trained in security should not be expected to understand the obvious implications of criminalizing the tools.  They don't see it is rather like criminalizing the posession of bricks because it is easy to use a brick to break into a car or building.  Some of the brilliant security researchers I know, are leery of the idea, because

1.) They don't want to take on the job of lobbying and organizing (even if it supports their own interests).  They are busy doing the fun job of security research.

2.) Because they are anti-establishment, they have decided that there is no solution for dim-witted legislators mucking up the water.

I think of this as one of the ultimate social engineering experiments, and a way to hack the parameters of reality as it is currently imagined. 

 
SgS125
100%
0%
SgS125,
User Rank: Ninja
1/22/2015 | 2:09:10 PM
a ticket to ride
Think of it as you would a cissp or other such certification.  Plenty of professionals are willing to test for the certifications needed to land jobs.  I would be happy to have a White Hat/ Ethical hacking license.
Ericka Chickowski
100%
0%
Ericka Chickowski,
User Rank: Moderator
1/22/2015 | 2:03:01 PM
Re: Proponent
I really wonder how well that would fit within the security research community, given its culture? There are a lot of brilliant, ethical and very anti-establishment researchers who would be turned off by the whole process. I'm not sure that kind of mandatory licensing would fly. 
Marilyn Cohodas
100%
0%
Marilyn Cohodas,
User Rank: Strategist
1/22/2015 | 11:12:47 AM
What would work as a national cybersecurity policy?
Certainly not all of the recommendations are bad? Who can object to a 30-day breach disclosure law? 
SgS125
100%
0%
SgS125,
User Rank: Ninja
1/22/2015 | 10:58:04 AM
Re: Proponent
That is an awesome concept!  We should have a license structure like you mention that offers us the ability to do the work we need to do, using the tools that can be used for both good and bad.  Like a locksmith.  Your analogy is spot on!

The concepts in the speech are not yet written into any kind of proposed law change so I can't really comment on how badly the politicians will muck it up.

It is very dangerous for us to trust this group of representatives to deliver comprehensive sensible legislation that does not give groups the right to go overboard on enforcement, or use it to further reduce the privacy of American citizens.

 

 
Ericka Chickowski
50%
50%
Ericka Chickowski,
User Rank: Moderator
1/22/2015 | 10:54:14 AM
Re: Classic failures
GonzSTL: You aren't the only one worked up on this, believe me. J.J. and Jeremaiah are just a subset of lots of security people who feel this is, put politely, misguided policy. But I think there are other choice words going around about it, too. 
Wolf6305
50%
50%
Wolf6305,
User Rank: Apprentice
1/22/2015 | 10:36:31 AM
Re: Proponent
Very true.  We have to look at who benefits from such a law.  There is a law in Germany, I am told, that prohibits a very broadly defined category of "hacking tools."  This has not made anybody any safer.  It will definitely make it harder to do routine security testing.  If the client doesn't like your results, will they get you arrested for felony "Accessing authorized resources in an unauthorized way?" 

People are the answer.  Well-trained security staff, as well as training the rank and file workers to recognize odd behavior and report it.  Actual response-team policy might be a good idea, too. 

In the field of locksmithing, there are states like California that control the tools of the trade, making state licensure a cost of doing business for locksmiths.  IT Security Specialists could start pushing for licenture rules, as well.  The costs need not be high, but the license would be a defense against facing felony arrest because you are doing your job. 
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
1/22/2015 | 10:21:27 AM
Proponent
Behind most detriments to an idea there is a postulated proponent. What does the government believe that instantiating this new verbiage and changing certain cyber security laws/rules will accomplish? Is there a report advocating the changes?
GonzSTL
50%
50%
GonzSTL,
User Rank: Ninja
1/22/2015 | 10:16:57 AM
Classic failures
This is a classic case of politicians operating in a vacuum!

Meanwhile, another change to existing law around "computer and cell phone spying devices" makes it unlawful to manufacture, distribute, possess or advertise "electronic communication intercepting devices." Really? Simply reading those words tell me that my packet sniffer will now be illegal to simply possess. In fact, a broader interpretation could be that your wireless NIC will be illegal because in its attempt to determine if a wireless access point is in service, it "intercepts" a broadcast electronic communication.

"Thompson says it is clear that the proposed law changes were made without much input from the security industry". I realize that an overhaul of existing cybersecurity laws is certainly in order, but it should not be done without consultation with experts in that field. To be more precise, those "experts" should not simply be lawyers, aides, and advisors, but should also include people who actually work, live, and breathe IT security.

"Additionally, allocating dollars toward professional cybersecurity education as a vocation would give us the talent needed to execute these goals. Policies that protect real cybersecurity research and promote education would dramatically improve our defenses against cyberattacks." Providing scholarships to students who want to pursue an education in IT security is an initiative that I would wholeheartedly agree with and support as a wise use of my tax dollars.

I think the IT security community should be more vocal on this issue, and not just addressing the IT security community, but targeting the message to the politicians. In the attempt to strengthen IT infrastructures through legislation, that same legislation must not hinder our ability to properly assess the security posture of the infrastructure we wish to protect.

Maybe its too early in the morning and I haven't had my proper dose of coffee yet, but reading this article just got me a little worked up.


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Enterprise Cybersecurity Plans in a Post-Pandemic World
Download the Enterprise Cybersecurity Plans in a Post-Pandemic World report to understand how security leaders are maintaining pace with pandemic-related challenges, and where there is room for improvement.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-38300
PUBLISHED: 2021-09-20
arch/mips/net/bpf_jit.c in the Linux kernel through 5.14.6 can generate undesirable machine code when transforming unprivileged cBPF programs, allowing execution of arbitrary code within the kernel context. This occurs because conditional branches can exceed the 128 KB limit of the MIPS architecture...
CVE-2021-40690
PUBLISHED: 2021-09-19
All versions of Apache Santuario - XML Security for Java prior to 2.2.3 and 2.1.7 are vulnerable to an issue where the "secureValidation" property is not passed correctly when creating a KeyInfo from a KeyInfoReference element. This allows an attacker to abuse an XPath Transform to extract...
CVE-2021-41073
PUBLISHED: 2021-09-19
loop_rw_iter in fs/io_uring.c in the Linux kernel through 5.14.6 allows local users to gain privileges by using IORING_OP_PROVIDE_BUFFERS to trigger a free of a kernel buffer, as demonstrated by using /proc/<pid>/maps for exploitation.
CVE-2021-23441
PUBLISHED: 2021-09-19
All versions of package com.jsoniter:jsoniter are vulnerable to Deserialization of Untrusted Data via malicious JSON strings. This may lead to a Denial of Service, and in certain cases, code execution.
CVE-2021-41393
PUBLISHED: 2021-09-18
Teleport before 4.4.11, 5.x before 5.2.4, 6.x before 6.2.12, and 7.x before 7.1.1 allows forgery of SSH host certificates in some situations.