Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

5/12/2009
02:22 PM
George V. Hulme
George V. Hulme
Commentary
50%
50%

Secure360: The Triumph Of Politics (Over Security)

While listening to former special adviser for cyberspace security for the White House this morning, Howard Schmidt, talk candidly about information security at the Secure360 conference here in Saint Paul, MN - I began wondering: why didn't we implement the original National Strategy To Secure Cyberspace?

While listening to former special adviser for cyberspace security for the White House this morning, Howard Schmidt, talk candidly about information security at the Secure360 conference here in Saint Paul, MN - I began wondering: why didn't we implement the original National Strategy To Secure Cyberspace?This is from a story I wrote, way back in 2002, on the original National Strategy To Secure Cyberspace:

While execs seemed relieved with the lack of mandates, some experts criticized the plan, saying the government needs to establish both incentives for companies that invest in security and punishment for those that don't. "Mandatory reporting by the government to some central authority with meaningful sanctions" is needed, says Mark Rasch, former Department of Justice computer-crime prosecutor. Rasch, now an attorney specializing in the legal aspects of information security, cited tax incentives as one incentive.

We didn't get any of those mandates, and we didn't get much in the way of IT security surrounding the IT infrastructure. Heck: we didn't even get incentives. In fact, in many ways, we got nothing. And in so many ways, the national IT security problem has gotten worse.

Today, when looking back at the plan Schmidt helped to create, Schmidt said he believes the plan was 100 percent on target, but that it was never executed.

I agree. The plan was thorough and it was loaded with common sense, and, if implemented, the plan would have surely increased the security of the critical infrastructure, and the IT security of our telcos, the power grid, our air traffic control system, and other critical services that now flow through the network. They certainly wouldn't be in as sad of shape they are in now.

But it wasn't implemented, because it wasn't mandated. The business lobbyists won in the end, and the politicians pulled every tooth from the draft legislation before it was made public. Sarbanes-Oxley, SB 1386, the Payment Card Industry Data Security Standard - these are taken seriously because they are mandated by government or industry. And they have some teeth.

During his talk, Schmidt hinted at perhaps why we didn't see many mandates in the original plan. Rarely, he said, has he met someone in the state legislature that came from an information security, or even a technology background. They just don't get IT.

For an example, he cited a congresswoman who he wouldn't name (but described as a "very active Congresswoman from California) who wanted to bring an end to spyware. "She said she was tired of her constituents calling and complaining about spyware, and we are going to write a law to stop it," Schmidt explained.

Apparently, he was asked to review the antispyware law, and it didn't fly well with him. "The way the law was written, pushing updates to operating systems and routers would have been illegal."

I get what he is saying, and agree wholeheartedly. And it's always a concern when lawmakers try to legislate technology. But security mandates don't have to be that granular. They can mandate that best practices be adhered. They can mandate periodic audits by third-parties, among other things, are conducted. They can mandate fines.

But, again: we don't have any of that. And, today, the National Strategy To Secure Cyberspace has collected dust for the better part of a decade. That's a lot of lost time. That's a lot of bad practices now entrenched into the system that need righting.

To that end, President Obama aide Melissa Hathaway has already completed her cyber security review, and the only reason it hasn't been released yet is because of a lingering debate over what the White House's role should be in the effort to secure cyberspace. The plan is expected to be released as early as this week, though I'm hearing on the street that it won't be until next week - at the earliest.

I'm looking forward to seeing the plan. Though, I'm not expecting much.

I don't have hope for the success of this administration's ability to secure the critical infrastructure. Especially if this Washington Post story is correct, it looks like we are in store for little more than another triumph of politics over security:

The extent to which the government should direct or guide actions by owners of private commercial systems remains a matter of sharp disagreement with industry and civil liberties groups and probably will be deferred, said sources who have been briefed on the discussions.

For my mobile infosec observations, please follow me on Twitter.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
Inside the Ransomware Campaigns Targeting Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/2/2021
Commentary
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  3/30/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-24028
PUBLISHED: 2021-04-14
An invalid free in Thrift's table-based serialization can cause the application to crash or potentially result in code execution or other undesirable effects. This issue affects Facebook Thrift prior to v2021.02.22.00.
CVE-2021-29370
PUBLISHED: 2021-04-13
A UXSS was discovered in the Thanos-Soft Cheetah Browser in Android 1.2.0 due to the inadequate filter of the intent scheme. This resulted in Cross-site scripting on the cheetah browser in any website.
CVE-2021-3460
PUBLISHED: 2021-04-13
The Motorola MH702x devices, prior to version 2.0.0.301, do not properly verify the server certificate during communication with the support server which could lead to the communication channel being accessible by an attacker.
CVE-2021-3462
PUBLISHED: 2021-04-13
A privilege escalation vulnerability in Lenovo Power Management Driver for Windows 10, prior to version 1.67.17.54, that could allow unauthorized access to the driver's device object.
CVE-2021-3463
PUBLISHED: 2021-04-13
A null pointer dereference vulnerability in Lenovo Power Management Driver for Windows 10, prior to version 1.67.17.54, that could cause systems to experience a blue screen error.