Back to Results

HOUSE_OVERSIGHT_018336.jpg

Source: HOUSE_OVERSIGHT  •  other  •  Size: 0.0 KB  •  OCR Confidence: 85.0%
Download Original Image

Extracted Text (OCR)

misbehavior” that defies simple analysis. You can’t predict where you might be attacked by merely looking at the possible holes in each piece. Rather, it’s the whole system that breeds risks. It acts in ways that the designer could not have predicted in advance. “Clearly the system itself is misbehaving,” the researcher Jeffrey Mogul writes of his study of various cases where networks are cracked in this fashion. “However, none of the components have failed per-se.”145 The complexity of the systems themselves has been, not surprisingly, mimicked in the design of hacking attacks. What was once done by a single Warez Dude is now handled with division of labor, technical specialization and intensive pre-attack research. Every innovation in “righteous malware” is quickly copied and used in dangerous attack tools. The clever modular design of Stuxnet, for instance, was studied by criminals and was found years later still echoing in weapons aimed at banks, credit card companies and health insurance firms. “We are not experts in military history, doctrine, or philosophy,” cybersecurity researchers Stephen Cobb and Andrew Lee have written, “so we are unaware of the correct word for the following category of weapons: the ones you deliver to your enemies in re-usable form.” Cyberattack systems can be dangerous not least because they boomerang. They are delivered intact, primed for re-use to enemies who may choose to bounce them back at your banks, hospitals and electrical grids. “Righteous malware is unique,” Cobb and Lee conclude. “You are giving away your weapons, tactics and designs simply by using them.” 146 It’s not only American services hunting and using such backdoor keys and battering rams, of course; not only the NSA that sees its viruses retooled and reused. Computer security researchers describe opening up the laptops of unwary business travelers and finding the machines blasted inside by malware and other technical cancers, carefully planted by a half-dozen intelligence agencies and criminal organizations. It’s like discovering a closet full of spies in your house, each being careful not to step on the other’s toes as they watch and listen to your life. Why is my computer so slow, a government official in a Eurasian capital might ask. It is because it has been simultaneously pwned by Americans, Russians, Israelis, Chinese, and maybe a local Mafioso or two - and their code is not running smoothly. A couple of years ago I had a naive moment when | thought, perhaps, it would be possible and in everyone’s interest to go back to those simpler, innocent Hacktic days, when information about vulnerabilities was widely shared and easily discussed - and holes were quickly patched as a result. 1 was thinking about the problem of cybertension between the US and China and suggested applying an 145 “However”: Jeffrey C. Mogul, “Emergent (Mis)behavior vs. Complex Software Systems”, HP Labs Research Papers, 2006, HPL-2006-2 146 “We are not experts”: Stephen Cobb and Andrew Lee, “Malware is Called Malicious for a Reason: The Risks of Weaponizing Code” in P. Brangetto, M. Maybaum, J. Stinissen eds., 6 Annual Conference on Cyber Conflict (NATO Publications, 2014) 71-82 104 HOUSE_OVERSIGHT_018336

Document Preview

HOUSE_OVERSIGHT_018336.jpg

Click to view full size

Document Details

Filename HOUSE_OVERSIGHT_018336.jpg
File Size 0.0 KB
OCR Confidence 85.0%
Has Readable Text Yes
Text Length 3,246 characters
Indexed 2026-02-04T16:34:45.440976

Related Documents

Documents connected by shared names, same document type, or nearby in the archive.

Ask the Files