Law enforcers the ‘absolute worst people’ for Net security – former Fed

Hmmm...our hacker buddies may be smarter than they appear

  • alert
  • submit to reddit

Bridging the IT gap between rising business demands and ageing tools

The chief legacy of this month's escalation in malicious distributed denial of service (DDoS) attacks will undoubtedly be a ham-handed ploy by federal and state law enforcement bodies to exploit populist insecurities in quest of vastly increased powers of intervention in Net security. We've already seen US Attorney General Janet Reno and FBI Director Louis Freeh licking their chops in hastily-convened Senate hearings, palpably gloating over the new powers of surveillance and control they anticipate. Seated only days after the celebrated DDoS attacks, the Senate Appropriations Subcommittee before which they testified last week proved a sympathetic audience. Reno took the opportunity to sue for her ongoing dream of dictating technical standards to manufacturers of virtually all communications devices and media. "The technology is evolving so quickly that we find our [black-bag gizmos] obsolete almost as soon as we get them," she sighed. And why should Congress care? Because the cost of keeping up with commercial innovations and fifteen-year-old script kiddies is immense, she slyly noted to a Congressional committee charged with the budgeting of public funds, and whose fiduciary responsibilities to the taxpayer weigh heavily on conscience. As for the FBI, Freeh again made an impassioned pitch for his pet ambition of securing keys to popular cryptographic programs used by citizens and businesses alike, so that the United States might soon join the ranks of such notably neurotic countries as China (and Great Britain, if the momentum doesn't change). Committee chairman Judd Gregg (Republican, New Hampshire) seemed less than sympathetic with the notion of passing around crypto keys to the Feds, grasping, and wisely so, the damper such a programme would put on the commercial cryptographic industry and the confidence of citizens and businesses in the (largely illusory) security of their electronic communications. So Gregg offered a suggestion of his own. "Do you need a counter-cryptographic centre?" he asked. Freeh answered in one word: "Definitely." An elegant solution, we must allow: give the people their false sense of online security, but give the FBI a supercomputing centre so that it might conveniently brute-force crack the encryption codes which vex it so. But just as Reno and Freeh were patting themselves on the back for delivering command performances, a security expert with a uniquely authoritative background as a trial attorney in the Department of Justice's Criminal Division, who was assigned specifically to prosecuting cyber-crime, flatly told the Committee that "the absolute worst people to coordinate Internet security are law enforcement." Congress "should not allow law enforcement to take it upon themselves to regulate Internet architecture or technical standards," Mark Rasch, Vice President of security firm Global Integrity, insisted. His reasons were many. First, and most simply, no one in his right mind trusts the Feds, an observation borne out by the reluctance of perfectly sober network administrators to install National Infrastructure Protection Center (NIPC) software to detect the DDoS tools Trin00, TFN and Stacheldraht, chiefly because the NIPC stubbornly refused to release the source code. People didn't like the idea of loading an "official" FBI application on their systems without first having a peek at its inner workings. They were inhibited, no doubt, by a nagging fear that the Feds could implant malicious, "back-door" code of their own, and thereby render their obvious ambitions to snoop into every corner of cyber-space immensely more convenient to achieve. Another of Rasch's common-sense observations: law enforcement doesn't need to regulate Internet security. The DDoS attackers exploited "widely-known, widely publicised vulnerabilities," to carry out their attack, he noted. "Had those vulnerabilities been fixed by the sites that were broken into, this attack could not have taken place," Rasch said. "If we would just fix the problems we already know about, we would be ninety percent there," he observed. He spoke also of a brain-drain from high-tech law enforcement bodies towards a far more lucrative private security industry. The subtext here is that law enforcement subsists on under-qualified high-tech newbies who move on to greener pastures as soon as they've learned enough to be of use to the private sector. Indeed, most if not all the leads in the FBI's current DDoS investigation have been provided not by government high-tech gumshoes, but by watchful, garden-variety system administrators. Federal law enforcement, in spite of its brave postures, doesn't have much of a handle on the case. Freeh confirmed the suspicion, citing employee retention as one of his greatest challenges, and noting that government pay is inadequate to attract qualified personnel. "The ability to hire above the current [government pay] scale is essential," he said. So we are left with an impression that the Feds, spurred to action by this month's celebrated attacks, are determined to stumble headlong into Internet regulation, and in the process piss off the majority of citizens and businesses who naturally resent government intervention in their private affairs, whilst making a complete pudding of online security in the process. And this, we must observe, should effectively guarantee that the Internet will remain the hopelessly leaky, creaky, ill-fitted hackers' paradise it has always been. Who says those DDoS attackers were a lot of dumb kids? ®

Build a business case: developing custom apps

More from The Register

next story
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
ITC: Seagate and LSI can infringe Realtek patents because Realtek isn't in the US
Land of the (get off scot) free, when it's a foreign owner
Samsung threatens to cut ties with supplier over child labour allegations
Vows to uphold 'zero tolerance' policy on underage workers
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
US freemium mobile network eyes up Europe
FreedomPop touts 'free' calls, texts and data
Big Blue Apple: IBM to sell iPads, iPhones to enterprises
iOS/2 gear loaded with apps for big biz ... uh oh BlackBerry
prev story


Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.