{"id":4392,"date":"2001-12-06T10:42:06","date_gmt":"2001-12-06T16:42:06","guid":{"rendered":"https:\/\/blog.socialmediaperformancegroup.com\/?p=4392"},"modified":"2001-12-06T10:42:06","modified_gmt":"2001-12-06T16:42:06","slug":"stratvantage-news-120601","status":"publish","type":"post","link":"https:\/\/stratvantage.com\/index.php\/2001\/12\/06\/stratvantage-news-120601\/","title":{"rendered":"StratVantage &#8211; The News \u2013 12\/06\/01"},"content":{"rendered":"<div id=\"bodyContent\">\n<div id=\"box\">\n<div id=\"box_inner\">\n<div id=\"text\">\n<div id=\"pages\">\n<div id=\"page1\" class=\"page\">\n<div class=\"page_content\">\n<h2 id=\"articleHeader\">\u00a0<b><i>Software Quality and Cyberterror Threats, Part 2<\/i><\/b><\/h2>\n<p>Last SNS, I discussed the huge task confronting Richard Clarke, the counter terrorism expert in charge of the president&#8217;s <a href=\"http:\/\/www.iwar.org.uk\/cip\/resources\/bush\/executive-order.htm\" target=\"_blank\">Critical Infrastructure Protection Board<\/a>. Despite the disparate issues surrounding computer security, it is at bottom a software quality issue. If software were properly written, there would be a lot less cybercrime. In this issue, I\u2019ll examine some of the challenges businesses face in responding to computer security threats.<\/p>\n<p>In a <a href=\"http:\/\/www.counterpane.com\/crypto-gram-0111.html\" target=\"_blank\">recent issue<\/a> of his newsletter, <i>Cryptogram<\/i>, renowned security expert Bruce Schneier, CTO of Counterpane Internet Security, explains the lifecycle of a security bug:<\/p>\n<p>I coined a term called the \u201cWindow of Exposure\u201d to explain the evolution of a security vulnerability over time. A vulnerability is a bug; it&#8217;s a programming mistake made by a programmer during the product&#8217;s development and not caught during testing. It&#8217;s an opening that someone can abuse to break into the computer or do something normally prohibited.<\/p>\n<p>Then, someone writes an exploit: an automatic tool that exercises the vulnerability. [. . .] Once a tool is written, anyone can exploit the vulnerability, regardless of his skill or understanding.[T]his tool can be distributed widely for zero cost, thereby giving everybody who wants it the ability. This is where \u201cscript kiddies\u201d come into play: people who use automatic attack tools to break into systems. Once a tool is written, the danger increases by orders of magnitude.<\/p>\n<p>Then, the software developer issues a patch. The danger decreases, but not as much as we&#8217;d like to think. A great many computers on the Internet don&#8217;t have their patches up to date; there are many examples of systems being broken into using vulnerabilities that should have been patched. I don&#8217;t fault the sysadmins for this; there are just too many patches, and many of them are sloppily written and poorly tested.So while the danger decreases, it never gets back down to zero.<\/p>\n<p>Microsoft operating systems have been the number 1 target of software crackers and cybercriminals over the past couple of years. One reason is there\u2019s an awful lot of installations of these OSes. That alone does not account for the truly staggering number of security bugs exhibited by release after release of these systems.<\/p>\n<p>Part of the problem, according to Schneier is Microsoft\u2019s and other software makers\u2019 attitude towards software vulnerabilities. Schneier makes the case that full disclosure of vulnerabilities and independent code review should be the rule and not the exception. Rather than maintaining closed code and stonewalling reports of problems, software vendors should open their code for expert review and not only acknowledge problems, but actively partner with software researchers to ferret out the bugs and exterminate them.<\/p>\n<p>This has not been the overall practice in the industry in general, and Microsoft in specific. Until relatively recently, Microsoft utilized the deny and disparage technique for dealing with security bug reports. If a researcher or talented amateur brought a bug to the company\u2019s attention, often Microsoft\u2019s first response was to deny its existence. If pressed, the company often disparaged the bug, calling the vulnerability \u201ctheoretical\u201d or minor. To be fair, the software monopoly has drastically changed its handling of security vulnerabilities in the last couple of years. And they are by no means the only offender; plenty of software companies employ the deny and disparage defense.<\/p>\n<p>When there isn\u2019t full disclosure about a software vulnerability, users have no way to evaluate the threat, and the advisability of using the software. Furthermore, wrong-headed legislation like the Digital Millennium Copyright Act (DMCA) complicates the issue. The DMCA makes it a crime to unravel security measures like encryption. In fact, a <a href=\"http:\/\/freesklyarov.org\/\" target=\"_blank\">Russian citizen<\/a> is being held in jail today for breaking the encryption Adobe uses for its eBooks. The act was not a crime in his homeland, where he did the work, but when he traveled to the US for a conference, he was apprehended and thrown in jail. We can only hope he\u2019s not brought up before a military tribunal.<\/p>\n<p>It gets worse. As I discussed in a <a href=\"http:\/\/www.stratvantage.com\/news\/062101.htm\" target=\"_blank\">previous<\/a> SNS, an August 2000 court decision preventing cracker site <a href=\"http:\/\/www.2600.com\/dvd\/docs\/\" target=\"_blank\">www.2600.com<\/a> from linking to the outlawed DeCSS DVD cracking code has thrown open the whole question of hyperlinking. In addition to worrying about keeping cybercriminals out, businesses now need to worry about linking to criminal sites and criminal code, assuming they can keep up with what\u2019s illegal.<\/p>\n<p>Determining what\u2019s illegal and abiding by the law will get harder, thanks to the international <a href=\"http:\/\/conventions.coe.int\/Treaty\/EN\/WhatYouWant.asp?NT=185\" target=\"_blank\">Convention on Cybercrime<\/a>, which imposes some very interesting responsibilities upon signatory nations. This <a href=\"http:\/\/www.law.com\/cgi-bin\/gx.cgi\/AppLogic+FTContentServer?pagename=law\/View&amp;c=Article&amp;cid=ZZZD3WRL5LC&amp;live=true&amp;cst=1&amp;pc=0&amp;pa=0&amp;s=News&amp;ExpIgnore=true&amp;showsummary=0\" target=\"_blank\">treaty<\/a> enables any signatory nation to enforce their cybercrime laws against citizens of other nations, and requires the cooperation of those other nations in bringing criminals to justice. This means if it is illegal to transmit a particular document, run a particular program, or link to a particular Web site in Bulgaria, a citizen in the US could be legally and criminally liable, despite abiding by US law. The US would cooperate with any Bulgarian warrant to search and seize assets of US companies or citizens in order to investigate the case.<\/p>\n<p>If that\u2019s not bad enough, the treaty also specifies that companies are liable for any cybercriminal actions of their employees if those actions were due to\u201cthe lack of supervision or control\u201d by the company. Thus businesses need to be cognizant of the cybercrime laws of the 31 nations that have so far signed the convention, must educate their employees on how to comply with all those laws, and then must keep tabs on their workers\u2019 behavior in order to avoid liability.<\/p>\n<p>All this has cast a chill upon computer security research. Trying to figure out if closed source code is vulnerable to attack could land you in jail. Schneier notes the case security researcher Niels Ferguson who found a security flaw in Intel&#8217;s HDCP Digital Video Encryption System. Ferguson did not publish the flaw due to fear of prosecution. \u201cIntel&#8217;s reaction was reminiscent of the pre-full-disclosure days: they dismissed the break as \u201ctheoretical\u201d and maintained that the system was still secure,\u201d said Schneier. \u201cImagine you&#8217;re thinking about buying Intel&#8217;s system. What do you do? You have no real information, so you have to trust either Ferguson or Intel.\u201d Since using the software could put you afoul of the law in another country, this is an important issue.<\/p>\n<p>So what is the computer software industry doing about all this? Are they banding together and taking a pledge of quality, determined to release no more buggy software lest they make their customers liable? I\u2019ll take a look at the industry response in Part 3 of this article.<\/p>\n<p><b><i>Briefly Noted<\/i><\/b><\/p>\n<ul>\n<li><b>Shameless Self-Promotion Dept.<\/b>: On Friday, StratVantage is debuting a new service, CTOMentor\u2122, designed to allow Chief Technology Officers and other technical leaders to sweep the newspapers, magazines, and newsletters clogging their inboxes into the trash. CTOMentor is a subscription advisory service tailored to customers\u2019 industry and personal information needs. Four times a year CTOMentor will provide a four-hour briefing for subscribers and their staffs on the most important emerging technology trends that could affect their businesses. As part of the service, subscribers also get a weekly email newsletter containing links to the Top 10 Must Read articles needed to stay current.<br \/>\n<a href=\"http:\/\/www.ctomentor.com\/\" target=\"_blank\">CTOMentor<\/a><\/li>\n<li><b>Unintended Consequences of Search Engines:<\/b> The major search engines use automated programs called spiders (they walk the Web) to search through and index Web sites. The spiders typically start at the main page and follow links. This works well for directing people to resources that Web site owners want them to see. But it also works well for turning up stuff they don\u2019t want you to see, like passwords, credit card numbers, classified documents and even computer vulnerabilities that can be exploited by hackers. While this has always been a problem with indexers, it has gotten worse now that Google searches for other file types such as Adobe PostScript; Lotus 1-2-3 and WordPro; MacWrite; Microsoft Excel, PowerPoint, Word, Works and Write; and Rich Text Format. Viewing the new file types can also expose you to viruses that may be contained in the files. This happened to me recently when I clicked on a link in Google to a Microsoft Word file that had been infected with the Melissa virus. Luckily my antivirus caught it.Businesses need to make sure that the only files on their public Web sites viewable by the public are those they intend to share with the world.<br \/>\n<a href=\"http:\/\/news.cnet.com\/news\/0-1005-200-7946411.html\" target=\"_blank\">C|Net<\/a><\/li>\n<li><b>Another Fixed Wireless Player:<\/b> After a pilot in Memphis, TN, WorldCom<sup>sm<\/sup>has widened its Broadband Fixed Wireless offering to 11 markets total: Bakersfield, CA; Baton Rouge, LA; Chattanooga, TN; Hartford, CT; Jackson, MS; Kansas City, MO; Memphis, TN; Minneapolis, MN; Montgomery, AL; Springfield, MA; and Tallahassee, FL. The company is planning on rolling out the service nationwide. As discussed in a <a href=\"http:\/\/www.stratvantage.com\/news\/072301.htm\" target=\"_blank\">previous<\/a> SNS, Fixed Wireless involves putting microwave antennae on rooftops and offering broadband Internet connections over a radio connection. WorldCom can service roughly 70 percent of a 35-mile radius of users from a single tower-mounted \u201csuper cell.\u201d Each rooftop antenna needs a clear line of sight to the super cell antenna.WorldCom is targeting the service at businesses, offering downstream transmission rates of 1 Mbps to 10 Mbps and average upstream speeds of around 512 Kbps. Pricing is comparable to DSL and cable modem broadband service offerings. Competitor Sprint offers <a href=\"http:\/\/www.sprintbroadband.com\/statusFAQ.html\" target=\"_blank\">Fixed Wireless<\/a> in 14 markets, none of which overlap WorldCom\u2019s, but the company is not acquiring new customers, having determined that current wireless technology can\u2019t support their business model. I wonder if WorldCom will find the same thing?<br \/>\n<a href=\"http:\/\/www1.worldcom.com\/us\/products\/access\/broadband\/wireless\/\" target=\"_blank\">WorldCom<\/a><\/li>\n<li><b>Yet Another Fixed Wireless Player<\/b>: NextNet&#8217;s Expedience\u2122 solves the line of sight problem with a single compact, indoor, portable unit that integrates the modem, transceiver and antenna. Even better: The unit is customer-installable, so there\u2019s no mucking about up on the roof or waiting for the technician to show. The company uses a traditional cell-oriented scheme, with each cell tower serving about three square miles. The company is targeting resellers rather than end users, which sucks because the company\u2019s in my backyard (Minneapolis).<br \/>\n<a href=\"http:\/\/www.nextnetwireless.com\/\" target=\"_blank\">NextNet<\/a><\/li>\n<li><b>My, How We\u2019ve Grown: <\/b>2001 is the 20th Anniversary of the original 8088 PC and the 1 billionth PC will ship by the end of this year.Here are a couple of stats to illustrate how far we\u2019ve come in 20 years:\n<ul>\n<li>If you were to build the original Pentium processor with the technology used to build ENIAC, the first computer, it would cover more than 10 square miles.<\/li>\n<li>By 2005 we\u2019ll see the first 30 nanometer transistors (0.03 microns). A hundred thousand of them stacked on top of each other will be the thickness of a sheet of paper. This will enable 10GHz processors that can process 20 million calaculations in the time a bullet flies 1 foot.<\/li>\n<\/ul>\n<p><a href=\"http:\/\/www.technology-alliance.com\/publications\/McManusPowerPoint.pdf\" target=\"_blank\">Intel<\/a><\/li>\n<li><b>Online Exchange Volume is Up<\/b>: The Global Trading Web Association (GTWA), an independent membership organization of electronic marketplaces, reported a 733 percent increase in transactions among its members in January-June 2001 compared with the same time period in 2000. Projected 2001 year-end transactions are expected to reach 2,140,500 with a sales volume of $6,238,433,526.<br \/>\n<a href=\"http:\/\/www.gtwa.net\/\" target=\"_blank\">GTWA<\/a><\/li>\n<li><b>Wireless LAN Productivity: <\/b>Cisco announced the results of an independent study by NOP World-Technology that found end users using wireless LANs stayed connected one and three-quarter hours more each day, amounting to a time savings of 70 minutes for the average user, increasing their productivity by as much as 22 percent.<br \/>\n<a href=\"http:\/\/newsroom.cisco.com\/dlls\/corp_111201b.html\" target=\"_blank\">Cisco<\/a><\/li>\n<li><b>If You Need Phone Word Help:<\/b> If you\u2019re having a hard time coming up with cool mnemonics for the Queen\u2019s cell phone number (as discussed in a<a href=\"http:\/\/www.stratvantage.com\/news\/110801.htm\" target=\"_blank\">previous<\/a> SNS) here\u2019s a Web site that can help. Phone Spell tries to convert a phone number into words. Unfortunately, it doesn\u2019t use \u201clicense plate tricks\u201d like converting 0s, 2s and 4s into letters, or \u201c2c00l d00d tricks\u201d like using the pronunciations of numbers as syllables (as in the number 423-2863). Fortunately for those trying to come up with the Queen\u2019s number, you can type in words and Phone Spell will give you back a phone number. Unfortunately, my best offering for the Queen has 14 digits, although I can get it down to 12 by substituting 0 for the word not: 932730268733. Worst of all, my cell phone number spells nothing at all!<br \/>\n<a href=\"http:\/\/www.phonespell.org\/\" target=\"_blank\">Phone Spell<\/a><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div id=\"extra__ui__basics\"><\/div>\n<div id=\"extra__ui\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>\u00a0Software Quality and Cyberterror Threats, Part 2 Last SNS, I discussed the huge task confronting Richard Clarke, the counter terrorism expert in charge of the president&#8217;s Critical Infrastructure Protection Board. Despite the disparate issues surrounding computer security, it is at bottom a software quality issue. If software were properly written, there would be a lot &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/stratvantage.com\/index.php\/2001\/12\/06\/stratvantage-news-120601\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;StratVantage &#8211; The News \u2013 12\/06\/01&#8221;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-4392","post","type-post","status-publish","format-standard","hentry","category-sns"],"_links":{"self":[{"href":"https:\/\/stratvantage.com\/index.php\/wp-json\/wp\/v2\/posts\/4392","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/stratvantage.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/stratvantage.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/stratvantage.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/stratvantage.com\/index.php\/wp-json\/wp\/v2\/comments?post=4392"}],"version-history":[{"count":0,"href":"https:\/\/stratvantage.com\/index.php\/wp-json\/wp\/v2\/posts\/4392\/revisions"}],"wp:attachment":[{"href":"https:\/\/stratvantage.com\/index.php\/wp-json\/wp\/v2\/media?parent=4392"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/stratvantage.com\/index.php\/wp-json\/wp\/v2\/categories?post=4392"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/stratvantage.com\/index.php\/wp-json\/wp\/v2\/tags?post=4392"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}