[Infowarrior] - New US security head advocates partnership at Black Hat
Richard Forno
rforno at infowarrior.org
Sat Aug 9 15:07:36 UTC 2008
New US security head advocates partnership at Black Hat
By Joel Hruska | Published: August 08, 2008 - 12:44PM CT
http://arstechnica.com/news.ars/post/20080808-new-security-head-keynotes-black-hat-advocates-partnership.html
The head of the newly formed National Cyber Security Center, Rod
Eckstrom, was one of Black Hat's keynote speakers this year, even
though he's not actually a cyber security expert. Eckstrom is the co-
author of a book entitled The Starfish and the Spider: The Unstoppable
Power of Leaderless Organizations, and was presumably tapped to lead
the NCSC based on his book's insights into the function of centralized
organizations vs. decentralized organizations. Organizational
principles might not seem to have very much to do with cyber security,
but the two issues align more readily than may be immediately apparent.
The rise of the Internet over the past decade has fueled the growth of
a number of decentralized organizations and structures, many of which
now challenge older, centralized systems. Wikipedia has tussled with
Encyclopedia Britannica, and the RIAA has fought the dispersal of
digital content distribution tooth and nail, to name just two examples.
Beckman's ideas map quite well to both real-world and online security
concerns. In the 20th century, nation-states were seen as the primary
security threat against which other nation states defended themselves.
In the post Cold War era, this has changed; terrorist cells and
paramilitary forces are now the primary threats against which nations
defend themselves. Conventional, centralized military tactics are of
limited effectiveness against such a decentralized groups, as has been
demonstrated by America's struggle to gain control of Iraq and
Afghanistan.
Cyber security threats have evolved in a similar manner. When Clifford
Stoll began his investigation into a 75 cent billing error while
working at the Lawrence Berkeley National Laboratory in the mid-1980s,
he uncovered the trail of hacker Marcus Hess, a West German citizen
who ultimately proved to be in the employ of the KGB. Twenty years
later, governments may still employ their own black hat teams for
various covert operations, but the vast, vast majority of the Trojans
shoveled out into the Internet every day are deployed for profit, not
espionage. What was once a nation-to-nation attack vector has now
decentralized, diffused. Chinese gold farmers are far more interested
in the contents of my World of Warcraft account than the Chinese
government is interested in the contents of my hard drive.
Because of the diffuse threat, securing United States interests
against potential cyber security risks will require cooperation across
the entire security industry. Beckstrom's role, and the NCSC's
mandate, is to foster this type of decentralized approach. In his
speech at Black Hat, Beckstrom praised the work of security companies
and organizations that have coordinated the industry-wide effort to
repair the DNS problem, and implied that such efforts are an absolute
necessity for tackling future security issues. Beckstrom called for
investment in protocol security, saying it "may be the cheapest
security dollars we can invest," and referred to the recent DNS
vulnerability as an example of how an insecure protocol can continue
to cause problems even after repeated attempts to repair the damage.
The NCSC is just four months old, and Beckstrom's lack of technical
knowledge could prove to be a problem down the road, but his
perception of modern security as a struggle between centralized and
decentralized forces seems spot-on. These conflicts may be inevitable
as society evolves to make use of modern technology, but there seems
little question that cyber security would benefit from cooperation
between the government and the various facets of the white (or even
gray) hat security industry.
More information about the Infowarrior
mailing list