[Infowarrior] - Schneier: U.S. enables Chinese hacking of Google

Richard Forno rforno at infowarrior.org
Sun Jan 24 15:56:23 UTC 2010


http://www.cnn.com/2010/OPINION/01/23/schneier.google.hacking/

U.S. enables Chinese hacking of Google
By Bruce Schneier, Special to CNN
January 23, 2010 5:20 p.m. EST

Editor's note: Bruce Schneier is a security technologist and author of  
"Beyond Fear: Thinking Sensibly  About Security in an Uncertain  
World." Read more of his writing at www.schneier.com.

(CNN) -- Google made headlines when it went public with the fact that  
Chinese hackers had penetrated some of its services, such as Gmail, in  
a politically motivated attempt at intelligence gathering. The news  
here isn't that Chinese hackers engage in these activities or that  
their attempts are technically sophisticated -- we knew that already  
-- it's that the U.S. government inadvertently aided the hackers.

In order to comply with government search warrants on user data,  
Google created a backdoor access system into Gmail accounts. This  
feature is what the Chinese hackers exploited to gain access.

Google's system isn't unique. Democratic governments around the world  
-- in Sweden, Canada and the UK, for example -- are rushing to pass  
laws giving their police new powers of Internet surveillance, in many  
cases requiring communications system providers to redesign products  
and services they sell.

Many are also passing data retention laws, forcing companies to retain  
information on their customers. In the U.S., the 1994 Communications  
Assistance for Law Enforcement Act required phone companies to  
facilitate FBI eavesdropping, and since 2001, the National Security  
Agency has built substantial eavesdropping systems with the help of  
those phone companies.

Systems like these invite misuse: criminal appropriation, government  
abuse and stretching by everyone possible to apply to situations that  
are applicable only by the most tortuous logic. The FBI illegally  
wiretapped the phones of Americans, often falsely invoking terrorism  
emergencies, 3,500 times between 2002 and 2006 without a warrant.  
Internet surveillance and control will be no different.

Official misuses are bad enough, but it's the unofficial uses that  
worry me more. Any surveillance and control system must itself be  
secured. An infrastructure conducive to surveillance and control  
invites surveillance and control, both by the people you expect and by  
the people you don't.

China's hackers subverted the access system Google put in place to  
comply with U.S. intercept orders. Why does anyone think criminals  
won't be able to use the same system to steal bank account and credit  
card information, use it to launch other attacks or turn it into a  
massive spam-sending network? Why does anyone think that only  
authorized law enforcement can mine collected Internet data or  
eavesdrop on phone and IM conversations?

These risks are not merely theoretical. After September 11, the NSA  
built a surveillance infrastructure to eavesdrop on telephone calls  
and e-mails within the U.S. Although procedural rules stated that only  
non-Americans and international phone calls were to be listened to,  
actual practice didn't match those rules. NSA analysts collected more  
data than they were authorized to and used the system to spy on wives,  
girlfriends and notables such as President Clinton.

But that's not the most serious misuse of a telecommunications  
surveillance infrastructure. In Greece, between June 2004 and March  
2005, someone wiretapped more than 100 cell phones belonging to  
members of the Greek government: the prime minister and the ministers  
of defense, foreign affairs and justice.

Ericsson built this wiretapping capability into Vodafone's products  
and enabled it only for governments that requested it. Greece wasn't  
one of those governments, but someone still unknown -- A rival  
political party? Organized crime? Foreign intelligence? -- figured out  
how to surreptitiously turn the feature on.

And surveillance infrastructure can be exported, which also aids  
totalitarianism around the world. Western companies like Siemens and  
Nokia built Iran's surveillance. U.S. companies helped build China's  
electronic police state. Just last year, Twitter's anonymity saved the  
lives of Iranian dissidents,  anonymity that many governments want to  
eliminate.

In the aftermath of Google's announcement, some members of Congress  
are reviving a bill banning U.S. tech companies from working with  
governments that digitally spy on their citizens. Presumably, those  
legislators don't understand that their own government is on the list.

This problem isn't going away. Every year brings more Internet  
censorship and control, not just in countries like China and Iran but  
in the U.S., the U.K., Canada and other free countries, egged on by  
both law enforcement trying to catch terrorists, child pornographers  
and other criminals and by media  companies trying to stop file sharers.

The problem is that such control makes us all less safe. Whether the  
eavesdroppers are the good guys or the bad guys, these systems put us  
all at greater risk. Communications systems that have no inherent  
eavesdropping capabilities are more secure than systems with those  
capabilities built in. And it's bad civic hygiene to build  
technologies that could someday be used to facilitate a police state.

The opinions expressed in this commentary are solely those of Bruce  
Schneier.


More information about the Infowarrior mailing list