On the heels of the third Presidential “debate”, there was
much hand-wringing and finger-wagging against Trump, for refusing to commit
himself in advance to not contesting the election, no matter how it turns
out. Actually no rational
candidate should do that -- there is always the possibility of a squeaker, in
which the seemingly-losing candidate may demand a recount (most recently and
notably in Bush v. Gore). But additionally, there exists a
scenario, unfortunately not science-fictional, in which Hillary not only
would, but should, contest the results, and indeed demand something more
thorough-going than a mere recount.
Namely, as the candidate herself maintains (very plausibly):
(1) Russian state actors hacked the DNC data as well as that of
the chairman of her Presidential campaign.
(2) Putin is said to have it in for Mrs Clinton.
So -- what if a state actor were to hack the vote-count, and
throw it to Trump?
When I mentioned this scenario to people at work, they
mostly preferred to shrug it off and keep their fingers crossed. And indeed, (1) + (2) do not entail that Putin either would, or could,
pull of a vote-fraud on that scale.
But the very next morning, two news items caught the world’s attention.
(3) Russia sent its fleet through
the English Channel. As they
passed Dover, they trained their guns on England.
(4) A wide variety of very
prominent (and, one would imagine, relatively well-defended) Web sites were -- a thing unprecedented --
simultaneously unreachable.
(3): Would (Putin
is not reticent about flourishing power).
(4): Could (rather than attacking such sophisticated well-fortified sites as Amazon and the New York Times, he need only get past the defenses of the clueless retired librarians and what have you who run the elections in Mississipi et cetera).
(4): Could (rather than attacking such sophisticated well-fortified sites as Amazon and the New York Times, he need only get past the defenses of the clueless retired librarians and what have you who run the elections in Mississipi et cetera).
As it turns out, the attacks were not quite as concerning as
one could have been led to believe by vague early media accounts. The attackers didn’t manage to
hack their way into the sites in
question, where they would be in a position to make mischief (say, to order one
billion copies of The Art of the Deal with next-day shipping to the
Clinton campaign).
Rather, they merely flooded the servers of a somewhat obscure DNS
company (one which originated, in Wikipedia’s phrase, as “a community-led
student project” at Worcester Polytech), which performs the humble domain-name
service for various sites.
By way of comparison:
Anyone can temporarily block access to Fort Knox by burning a
semitrailer on the entrance road;
that is quite different from actually breaking in and making away with the
gold. Specifically as
applied to electronic vote-counting,
all that a DDOS attack could do would be to disenfranchise that fraction
of Alaskan voters (they won’t be missed) and overseas servicemen who are allowed to vote via the
internet; it wouldn’t change their votes to a different
candidate, nor those of non-Internet voters.
Nevertheless, the attack was significant for the novelty of
its Denial-of-Service robot army,
relying in large measure on the “Internet of Things” -- “smart” (read:
idiot-savant) devices like late-model thermostats and baby-monitors.
"Smart" refrigerator, plotting evil |
Now, I have long been annoyed, in a grumpy curmudgeonly way,
with contra-Okhamian appliances and interfaces, that try to do so many things
that they perform their core function less well, and have multiple points of
failure. But I had not
realized their potential for active lethality, in concert, a sort of
globe-girdling zombie army. So I
contacted my old friend Песец из Канады, surveying the bedraggled
march of history from his perch in
the frozen north:
> As a guy who
used to program for limited-memory ROMs serving closed,
> pre-circumscribed-purpose platforms, perhaps you can answer this: How
> can a single-purpose device like a thermostat have the capacity to
> store, and then launch upon instruction, malware used for DDOS ??
> pre-circumscribed-purpose platforms, perhaps you can answer this: How
> can a single-purpose device like a thermostat have the capacity to
> store, and then launch upon instruction, malware used for DDOS ??
He replied:
Nowadays, "limited memory" means gigabytes. It actually costs *more* to make a product that is only capable of doing what it needs to do and is not also a mass-produced general-purpose computer.
For the moment, people still tend to buy products that "connect to the Internet!!!" As more of these IoT disasters unfold, I expect that eventually people will learn that they must never allow Internet access from any computer whose program they are prohibited from replacing. First off, "connects to the Internet!" is just a bullet-point on the packaging; manufacturers don't really want to pay what it would actually cost to develop a *secure* product that connects to the Internet. Second, there are considerable social forces acting on manufacturers to engage in frankly-evil acts -- and one evil act can build upon another, leading to a DDOS attack.
Example: Samsung used to sell a television set that recorded all your voice conversations (for no reason) and sent them to a central server (for no reason) over an Internet connection (that a TV doesn't really need). It offered a menu item for turning off this behaviour, but the Samsung TV was programmed to lie to its "owner" and claim that it had stopped spying, while actually continuing to do so under orders from its manufacturer. In a perfect world, Samsung's corporate charter should have been revoked for this. Instead, TV's are joining thermostats as IoT objects that can be co-opted by terrorists. Isn't it nice of us to provide them with this free ammunition?
Microsoft's Windows 10 has the same problem -- it spies on you, offers an option to turn off the spying, then continues to do it anyway. Windows 10 should not be used on any computer connected to the Internet, especially by a person who holds a security clearance from any country. A computer that has been programmed to accept orders from "our spies" over the Internet is a computer that can be co-opted by "their spies" over the Internet.
GM's "OnStar" vehicles have the same problem: a car that can be remotely shut down by police is a car that can be remotely shut down by an assassin or a terrorist. Wouldn't it be interesting to find out if it's technically possible to convince all the GM-branded cars on the Beltway to simultaneously shut off their brakes and steering while travelling at highway speeds?
Speaking of computers inexplicably connected to the Internet, *why* do American e-voting machines have Internet connections? The only obvious reason to do that would be to allow the government to disclaim the result of an election that doesn't go their way: the American people didn't *really* vote for Donald Trump, that was just the Russians hacking our voting machines because they're evil demons who do evil things for no reason -- after we give them the necessary tools for no reason. How dare the Russians "interfere" with our election by publishing the emails that Hillary insisted on letting them have! And why is it that we are preparing for cyberwar against Russia, when it always seems to be China conducting cyberwar against the USA? That's like invading Iraq because some Saudi dissidents based in Afghanistan attacked New York City.
I'm voting for Stein. Thankfully, I will not have to move to Canada after the election.
That assertion about Windows 10 was startling. I did not wish to post anything so
denigrating about the LOVELY, PEACEABLE, TOTALLY NON-LITIGIOUS ALL-POWERFUL
MEGA-ENTITY MICROSOFT (who can crush poor bloggers like a bug) without some
supporting footnotes, which my correspondent kindly supplied:
http://www.howtogeek.com/273513/why-you-shouldnt-use-anti-spying-tools-for-windows-10/
"You can’t fully disable telemetry on Home or Professional editions of Windows 10... If you have a major philosophical problem with the fact that Windows 10 doesn’t let you avoid non-security updates or disable telemetry, don’t try to fix it. Instead, just switch to another operating system, like Linux..."
http://www.disclose.tv/news/the_extent_of_windows_10_spying_software_is_revealed/127799
A more alarmist article, claiming that even buying the Enterprise edition of Windows 10 still won't stop all the spying.
https://discussions.agilebits.com/discussion/70037/windows-10-keylogger
Windows 10 keeps copies of everything you type and sends them to Microsoft's servers. There is a button to turn this off, but Microsoft keeps sending out updates that turn it back on -- and you are not permitted to turn off those updates.
"You can’t fully disable telemetry on Home or Professional editions of Windows 10... If you have a major philosophical problem with the fact that Windows 10 doesn’t let you avoid non-security updates or disable telemetry, don’t try to fix it. Instead, just switch to another operating system, like Linux..."
http://www.disclose.tv/news/the_extent_of_windows_10_spying_software_is_revealed/127799
A more alarmist article, claiming that even buying the Enterprise edition of Windows 10 still won't stop all the spying.
https://discussions.agilebits.com/discussion/70037/windows-10-keylogger
Windows 10 keeps copies of everything you type and sends them to Microsoft's servers. There is a button to turn this off, but Microsoft keeps sending out updates that turn it back on -- and you are not permitted to turn off those updates.
Those assertions are disputed elsewhere, e.g
The dispute is way above the pay-grade of this peaceful,
penguin-loving site, and we take no stand on the matter.
Wholesome penguins,
lacking Internet access,
don’t worry about any of this |
~
Miscellaneous musings:
(1) In the case
of weaponizable appliances, we are faced with a double-bladed Tragedy of the
Commons. It is simply not in
the interests of the various cost-cutting Asian-tiger gadget manufacturers to
add in security (which in any even would be swiftly obsoleted; and nobody’s going to pay for ongoing anti-zombie
tech-support for Net-connected blenders and toasters). Nor does the individual consumer
particularly care (save in so far as heroically public-minded) whether his
electr(on)ic toothbruth or Web-connected hamburgerbun sesameseed-applicator was
out on the town last night, ravaging Reddit (though they do seem a bit
hung-over this morning).
(2) When the
DNC hack was pinned on Putin, pundits wondered aloud (or rather, aprint)
whether we should retaliate by deploying our own cyberattack tools. That was ill-considered.
(a) First, sanctions, to have any
point, must be publically announced -- a tariff, an embargo, a finger-wagging
on the New York Times editorial page, or what not. The virtue of cyber tools is that they can be used
stealthily and (with luck) deniably -- exactly the wrong scenario here.
(b) Cyberwar is serious business,
and its means stand on the forefront of (secret) research. You want to minimize exposure of your
tools until they are needed to be deployed for
real, and not just as a petulant gesture.
To retaliate against Putin (or anyone else), you select that
arrow from your quiver that best meets the case; you don’t limit yourself to mimicking
his moves, doing exactly what he did
(as the lex talionis enjoined).
Which raises the question: In Friday’s attack, cui
prodest? On the face of
it, nothing positive was accomplished, just a few hours of snail-slow
connection times. And the
attackers lost the element of surprise as regards a next such attack: defenders now know that, in estimating
the power of the next DDOS attack, they must reckon-in the gadget-bot
army. But it might
have been worth it to the attacker, to see how vulnerable a crucial node like a
DNS would be. The sally
would thus be the cybernetic equivalent of a ferret flight.
(3) From a
conspiratorial standpoint, the beauty part is: it is not even necessary actually to manage to hack the vote
-- merely providing plausible reasons for people to imagine you might have,
poisons national confidence.
Cf. the ridiculous episode of the Nigerian Underwear Bomber, who failed
to bring down the plane he was riding on, managing only to boil his balls: still, AQAP rejoiced, since it was
enough to get TSA’s knickers in a twist. Already burdensome security become more burdensome
still -- though unlike the case of the Shoe Bomber, the incident did not lead
to the targeting of a specific garment -- no Skivvies Inspections at the
airports as yet.
[Update 28 October 2016] And now, sailing in from left field, the bizarre carom-shot
off Anthony Weiner’s computer,
announced today out of
nowhere by a po-faced FBI
director, somehow supposed to link up with the in principle unrelated Hillary-computer-emails brouhaha. Nothing substantive yet, nor will there
be (he conceded) until after the election; as Trump said recently in another connection, “I’ll keep you
in suspense.” (As a mysterywriter, I would hesitate to concoct so far-fetched a plot; but reality recks not verisimilitude.)
Thus, it is not only Trump voters who have reason to
question the legitimacy of this electoral season.
Note, though, that anyone maintaining that the timing of the
announcement was calculated to maximize the damage to Mrs Clinton, should
consider the fact that it was made at the least
sensitive time in the news-cycle, Friday afternoon, the hours at which any
business or administration prefers to release embarrassing news.
No comments:
Post a Comment