Recent terrorist attacks on citizens in all too many countries have raised the question of creating back-doors in encrypted communications technology. A November 22 NY Times article by Zeynep Tufekci: “The WhatsApp Theory of Terrorism“, does a good job of explaining some of the flaws in the “simplistic” – government mandated back-doors. The short take: bad guys have access to tools that do not need to follow any government regulations, and bad guys who want to hack your systems can use any backdoor that governments do mandate — no win for protection, big loss of protection.
Toys? The Dec. 1 Wall Street Journal covered: “Toy Maker Says Hack Accessed Customer Information“. While apparently no social security or credit card data was obtained, there is value in having names – birthdates – etc for creating false credentials. How does this relate to the Terrorist Threat? — two ways actually:
- there are few, if any, systems that hackers won’t target — so a good working assumption is someone will try to ‘crack’ it.
- technologists, in particular software developers, need to be aware, consider and incorporate appropriate security requirements into EVERY online system design.
We are entering the era of the Internet of Things (IoT), with many objects now participating in a globally connected environment. There are no doubt some advantages (at least for marketing spin) with each such object. There will be real advantages for some objects. New insight may be discovered though the massive amount of data available – for example, can we track global warming via the use of IoT connected heating/cooking devices? However, there will be potential abuses of both individual objects (toys above), and aggregations of data. Software developers and their management need to apply worst case threat-analysis to determine the risks and requirements for EVERY connected object. In addition to terrorists, we can expect nation-states to use these channels for cyber-warfare.
Can terrorists, or other bad guys, use toys? Of Course! There are indications that X-Box and/or Playstations were among the networked devices used to coordinate some of the recent attacks. Any online environment that allows users to share data/objects can be used as a covert communications channel. Combining steganography and ShutterFly, Instagram, Minecraft, or any other site where you can upload or manipulate a shareable image is a channel. Pretending we can protect them all is a dangerous delusion.
Is your employer considering IoT security? Is your school teaching about these issues?