|
For most things, "eventually" is measured in years or centuries, but on the internet it might just be a few days or weeks. It is technically impossible to "secure" the internet or any electronic system attached to it. You are only as secure as your least secure, most vulnerable point. Unfortunately, with millions of potential weak points in software, hardware, and people, the web of trust and authentication we all depend on has itself been hacked, no longer trustworthy.
In general, the more secure you think you are, the less secure you really are. There are whole categories of threats most people have never even heard about.
The distinction between clock time and internet time was obvious to most people as soon as the technology became available, but few quite understand that internet time is getting faster and faster. with consequences and changes to our lives coming too rapidly for us to comprehend or to respond. The half lives of any competitive advantages in the marketplace, in security, in product design or features, in productivity, or anything else are becoming shorter and shorter. Competitors must respond quickly to survive, at least by including as the new standard what had been a competitor's advantage. It is a wild ride for everyone and will only get wilder.
For most things, "eventually" is measured in years or centuries, but on the internet it might just be a few days or weeks. We all know that the impossible takes longer, but the inconceivable are what really scare me. To believe something is impossible, even if in error, means that it was thought about and maybe any consequences. We are totally unprepared for the inconceivable.
A series of "inconceivable" security lapses over recent months are very troubling. Hackers gained access to internal networks at RSA and VeriSign, related companies that provide the key technologies for encryption, digital signatures, and authentications. A later hack at DigiNotar resulted in the issuing of fraudulent CAs for microsoft.com, google.com, verisign.com and many others. When combined with DNS cache poisoning to redirect the user to the ip of the imposter site, and with that in place there are lots of ways to escalate the attacks with little risk of detection.
A growing risk comes from hardware devices and components that are pre-hacked when manufactured, assembled, or shipped. While malware on a digital picture frame might be detected by Norton and such, more sophisticated exploits hidden in disk drive firmware, add-on memory, graphics controllers, or even in a cable plug are very difficult to find. Even harder to detect a Trojan inserted during the design of a CPU chip that will be used widely, the Trojan remaining dormant unless it is used in the targeted environment or activated some other way.
I posted a lot several years ago about voting machines, opscan, etc. and why they are technically unsound and operationally a nightmare, and neither can ever meet criteria for security and trustworthiness needed for our elections. Suppose for a moment that by some miracle you have voting machine software that is perfect, flawless implementation, ideal design, bug free, open source, no issues at all. (I did say a miracle.) Even with this miracle, it is not enough.
The issues with ballot design, "programming", validation, testing when dealing with the complexities of special overlay districts (water, schools, municipalities, with multiple combinations all at one polling place), multi-seat contest, straight party with exceptions, instant runoff, initiatives, amendments, ... This requires a significant effort for each election by election officials in every county or district. Testing and validation is a larger effort if done properly. These tasks are roughly the same as those for systems currently in use.
The big problem is ensuring that the machines and all components are secure and remain so. That should begin with chips manufactured in a secure foundry and assembled in secure facilities. For the life of each voting machine, it must be secured and have the equivalent of the chain of custody for evidence. If not, should be grounds for spoiliation of evidence.
The recent Argonne Labs Vulnerability Assessment demonstrates their $10 alien hardware man-in-the-middle hack against Diebold. I think a slightly more complex bit of hardware would make it much easier for people to understand how great the threats really are. Use a cell phone chip for remote control through text messages containing commands like Find text, Replace text, etc. Lets you show people things like changing candidate names while they are "voting", and do it from anywhere.
|