text
stringlengths 0
118
|
---|
the use of third-party software. Snapchat didn’t explain that the ban was to |
protect security; no reason for the ban was given. This dense, boilerplate |
agreement places the burden of securing against this attack on the party in |
the relationship least likely to have knowledge of the vulnerability—the |
user. |
In the aftermath of a data breach, this kind of blame game is typical.2 A |
legion of regulators will investigate. Insurance companies will balk. |
Penalties will be issued. Lawsuits will be launched. Commentators will |
castigate the organization for its carelessness. And, victims will often be |
blamed, typically for acting in predictable ways. |
There are many actors lurking in the shadows. They aren’t in the |
spotlight, but they are not bit players. These other actors are often not evil |
or malicious. They are doing exactly what our system allows them to do. |
In this chapter, we will describe the various types of actors that |
contribute to data breaches and the role that each plays. The law should |
hold these actors more responsible for their contribution to the risk. When |
we speak about the law imposing more responsibility, we are not referring |
to a particular legal strategy for doing so. The law can impose responsibility |
through lawsuits, monetary penalties, prohibitions, nudges, or regulatory |
interventions that are more cooperative than punitive. There are plenty of |
tools in the law’s toolbox. Our focus is on the first step, which is bringing |
the law to focus on risk management and to address risk throughout the |
entire data ecosystem. |
THE ACTORS |
Data breach stories often focus on the immediate events leading up to the |
breach. The stories typically begin with a person who makes a blunder, such |
as losing a device with data, failing to patch software, or falling for a |
phishing trick. |
But there is a lot more to the story than we often hear about. In fact, |
what we often learn about a breach is just one chapter of a long novel. To |
fully understand the problem, we must read all the chapters, where we will |
encounter a sweeping cast of characters who each play a role in the breach. |
Designers |
Actors who design insecure devices and buggy software with security vulnerabilities. |
Distributors |
Actors who distribute security threats, such as ad networks that fail to screen out malicious ads |
or platforms that fail to vet insecure apps. |
Amplifiers |
Actors who amplify the risks by collecting and storing massive amounts of personal data, such |
as consumer reporting agencies and other Big Data companies. |
Facilitators |
Actors who facilitate bad security by creating vulnerabilities for hackers to exploit, such as |
government entities that demand back doors that weaken security. |
Exploiters |
Actors who exploit existing vulnerabilities rather than reporting them and trying to fix them. |
Miseducators |
Actors who train people to engage in risky behavior and that undermine efforts to teach people |
safe practices. |
Designers |
Designers are the creators of countless devices, apps, and software |
programs that are riddled with security flaws. Designers usually don’t |
intentionally make insecure products; they just don’t prioritize security |
when designing. Instead, their energy is spent making things cheap and |
convenient because these are the services that the market typically rewards. |
Technology companies have also developed a culture of pushing a software |
release as soon as it works and then fixing it post-release through updates. |
The continual drive for updated systems and general tolerance for bugs in |
the software creates many issues. |
DEVICE DESIGNERS |
Brian Krebs, one of the leading security journalists, formerly wrote for The |
Washington Post. He later left the Post to write independently about |
security on his popular blog, KrebsOnSecurity. |
One evening in 2016, a DDoS attack was launched against Krebs’s |
website. A DDoS attack—short for a “distributed denial-of-service” attack |
—is one way malicious individuals use to shut down a site. They send a |
tsunami of traffic from other computers (usually infected with malware) to |
a site. The huge wave of traffic becomes too much for the computer server |
to handle, and the overload overwhelms the system. This floods out a |
website, rendering it inaccessible. DDoS attacks are automated, so millions |
of requests can occur in a short amount of time. On this fateful night, the |
DDoS attack knocked Krebs’s site down.3 |
Who did this? And why? Krebs and his readers suspected that the attack |
was payback for Krebs’ investigation into vDOS, a service that conducted |
DDoS attacks for hire. Krebs’ investigation led to the service being shut |
down and to the arrest of two of its founders.4 Unfortunately, there was no |
way to confirm his suspicion about the attack, as the perpetrators couldn’t |
be found. |
KrebsOnSecurity remained offline for days. Fortunately for Krebs, he |
had friends in high places. Ultimately, Google jumped in to rescue Krebs |
with Project Shield, a DDoS mitigation service for journalists and non- |
profit organizations.5 |
A DDoS attack comes from multiple different computers and devices. If |
all the traffic were to come from one source, the attack would be easy to |
stop—just block the source. What makes DDoS attacks challenging is that |
there are swarms of sources. Hackers locate sources by briefly |
commandeering them and commanding them to visit a website. This is |
known as a “botnet”—an army of machines that are taken over briefly to |
preform the DDoS attack. These machines aren’t a group of computers |
owned by hackers. Rather, they are machines owned by ordinary people, |
who often have no idea that their computers and devices are involved. |
The attack on Krebs involved the Mirai botnet. The botnet targeted |
Internet-enabled security cameras, DVRs, and printers.6 If you owned a |
security camera, it might have been involved in the Krebs attack, or it could |
be involved in another attack. You might never know. Indeed, many of your |
connected devices might be moonlighting as robot warriors, commanded by |
hackers from around the world. |
The hackers arranged a two-step strategy to attack Krebs. First, they |
hacked into these devices so that they could take them over at will. Then, |
they coordinated their robot army and told all the devices to request |
information from the web servers at once. |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.