Category Archives: Encryption
SHA-1 Encryption Has Been Broken: Now What? – Forbes
Forbes | SHA-1 Encryption Has Been Broken: Now What? Forbes In February 2017, Google and CWI announced they had broken SHA-1 encryption. This isn't a surprise: The encryption, used for things like digital signatures, had been susceptible to collisions for years. Companies began slowly phasing out SHA-1 after ... |
More here:
SHA-1 Encryption Has Been Broken: Now What? - Forbes
Hewlett Packard Enterprise touts encryption tool for federal clients – The Hill
Hewlett Packard Enterprise on Thursday announced that it has developed the first format-preserving encryption tool that meets federal government standards for use by agencies and government contractors.
The companys data security branch has been engaging with the National Institute of Standards and Technology (NIST) for several years to validate the encryption tool.
Format-preserving encryption maintains the format of the datas original text meaning that, for example, a 16-digit credit card number would be encrypted so that the output is another 16-digit number.
The encryption tool fits into Hewlett Packards data security product, called HPE SecureData, which has already been used in the private sector to secure banking records and other types of sensitive information.
Mark Bower, global director of product management at the company's data security branch, told The Hill that the product could have profound implications for government agencies and contractors trying to secure sensitive data from criminal and nation-state hackers.
The technology itself allows an organization to essentially go back in and retrofit or build in security or data privacy not only into the new applications they might be moving into [like] the cloud, but also in those highly-prized mission-critical [or] legacy systems that often are the backbone of government data processing, Bower said.
The ability to encrypt the data and keep the data useful when its encrypted means that you can essentially retrofit encryption into a lot of applications and processes and then do that without the heavy cost burden of traditional encryption, Bower said.
Information security in federal government systems has been a prime concern in the wake of the Office of Personnel Management breach, which compromised personal information of more than 20 million people and has been largely blamed on the agencys legacy systems. The breach was traced back to Chinese hackers.
Bower said that the company has already seen interest in the technology by U.S. federal agencies as well as other public organizations in other countries.
Here is the original post:
Hewlett Packard Enterprise touts encryption tool for federal clients - The Hill
Encryption on the Rise in Age of Cloud – Infosecurity Magazine – Infosecurity Magazine
How trustworthy is your cloud provider?
Thats the question many security personnel ask themselves, as cloud adoption continues apace. According to Thales 2017 Global Encryption Trends Study (carried out by Ponemon Institute), enterprises have accelerated adoption of encryption strategies in response to cloud adoption, with 41%of respondents saying their organization has an encryption strategy applied consistently across the enterprise.
About 67% of respondents take one of two routes: they either perform encryption on premise prior to sending data to the cloud, or encrypt in the cloud using keys they generate and manage on premises. But a full 37% said their organizations turn over complete control of keys and encryption processes to the cloud providers themselves.
Other critical findings demonstrate organizations continue to show a preference for control over encryption and key management when those activities migrate to the cloud. About a third (31%) are using or planning to use hardware security modules (HSMs) with bring your own key (BYOK) deployments, with 20% claiming the same for cloud access security broker (CASB) deployments.
Use of HSMs among organizations grew to its highest level ever, at 38%; of those respondents, 48% own and operate HSMs on-premise in support of cloud-based applications. Overall, usage of HSMs with CASBs is expected to double in the next 12 months (from 12% to 24%).
Also, for the first time in the studys 12-year history, business unit leaders have a higher influence over encryption strategy than IT operations.
This years findings align with key trends demonstrating an increased reliance on the cloud, ever-evolving internal and external threats, and new data sources mandating stronger protection, said John Grimm, senior director of security strategy at Thales e-Security. The survey further reinforces that cloud key management offerings are more important than everand business-leader involvement is crucial to a sound security strategy.
And no wonder: At 55%, compliance is the top driver for encryptionfollowed closely by protecting enterprise intellectual property (51%), customer information protection (49%) and protection from external threats (49%).
The accelerated growth of encryption strategies in business underscores the proliferation of mega-breaches and cyberattacks, as well as the need to protect a broadening range of sensitive data types, said Larry Ponemon, chairman and founder of the Ponemon Institute. Simply put, the stakes are too high for organizations to stand by and wait for an attack to happen to them before introducing a sophisticated data protection strategy. Encryption and key management continue to play critical roles in these strategies.
Originally posted here:
Encryption on the Rise in Age of Cloud - Infosecurity Magazine - Infosecurity Magazine
Make Encryption Ubiquitous, Says Internet Society – Infosecurity … – Infosecurity Magazine
The Internet Society has urged the G20 not to undermine the positive role of encryption in the name of security, claiming it should provide the foundation of all online transactions.
As the worlds leading economies met in Hamburg late last week, president and CEO of the non-profit, Kathryn Brown, called for ubiquitous encryption for the internet.
That comes amid a resurgence in encryption-bashing from some senior politicians, which have portrayed it as enabling terrorism in the wake of recent attacks in London and elsewhere.
Most notably, UK home secretary Amber Rudd went on the offensive, naming and shaming Facebooks WhatsApp for its use of end-to-end encryption.
Rudd and others around the world want to force tech firms to effectively create backdoors for law enforcers, so they can be used to intercept communications of suspects under investigation.
Even the historically more liberal European Commission recently claimed it was considering such a strategy.
However, the Internet Societys Brown argued that encryption should be made stronger and universal, not weaker.
Strong encryption is an essential piece to the future of the worlds economy and the Internet Society believes it should be the norm for all online transactions. It allows us to do our banking, conduct local and global business, run our power grids, operate, communications networks, and do almost everything else, she wrote.
However, rather than being recognized as the way to secure our online transactions or our conversations, all too often the debate focuses on the use of encryption as a way to thwart law enforcement. To undermine the positive role of encryption in the name of security could have devastating consequences.
Kevin Bocek, chief cybersecurity strategist for Venafi, agreed with the Internet Society, adding encryption was particularly important as we move to a world dominated by AI.
Machines have to be able to know which machine they are taking to they need privacy. This goes beyond enabling ecommerce and online banking all machine identities need to be protected and to do this we need encrypted and private communications, he added.
This is why our IoT-driven future, where decisions are made and business is conducted in the cloud through machines, needs encryption. If government wants to have an e-enabled, information society of the future, encryption is a required ingredient, not an optional one that can be picked up or put down at will.
The G20 has for the first time decided to hold ministerial meetings focused specifically on digital policy areas, and is also inviting non-governmental stakeholders to contribute, offering a great opportunity for a more balanced debate, Brown argued.
However, it remains to be seen whether Browns words will be heeded, especially as voters, politicians and headline writers appear to have little appetite to grasp the nuances of the argument for encryption.
A survey by Cable.co.uk last week revealed that most of the British public would feel safer without encryption.
A meeting of digital ministers in Dsseldorf last week appeared to focus mainly on global internet speeds and accessibility.
Visit link:
Make Encryption Ubiquitous, Says Internet Society - Infosecurity ... - Infosecurity Magazine
Can we encrypt the web while giving governments a backdoor to snoop? – SC Magazine UK
It's a choice between privacy and law enforcement
As SC Media reported yesterday the Internet Society has called upon G20 nations to ensure ubiquitous encryption of the web.
The president and CEO of the Internet Society, Kathryn Brown, has gone on record to state that encryption should be made stronger and universal, not weaker.
Some have taken this as a call to encrypt everything online, however in her Securing our Digital Economy' statement Brown says, Strong encryption is an essential piece to the future of the world's economy and the Internet Society believes it should be the norm for all online transactions.
Brown also mentions how rather than being recognised as a way to secure online transactions, or conversations, the debate too often focuses on the use of encryption as a way to thwart law enforcement.
Which got us thinking here at SC Media UK, would it actually be technically possible to encrypt the entire web and perhaps a little more controversially could this be achieved in a way that enabled decryption to facilitate criminal and national security investigations?
Yes, we know, one country's terrorist is another's journalist, but considering the ongoing global clamour for encryption backdoors we wondered how technically feasible it might be at an internet-wide scale?
As always, we turned to the cybersecurity industry itself for some answers:
Neil Cook, chief security architect at Open-Xchange, welcomed the Internet Society comments and reckons that universal encryption should not only be possible, but mandatory for web traffic, communications and data at rest. We cannot let the actions of a small minority of people compromise the security and privacy of everyone else by weakening the encryption we all rely on to keep us safe and our data private, he says.
Which, while admirable, doesn't get us any closer to the technical feasibility point. Dan Panesar from Certes Networks ponders whether that's because it's not actually possible. In practical terms, it would need to focus on utilising secure connections to everything, rather than blanket encryption of the entire web, Panesar says. Blanket web encryption would almost create more problems than it solves, slowing the internet and causing serious functionality problems.
Chris Hodson, EMEA CISO at Zscaler, is more positive about whether it can be achieved technically. In a word, yes, he told SC Media. Though encryption remains only part of the security puzzle. Front loading the internet with the silver bullet' of encryption only serves to protect information in transit between two parties and does not maintain security hygiene overall.
As Hodson adds, encryption is only actually valid against those who shouldn't have access to data. Encrypted information is still accessible if a hack is undertaken via legit' means such as the spear-phishing of an admin account.
Mark James, security specialist at ESET, agrees that it's a nice thought but says that while in theory it would enable private communication of all personal data, in practise with so many parts operated, owned and channelled through so many gateways it's a job that's seems highly unrealistic to achieve.
Javvad Malik, security advocate at AlienVault, prefers to try and break the problem down into component parts of which, he told us, there are primarily three:
Areas of the web that absolutely should be encrypted and active efforts should be made to increase the security. For example, with it comes to online banking transactions there should be no margin for doubt.
Areas of the web that need privacy and security, but could co-operate with law enforcement without undermining the security model. For example, a cloud provider that holds the encryption keys, or that can create additional access accounts can provide access. This is more common in SaaS type scenarios.
The real pain points which involves all those apps that need to be secured and have no easy way to intercept. This is where apps like WhatsApp sit which offer end-to-end encryption and even the service provider should not be able to access the data.
Lee Munson, security researcher at Comparitech, moved on to our secondary question, that of law enforcement access to encrypted communications.
For them to gain access to encrypted traffic there would be a need to share keys which, by definition, removes the encryption, Munson explains. While this could be controlled in such a manner that no third-party gains access to those keys, experience has told us that as soon as you slip a backdoor of any kind into an encrypted medium, some unauthorised person or group will find a way to leverage it for their own purposes.
High-Tech Bridge's CEO, Ilia Kolochenko, was equally perplexed by this at a technical level. It's technically impossible to design an encryption that good guys could break, while bad guys could not, he says. Even if we do develop such an algorithm one day, the bad guys will hack the good guys and decrypt all your data.
His answer then? That we need to make a choice between privacy and law enforcement. But then again, as Javvad Malik pointed out, the way currently encryption works, I'm not aware of a way that the communication can be kept secure but access allowed; not unless the laws of mathematics can be changed
We will leave it to the Venafi chief cyber-security strategist, Kevin Bocek, to swing the debate back around to commerce and the digital economy.
Encryption is key (no pun intended) to the system of trust which underlies the security of every machine on the Internet, of that there's no doubt. There is no replacement so we really need to continue to make this system work, Bocek told SC Media.
Machines have to be able to know which machine they are taking to, they need privacy, he explained. This goes beyond enabling ecommerce and online banking all machine identities need to be protected and to do this we need encrypted and private communications.
This, argues Bocek, is why our IoT-driven future, where decisions are made and business is conducted in the cloud through machines, needs encryption. If government wants to have an e-enabled, information society of the future, he concludes, encryption is a required ingredient, not an optional one that can be picked up or put down at will.
Visit link:
Can we encrypt the web while giving governments a backdoor to snoop? - SC Magazine UK
Why we need to encrypt everything – InfoWorld
If you've been paying attention lately, you've likely noticed that more of your everyday websites are going HTTPS by default: Twitter, Facebook, LinkedIn, and even your favorite search engine.
This is a good development. For years, critics have derided default, widespread HTTPS encryption and authentication as unnecessary and performance-wasting. But now that we've seen most of the biggest websites go HTTPS, led by Google, the world is finding out it isn't such a bad idea.
In fact, it's great. It's time for us to go all the way and encrypt and authenticate everything!
At a time where the U.S. Congress is allowing ISPs to continue spying on users' private sessions, we need default HTTPS to protect our privacy. We need to incorporate security and privacy protections in all our communications, whether over the internet, telephone, cable, mobile phones, instant messaging -- any form of networked communications. We should demand constant protection of all that. It's the only way to make the internet truly more secure and private.
Computer security students use the acronym of CIA -- aka "confidential, integrity, availability" -- to describe why computer security is needed.
Confidentiality refers to keeping information from being seen by unauthorized parties. Integrity means making sure a person or computer is who they say they are (or that content has been unmodified since it's intended distribution). Availability is ensuring that a computer asset is accessible to authorized parties, thanks to such practices as preventing denial-of-service attacks.
We should apply the security CIA triad to all computing and network communications. That doesn't mean we have to apply the strongest and most expensive security to everything; security measures should be commensurate with data they protect. You wouldn't protect a website containing public information as strenuously as you'd protect weapon systems or classified information. But in general, all websites and services should have some basic level of encryption and integrity.
Conventional wisdom dictates that protecting assets and content that don't seem to demand strong computer security is wasteful, unnecessary, and performance-killing. As a result, only content that supposedly needs better protecting receives it. What we end up with is a hodgepodge of protection, often within the same site or service.
We're all accustomed to connecting to banking websites that start off unprotected, then switch to protected for a logon or transaction, often with single pages that contain a mix of protected and unprotected content. Sometimes it's hard to determine which is which. The complexity of sustaining differing levels of protection on the same site is confusing to us and our browsers.
As it turns out, it's simply easier for developers, browsers, and users to protect everything all the time.
I liken it to file-based encryption. With file-based encryption, either you or the system encrypts files on a file-by-file or folder-by-folder basis. This supports the idea that only certain items need to be protected. But file-based encryption almost always fails as true protection over the long run. Objects that should be protected don't get protected. Sensitive data leaks out. A simple application crash can leave confidential data exposed. Moreover, it's difficult to remove all confidential data even if you try, especially in today's growing world of memory storage media (which doesn't even let the operating system choose what data to delete or encrypt).
Volume- and disk-based encryption is becoming the norm. You turn it on, and every file, every data bit remnant is protected by default. This approach makes an unintended data reveal much less likely, and usually the protection is invisible to the user. We need to take lessons learned in the storage arena and apply them to the rest of the world. Widespread, default, pervasive protection works best.
Getting rid of all HTTP connections and moving to (or even requiring) HTTPS is a good way to start. HTTPS gives us encryption and integrity during network transmission. We need to require default, total media encryption on all disks and storage media. No USB key or camera memory card should be without it.
We also need to move from one-factor authentication to two-factor (or greater) authentication. Stronger authentication doesn't prevent all attacks, but it stops the phishing of credentials, which is very prevalent right now.
It's also important to authenticate all content to protect its integrity, although this flies in the face of conventional thinking. Why protect content anyone can acquire? Mainly because it's easier to encrypt everything, but also because all content needs integrity protection.
Suppose a government agency offers public documents that anyone can have, use, and share. It's important that what users download and share is authentic. You don't want someone changing a public document to say something else and disseminate it as if it were the genuine article.
You might argue that many documents, where the original author or distributor doesn't mind any modification, shouldn't be integrity-protected. Again I'll argue that it's easier, more accurate, and cheaper to protect everything than singling out winners and losers.
Even availability issues need to be worldwide. You might think it's OK for your site or service to go down, but in today's world, you never know what upstream or downstream entity is integrating with your offering. Besides, almost everything in the cloud is redundant already, and it's cheaper to protect everything rather than a few bits.
It's inevitable that enabling security universally, such as HTTPS or default encryption, will break some objects, especially those that were built before these security options were available or pervasive. So what? Welcome to the real world. If something breaks, it's time to fix it or forget it. Pervasive computer security shouldn't be held back by dinosaur apps and services.
All spies dislike the idea of pervasive encryption and other security protections. Again, so what? The ability to protect our personal privacy should trump any other societal need.
I and millions of others don't buy that government must be able to infiltrate every digital transaction to protect society from criminals and terrorists. Let me be clear: We are willing to put up with the idea that pervasive security makes it harder for law enforcement to do its job.
That said, I'm not suggesting that default, pervasive security is a panacea. If a bad group successfully breaks into your computer or into a website, it can pretty much do anything it wants, including disabling default security.
But having good security always turned on as default means even those events are less likely to happen. Requiring seat belts in cars and helmets on motorcycle riders doesn't stop car or motorcycle deaths. But it absolutely, significantly reduces the number of deaths and horrible, disabling injuries.
The internet and every device connected to it will one day have built-in, pervasive security, turned on by default. It's already happening. I want us all to recognize it, hop on the bandwagon, and get it done. It's the only way the internet has a chance to be significantly more secure.
Read more here:
Why we need to encrypt everything - InfoWorld
Hacked Dallas sirens get extra encryption to fend off future attacks – Computerworld
Thank you
Your message has been sent.
There was an error emailing this page.
By Matt Hamblen
Senior Editor, Computerworld | Apr 11, 2017 2:37 PM PT
Dallas city officials have added extra encryption and other security measures to the outdoor warning sirens hacked early Saturday.
The hack also prompted the city to evaluate critical systems for potential vulnerabilities, City Manager T.C. Broadnax said in a statement late Monday. City officials are reviewing security for financial systems, a flood warning system, police-fire dispatch and the 911/311 system.
Broadnax told reporters separately on Monday that the hack came over a radio frequency and not over a wired computer network. The attack was "not a system software issue; it was a radio issue," he told the Dallas Observer and others.
The city believes the hack came from the Dallas area, but officials haven't detailed how it occurred. Dallas police are working with the FBI and the Federal Communications Commission (FCC) to validate what they think happened and find the source. The hack caused all 156 emergency sirens to activate for about 90 minutes, scaring some residents and doubling the number of calls to 911.
Radio security experts theorized the incident may have been a simple "replay attack" where the hacker recorded the radio signal sent out on April 5 at noon as part of a monthly test of the emergency siren system. Then, the hacker could have played that signal back repeatedly early Saturday. It would take a hacker with a software defined radio (SDR) or other off-the-shelf radio frequency test equipment to pull off the attack, said Chris Risley, CEO of Bastille Networks, a company that remediates radio frequency vulnerabilities.
Frequencies used for outdoor sirens are public and are managed by the FCC. Various security techniques, including encryption, are used to protect signals sent by radio.
Even if a "replay attack" was not used, the regularly scheduled siren test would allow an attacker to make multiple recordings of the "activate sirens" radio stream over several months and then analyze it for specific commands to trigger the alert, he added. SDRs are becoming cheaper and more capable and there is an abundance of open source software that can decode activation protocols.
Risley said other cities are probably just as vulnerable as Dallas.
The Dallas incident highlights how vulnerable and unprotected U.S. enterprises and government authorities are, said Matt Little, chief product officer for encryption provider PKWare. "Traditional security perimeters are breaking down. This attack reaffirms how necessary encryption is," he said.
Many siren systems are decades old and Dallas may have been relying on low-level encryption, perhaps even 64-bit encryption based on the Data Encryption Standard (DES) from the late 1970s, he said.
"Sirens are analogous to a lot of aging critical infrastructure that was built for high availability, and always has to be online, so security took a back seat to that," Little said.
Dallas may have decided after the hack to upgrade encryption or improve the authentication system regarding who gets access to encryption keys, Little said.
In the Dallas case, a hacker could have listened to the low-level encrypted activation signal sent to sirens for some time, then used a brute force attack to figure out the encryption key needed. "It seems to be a large brute force effort to compromise a signal tower," Little said.
In some ways, radio-controlled systems like a siren warning system with even weak encryption could actually be more secure than some Internet-connected devices with no encryption, he said. For example, unprotected cameras connected to the Internet that were attacked by the Mirai botnet were used in a coordinated D-DOS attack on Dyn servers last October. The result: widespread Internet outages.
Senior Editor Matt Hamblen covers mobile and wireless, smartphones and other handhelds, and wireless networking for Computerworld.
Sponsored Links
More:
Hacked Dallas sirens get extra encryption to fend off future attacks - Computerworld
Internet Society tells G20 nations: The web must be fully encrypted – The Register
The Internet Society has called for the full encryption of the internet, decrying the fact that securing the digital world has increasingly become associated with restricting access to law enforcement.
In a blog post aimed at the leaders of the G20 economies, ISOC CEO Kathryn Brown argues that the digital economy "will only continue to thrive and generate opportunities for citizens if the Internet is strong, secure, and trusted," adding: "Without this foundation, the global digital economy is at risk."
The G20 will meet in Hamburg in July and one of the main agenda topics is the "spread of digital technology" and its impact on economic growth. Notably, there will be a "digital affairs ministers conference" for the first time at the summit, and the importance of the topic was highlighted with a special two-day preparatory meeting last week attended by "ministers in charge of digitalization."
"Germany wants them to agree to a concrete plan one that includes affordable Internet access across the world by 2025, common technical standards and a focus on digital learning," wrote Brown at the conclusion of that prep meeting, presumably having been briefed on discussions.
The post gives some figures on the digital economy 360 million people; 28 per cent of output is digital; the internet contributes $6.6tn a year before getting to the point: interconnection and security.
"The truth is that economies can only function within a secure and trusted environment," Brown notes, "which brings us to encryption."
Internet engineers have long been strong advocates of increased online security (something that has been difficult since the internet's earliest building blocks largely ignored the idea of malicious activity), and the Internet Society reflects that belief back: "Strong encryption is an essential piece to the future of the world's economy and the Internet Society believes it should be the norm for all online transactions. It allows us to do our banking, conduct local and global business, run our power grids, operate communications networks, and do almost everything else."
Brown goes on: "Encryption is a technical building block for securing infrastructure, communications and information. It should be made stronger and universal, not weaker."
But then she also notes that in the past year, the issue of encryption has become intricately tied up with the issue of law enforcement trying to gain access to people's communications and being unable to do so.
In the lead-up to the US presidential election, the fight between the FBI and Apple over the phone of San Bernardino shooter Syed Farook became a hot topic. Politicians and law enforcement called for a backdoor (or even a frontdoor) to the latest encryption efforts, and tech companies, security bods, civil society and some federal agencies called that notion "magical thinking" because any hole introduced into encryption software is an exploitable hole that anyone can use and abuse.
Last month, the issue re-emerged following an attack in London, when the UK home secretary Amber Rudd specifically criticized Facebook-owned WhatsApp for not providing access to the app-based conversations of attacker Khalid Masood.
Just days later, EU Justice Commissioner Vra Jourov said she would introduce legislation to make it easier for law enforcement to gain access to encrypted apps' data. That followed calls from French and German ministers for ways to access encrypted comms.
However, following a now-familiar backlash to such calls from cybersecurity experts, Rudd then downplayed her call for access to encrypted communications. Jourov's department insisted she did not mean to imply the legislation would cover encryption only access to data stored in the cloud by encrypted apps (which presumably she expects to be unencrypted).
ISOC CEO Brown is not happy about how this conversation is defining the debate around encryption. "Rather than being recognized as the way to secure our online transactions or our conversations, all too often the debate focuses on the use of encryption as a way to thwart law enforcement," she complains, arguing: "To undermine the positive role of encryption in the name of security could have devastating consequences."
The Internet Society is usually diplomatic to the point of saying nothing, so when its CEO says, "we should recognize that encryption is key to the future digital economy and stop treating it as simply an obstacle to law enforcement," it is clear that the level of frustration among internet engineers is high.
Hammering the point home, she adds: "We need to deconstruct the issues faced by law enforcement and policy makers and agree together how we can achieve a trusted digital economy underpinned by encryption."
ISOC clearly sees July's G20 Summit as the best opportunity to address that concern, with Brown calling it a "turning point that should not be missed." And its position is stated simply: "The Internet Society calls for ubiquitous encryption for the Internet. We strongly believe that this is the best foundation for trust in the digital economy, and we urge the G20 nations to stand behind encryption."
Whether that technical message makes it past the politics of terrorism is going to be hard to discern, but there is little doubt that a more secure online environment is going to be a healthier one financially and ISOC and others will be hoping that money talks louder than fear.
Read this article:
Internet Society tells G20 nations: The web must be fully encrypted - The Register
Lack of encryption led to Dallas siren hack – WFAA
Dallas sirens hacked through radio frequencies
Landon Haaf and David Goins , WFAA 7:19 PM. CDT April 10, 2017
DALLAS - The city of Dallas confirmed Monday that a lack of encryption of the signal transmitted to 156 sirens led to the hack that kept Dallas residents awake late Friday and early Saturday.
City spokesperson SanaSyed confirmed to News 8 that city personnel had not set the system to use an encrypted signal before the sirens were activated for nearly 90 minutes.
Dallas City Manager T.C. Broadnaxtold reporters earlier Monday that the hack was accessed through the use of radio frequencies, and not remotely through computer software.
"The issue was with how we transmitted our information and weve worked to close those gaps,Broadnaxsaid.
All of the 156 outdoor warning sirens went off, starting at 11:42 p.m. Friday and lasting more than 90 minutes. City officials said Saturday that an apparent hack caused the sirens to go off, after first saying it was simply a system malfunction.
"The issue was with how we transmitted our information and weve worked to close those gaps, Broadnax said.
UPDATE: #Dallas sirens were not hacked via "computer software. This was a radio issue" says Broadnax. @wfaachannel8 pic.twitter.com/gXjS0kEBjV
On Monday, the Dallas office of emergency management said in a YouTube video that the system was fully operational.
If we had to activate the system at any point in time, we safely could do that to alert our residents and guests of any severe weather or impending hazard, Dallas OEM staff member Kevin Oden said in the video.
Severe storms with the threat of hail and damaging winds are expected in the area Monday afternoon and evening.
Broadnax made his statement at the start of the Public Safety Committee meeting Monday.
Council member Philip Kingston made a motion to enter executive session -- a closed meeting -- to discuss the siren hack, and despite a unanimous vote in support, committee chair Adam Medrano opted not to after advice from the city attorney.
"I'm advising you not to do that" - #Dallas city atty on going into closed session on siren malfunction - says item hasn't been posted
InsteadBroadnaxwill present more information on the hack to the full council onWednesday, but confirmed DPD and the FBI are leading the investigation.
We need to improve but someone intruded in our system," Broadnax said. "So had they not done something that is illegal, then in fact the notification and the issues wouldnt have occurred. Well own what we need to own and that is well work to improve our system. Weve already done that over this weekend.
2017 WFAA-TV
WFAA
Council member wants update on Dallas siren hacking
WFAA
Hackers prompted sirens to go off across Dallas area
View original post here:
Lack of encryption led to Dallas siren hack - WFAA
Why isn’t US military email protected by standard encryption tech? – Naked Security
One of the United States Senates most tech-savvy members is asking why much of the US militarys email still isnt protected by standard STARTTLS encryption technology.
Last month, Sen. Ron Wyden (D-Oregon) shared his concerns with DISA, the federal organization that runs mail.mil for the US army, navy, marines and the Coast Guard:
The technology industry created STARTTLS fifteen years ago to allow email servers to communicate securely and protect email messages from surveillance as they are transmitted over the internet. STARTTLS is widely supported by email server software but, critically, it is often not enabled by default, meaning email server administrators must turn it on.
Wyden noted that major tech companies including Google, Yahoo, Microsoft, Facebook, Twitter, and Apple use STARTTLS, as do the White House, Congress, NSA, CIA, FBI, Director of National Intelligence, and Department of Homeland Security but not DISA.
A 2015 Motherboard investigation originally uncovered the limited use of STARTTLS by U.S. government security agencies. Since then, Motherboard reports, many of the aforementioned agencies have started using STARTTLS but not DISA.
Wyden observed that until DISA enables STARTTLS, unclassified email messages sent between the military and other organizations will be needlessly exposed to surveillance and potentially compromised by third parties.
Even if all the military messages sent through DISAs servers are unclassified, if Wyden is correct, this might conceivably give adversaries additional insights into the US militarys structure, decision-makers, and decision-making processes.
Early reports on Wydens letter quoted DISA as saying that it would respond formally to him. DISA told Naked Security:
We are not at liberty to discuss specific tactics, techniques, and procedures by which DISA guards DOD email traffic. Email is one of the largest threat vectors in cyberspace. We can tell you that DISA protects all DOD entities with its Enterprise Email Security Gateway Solution (EEMSG) as a first line of defense for email security.
DISAs DOD Enterprise Email (DEE) utilizes the EEMSG for internet email traffic and currently rejects more than 85% of daily email traffic due to malicious behavior. DISA inspects the remaining 15% of email traffic to detect advanced, persistent cybersecurity threats. The Agency always makes deliberate risk-based decisions in the tools it uses for cybersecurity, to include email protocols for the DoD.
In the news you can use spirit, this might be a good time for a brief primer on STARTTLS. This SMTP extension aims to partially remedy a fundamental shortcoming of the original SMTP email protocol: it didnt provide a way to signal that email communication should be secured as messages hop across servers towards their destinations.
Using STARTTLS, an SMTP client can connect over a secure TLS-enabled port; the server can then advertise that a secure connection is available, and the client can request to use it.
STARTTLS isnt perfect. It can be vulnerable to downgrade attacks, where an illicit man-in-the-middle deletes a servers response that STARTTLS is available. Seeing no response, the client sends its message via an insecure connection, just as it would have if STARTTLS never existed. But, as the Internet Engineering Task Force (IETF) puts it, this opportunistic security approach offers some protection most of the time.
IETF says protocols like STARTTLS are:
not intended as a substitute for authenticated, encrypted communication when such communication is already mandated by policy (that is, by configuration or direct request of the application) or is otherwise required to access a particular resource. In essence, [they are] employed when one might otherwise settle for cleartext.
For context, Google reports that 88% of the Gmail messages it sends to other providers are now encrypted via TLS (in other words, both Google and the other provider supports TLS/STARTTLS encryption); 85% of messages inboundto Gmail are encrypted.
Would STARTTLS offer value in securing the military communications DISA manages through mail.mil? From the outside, its easy to say Yes. But it sure would be fascinating to hear the technical conversation between DISAs security experts and Senator Wydens.
Email service providers are caught on the horns of a dilemma, it seems. Naked Securitys Paul Ducklin says:
STARTTLS only deals with server-to-server encryption of the SMTP part, so it isnt a replacement for end-to-end encrypted email in environments where thats appropriate.In other words, there are situations in which you may be able to make a strong case for not needing STARTTLS. But my opinion is that its easier just to turn on STARTTLS anyway just think of all the time youll save not having to keep explaining that strong case of yours.
As for you: if you arent using STARTTLS wherever its available to you, why not?
Read the rest here:
Why isn't US military email protected by standard encryption tech? - Naked Security