US Army reduces tech vulnerabilities

GEC: Discuss gaming, computers and electronics and venture into the bizarre world of STGODs.

Moderator: Thanas

Post Reply
User avatar
Xisiqomelir
Jedi Council Member
Posts: 1757
Joined: 2003-01-16 09:27am
Location: Valuetown
Contact:

US Army reduces tech vulnerabilities

Post by Xisiqomelir »

Forbes
Thinking Different
Apples For The Army
Andy Greenberg , 12.21.07, 6:00 AM ET

Given Apple's marketing toward the young and the trendy, you wouldn't expect the U.S. Army to be much of a customer. Lieutenant Colonel C.J. Wallington is hoping hackers won't expect it either.

Wallington, a division chief in the Army's office of enterprise information systems, says the military is quietly working to integrate Macintosh computers into its systems to make them harder to hack. That's because fewer attacks have been designed to infiltrate Mac computers, and adding more Macs to the military's computer mix makes it tougher to destabilize a group of military computers with a single attack, Wallington says.

This past year was a particularly tough one for military cybersecurity. Cyberspies infiltrated a Pentagon computer system in June and stole unknown quantities of e-mail data, according to a September report by the Financial Times. Later in September, industry sources told Forbes.com that major military contractors, including Boeing, Lockheed Martin, Northrop Grumman and Raytheon had also been hacked.

The Army's push to use Macs to help protect its computing corps got its start in August 2005, when General Steve Boutelle, the Army's chief information officer, gave a speech calling for more diversity in the Army's computer vendors. He argued the approach would both increase competition among military contractors and strengthen its IT defenses.

Apple computers still satisfy only a tiny portion of the military's voracious demand for computers. By Wallington's estimate, around 20,000 of the Army's 700,000 or so desktops and servers are Apple-made. He estimates that about a thousand Macs enter the Army's ranks during each of its bi-annual hardware buying periods.

Military procurement has long been driven by cost and availability of additional software--two measures where Macintosh computers have typically come up short against Windows-based PCs. Then there have been subtle but important barriers: For instance, Macintosh computers have long been incompatible with a security keycard-reading system known as Common Access Cards system, or CAC, which is heavily used by the military.

The Army's Apple program, created after Boutelle's 2005 address, is working to change that. As early as February 2008, the Army is planning to introduce software, developed by Arlington, Texas-based Thursby Software, that will also enable Mac desktops and laptops to use CAC systems--a change that should make it easier to get Macs into the service.

Though Apple machines are still pricier than their Windows counterparts, the added security they offer might be worth the cost, says Wallington. He points out that Apple's X Serve servers, which are gradually becoming more commonplace in Army data centers, are proving their mettle. "Those are some of the most attacked computers there are. But the attacks used against them are designed for Windows-based machines, so they shrug them off," he says.

Apple, which declined to comment, has long argued its hardware is less hackable than comparable PCs. Jonathan Broskey, a former Apple employee who now heads the Army's Apple program, argues that the Unix core at the center of the Mac OS operating system makes it easier to lock down a Mac than a Windows platform.

And Apple's smaller market share has long meant that it didn't attract cybercriminals hoping to wreck the most havoc possible. "If you look at the numbers, you see that malicious software for Macs is very limited," he says. "We used to sell Apples by saying they don't get viruses."

Of course, cyberspooks may be honing their Mac-attacking skills, too. An end-of-year report by Finnish software security company F-Secure highlights the growing number of hackers targeting Apple systems with malicious software, some of which could allow cybercriminals to steal security passwords. In the past two years, until this October, F-Secure found only a small handful of malicious programs targeting Macs. In the past two months, the company has found more than a hundred specimens of Mac-targeted malicious code.

Charlie Miller, a software researcher with Independent Security Evaluators, worries that the Army's diversification plan isn't enough to thwart the bad guys. He sees a two-platform system as a "weakest link" scenario, in which a determined cyber-intruder will seek out the more vulnerable of the two targets. "In the story of the three little pigs, did diversifying their defenses help? Not for the pig in the straw house," he says.

The marketing pitch that Apples are inherently more secure than PCs is also largely a myth, contends Miller, who gained notoriety for remotely hacking the iPhone last August. He points to data gathered by software security firm Secunia, which showed that Apple had to patch nearly five times as many security flaws in its software over the past year as Microsoft had to patch in Windows. Apple's Quicktime player alone, he says, was patched 34 times. "I love my Macs, but in terms of security, they're behind the curve, compared to Windows," Miller warns.

But the Army's Jonathan Broskey stands by his claims of Apple's security: He says the high number of patches to Apple software is a good sign--evidence of the large community of developers actively working to tighten Unix programs and eliminate bugs. Nonetheless, like any responsible IT department, he says the Army's Apple program will closely monitor security updates to Mac-specific programs. "The Army's no different from any corporation," he says.

Still, relative to corporate cybersecurity, Lieutenant Colonel Wallington points out, the stakes are much higher. A leaked deployment order, for instance, might reveal the path of a supply truck and the points where it could be sabotaged, he says.

"This is information that affects the lives of soldiers and the civilians we're trying protect," Broskey adds. "It has to be safeguarded."
User avatar
Solauren
Emperor's Hand
Posts: 10388
Joined: 2003-05-11 09:41pm

Post by Solauren »

Given the money the army has, converting to all Macintosh shouldn't be a problem.

However, that may actually encourage hackers to target Macintosh systems.

I personally think the Army would be further ahead buying up a software firm and saying 'okay, make us our own custom operating system to these specifications.'

Keep the operating system classified, and that would reduce hacker problems dramatically.

'Course, that would oh, make sense
User avatar
phongn
Rebel Leader
Posts: 18487
Joined: 2002-07-03 11:11pm

Post by phongn »

Writing an entirely new custom OS probably would make the system less secure, not more.
User avatar
Durandal
Bile-Driven Hate Machine
Posts: 17927
Joined: 2002-07-03 06:26pm
Location: Silicon Valley, CA
Contact:

Post by Durandal »

Solauren wrote:However, that may actually encourage hackers to target Macintosh systems.
It probably will. But frankly, we've been hearing all this noise about how Mac OS X is going to be the next Windows XP for years now. And it hasn't happened. With things like Seat Belt in Leopard, exploits' ability to harm the system will be severely diminished. There are vulnerabilities in Mac OS X, but no one seems to have really bothered exploiting them, despite growing marketshare, mindshare and the supposed "smug attitude" of Mac users about security.
I personally think the Army would be further ahead buying up a software firm and saying 'okay, make us our own custom operating system to these specifications.'
Just buying up a software company and telling them to write an operating system isn't exactly easy. And the final product will almost certainly be riddled with security holes, since code scrutiny will be limited to those with security clearances. It's a security-by-obscurity design, and it doesn't work. The entire technique of fuzzing was probably developed largely in part to work against this security model.
Keep the operating system classified, and that would reduce hacker problems dramatically.

'Course, that would oh, make sense
Not terribly, no.
Damien Sorresso

"Ever see what them computa bitchez do to numbas? It ain't natural. Numbas ain't supposed to be code, they supposed to quantify shit."
- The Onion
User avatar
Zablorg
Jedi Council Member
Posts: 1864
Joined: 2007-09-27 05:16am

Re: US Army reduces tech vulnerabilities

Post by Zablorg »

Lieutenant Colonel C.J. Wallington is hoping hackers won't expect it either.
Well Wallington, you just kind of blew that hope by announcing you're using them! :lol:
Jupiter Oak Evolution!
User avatar
Darth Ruinus
Jedi Master
Posts: 1400
Joined: 2007-04-02 12:02pm
Location: Los Angeles
Contact:

Re: US Army reduces tech vulnerabilities

Post by Darth Ruinus »

Zablorg wrote:
Lieutenant Colonel C.J. Wallington is hoping hackers won't expect it either.
Well Wallington, you just kind of blew that hope by announcing you're using them! :lol:
Or...

... its a trick!
"I don't believe in man made global warming because God promised to never again destroy the earth with water. He sent the rainbow as a sign."
- Sean Hannity Forums user Avi

"And BTW the concept of carbon based life is only a hypothesis based on the abiogensis theory, and there is no clear evidence for it."
-Mazen707 informing me about the facts on carbon-based life.
User avatar
Durandal
Bile-Driven Hate Machine
Posts: 17927
Joined: 2002-07-03 06:26pm
Location: Silicon Valley, CA
Contact:

Post by Durandal »

It's a trap!
Damien Sorresso

"Ever see what them computa bitchez do to numbas? It ain't natural. Numbas ain't supposed to be code, they supposed to quantify shit."
- The Onion
User avatar
Spyder
Sith Marauder
Posts: 4465
Joined: 2002-09-03 03:23am
Location: Wellington, New Zealand
Contact:

Post by Spyder »

Yep, someone's going to feel very clever when they telnet in and get greeted with a TRS-DOS prompt.
:D
User avatar
Rogue 9
Scrapping TIEs since 1997
Posts: 18679
Joined: 2003-11-12 01:10pm
Location: Classified
Contact:

Post by Rogue 9 »

Okay, so now hackers have an actual reason to start hacking Macs. Yay?
It's Rogue, not Rouge!

HAB | KotL | VRWC/ELC/CDA | TRotR | The Anti-Confederate | Sluggite | Gamer | Blogger | Staff Reporter | Student | Musician
User avatar
Spyder
Sith Marauder
Posts: 4465
Joined: 2002-09-03 03:23am
Location: Wellington, New Zealand
Contact:

Post by Spyder »

Rogue 9 wrote:Okay, so now hackers have an actual reason to start hacking Macs. Yay?
That'll be interesting to see actually. I've always been curious to see how Macs would perform if hackers were given a reason to launch an attack.
:D
User avatar
Zablorg
Jedi Council Member
Posts: 1864
Joined: 2007-09-27 05:16am

Post by Zablorg »

Mac fans say that no one really hacks macs because of their 1337 security. Can anyone confirm this?
Jupiter Oak Evolution!
User avatar
Mr Bean
Lord of Irony
Posts: 22464
Joined: 2002-07-04 08:36am

Post by Mr Bean »

Of course there's the problem that attempting to hack DOJ will be prosecuted as a terrorist act rather than simply industrial espionage or electronic breaking and entering.

That of course does not stop a dozen people a day attempting to hack the FBI's server. (At least that's one Web guru told me at the Pentagon once)

"A cult is a religion with no political power." -Tom Wolfe
Pardon me for sounding like a dick, but I'm playing the tiniest violin in the world right now-Dalton
User avatar
Rogue 9
Scrapping TIEs since 1997
Posts: 18679
Joined: 2003-11-12 01:10pm
Location: Classified
Contact:

Post by Rogue 9 »

People attempt to hack the DoD every day, or at least they used to. I don't know whether that's changed since the government started considering it a terrorist act (when was this, by the by?), but it wouldn't surprise me much if it didn't.
It's Rogue, not Rouge!

HAB | KotL | VRWC/ELC/CDA | TRotR | The Anti-Confederate | Sluggite | Gamer | Blogger | Staff Reporter | Student | Musician
User avatar
Mr Bean
Lord of Irony
Posts: 22464
Joined: 2002-07-04 08:36am

Post by Mr Bean »

Rogue 9 wrote:People attempt to hack the DoD every day, or at least they used to. I don't know whether that's changed since the government started considering it a terrorist act (when was this, by the by?), but it wouldn't surprise me much if it didn't.
Since Patriot Act Part I, any attack on US government facilities can be considered terrorism if the DoJ decides to prosecute it as such.

"A cult is a religion with no political power." -Tom Wolfe
Pardon me for sounding like a dick, but I'm playing the tiniest violin in the world right now-Dalton
User avatar
Netko
Jedi Council Member
Posts: 1925
Joined: 2005-03-30 06:14am

Post by Netko »

Zablorg wrote:Mac fans say that no one really hacks macs because of their 1337 security. Can anyone confirm this?
Not really, no. As the article notes (in a surprisingly balanced fashion), Macs (and Linux in a desktop role - however, its server proliferation makes it a bigger target) have an added security advantage of being a minor market share OS, which discourages general hacks (would you target the OS with 90% market share, and more importantly a 90% chance of finding it again when the virus attempts to spread itself or the one with 5%?) and targeted hacks have the problem of less knowledge (familiarity) on the part of the hackers. On the other hand, as noted about last year's patching numbers, do to being the main target Windows got hardened a lot in the last couple of years (since XP SP2 when security became paramount), while, do to being such a smaller target, OS X developers could be slack about security, comparatively (hence the need to plug so many holes). The general feel over on Ars among the knowledgeable posters seems to be that OS X is probably better security-wise then pure XP but less then or on par with XPSP2 (with Vista being even somewhat more secure), or that at least is my impression.
User avatar
ThatGuyFromThatPlace
Jedi Knight
Posts: 691
Joined: 2006-08-21 12:52am

Post by ThatGuyFromThatPlace »

Solauren wrote:Given the money the army has, converting to all Macintosh shouldn't be a problem.

However, that may actually encourage hackers to target Macintosh systems.

I personally think the Army would be further ahead buying up a software firm and saying 'okay, make us our own custom operating system to these specifications.'

Keep the operating system classified, and that would reduce hacker problems dramatically.

'Course, that would oh, make sense
Why buy a software firm simply to develope a more secure, custom OS whent he open source community already provides a number of highly customizable and secure OSes for free, then the pentagon could spend it's money on more hookers for the generals AND have a versatile, secure OS.
But I guess Pentagon is allergic to spending its money wisely and has decided to buy overpriced, overspecced, not incredibly versatile computers instead (I guess this will be good for the quality of powerpoint presentation in the Pentagon at least) :?
[img=right]http://www.geocities.com/jamealbeluvien/revolution.jpg[/img]"Nothing here is what it seems. You are not the plucky hero, the Alliance is not an evil empire, and this is not the grand arena."
- The Operative, Serenity
"Everything they've ever "known" has been proven to be wrong. A thousand years ago everybody knew as a fact, that the earth was the center of the universe. Five hundred years ago, they knew it was flat. Fifteen minutes ago, you knew we humans were alone on it. Imagine what you'll know tomorrow."
-Agent Kay, Men In Black
User avatar
Lonestar
Keeper of the Schwartz
Posts: 13321
Joined: 2003-02-13 03:21pm
Location: The Bay Area

Post by Lonestar »

Durandal wrote:
Not terribly, no.
The operations side is classified. In fact, it's physically segregrated from the internet.

Not much that would be damaging is to be had on nIPR.

Uhhh...except social security numbers. :P
"The rifle itself has no moral stature, since it has no will of its own. Naturally, it may be used by evil men for evil purposes, but there are more good men than evil, and while the latter cannot be persuaded to the path of righteousness by propaganda, they can certainly be corrected by good men with rifles."
Post Reply