AusCERT2012: Governments stockpiling cyber arms

Powered by SC Magazine
 

The cyber arms race is in full swing.

Governments are ramping up use of defence contractors to stockpile security expertise in an attempt to increase their ability to attack foreign governments through software exploits.

The rush to build expertise from governments worldwide was likely sparked by the launch of Stuxnet against Iran's uranium enrichment facilities, according to F-Secure's chief research officer, Mikko Hypponen.

Though Iran's response to the attack - at times linked to the US and Israel governments - was muted, the move to build protection and offensive capabilities has since exploded.

Complete coverage of AusCERT 2012

Hypponen noted the US' largest defence contractors seeking to fill more than 200 roles that required top secret security expertise for the purpose of developing and stockpiling exploits against PCs, smartphones and enterprise systems aimed at crippling a foreign government's network.

"The cyber arms race has started," Hypponen told the AusCERT 2012 conference on the Gold Coast this week.

"We're in the middle of all technically capable nations stockpiling on cyber arms for their own arsenals. Cyber arms don't last very long, they go bad or rot away as those exploits get found so they have to keep a current stockpile."

That security expertise and the exploits was being hired by those contractors on behalf of governments worldwide.

The growing attempts to build their capability online, which can be sourced as far back as 2005 according to Hypponen, also placed private security experts in a compromising situation as they decided whether to protect their clients from government-sponsored exploits.

"I don't have to think about it - We should and we are detecting [government-made] trojans," he declared.

"That's of course a delicate subject because at the same time we are working with the government and we are working with police to hunt down online criminals. But at the same time, we can't help them with this.

"I can see why they want to use trojans, go ahead and use them, don't tell us about it. We will try to detect them."

 

 

DDoS as legal protest?

Hypponen also warned that the distributed denial of service techniques used by highly visible hactivist groups like Anonymous and LulzSec may not remain as demonised as it currently is by governments and modern legal systems.

"According to current laws in almost any country it isn't, but maybe one day it will be because [hacktivists] will grow up," he said.

The use of DDoS to protest restrictive potential laws like SOPA or PIPA appeared contradictory to Hypponen, who said it only increased the perceived need to pass such laws in order to block the source of such attacks.

However, he suggested that denial of service could ultimately be levelled with physical sit-in protests as knowledge and understanding of such groups evolved.

Copyright © SC Magazine, Australia


AusCERT2012: Governments stockpiling cyber arms
F-Secure chief research officer Mikko Hypponen discusses the advent of government-led cyber war.
 
 
 
Top Stories
Meet FABACUS, Westpac's first computer
GE225 operators celebrate gold anniversary.
 
NSW Govt gets ready to throw out the floppy disks
[Opinion] Dominic Perrottet says its time for government to catch up.
 
iiNet facing new copyright battle with Hollywood
Fighting to protect customer details.
 
 
F-Secure chief research officer Mikko Hypponen discusses the advent of government-led cyber war.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  25%
 
Sourcing and strategy
  12%
 
IT infrastructure (servers, storage, networking)
  22%
 
End user computing (desktops, mobiles, apps)
  15%
 
Software development
  26%
TOTAL VOTES: 327

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  56%
 
No
  44%
TOTAL VOTES: 135

Vote