Author: brandonworkentin

Donald Trump Gives Another Crazy Interview

Because I want to save other people from forcibly removing their eyes from their face with a spoon, I like to read transcripts of Donald Drumpf’s interviews and pick out the best (worst?) parts. This one was with Bob Woodward and Robert Costa of the Washington Post. This one started off with the journalists asking Trump when he decided to run for President. It seems like a pretty simple question, and I would think that making that decision would be pretty important and somebody would remember making a decision like that. Trump continued his tradition of refusing to answer questions, though, and had to be asked 14 different times because his answers were about everything besides the actual question.

Note: All quotes are from Trump unless stated otherwise.

I said, “I sort of have to do it, I think. I really have to do it.” Because it’s something I’d be — I could do such a great job. I really wanted to give something back. I don’t want to act overly generous, but I really wanted to give something back. (emphasis mine)

Yes, I’m sure Trump would hate to be overly generous. He would never make that mistake.

[The Iran deal] was a terrible negotiation. It was negotiated by people that are poor negotiators against great negotiators. Persians being great negotiators, okay? It’s one of those things.

Nice. I’m sure with an attitude like that the future President Trump would have a very successful foreign policy in the Middle East.

Bob Woodward: Other words, what’s the definition of the job [of President]?

Trump: But number one —and I say number one, two, three — is the security of the country. The military, being strong, not letting bad things happen to our country from the outside.

I think that not letting bad things happen to our country from the inside is also pretty important. Bad things like a Trump presidency, for starters.

One of your questions, I noticed, is what would be your first 90 days in terms — and we’ll talk about that next.

Was Trump given the questions before the interview? If so, his rambling answers make even less sense.

And Nixon failed, I think to a certain extent, because of his personality. You know? It was just that personality. Very severe, very exclusive. In other words, people couldn’t come in. And people didn’t like him. I mean, people didn’t like him.

I’m confused, is he describing Nixon or Trump?

[Still talking about Nixon] But such an interesting figure. And such a man of great talent. I mean, Nixon had great potential, great talent. Unfortunately it was a very sad legacy in the end. It turned out to be a very sad legacy. Such an interesting figure to study.

His admiration for Nixon reminds me of his admiration for Hitler.

But I’m in for about $35 million. But I don’t want any money. Bob, I have turned down — I would have made — Bush had $148 million. I would’ve had five times that much if I wanted to take it.

It’s important to note that his “self-funded” line is disingenuous at best, or as Politifact said it’s “half-true.” They partly based it on the fact that he is getting donations, and in fact has a big “Donate” button on his website, but also because his contributions are actually loans. Since he’s such a “great” businessman, I’m sure he knows that loans are generally expected to be paid back.

And then Rubio went, you know, Rubio went Don Rickles on me, and all of a sudden he became cute and he started getting extremely nasty. And I had to get even nastier to him.

That is the logic of a five-year-old. You do not have to be “nasty” to someone just because they were nasty to you, much less be more nasty. That’s what leads to feuds escalating and never ending.

I’d been very political. I’d given a lot of money.

Sadly, that’s what it means to be “political” today. It doesn’t mean you have given thought to policy questions and have a reasoned opinion, but that you’ve given money.

Donald Trump Refuses to Give Actual Answer on Policy Questions

This is the second part of my review of Trump’s interview with the Washington Post editorial board (click here for the first part). The reporters kept asking Trump for a specific policy proposal that Trump would make about how he would reform libel laws. Trump couldn’t name anything that he would actually do. He spent mainly spent the whole time complaining about stories that have been written about him and his candidacy. Even when the editorial board suggested reforms to him, he refused to take the bait and actually give any concrete proposals for what he would do.

RYAN: My question is not so much why you feel [libel laws] should be open but how. What presidential powers and executive actions would you take to open up the libel laws?

It’s so sweet, it sounds like he actually expects Trump to have some actual, real policy proposals.

TRUMP: Okay, look, I’ve had stories written about me – by your newspaper and by others – that are so false, that are written with such hatred – I’m not a bad person. I’m just doing my thing – I’m, you know, running, I want to do something that’s good. It’s not an easy thing to do. I had a nice life until I did this, you know. This is a very difficult thing to do. In fact I’ve always heard that if you’re a very successful person you can’t run for office. And I can understand that. You’ll do a hundred deals, and you’ll do one bad one or two bad ones — that’s all they read about are the bad ones. They don’t read about the one hundred and fifty great ones that you had. And even some of the ones they write that are good, they make them sound bad. You know, so I’ve always heard that. I’ve heard that if you’re successful – very successful – you just can’t run for—

Well, so far it’s just a rambling answer. There’s nothing in way of polciy proposals in there. Just complaining. Let’s try again.

RYAN: But how would you fix that? You’ve said that you would open up the libel laws.

TRUMP: What I would do, what I would do is I’d – well right now the libel laws, I mean I must tell you that the Hulk Hogan thing was a tremendous shock to me because – not only the amount and the fact that he had the victory — because for the most part I think libel laws almost don’t exist in this country, you know, based on, based on everything I’ve seen and watched and everything else, and I just think that if a paper writes something wrong — media, when I say paper I’m talking about media. I think that they can do a retraction if they’re wrong. They should at least try to get it right. And if they don’t do a retraction, they should, they should you know have a form of a trial. I don’t want to impede free press, by the way. The last thing I would want to do is that. But I mean I can only speak for – I probably get more – do I, I mean, you would know, do I get more publicity than any human being on the earth? Okay? I mean, [Editor’s note: Trump points at Ruth Marcus] she kills me, this one – that’s okay, nice woman.

Nope, still no coherent answer. Let’s try a third time.

RYAN: Would you expand, for example, prior restraints against publications?

This time, he even suggested a policy that could conceivably be changed. Trump won’t take that bait, though.

TRUMP: No, I would just say this. All I want is fairness. So unfair. I have stories and you have no recourse, you have no recourse whatsoever because the laws are really impotent.

Fourth time’s a charm?

MARCUS: So in a better world would you be able to sue me?

TRUMP: In a better world — no — in a better world I would be able to get a retraction or a correction. Not even a retraction, a correction.

Nope, still just complaining.

RYAN: Well, now, you’ve been a plaintiff in libel suits so you know a little bit of the elements …

TRUMP: I had one basic big libel suit, it was a very bad system, it was New Jersey. I had a great judge, the first one, and I was going to win it. And then I had another good judge, the second one, and then they kept switching judges. And the third one was a bad judge. That’s what happened. But, uh…

Fifth time is still just complaining about a lawsuit, which he lost. Of course, I don’t know how he lost the suit since he’s such “winner.”

RYAN: But there’s standards like malice is required. Would you weaken that? Would you require less than malice for news organizations?

These silly reporters. They’re still giving him actual policy ideas. Let’s see if Trump decides to add any substance to his sixth attempt to answer.

TRUMP: I would make it so that when someone writes incorrectly, yeah, I think I would get a little bit away from malice without having to get too totally away. Look, I think many of the stories about me are written badly. I don’t know if it’s malice because the people don’t know me. When Charles writes about me or when Ruth writes about me, you know, we’ve never really met. And I get these stories and they’re so angry and I actually say, I actually say, “How could they write?” – and many stories I must tell you, many stories are written that with a brief phone call could be corrected before they’re written. Nobody calls me.

Nope, just more complaining. And maybe reporters would be more likely to try to contact him if he actually had an actual press relations operation instead of using a “twentysomething former Ralph Lauren model who’s never previously worked in politics” as his entire press team.

Seven’s a lucky number, right? At least, it’s the last question in this thread.

STEPHEN STROMBERG, EDITORIAL WRITER: How are you defining “incorrect?” It seems like you’re defining it as fairness or your view of fairness rather than accuracy.

TRUMP: Fairness, fairness is, you know, part of the word. But you know, I’ve had stories that are written that are absolutely incorrect. I’ll tell you now and the word “intent”, as you know, is an important word, as you know, in libel. I’ll give you an example.

They leave the topic for a little bit, but they come back to it a bit later. I think journalists really care a lot about libel laws.

HIATT: But just – given the Supreme Court rulings on libel — Sullivan v. New York Times — how would you change the law?

TRUMP: I would just loosen them up.

RUTH MARCUS: What does that mean?

TRUMP: I’d have to get my lawyers in to tell you, but I would loosen them up. I would loosen them up. If The Washington Post writes badly about me – and they do, they don’t write good – I mean, I don’t think I get – I read some of the stories coming up here, and I said to my staff, I said, “Why are we even wasting our time? The hatred is so enormous.” I don’t know why. I mean, I do a good job. I have thousands of employees. I work hard.

We’re now at nine times they’ve asked about it, and Trump is stil going on complaining about the press coverage, but not answering what he would actually do to change the situation.

RYAN: Would that be the standard then? If there is an article that you feel has hatred, or is bad, would that be the basis for libel?

TRUMP: No, if it’s wrong. If it’s wrong.

They tried giving him an actual polciy answer. Again. And Trump refuses to take the bait. Again. (We’re now up to 9 questions on it. Number 10 is coming up next.)

RYAN: Wrong whether there’s malice or not?

TRUMP: I mean, The Washington Post never calls me. I never had a call, “Why – why did you do this?” or “Why did you do that?” It’s just, you know, like I’m this horrible human being. And I’m not. You know, the one thing we have in common I think we all love the country. Now, maybe we come at it from different sides, but nobody ever calls me. I mean, Bob Costa calls about a political story – he called because we’re meeting senators in a little while and congressmen, supporters – but nobody ever calls.

Still just complaining, of course. Maybe his policy proposal would be if you’re going to write anything critical of a politician, you need to call them for comment first. How would that even be remotely possible in the real world?

RYAN: The reason I keep asking this is because you’ve said three times you’ve said we are going to open up the libel laws and when you ask you what you mean you say hatred, or bad–

TRUMP: I want to make it more fair from the side where I am, because things are said that are libelous, things are said about me that are so egregious and so wrong, and right now according to the libel laws I can do almost nothing about it because I’m a well-known person you know, etc., etc.

And the elevent time. He kind of gets to an actual policy proposal here. Of cours, you’d have to read between the lines, but if you squint you can make out an actual policy proposal that famous people don’t have as much protection from libel laws as private citizens.

On Donald Trump’s Interview with WaPo

Donald Trump did an interview with the Washington Post editorial board the other day. The more I read of it, the sadder I became. It boggles my mind that somebody who is that idiotic and that much of a liar could be the likely presidential nominee for one of the two major political parties in our country. This post ended up being really long so I split it up into two different posts. Later this week, there’s a full post coming just on the many times Trump refused to answer a question about what specific policy proposals he would make in the area of reforming libel laws. Today’s post covers all the other topics discussed in the interview.

The interview started with Trump naming the “foreign policy advisors” he’d been promising to name for a while now.

RYAN: Thank you… We’ve heard you’re going to be announcing your foreign policy team shortly… Any you can share with us?
TRUMP: Well, I hadn’t thought of doing it, but if you want I can give you some of the names… Walid Phares, who you probably know, PhD, adviser to the House of Representatives caucus, and counter-terrorism expert; Carter Page, PhD; George Papadopoulos, he’s an energy and oil consultant, excellent guy; the Honorable Joe Schmitz, [former] inspector general at the Department of Defense; [retired] Lt. Gen. Keith Kellogg; and I have quite a few more. But that’s a group of some of the people that we are dealing with.

Walid Phares is a “counter-terrorism expert” in the sense that he thinks that there is a Muslim conspiracy which controls the United States. Carter Page has written that the U.S. pushed Russia to annex Crimea. Joe Schmitz “slowed or blocked investigations of senior Bush administration officials, spent taxpaer money on pet projects and accepted gits that may have violated ethics guidelines” while h ewas the inspector general at the DoD. He also pivoted from being the inspector general to being a senior official at the parent company of Blackwater. (And unrelated to his foreign policy credetials, his sister is Mary Kay Letourneau. Wow.)

So we’re having a news conference today in the new building that’s going up, and the building is very much ahead of schedule, because it was supposed to open two years from September, and we’re going to open it in September.

In one of his many lies, Trump pulled the “two years from September” out of his ass. Back in 2013 when the building was announced, it was scheduled to be opened “in late 2015 or early 2016.”

They chose us over—I think they had more than 100 people who bid…

The General Services Administration, which managed the bids, wouldn’t say at the time how many bids were submitted. But when they solicited bids on the same building in 2005, they said that they received 20 submisions. Most likely, Trump pulled this number out of his ass, too.

HIATT: If I could, I’d start by asking is there a secretary of state and a secretary of defense in the modern era who you think have done a good job? Who do you think were the best?
TRUMP: Well, because I know so many of them, and because in many cases I like them, I hate to get totally involved.

God, I can’t stand the pompousness of this response.

HIATT: Short of nation building, is there any role in promoting values or democracy? Or that’s not something…
TRUMP: Well, there is, I just think that we have values in our country that we have to promote. We have a country that is in bad shape, it’s in bad condition. You look at our inner cities, our inner cities are a horrible mess. I watched Baltimore, I have many, many friends in Baltimore, we watched what happened. St. Louis, Ferguson, Oakland, it could have been much worse over the summer.

HIATT: So what would you do for Baltimore, let’s say.
TRUMP: Well, number one, I’d create economic zones. I’d create incentives for companies to move in. I’d work on spirit because the spirit is so low, it’s incredible, the unemployment, you look at unemployment for black youth in this country, African American youth, is 58-59 percent. It’s unthinkable. Unemployment for African Americans – not youth, but African Americans – is very high. And I would create in the inner cities, which is what I really do best, that’s why when I open a building and I show you it’s way ahead of schedule, under budget and everything else…

This number just didn’t make sense to me. I found this PolitiFact article on Bernie Sanders making a similar claim, when he said that the “real unemployment rate” for African-American youth was 51%. It turns out that’s not the unemployment rate for that demographic, which was 31.8%, but what a left-of-center think tank called a measure of “labor underutilization” or “underemployment,” because it included part-time workers in it. It appears that Trump took something Sanders said, which was already exaggerated, and exaggerated it even more.

And, he was using Baltimore to talk about African-Americans being unhappy with the way their cities were run, saying that we were putting to much money into foreign aid when it should be going to domestic programs. Since he brought up Baltimore, he was asked about that.

HIATT: The root of many people’s unhappiness in Baltimore was the perception that blacks are treated differently by law enforcement. And the disproportionate – do you think it’s a problem that the percentage of blacks in prison is higher than whites, and what do you think is the root of that situation?
TRUMP: Well I’ve never really see anything that – you know, I feel very strongly about law enforcement. And, you know, if you look at the riot that took place over the summer, if that were stopped – it all, it mostly took place on the first evening, and if that were stopped on the first evening, you know, you’d have a much nicer city right now, because much of that damage and much of the destruction was done on Evening One. So I feel that law enforcement, it’s got to play a big role. It’s got to play a big role. But that’s a pretty good example, because tremendous amounts of damage was done that first evening – first two evenings, but the first evening in particular. And so I’m a very strong believer in law enforcement, but I’m also a very strong believer that the inner cities can come back.

Trump is asked about racial disparities in prison rates, and instead tries to give a pep talk for law enforcement, totally ignoring the question. Of course, he knows that his supporters don’t care about the Black Lives Matter movement, but will love the law and order talk.

HIATT: Do you see any racial disparities in law enforcement – I mean, what set it off was the Freddie Gray killing, as you know. Is that an issue that concerns you?
TRUMP: Well, look, I mean, I have to see what happens with the trial. I—
HIATT: Well, forget Freddie Gray, but in general, do you believe there are disparities in law enforcement?
TRUMP: I’ve read where there are and I’ve read where there aren’t. I mean, I’ve read both. And, you know, I have no opinion on that.

This shows just a complete lack of an ability to think critically, or even to desire to think critically. If you want to be the President of the United States, you need to be able to converse on issues. And to just say, “Eh, whatever,” doesn’t cut it.

RUTH MARCUS, COLUMNIST: But Mr. Trump, if I could just follow up on Fred’s question. I think that what he was trying to get at was the anger in the African American community that held some of the riots and disturbances this summer about disparate treatment and about … clearly you say you’ve read where there is disparate treatment. But it is pretty undeniable that there is disproportionate incarceration of African Americans vs. whites. What would you – is that something that concerns you?
TRUMP: That would concern me, Ruth. It would concern me. But at the same time it can be solved to a large extant with jobs. You know, if we can rebuild those communities and create incentives for companies to move in and create jobs. Jobs are so important. There are no jobs. There are none. You go to those communities and you can’t – there is nothing there.

If that concerns Trump, then why did he just deflect four straight questions on the topic? And to say that bringing jobs to the inner city will solve the problem ignores that with so many people having criminal records, they have a much harder time getting a job. That’s why there’s the “Ban the Box” movement to prevent employers from using criminal history to automatically deny employment to formerly-incarcerated people.

CHARLES LANE, EDITORIAL WRITER/COLUMNIST: So I guess the question, then, is what’s different specifically about your approach to these issues from what’s been tried in the past, because a lot of effort has been put in just the direction you just described.
TRUMP: I think what’s different is we have a very divided country. And whether we like it or not, it’s divided as bad as I’ve ever seen it. I‘ve been, you know, I’ve been doing things for a long time. I see it all the time. I mean I see it so often. I see it when we go out and we have 21,000 people in Phoenix, Arizona, the other day, the division – not so much Phoenix, because that was actually very smooth, there wasn’t even a minor, they did block a road, but after that, that was Sheriff Joe Arpaio, when the road was unblocked everyone left and it was fine. But in Tucson, you can see the division. You can see the division. There’s a racial division that’s incredible actually in the country. I think it’s as bad, I mean you have to say it’s as bad or almost as bad as it’s ever been.

I cannot believe that Trump seems to be complaining about the racial divisions in this country, and specifically at his rallies, when he’s been driving that division by specifically using race-based statements (i.e. ban all Muslims).

TRUMP: And one thing I thought that would happen, and it hasn’t happened, unfortunately, I thought that President Obama would be a great cheerleader for the country. And it just hasn’t happened.

I think it might be important to note that Trump was one of the biggest cheerleaders trying to de-legitamitize President Obama with the birther conspiracy theory.

Trump goes into talking about the protestor getting beaten at his rally in Tuscon (sadly, we need to clarify which rally because it’s happened at multiple sites now). So he kinda-sorta answers this question, but he’s still a long ways off from a ny real policy answer. Oh, well.

TRUMP: We don’t condone violence at all but it’s very, very unfair reporting and we, you know…
HIATT: Sorry, when you say we don’t condone violence —
TRUMP: I say that.
HIATT: You say that. But you’ve also said, “In the good old days, he would have been ripped out of his seat so fast, you wouldn’t believe it.” Isn’t that condoning violence?
TRUMP: No, because what I am referring to is, we’ve had some very bad people come in. We had one guy — and I said it — he had the voice — and this was what I was referring to — and I said, “Boy, I’d like to smash him.”

He doesn’t condone violence but he also wants to handle protesters “like the good old days” and says from the stage that he’d “like to smash” a protester. That seems to be condoning violence by any normal definition of the words. Trump can literally prove he was lying in the very next sentence he speaks.

A bit later, after talking about libel laws, the reporters then change the topic to foreign relations.

TRUMP: I mean, we pay billions– hundreds of billions of dollars to supporting other countries that are in theory wealthier than we are.
DIEHL: Hundreds of billions?
TRUMP: Billions. Well if you look at Germany, if you look at Saudi Arabia, if you look at Japan, if you look at South Korea — I mean we spend billions of dollars on Saudi Arabia, and they have nothing but money. And I say, why?

In 2014, our total foreign aid budget was about $35 billion. The “hundreds of billions” line was (once again) just pulled out of Trump’s ass. And only four countries received more than $1 billion total: Israel ($3.1), Egypt ($1.5), Afghanistan ($1.1) and Jordan ($1.0). In 2012, the U.S. gave almost $1.5 million to Saudi Arabia, which in case you aren’t a math person is a lot less than a billion.

That was just some of the easily-checkable things that Trump lied about in the interview. God help us if he’s ever elected to anything. I think he could destroy my hometown just be being elected dog-catcher.

Innumeracy and Cybersecurity Reports

Back in high school, I had to read the book “Innumeracy,” by John Allen Paulos. The subtitle of the book is “Mathematical Illiteracy and Its Consequences.” I guess since I became a math teacher and still remember the book all these years later, the book must have had some kind of an influence on me. I don’t teach math anymore, but it still annoys me when I see smart people make statements that don’t hold up to mathematical scrutiny. Usually, these people aren’t trying to be misleading. They just aren’t looking at what they’re saying through a mathematical lens. That happened a couple days ago while reading Politic’s Morning Cybersecurity newsletter.

The newsletter had a short section on FireEye and their trends report which found that companies have reduced the time needed to identify an attack. d gotten The report had gotten some press for finding that the median number of days attackers were present on a victim’s network had dropped from 205 days in 2014 down to 146 days in 2015. In talking to Politico, FireEye’s GM of Canadian operations Ajay Sood downplayed the finding, saying that, “the improvement was driven by a small number of businesses that discovered breaches themselves,” and that for attacks discovered by third-parties (i.e. not self-identified by the victim) the attacks remain undetected for just as long.

There are a couple things I see wrong with using that reason to downplay the findings. First of all, the report specifically says the median length of time had dropped significantly. Medians are not as influenced by a few outliers as the mean average. A quick refresher: the median is found by lining all the numbers up from shortest to longest and selecting the middle number. The mean is found by adding up every number and dividing by the total number of entries. I won’t go into the details, but this means that the mean is influenced a lot more by a few outliers than the median is. This is why home prices or incomes in a given neighborhood or city are normally given in terms of the median, so that a few really expensive homes or high-income earners don’t skew the results in a misleading way.

There’s a more subtle problem with the FireEye report, too. The number they use is often taken as the gospel truth. The problem is that the report is based on investigations that Mandian/FireEye have been a part of. There are a lot of incidents where an internal security team identifies an attempted breach and responds to it, using internal resources, before the incident is able to become a million dollar problem like Target experienced. (If there aren’t any such instances, then why are companies spending millions on creating Security Operations Centers?) None of these incidents will make it into the Mandiant report, because a third-party consultant wasn’t called in. But, if you wanted a real, mathematically accurate idea of the amount of time attackers are on a victim’s network then those incidents should also be included. That makes it a lot harder question to answer, though. It’s a lot easier just to use Mandiant’s number, which is why you keep seeing it.

The other problem, not related to math, I have with Sood’s comment is that if the median time to discover a breach is coming down because more companies are discovering breaches with their internal systems instead of using the Krebs IDS, that’s a good thing. It doesn’t make any sense to downplay that improvement just because some other companies didn’t improve as fast.

Thoughts on Apple’s Response to Court Order

Apple filed their response to the court order seeking them to create a new operating system with security features removed. Since I did a post on the DOJ’s motion, I thought I’d also do one with my thoughts as I read the Apple response.

Page 1 line 3: This is not a case about one isolated iPhone.

Nobody believes this. Even FBI Director James Comey, who has made that argument, had to come out and admit that the case “will be instructive for other courts,” and that the outcome would affect other cases.

Page 1 lines 4-5: this case is about the Department of Justice and the FBI seeking through the courts a dangerous power that Congress and the American people have withheld.
Page 1 lines 13-15: In fact, no court has ever authorized what the government now seeks, no law supports such unlimited and sweeping use of the judicial process, and the Constitution forbids it.
Page 1 lines 16-17: Since the dawn of the computer age, there have been malicious people dedicated to breaching security and stealing stored personal information.
Page 1 lines 21-22: In the face of this daily siege, Apple is dedicated to enhancing the security of its devices

Apple sure does seem to be using a lot of grandiose language. I feel like I’m getting ready to watch Star Wars or something, or at least something a more exciting than a boring, old legal brief.

Page 2 lines 7-8: There are two important and legitimate interests in this case: the needs of law enforcement and the privacy and personal safety interests of the public.

I think it’s important to frame this debate as being law enforcement vs security, instead of being a case of security vs. privacy. If the DOJ is able to win this case (and the sure-to-follow appeals), then it will lead to a reduction in security as backdoors would then be something that the government could compel organizations to create.

Note: I wanted to link to a really good blog post on whether this is a “backdoor” or not, as people have been latching onto that word. I can’t remember who it was and just wasted too much time trying to find it, but basically the guy said that if you have Program A which removes security features so that a formerly-secure product could be accessed. That would be considered a backdoor. You could also have Program B which only allows Program A to run in certain situations. Program B may not be a backdoor, but it relies on Program A, which could be used on any device. It made a lot more sense than that when he wrote it, and I really wish I could find it again.

Page 2 lines 26-27: And once developed for our government, it is only a matter of time before foreign governments demand the same tool.

This is just ignored by all the “It’s just one phone!” folks. Our government has decent civil liberties protections for citizens. Other countries don’t, though. If the DOJ wins this case then it opens up other countries to then expect the same assistance, and Apple would face tremendous pressure to comply, and that process would almost certainly be used on political dissidents in authoritarian countries.

Page 3 line 18 – page 4 line 2: even if such limitations could be imposed, it would only drive our adversaries further underground, using encryption technology made by foreign companies that cannot be conscripted into U.S. government service—leaving law-abiding individuals shouldering all of the burdens on liberty, without any offsetting benefit to public safety.

This is why this needs to be framed as a decision pitting less security vs. more security. Encryption is out there. It’s not going away no matter what the U.S. government wants (see the worldwide encryption products survey by Bruce Schneier and others).

Page 4 lines 6-12: Finally, given the government’s boundless interpretation of the All Writs Act, it is hard to conceive of any limits on the orders the government could obtain in the future. For example, if Apple can be forced to write code in this case to bypass security features and create new accessibility, what is to stop the government from demanding that Apple write code to turn on the microphone in aid of government surveillance, activate the video camera, surreptitiously record conversations, or turn on location services to track the phone’s user? Nothing.

This is a bit of a sky-is-falling argument, but it wouldn’t surprise me if law enforcement really did want those capabilities.

Page 4 lines 13-17: As FBI Director James Comey expressly recognized:

Democracies resolve such tensions through robust debate. . . . It may be that, as a people, we decide the benefits [of strong encryption] outweigh the costs and that there is no sensible, technically feasible way to optimize privacy and safety in this particular context, or that public safety folks will be able to do their job well enough in the world of universal strong encryption. Those are decisions Americans should make, but I think part of my job is [to] make sure the debate is informed by a reasonable understanding of the costs.

Nice use of Director Comey’s words to make their point right there. It seems to be a pattern where he says something and then later says the exact opposite thing (see the 1 phone vs precedence item above).

Page 6 lines 15-17: For one, Apple uses a “large iteration count” to slow attempts to access an iPhone, ensuring that it would take years to try all combinations of a six- character alphanumeric passcode.

This points out that the best thing you can do is to change the setting away from the default number-only passcode and make it an alphanumeric passcode. As long as that alphanumeric passcode isn’t something obviously gussable, then your phone wouldn’t be able to be opened, even with the “FBiOS”.

Page 8 lines 10-17: In addressing the twin needs of law enforcement and privacy, Congress, through CALEA, specified when a company has an obligation to assist the government with decryption of communications, and made clear that a company has no obligation to do so where, as here, the company does not retain a copy of the decryption key. 47 U.S.C. § 1002(b)(3). Congress, keenly aware of and focusing on the specific area of dispute here, thus opted not to provide authority to compel companies like Apple to assist law enforcement with respect to data stored on a smartphone they designed and manufactured.

This seems to me like a pretty good argument. My understanding is that the All Writs Act is for situations where the law is silent. In this case, the law isn’t silent. It specifically says that Apple does not have an obligation to assist law enforcement.

Page 9 lines 12-14: Moreover, members of Congress have recently introduced three pieces of legislation that would affirmatively prohibit the government from forcing private companies like Apple to compromise data security.

To be fair, other members of Congress have proposed legislation that would require companies like Apple to compromise data security.

Page 11 footnote 21: In its motion to compel, filed February 19 with this Court, the government sought to shift the blame to the “owner” (San Bernardino County) in describing who changed the password and why it allegedly has no other viable alternatives besides the creation of a new operating system. Dkt. 1 at 18 n.7. The FBI later issued a press release acknowledging that it “worked with” the County to reset the password.

Nice little dig at the FBI. Yet another example of law enforcement being quite duplicitious.

Page 11 footnote 22a: The government obtained the Order without notice to Apple and without allowing Apple an opportunity to be heard. See Mullane v. Cent. Hanover Bank & Tr. Co., 339 U.S. 306, 314 (1950) (recognizing that one of the “‘fundamental requisite[s] of due process of law is the opportunity to be heard’”) (quoting Grannis v. Ordean, 234 U.S. 385, 394 (1914)).

The Order also made it quite clear that Apple could file a motion challenging the validity of the order, so I think they’re pushing their luck here trying to argue they weren’t given the “opportunity to be heard.” That’s probably why it’s in a footnote, though.

Page 11 footnote 22b: But this was not a case where the government needed to proceed in secret to safeguard its investigation; indeed, Apple understands that the government alerted reporters before filing its ex parte application, and then, immediately after it was signed and confirmed to be on the docket, distributed the application and Order to the public at about the same time it notified Apple.

That’s because it’s not a case about getting information from this one phone. There’s been a lot written about this already, but the phone isn’t even likely to have much information, since the terrorist destroyed his other phones but didn’t care enough about this one to destroy it.

Page 11 footnote 22c: Moreover, this is the only case in counsel’s memory in which an FBI Director has blogged in real-time about pending litigation, suggesting that the government does not believe the data on the phone will yield critical evidence about other suspects.

The blog post was a p.r. effort. Lending even more credence to the argument that, for the FBI, this is all about setting a precedence.

Page 13 line 27 – page 14 line 6: Thus, quality assurance and security testing would require that the new operating system be tested on multiple devices and validated before being deployed. Apple would have to undertake additional testing efforts to confirm and validate that running this newly developed operating system to bypass the device’s security features will not inadvertently destroy or alter any user data. To the extent problems are identified (which is almost always the case), solutions would need to be developed and re-coded, and testing would begin anew.

An example of why anybody who says “It’s only one phone” either has absolutely no grasp of how software development works or else is just lying.

Page 14 lines 14 – 24: The All Writs Act (or the “Act”) does not provide the judiciary with the boundless and unbridled power the government asks this Court to exercise. The Act is intended to enable the federal courts to fill in gaps in the law so they can exercise the authority they already possess by virtue of the express powers granted to them by the Constitution and Congress; it does not grant the courts free-wheeling authority to change the substantive law, resolve policy disputes, or exercise new powers that Congress has not afforded them. Accordingly, the Ninth Circuit has squarely rejected the notion that “the district court has such wide-ranging inherent powers that it can impose a duty on a private party when Congress has failed to impose one. To so rule would be to usurp the legislative function and to improperly extend the limited federal court jurisdiction.” Plum Creek, 608 F.2d at 1290 (emphasis added).

This seems to be one of their best arguments, especially since it relies on precedent from a prior Ninth Circuit case instead of arguing that this would be bad policy.

Page 16 lines 1-5: Thus, in another pending case in which the government seeks to compel Apple to assist in obtaining information from a drug dealer’s iPhone, Magistrate Judge Orenstein issued an order stating that while the Act may be appropriately invoked “to fill in a statutory gap that Congress has failed to consider,” it cannot be used to grant the government authority “Congress chose not to confer.”

It’s important to note that Apple has already had success in arguing against the use of the All Writs Act to compel them to decrypt a phone. That was in New York, though, so it doesn’t have an precedental value in this case.

Page 17 lines 2-5: CALEA does not allow a law enforcement agency to require Apple to implement any specific design of its equipment, facilities, services or system configuration. Yet, that is precisely what the government seeks here. Thus, CALEA’s restrictions are directly on point.

I can’t get past this argument. My uderstanding is the All Writs Act is for situations where there is no clear law. It doesn’t seem like if there’s a law that law enforcement doesn’t like they should be able to use the All Writs Act to get around that law.

Page 24 footnote 24: The government’s suggestion that Apple can destroy the software has clearly not been thought through, given that it would jeopardize criminal cases.

I love it when subtle insults are put into footnotes. I don’t know why I take so much pleasure from that, but I do.

Page 26 lines 12-16: Indeed, under the government’s formulation, any party whose assistance is deemed “necessary” by the government falls within the ambit of the All Writs Act and can be compelled to do anything the government needs to effectuate a lawful court order. While these sweeping powers might be nice to have from the government’s perspective, they simply are not authorized by law and would violate the Constitution.

I made the same point in my blog on the DOJ’s filing in this case, saying that, “It seems like the government’s reasoning would lead to the situation where anybody with any specialized skills would be required to assist in serving a warrant.”

Page 30 lines 1-4: Moreover, the government has not made any showing that it sought or received technical assistance from other federal agencies with expertise in digital forensics, which assistance might obviate the need to conscript Apple to create the back door it now seeks.

I don’t think the FBI wants to say publicly that the NSA can’t get into the phone. Of course, that assumes that the FBI’s purpose in this case is to gain access to the phone. I’ve said multiple times that its purpose is to set a precedent that companies need to break their encryption. I guess if you look at it that way, Apple is the only company that can serve that purpose in this case.

Problems with FBI’s Effort Against Apple

The Department of Justice filed a motion in response to Apple’s announcement that they would not be complying with the court order to create a backdoor that would allow access to the San Bernardino shooter’s cellphone. It is not toally surprising that they would do so since the FBI is part of the DOJ. I’m a little surprised by the timing. I would have thought that it would have made more sense for the DOJ to file this motion after Apple made their official response to the court. But, I am not a lawyer, so maybe there is some tactical reason why the government would want to file this first.

Page 1 lines 3-5: Rather than assist the effort to fully investigate a deadly terrorist attack by obeying this Court’s Order of February 16, 2016, Apple has responded by publicly repudiating that Order.

This is interesting, at least in light of the New York Times article claiming that Apple wanted to have the original order be sealed, and the government was the one who made it public, and only after that did Tim Cook draft and release his Letter to Customers.

Page 1 lines 9-11: Despite its efforts, Apple nonetheless retains the technical ability to comply with the Order, and so should be required to obey it.

This seems to be true. I haven’t seen anybody claiming that Apple doesn’t have the technical capabilities to remove the security on the phone. Of course, that being true doesn’t lead to the conclusion that they should have to use those technical capabilities in this case.

Page 2 lines 2-7: The Order requires Apple to assist the FBI with respect to this single iPhone used by Farook by providing the FBI with the opportunity to determine the passcode. The Order does not, as Apple’s public statement alleges, require Apple to create or provide a “back door” to every iPhone…

This is an example of the straw man logical fallacy (incidentally, the previous quote would also be an example of this fallacy). The argument by privacy advocates, Apple, and technologists isn’t that this particular operating system would lead to a backdoor for every iPhone. The argument is that the legal precedence of this order would then lead to the government being able to compel similar access in the future.

This section continues that the order:

Page 2 lines 9-11: does not give the government “the power to reach into anyone’s device” without a warrant or court authorization;

This takes the straw man argument and makes it blatantly obvious. Notice how the motion stops after the word “device”? There’s a good reason for that. That’s because Apple doesn’t make the argument that they would be giving the government access without court authorization. That would make absolutely no sense because the whole argument is over a court order. The question is whether the court order should be legally enforceable, and whether enforcing the court order would be good policy for the United States.

Page 2 lines 16-19: In the past, Apple has consistently complied with a significant number of orders issued pursuant to the All Writs Act to facilitate the execution of search warrants on Apple devices running earlier versions of iOS.

Just because a citizen or corporation has voluntarily assisted law enforcement in the past, or at least not refused to assist law enforcement, does not mean that they are compelled to do the same in the future. Using this logic, if a suspect in a criminal investigation cooperates with the police, then he would be waiving his right to then refuse to cooperate in the future if he changes his mind. This is clearly not the way our justice system works.

Page 2 line 22 – page 8 line 2: Apple’s current refusal to comply with the Court’s Order, despite the technical feasibility of doing so, instead appears to be based on its concern for its business model and public brand marketing strategy.

Of course Apple is concerned about its business model and marketing. That doesn’t mean that is the only argument, or even the main argument, against compelling Apple to remove the security on an iPhone, and it certainly doesn’t prove that Apple is in the wrong here.

Page 3 lines 11-14: the urgency of this investigation requires this motion now that Apple has made its intention not to comply patently clear. This aspect of the investigation into the December 2, 2015 terrorist attack must move forward.

That answered my question of why the DOJ decided to make this motion now. I think it may be a little wishful thinking on the part of the government, though. I think most observers expect this to be litigated for quite a while, likely to the Supreme Court, since both sides have so much to gain and so much to lose if a ruling goes against them.

Page 12 lines 7-12: In Mountain Bell, the Ninth Circuit emphasized that its decision “should not be read to authorize the wholesale imposition upon private, third parties of duties pursuant to search warrants,” 616 F.2d at 1132, but Apple is not a random entity summoned off the street to offer assistance, nor is it the target of the investigation.

It seems to me like the government’s argument here would lead to almost anybody being compelled to have to assist a warrant. Law enforcement wouldn’t be ordering just anybody to assist, they would be wanting assistance from people who have particular skills or knowledge, or some other applicable quality that law enforcement would want to make use of. It seems like the government’s reasoning would lead to the situation where anybody with any specialized skills would be required to assist in serving a warrant, which is a lot more broad than the quoted Ninth Circuit opinion seems to imply.

Page 14 lines 3-10: assistance under the All Writs Act has been compelled to provide something that did not previously exist – the decryption of the contents of devices seized pursuant to a search warrant. In United States v. Fricosu, 841 7 F.Supp.2d 1232, 1237 (D. Co. 2012), a defendant’s computer -whose contents were encrypted – was seized, and the defendant was ordered pursuant to the All Writs Act to assist the government in producing a copy of the unencrypted contents of the computer.

This doesn’t seem like a very apt comparison. If Apple was being required to provide a password or some kind of knowledge to be used to decrypt the iPhone, then that would be similar to decrypting the defendant’s computer. In this case, Apple is being asked to write a new firmware update. That’s not the same thing as putting your password into a computer. And, it’s not exactly settled case law that a person can be compelled to give their password to law enforcement, anyway.

Page 14 line 27 – page 15 line 10: the Order is tailored for and limited to this particular phone…Nor is compliance with the Order a threat to other users of Apple products. Apple may maintain custody of the software, destroy it after its purpose under the Order has been served, refuse to disseminate it outside of Apple, and make clear to the world that it does not apply to other devices or users without lawful court orders. As such, compliance with the Order presents no danger for any other phone and is not “the equivalent of a master key, capable of opening hundreds of millions of locks.”

Again, the concern isn’t that this particular source code will be let out into the wild. The concern is that once the government sets this precedence, then Apple will have to comply with similar orders in the future. The government didn’t pick this case to make their public stand because they need access to this phone in order to stop an impending attack. They chose this case because the publicity of a terrorist using an encrypted device works to further their effort to weaken encryption in a misguided attempt to battle the so-called “going dark problem.”

Page 20 lines 20-25: no one outside Apple would have access to the software required by the Order unless Apple itself chose to share it. This eliminates any danger that the software required by the Order would go into the “wrong hands” and lead to criminals’ and bad actors’ “potential to unlock any iPhone in someone’s physical possession.”

I’m glad the government has complete faith in Apple’s ability to keep something a secret. Do they have that same amount of faith in the Office of Personnel Management? Or in JP Morgan Chase? Or maybe Adobe, which had their source code stolen by hackers?

Page 20 line 26 – page 21 line 1: marketing or general policy concerns are not legally cognizable objections to the Order. As discussed above, the analysis of whether a court order presents an unreasonable burden is focused on the direct costs of compliance

I don’t know enough about the law to know if this is true, but it seems like it might be. It would be a lot harder to quantify potential indirect costs, such as that American tech companies may not be trusted in the global marketplace. Unfortunately, those indirect costs are worth a lot more than the direct costs to Apple of having some software engineers write some code.

Page 21 lines 9-10: Strong public policy interests favor enforcing the All Writs Act Order in this matter.

I’ll close with this, because it is obviously in debate. I think it’s obvious that I come down on the infosec community’s side, the technology community’s side, the side of privacy, and the side of security. In other words, I hope Apple wins this case. I don’t hope that because I support terrorists, as Apple has been accused of doing. I hope it mainly because the problem of precedence and the damage to our technology industry such a ruling would cause are humongous.

Logical Fallacies in NSA Director’s Interview

National Security Agency Director Adm. Michael Rogers gave an interview with Yahoo News’s Michael Isikoff. The interview is full of misleading statements and poor logic.

Rogers confirmed speculation that began right after the attack: that “some of the communications” of the Paris terrorists “were encrypted,” and, as a result, “we did not generate the insights ahead of time.”

According to this logic, if any terrorist uses any encryption, then law enforcement will not be able to find anything out about them. This is demonstrably false. The former director of the NSA, Gen. Michael Hayden, has said that, “We kill people based on metadata.” Metadata still exists even if communications are encrypted. Former NSA General Counsel Stewart Baker said that metadata can tell you, “everything about somebody’s life,” and that, “If you have enough metadata, you don’t really need content.”

Adm. Rogers goes on from that last point:

“Clearly, had we known, Paris would not have happened.”

This is an example of the logical fallacy of circular logic. Circular logic is when “the reasoner begins with what they are trying to end with.” Adm. Rogers assumes that if he had enough information then he would have been able to predict, and therefore stop, the attacks. According to his logic, there would never be the situation where law enforcement had information but failed to connect the dots and turn the information into actionable intelligence. Something like, say, an arrested Al Quaeda operative being “described as interested in flight training for the purpose of using an airplane in a terrorist act” before 9/11 happened.

From a little later in the article:

Rogers has at times sought to steer a middle ground in this debate, acknowledging that encryption is “foundational to our future” and even saying recently that arguing about it “is a waste of time.”

Encryption is “foundational to our future” (I would add foundational to our present society) and arguing about it is a waste of time.

Because Math Mug

Adm. Rogers doesn’t stop there, though, and goes on to argue about encryption.

He frankly acknowledged, “I don’t know the answer” to unencrypting devices and applications without addressing the concerns over privacy and competitiveness, calling for a national collaboration among industry and government officials to solve the problem.

This is an example of the fallacy of argument to moderation. This fallacy says that in a choice between two extremes, the correct choice will fall somewhere in the middle. In this case, perfect encryption and total law enforcement access to all data would both be ruled out and the correct solutioon to the “going dark problem” would be somewhere in the middle. Once again, though, that ignores that it’s not an argument between two possible policy decisions. It’s an argument between having the most robust security you can or purposefully weakening security.

Once again:

Because Math Shirt

Rogers also provided new details about his agency’s efforts to implement the USA Freedom Act, a law passed in the wake of the Edward Snowden disclosures, which he said has made it “more expensive” for his agency to access the phone records of terror suspects inside the United States and has resulted in a “slightly slower” retrieval of data from U.S. phone companies.

That was kind of the point of the law.

But Rogers said the delay in retrieving phone records is measured “in hours, not days or weeks,” and he has not yet seen any “significant” problems that have “led to concerns … this is not going to work.”

Wow, just a few months ago, he was saying the exact opposite when he was lobbying against the bill, saying that “Americans will become less safe” when the Freedom Act goes into effect.

That kind of makes you wonder how much faith we should put into what Adm. Rogers says. As Ars Technica points out in their article on this Rogers interview, the Paris attacks should also cause us to question the value of what Adm. Rogers says.

ISIS has been known to use encrypted communications, such as Telegram, to communicate and recruit. But despite those encrypted communications, the US did provide a warning of an impending ISIS attack in France, despite any encryption, over two months before the attack.

So, there was some forewarning that ISIS would attempt to attack France, despite the use of encryption by some terrorists. And, even more damaging to Adm. Rogers idea that “had we only known” we would have been able to stop the attacks is that the French did receive specific warnings about one of the attackers. Turkish police said they notified the French about him multiple times about him, but that, “We did, however, not hear back from France on the matter.”

NERC Committee Agenda Packages

The NERC Board of Trustees is meeting this week, and along with that are several standing committee meetings. While the meetings will not be simulcast online, the agendas for the meetings oftentimes include some interesting reading. A couple items from the Members Representative Committee and the Compliance Committee were interesting.

Members Representative Committee

On page 44 of the MRC agenda package, Compliance Guidance Implementation is discussed. They provide an update on the new process where compliance guidance will be vetted by the “ERO Enterprise,” and after that vetting and approval then the guidance will be given “deference” from auditors in all the regions. This update says that the task force is beginning to review existing documents that can be submitted to the ERO Enterprise for endorsment. More interesting, though, is that the CCC members of the task force are developing a process to approve organizations to be able to submit guidance documents even if the organization is not already on the pre-qualified list to submit guidance documents.

Another interesting bit of news is that a CMEP Practice Guide focused on what it means for auditors to “provide deference” is being developed. The guide on how to provide deference will be the first CMEP Practice Guide published. The CMEP Practice Guides are basically guidance created by the ERO Enterprise which provide direction to auditors on how they should conduct audits.

Compliance Committee

Lessons Learned Documents

This one had this great quote: “The CIP Version 5 Transition Advisory Group identified specific issues with the CIP Version 5 standard language, which were temporarily resolved through Lessons Learned documents.”

It then lists the issues that are being referred to the CIP V5 Revisions Standards Drafting Team:

  • Transmission Owner Control Centers
  • BES Cyber Assets/Programmable Electronic Devices
  • Virtualization
  • External Routable Connectivity

InegoMontoyaMemeTo call these issues even temporarily “resolved” is quite the stretch. Virtualization is not addressed at all in the Lessons Learned (LL) documents. While the others were addressed, they were not resolved. For example, the LL on BES Cyber Assets doesn’t provide a definition for “programmable,” which forms the basis of the Cyber Asset definition but doesn’t have any clear definition itself.

Note: A coworker told me that she’s heard the same line (“temporarily resolved through LL documents”) used by the V5 TAG several times. This is the first I’ve noticed it, though.

IRAs and ICEs

The 2015 ERO Enterprise Annual CMEP Report was included in the agenda package. It said that there were 236 entities scheduled for an audit in 2015. The Regions conducted a total of 230 Inherent Risk Assessments for entities on the audit schedule, so they got almost all of them. They also performed 31 Internal Controls Evaluations for entities on the audit schedule, or about 13% of the entities that had an IRA performed. It would have been nice to have a breakdown of those numbers by region. Are all eight regions represented in those 31 ICEs? Or are the numbers dominated by just one or two regions? That would be helpful information to have, although it may be available from other sources, I haven’t researched that question.

Outreach Events Focused on Risk-based CMEP

Screen Shot 2016-02-08 at 11.26.54 AM.pngThese figures were included in the CMEP report. It seems weird that ReliabilityFirst would have done almost twice as many events as anybody else, but had the second lowest number of participants. These numbers would mean that RF only had about 9 participants per event, which seems quite low. It makes me wonder if the different regions didn’t all use a standardized definition of what constitutes an “outreach event.”

Shodan and SERC Audits

On SERC’s Open Forum Webinar on Monday, January 25, they had a presentation on the Shodan search engine. I wasn’t able to participate in the webinar, but a co-worker did, and the webinar seemed to be based on this one-page document SERC released on January 4, “Shodan: What SERC Registered Entities Need to Know.” SERC said on the webinar that the SERC audit teams will be using Shodan as part of their audits.

Shodan (www.shodan.io) calls itself the “world’s first search engine for Internet-connected devices.” If you haven’t had a chance to explore Shodan yet, you really should go spend a half-hour or so exploring it and seeing what is possible with it. It’s been in the news over the last couple days because they added a new section that allows paid users to browse Internet-connected webcams. You don’t have to be a paid user to use the site, although the paid accounts do have some added capabilities. Shodan also has a section dedicated to Industrial Control Systems, where a user can get tips on how to find ICS. One of their examples is that if you search for ‘title:”xzeres wind”‘, then you can find wind turbines.

shodanSERC_1

SERC’s one-page is a pretty good overview of what Shodan does. One key point that they make is that when somebody uses Shodan, they aren’t actually contacting the target. Shodan has already gotten the information about what devices are on the Internet, and all the user of Shodan is doing is searching this database. SERC calls out two things which an attacker could use Shodan for. First, if an attacker has a vulnerability they are prepared to use, they could use Shodan to find devices which have that vulnerability. As an example, the first alert on ICS-CERT’s website when I checked it today was ICS-ALERT-15-225-01A for Rockwell Automation 1769-L18ER PLC. This alert talks about there being public proof-of-concept exploit code. If you search Shodan for “1769-L18ER/A”, you find 65 results. An attacker could use that list to find possible targets for an attack.

shodanSERC_2

If you’re unlucky (probably the wrong word, because you’re doing something wrong, not just being unlucky) to have one of the devices somebody is targeting on the list that gets returned to the user, you might get targeted. There isn’t much that knowledge of this type of attack using Shodan can actually do for you, though. It’s probably unrealistic for a company to try to go search for all the devices they have in their plant, and even if they did, almost everythiing they found on Shodan would be a false positive since any one result isn’t likely to be from your specific organization.

The other way that SERC points out that an attacker could search an organization’s domain name. This would be used in a more targeted approach. Using the domain of a large energy company, there were 40 results returned by Shodan.

shodanSERC_3

shodanSERC_4

This led mostly to some 302 Redirects and mail servers whose banner message said that the Shodan crawler was not allowed to access them. There weren’t any any ICS protocols in any of the results, as you can see in the “Top Services” section, so this company seems to be in pretty good shape, at least in terms of what Shodan could see in a simple search.

SERC said that they recommend that,

all its registered entities perform a Shodan search for their own domain name(s). For each device found, consider the following questions:
Is it truly necessary for this device to be external-facing?
Have all applicable security patches been installed on this device?
Have unneeded accounts and old passwords been removed/changed?
What security measures are in place on the device (e.g., anti-virus, host-based IPS, firewall)?

They go on to say that, “the SERC audit team intends to utilize Shodan during the early stages of its CIP audits, performing a search for the audited entity’s internet domain name,” and that the audit team will use the entity-provided list of BES Cyber Assets (they actually call them Critical Cyber Assets, but I’m pretty sure they mean BCA) and that any matches will probably be included in the sample selection for CIP-005 and CIP-007. They finish by saying, “the audited entity will be offered the opportunity to provide evidence the device and its associated network(s) are appropriately configured.”

I think that it’s pretty good advice to, as a defender, consider using Shodan to see if you have anything hanging out on the public Internet. From a commonsense perspective, there may be some sense to an auditor using Shodan in order to find devices which are publicly accessible, and therefore giving them a little extra attention, or at least making sure they aren’t missed. Ideally, though, auditors won’t find any control systems on Shodan, and so the search won’t add much value to the audit.

Cyber Asset Lesson Learned Finalized

NERC’s Standards Committee (SC) approved the Lesson Learned (LL)document on CIP-002-5: BES Cyber Assets on January 21, 2015. This document was originally released for comment on September 9, 2015, and the final document is dated December 7, 2015. It was created by NERC’s V5 Transition Advisory Group (V5TAG).

One of my criticisms of the LL process is that the LLs will be commented on, get revised, and then get approved and posted by the SC without industry having a chance to see or vet the revisions before they are finalized. While NERC has re-posted some of the LLs for comments, they’ve generally only done that when there are major revisions, and they definitely haven’t done so for all (or even most) of the Lessons Learned documents. This leads to a limited number of people actually having input into what the final, official, document contains. I believe this process has the potential to introduce flaws into the documents, and it happened again with the Cyber Asset LL.

The final document will be available from the “Related Documents” section of the CIP-002-5.1 page at NERC’s website, and the consideration of stakeholder comments will be available from the transition program page. The redlined version of the document is a little harder to find, but it is available from the SC agenda package for their January 21, 2016 meeting.

Sidenote: At one point, the redlined versions were not provided by the V5TAG or the SC. As part of my day  job I actually went and created a redlined version from the previous draft and the finalized draft for a couple of the LLs. That was a pain-in-the-butt, so the inclusion of the redlined versions the last few times finalized LLs were released was much appreciated.

Anyways, the purpose of this post is to look at some of what is in the LL and some of what was taken out of it.

When Cyber Assets meet a threshold of BES impact they become BES Cyber Assets (BCA) which may be grouped by responsible entities into BES Cyber Systems (BCS)

While I don’t disagree with this statement, I think it may be misleading to some people, specifically the word “threshold”. If the Cyber Asset has an adverse impact on the BES within 15 minutes of being misused, degraded, or unavailable, then it is a BES Cyber Asset.[^This is a simplified definition, obviously, and there are more qualifiers and requirements, but this summary works for now.] While the 15 minutes could be considered a threshold, there is no allowance in the standards for the adverse impact to have some minimum threshold. The way the sentence in the LL is worded, with “threshold” directly preceding “of BES impact” could cause some confusion for somebody who associates “BES impact” with the “adverse impact” from the BES Cyber Asset definition.

Some study participants assessed each functional system at a site or facility to determine its potential to adversely impact the BES in 15 minutes or less…Other study participants identified all Cyber Assets, grouped them into BES Cyber Systems, and evaluated the impact of the resulting system.

I like how this provides two approaches to achieving the goal of identifying BES Cyber Assets. This is a good example of an LL being written in such a way that it acknowledges that, “there may be other legitimate ways to fulfill the obligations of the requirements that are not expressed within this supporting document,” as the LL puts it in the introductory paragraph.

Did the device’s function directly impact the reliable operation of a BES asset?

The word “directly” was removed from here, and there were similar edits at other places. This was done in response to a comment from ACES, and seems like a good decision, although it leads to a problem discussed next. There’s nothing in the definition of BES Cyber Asset that talks about a difference between “direct” and “indirect” impacts, and so adding that concept here seems like it would add to confusion insteading of making things more clear.

Did the device function as an EACMS, PACS, or Intermediate System? These types of devices, such as firewalls, intrusion prevention systems or physical access controllers and others that perform security functions may indeed have an adverse impact if they are unavailable or misused to allow unauthorized access or deny authorized electronic or physical access, but it is an indirect impact. These devices have their own definitions and requirements in the CIP version 5 Reliability Standards and therefore are not considered BCAs due solely to their impact.

This is the most glaring example in this document of the problem of not having LLs vetted by industry after being edited. I do not think these changes would have made it through a public vetting process, if there had been one. In the first part of this paragraph, they are saying straight-up that firewalls, IPSs, or other security devices can have an adverse iimpact if they are unavailable or misused. While these devices do have their own definitions, there is nothing in the definition of BES Cyber Asset that would imply that an entire class of devices can be categorically excluded from the requirement to determine whether they are BES Cyber Assets. By removing those last five words from this paragraph in the draft LL, the V5TAG has gone beyond providing an example of a compliant approach, and has gone into the terrority of interpreting the standards.

There are programmable devices that may have an impact, but have no way to change their executing code, have no concept of a user or authentication, have no ports/services, have no network connectivity, no concept of event logs or alerting, no patches or updates, andor are located in areas where physical security perimeters cannot be established. For these devices, the ERO will allow (for the purposes of assessing compliance with the standards) Responsible Entities to only protect those devices to the extent capable.

The last sentence in this excerpt had, by far, the most comments related to it. EEI went so far as to say that unless the sentence was removed they couldn’t support the document being submitted to the SC for approval. The problem with the sentence was that it implies that non-programmable devices, if they would have an adverse impact within 15 minutes of their misuse, degradation, or unavailability, would have to be protected to the extent capable. The definition of Cyber Asset, though, explicitly states that a Cyber Asset is programmable. That means that a number of new devices would now be in-scope for the CIP standards.

Screen Shot 2016-01-21 at 9.47.54 PM

They changed this table to say they were identifying Cyber Assets typically “evaluated” as BES Cyber Assets instead of saying they were typically “identified” as BCA. This change seems to be more in line with what the purpose of the list of device types originally was.

The transition study participants found a lack of clarity in the CIPV5 Reliability Standards because they do not specifically define the “programmable electronic device” component of the BES Cyber Asset NERC Glossary term. Consequently, the CIP V5 Transition Advisory Group referred the identified issues to be evaluated for standards development.

This was added to the document. While a better definitio of Cyber Asset or a definition of “programmable” is needed, unfortunately the creation of an SDT will not be a very quick process, so that clarification likely won’t help most entities very much in the near- to mid-term future.