Saturday, March 10, 2018

Easttom: in cyber war, malware is “the weapon of choice” - Capitol Technology University (Since 1927 Located Near Washington D.C.)

Direct Link: https://www.captechu.edu/easttom

Prior to beginning his doctoral degree at Capitol, consultant and IT professional Chuck Easttom had already made significant contributions to the fields of cybersecurity and computer science. He is the author of 26 books on programming, digital forensics, cyber security, and penetration testing.  Several of those books are used as textbooks at various universities. He holds more than 40 industry certifications and has served as a subject matter expert for CompTIA certification exams in the creation of the CompTIA Security+, Server+, and Linux+ certifications. He was also on the Certified Ethical Hacker version 8 test revision team and created the OSForensics Certified Examiner course and test.

Easttom is a regular speaker at computer science and security conferences including Defcon, SecureWorld, ISC2 Security Congress, IEEE conferences, AAFS, and many others.  He has already published dozens of peer reviewed papers and articles in trade journals like 2600 Hacker.  Additionally Chuck Easttom is an inventor with 13 computer science patents so far.

Most recently, Easttom was invited to present a paper on weaponized malware at the 13thInternational Conference on Cyber Warfare and Security, held from March 8 to 9 at National Defense University. In addition to the paper, Easttom is presenting a poster at the event.

What research did you present at the ICCWS?

The paper is, in effect, a how-to on weaponized malware, and puts forward the argument that we should use weaponized malware. Cyber warfare is here, it occurs, malware is the weapon of choice in this domain, so let’s look at how to use it effectively.

The paper also aims to set up a different type of malware taxonomy. Instead of looking at malware based on the damage it causes, we look at it based on which one would be best selected for particular cyber warfare missions.

In addition to the paper, I presented a poster on a proposed taxonomy based on the McCumber Cube, which is one of the important conceptual models used in the cybersecurity field. The McCumber Cube provides a view that goes beyond the oft-cited triad of confidentiality, integrity, and availability; it allows us, for instance, to apply these three parameters to data at rest, data in motion, and data in processing.  So we get multiple dimensions. What I’m proposing is a taxonomy for all types of attacks – malware, denial of service, or any other type of attack – based on which of the McCumber Cube dimensions they affect. I have a paper in the works on this topic.

What are some of the objections raised against use of weaponized malware, and how would you answer these objections?

The first is the general ethical issue of using cyber, in any way, as part of an offensive methodology. However, it is simply a fact that countries have cyber conflicts. That’s the reality. From my perspective, weaponizing malware isn’t different from developing any other type of weapon. Scientists work on developing missiles, guns, and other things. Why would a cyber weapon be any different? What I find odd in these ethical discussions is that the same people who voice outrage at the fact that the United States or one of our allies might attack computers in Iran don’t seem as outraged when we send in a plane and drop bombs. Now, if you’re angry at me, would it be better from my perspective for you to drop a bomb on my house or target me with a computer virus. Maybe others will disagree, but I vote for the virus!

That brings us to the second objection. Carl Sagan famously opined that no scientist should be involved in any sort of weapons research. While Sagan is a great hero of mine, I can’t agree with that. We live in a world where bad things happen and there are bad people. That means weapons are required, including cyber weapons.

One of the things I do discuss in my paper, though, is how to minimize collateral damage. I’ve already published research on how to target malware so that it looks at the machine it is on and determines whether it has found one of its targets; if not, it would self-destruct. That’s something we’re not doing that I think we should.

The Stuxnet virus offers a case in point. Experts agree that Stuxnet was designed to target Iranian nuclear refinement. In the process of reaching its target, though, it affected a whole lot of machines that had nothing to do with Iran or its nuclear program. And that’s a problem. Even if we agree that it’s okay to attack Machine X, it’s not okay to attack every machine that might connect to X.

You’re already a cybersecurity expert who has authored many books and publications. What motivated you to undertake a doctoral degree, and why did you choose Capitol?

We all have gaps in our knowledge. No matter how much expertise you may have, there are going to be areas where you can afford to strengthen your understanding. It’s not uncommon to encounter people – a colleague, say, or even a professor – who know less than you in terms of the overall field, but may have one particular piece that you don’t have.  We have to be ready to put our egos to one side and be willing to close those gaps.

Another reason is more personal. As a child, being something of a geek, I always imagined I would have a doctorate by the time I was 25. Life got in the way and I’m well past 25. My wife told me I would never be happy until I achieve that milestone, and she’s probably right. Not having a doctorate hasn’t hurt my career; I’m a frequent public speaker, often at events where I’m the only speaker without a doctoral degree, and have published several books. But it’s a matter of self-fulfillment.

Capitol jumped out for a couple of reasons. Online education has exploded in recent years, but quite a few of the schools involved – especially the for-profit schools – have what I would consider to be very weak programs. In some cases, they exist mainly for one purpose -- to take your money. Capitol is not an online for-profit school; it’s a bonafide university. The undergraduate engineering programs are ABET-accredited; the school has contacts with NASA, and it’s a DHS and NSA-designated Center for Excellence in cybersecurity. It’s a strong university that happens to offer the opportunity to take courses online.

I also like the fact that Capitol is focused. There aren’t 500 different majors you can take. If you want to major in medieval European history, Capitol isn’t the school for you. Capitol does business, engineering, and technology. I like being at an institution that has this kind of focus.

No comments:

Post a Comment