Failing at the Basics in Intelligence and InfoSec

1ri0qfeth1s-vlo0tssxedq

This piece by @thegrugq is spectacular. It covers the myriad of failures that occurred within the intelligence community leading up to the Paris attacks.

Several lessons can be learned from these fundamental misses on the part of the intelligence community, but I want to focus on a single, underlying theme: reaching for the advanced before you have mastered the basics.

Governments have been scrambling to create new legislation that would give new tools to law enforcement, presumably to stop future attacks from occurring. But law enforcement doesn’t need new tools. They need to learn how to use the ones they have.

The failure is in basic police work. Basic investigation. Basic follow-through on obvious, clear, and tangible leads.

The attackers were largely known. The communications were largely unencrypted. And the intentions to perform the attacks were largely in the open for anyone to see.

These signs aren’t handled better by adding new tools. They’re handled better by focusing on basics.

We see the same thing in corporate information security, where millions are spent every year to buy the newest, shiniest tools. But if you ask most companies for a list of every website they own, or a list of every service that faces the internet, they are unable to provide these.

And they get hacked. Repeatedly.

The solution? Buy more things. Hire more staff. Install more products.

Unsupervised Learning — Security, Tech, and AI in 10 minutes…

Get a weekly breakdown of what's happening in security and tech—and why it matters.

A unifying concept for intelligence and infosec

Master the basics first. Do not purchase more products. Do not create new legislation. Here are some prescriptive recommendations for each area:

InfoSec

  1. Document where your sensitive data is

  2. Document how that data moves as part of your normal business processes

  3. Create a list of all hosts in your environments

  4. Document every service that faces the internet, and the hosts that they’re associated with

  5. Keep your systems patched

  6. Perform extensive filtering on the traffic that moves within your environment, with focus on the flows that involve your sensitive data

These are Day 1 basics, yet far too few companies are doing them.

Intelligence

  1. Create a list of known malicious actors

  2. Track their whereabouts

  3. Within the boundaries of the law, monitor their communications and determine their intentions

  4. If their intentions are to launch an attack, try to stop it

Seems simple enough, yet for some reason we’re seeing attacks committed by people who were so plainly malicious, and who were not even hiding their intentions or their communications. And often they were already on known lists of malicious people.

But what are we working on? Parsing the metadata of millions of people, looking for SETI signals.

STOP. Both of you.

If you’re getting successfully attacked by people on known terror lists, speaking out in the open over unencrypted channels, then you don’t get encryption legislation. That’s for grown-ups who’ve used their existing tools to the fullest.

If you’re getting compromised inside your network on hosts you don’t even have records of, that haven’t been patched in months, you don’t get user behavior analytics. That’s for grown-ups who’ve used their existing tools to the fullest.

If you haven’t mastered the basics, stop everything else and work on them first. Because if you’re not doing well at the fundamentals, there’s no legislation or product that can help you.

Notes

  1. If you’re in the security community (OPSEC, physical, intelligence, or InfoSec, you should be following thegrugq’s Twitter and blog.

Related posts: