June 24th, 2024

Google: Stop Burning Counterterrorism Operations

Google's Project Zero and TAG exposed a U.S.-allied government's counterterrorism operation, sparking debate on the impact of revealing such information. Cyber operations play a crucial role in counterterrorism efforts, balancing intelligence gathering with minimizing risks.

Read original articleLink Icon
Google: Stop Burning Counterterrorism Operations

The article discusses Google's Project Zero and TAG's actions in exposing a counterterrorism operation by a U.S.-allied Western government. Despite the intention of harm reduction, the decision to reveal exploits and methodologies had severe consequences, including potentially risking lives and undermining national security efforts. The piece highlights the critical role of cyber operations in counterterrorism, citing examples where cyber activities have successfully disrupted terrorist networks and operations. It emphasizes the importance of cyber operations in gathering intelligence while minimizing risks to human lives. The author criticizes Google's teams for their actions, stating that the destruction of a counterterrorism operation was a significant misstep with potentially deadly consequences. The article underscores the complexities and real-world implications of decisions made by tech companies in the realm of national security.

Related

The hacking of culture and the creation of socio-technical debt

The hacking of culture and the creation of socio-technical debt

Algorithms shape culture, dividing it into niche groups. "A Hacker Manifesto" by McKenzie Wark discusses hackers' influence on power dynamics, emphasizing free information. Tech giants like Facebook and TikTok wield immense cultural influence, blurring propaganda and personalization boundaries. Corporate dominance in culture hacking alters global power structures, challenging governments' regulatory capacity.

Simple ways to find exposed sensitive information

Simple ways to find exposed sensitive information

Various methods to find exposed sensitive information are discussed, including search engine dorking, Github searches, and PublicWWW for hardcoded API keys. Risks of misconfigured AWS S3 buckets are highlighted, stressing data confidentiality.

BeyondCorp (2014)

BeyondCorp (2014)

Google's BeyondCorp approach rethinks enterprise security by moving away from traditional perimeter security to enhance protection in the changing tech environment. Visit the link for more details on this innovative strategy.

Swiss government websites hit by cyberattacks ahead of Ukraine summit

Swiss government websites hit by cyberattacks ahead of Ukraine summit

Swiss government websites and organizations faced cyberattacks ahead of the Ukraine peace summit at Bürgenstock resort. Minor disruptions occurred, but data security remained intact. Customs procedures were temporarily adjusted.

TikTok confirms it offered US Government a 'kill switch'

TikTok confirms it offered US Government a 'kill switch'

TikTok offered a "kill switch" to the US government amid data security concerns. Legal battles persist over potential divestment from ByteDance. Reports suggest data sharing between TikTok and ByteDance.

Link Icon 14 comments
By @halJordan - 5 months
I remain unconvinced that the benefits of secrecy are outweighted by the benefits of transparency. It's unfortunate that the threat actor was caught so hard, but that is the cost of doing business. Couching it as protect the children or punish the terrorists doesn't change the fundamentals. Police work, soldier work, IRS work. They all have to work within and around the "normal" world. They aren't allowed to just demand obeisance because it makes their job easier
By @ein0p - 5 months
So much trouble over creating, funding, and arming “freedom fighters”/“moderate rebels” to (unsuccessfully) take down Assad. I think I concur with Google TAG here. I think exposing and fixing zero days is better than not doing so, simply because other countries can find them also. Which this article openly acknowledges thus defeating its own argument
By @rs_rs_rs_rs_rs - 5 months
I personally am thankful to Google for doing the thing that's right for everyone(fixing security vulnerabilities) not just some "Western" countries as the author put it(not sure why the capital w but I am not a native english speaker)
By @schoen - 5 months
Upvoted despite vast disagreement because I (sort of) appreciate someone openly arguing this.
By @poincaredisk - 5 months
I'm a security researcher close to the field of the author. I'm usually very sceptical of what Google is doing.

In this case though, Google really did nothing wrong. They did what they should to protect their users. They didn't know they're interfering with a counter terrorist operation (according to the post), and even if they knew, who knows how many other less commendable operations they disrupted. And who knows who else was using the same vulnerabilities? I'm sure if Google disrupted Chinese or Russian operation the author would be very happy about that.

>However, burning operations, no matter the actor and no matter the reason, demonstrates a grave misunderstanding of the critical role that cyber plays in reducing harm in the world.

I honestly don't understand what the author tries to convey. What about Iranian operations targeting independent journalists? What about Chinese operations against Uyghurs? Is it also not OK to disrupt those? How should Google decide which operations are OK to disrupt? Especially since they don't really have full insight into campaigns.

By @notactuallyben - 5 months
Interesting blog post that was long overdue, I think Google should probably disclose all the details (URLs/actors responsible, methodology for catching these exploits ITW and targeting) around the ITW samples when they kill the bugs, so we can have nuanced discussion with actual facts. It would also help the threat intelligence industry ;)
By @ano-ther - 5 months
How are Google (and other security researchers) supposed to know that they are about to disturb a counter-terrorism operation?
By @jauntywundrkind - 5 months
The framing is absurd & fascist to the core.

Someone was cyber attacking Chrome. Unclear if Google had even so much as a guess they knew who from. There were bugs in Chrome. Google fixed the vulnerabilities, making the software obey the contract websites & users have with each other, & detailed why they were changing the open source code in such a fashion.

This is not burning an operation. Google didn't name any operation or country. Google probably didn't know who it even was!

If they had some guesses, & did try to pick up the phone & call say MI6, about this topic of leaving this exploit jeapordizing everyone running - which they may well have done (if they confidently track down the cyber attack) - the first most likely response is "we have no idea what you re talking about" in which case fixing the vulnerability & writing a blog post is basically the only remotely acceptible option. You spent a while trying to find out who the cyber attack is launching from, you've gone crazy far to do due diligence to track down whose attack it is, and they say it's not theirs. Ok your diligence was wrong, the cyber attack is coming from somewhere else or from multiple people, you need to resolve it.

Next option is whichever security agency either fesses up & does the right thing. Google addresses the vulnerabilities, and writes a blog post about them.

Or, stand-in Intelligence Agency [SIIA] declares, no, we're SIIA, and you're leaving the defect in place, because we say so.

It's unclear what the author is really protesting here? Bugs are critical to national security so we should let people exploit them? Oh that's exactly what they're saying.

> However, burning operations, no matter the actor and no matter the reason, demonstrates a grave misunderstanding of the critical role that cyber plays in reducing harm in the world.

'The military's active use of indiscriminate cyberwarfare trump's the right to find and correct defects.' Wow. That is a bold position.

By @lucasRW - 5 months
Part of the game... With Crowdstrike, Mandiant, Google, Kaspersky, etc, it's hard to remain undetected these days !
By @hi-v-rocknroll - 5 months
Maybe instead of spending taxpayer money on weaponized 'sploits from Zerodium while keeping everyone vulnerable, these three letter agencies should get off their lazy asses and develop HUMINT and use conventional intelligence sources and methods.
By @g8oz - 5 months
This is a real "think of the children" style argument the author is making. I'm sure if there are some unsavory operations that have been burnt they will not be trotted out.
By @ta112112 - 5 months
maybe it's payback for the time the NSA hacked Google and were siphoning off data after HTTPS decryption
By @tachyons - 5 months
TLDR:

USA should be allowed to use 0 days for their "counter" terrorism operations. This is interesting at the time of USA being complicit in a genocide against a community.