Google: Stop Burning Counterterrorism Operations
Google's Project Zero and TAG exposed a U.S.-allied government's counterterrorism operation, sparking debate on the impact of revealing such information. Cyber operations play a crucial role in counterterrorism efforts, balancing intelligence gathering with minimizing risks.
Read original articleThe article discusses Google's Project Zero and TAG's actions in exposing a counterterrorism operation by a U.S.-allied Western government. Despite the intention of harm reduction, the decision to reveal exploits and methodologies had severe consequences, including potentially risking lives and undermining national security efforts. The piece highlights the critical role of cyber operations in counterterrorism, citing examples where cyber activities have successfully disrupted terrorist networks and operations. It emphasizes the importance of cyber operations in gathering intelligence while minimizing risks to human lives. The author criticizes Google's teams for their actions, stating that the destruction of a counterterrorism operation was a significant misstep with potentially deadly consequences. The article underscores the complexities and real-world implications of decisions made by tech companies in the realm of national security.
Related
The hacking of culture and the creation of socio-technical debt
Algorithms shape culture, dividing it into niche groups. "A Hacker Manifesto" by McKenzie Wark discusses hackers' influence on power dynamics, emphasizing free information. Tech giants like Facebook and TikTok wield immense cultural influence, blurring propaganda and personalization boundaries. Corporate dominance in culture hacking alters global power structures, challenging governments' regulatory capacity.
Simple ways to find exposed sensitive information
Various methods to find exposed sensitive information are discussed, including search engine dorking, Github searches, and PublicWWW for hardcoded API keys. Risks of misconfigured AWS S3 buckets are highlighted, stressing data confidentiality.
BeyondCorp (2014)
Google's BeyondCorp approach rethinks enterprise security by moving away from traditional perimeter security to enhance protection in the changing tech environment. Visit the link for more details on this innovative strategy.
Swiss government websites hit by cyberattacks ahead of Ukraine summit
Swiss government websites and organizations faced cyberattacks ahead of the Ukraine peace summit at Bürgenstock resort. Minor disruptions occurred, but data security remained intact. Customs procedures were temporarily adjusted.
TikTok confirms it offered US Government a 'kill switch'
TikTok offered a "kill switch" to the US government amid data security concerns. Legal battles persist over potential divestment from ByteDance. Reports suggest data sharing between TikTok and ByteDance.
In this case though, Google really did nothing wrong. They did what they should to protect their users. They didn't know they're interfering with a counter terrorist operation (according to the post), and even if they knew, who knows how many other less commendable operations they disrupted. And who knows who else was using the same vulnerabilities? I'm sure if Google disrupted Chinese or Russian operation the author would be very happy about that.
>However, burning operations, no matter the actor and no matter the reason, demonstrates a grave misunderstanding of the critical role that cyber plays in reducing harm in the world.
I honestly don't understand what the author tries to convey. What about Iranian operations targeting independent journalists? What about Chinese operations against Uyghurs? Is it also not OK to disrupt those? How should Google decide which operations are OK to disrupt? Especially since they don't really have full insight into campaigns.
Someone was cyber attacking Chrome. Unclear if Google had even so much as a guess they knew who from. There were bugs in Chrome. Google fixed the vulnerabilities, making the software obey the contract websites & users have with each other, & detailed why they were changing the open source code in such a fashion.
This is not burning an operation. Google didn't name any operation or country. Google probably didn't know who it even was!
If they had some guesses, & did try to pick up the phone & call say MI6, about this topic of leaving this exploit jeapordizing everyone running - which they may well have done (if they confidently track down the cyber attack) - the first most likely response is "we have no idea what you re talking about" in which case fixing the vulnerability & writing a blog post is basically the only remotely acceptible option. You spent a while trying to find out who the cyber attack is launching from, you've gone crazy far to do due diligence to track down whose attack it is, and they say it's not theirs. Ok your diligence was wrong, the cyber attack is coming from somewhere else or from multiple people, you need to resolve it.
Next option is whichever security agency either fesses up & does the right thing. Google addresses the vulnerabilities, and writes a blog post about them.
Or, stand-in Intelligence Agency [SIIA] declares, no, we're SIIA, and you're leaving the defect in place, because we say so.
It's unclear what the author is really protesting here? Bugs are critical to national security so we should let people exploit them? Oh that's exactly what they're saying.
> However, burning operations, no matter the actor and no matter the reason, demonstrates a grave misunderstanding of the critical role that cyber plays in reducing harm in the world.
'The military's active use of indiscriminate cyberwarfare trump's the right to find and correct defects.' Wow. That is a bold position.
USA should be allowed to use 0 days for their "counter" terrorism operations. This is interesting at the time of USA being complicit in a genocide against a community.
Related
The hacking of culture and the creation of socio-technical debt
Algorithms shape culture, dividing it into niche groups. "A Hacker Manifesto" by McKenzie Wark discusses hackers' influence on power dynamics, emphasizing free information. Tech giants like Facebook and TikTok wield immense cultural influence, blurring propaganda and personalization boundaries. Corporate dominance in culture hacking alters global power structures, challenging governments' regulatory capacity.
Simple ways to find exposed sensitive information
Various methods to find exposed sensitive information are discussed, including search engine dorking, Github searches, and PublicWWW for hardcoded API keys. Risks of misconfigured AWS S3 buckets are highlighted, stressing data confidentiality.
BeyondCorp (2014)
Google's BeyondCorp approach rethinks enterprise security by moving away from traditional perimeter security to enhance protection in the changing tech environment. Visit the link for more details on this innovative strategy.
Swiss government websites hit by cyberattacks ahead of Ukraine summit
Swiss government websites and organizations faced cyberattacks ahead of the Ukraine peace summit at Bürgenstock resort. Minor disruptions occurred, but data security remained intact. Customs procedures were temporarily adjusted.
TikTok confirms it offered US Government a 'kill switch'
TikTok offered a "kill switch" to the US government amid data security concerns. Legal battles persist over potential divestment from ByteDance. Reports suggest data sharing between TikTok and ByteDance.