The views expressed by contributors are their own and not the view of The Hill

Cybersecurity 101: How we can stop making so many mistakes


The online exercise-tracking map that recently revealed the locations of remote U.S. military outposts, including even the identity of particular soldiers, was a textbook cybersecurity fail, but the Department of Defense is by no means alone in unsuccessfully imagining the swoops and sallies that happen with data (and the innumerable ways it can get stolen, diverted or revealed). 

While the Strava “heat map” was good marketing, there was collateral damage for the DoD. The problem was so simple it could be stated in a few words, and it was by a twenty-year old Australian university student in a tweet. “Not amazing for Op-Sec,” he wrote. “US Bases are clearly identifiable and mappable.”

While the problem was easy to describe, for some reason it wasn’t quite as easy to predict, and it should have been. By issuing FitBit devices to address obesity among the enlisted, the Defense Department inadvertently created a source of intel about troop locations in Afghanistan, Syria and Iraq.

{mosads}Recent news of a low-level discussion in the Trump administration about a government-owned nationwide 5G network was newsworthy because it seemed like a redundancy — AT&T and Verizon are already poised to make 5G a reality. Would Chinese-supplied hardware (such as integrated circuitry) be used to power that network? If so, how could we protect against Chinese influence?

 

We need to start from the premise that all connected devices are hackable, and reverse engineer from there. The future is not terribly different from our current situation, but it will be defined by a commonly held belief that every device can and will be hacked. 

What would this look like with regard to the Strava reveal?

It’s entirely possible that someone in procurement didn’t identify the FitBit as a computer system. The devices may have gotten no more scrutiny than the purchase of sunglasses or flashlights. If that’s what happened, no one in a position to determine the associated risk was aware of the purchase. This sort of surprise can be avoided by making everyone in an organization aware of the security dangers posed by connected devices. 

We need a new approach, one predicated on thinking ahead and baking best security practices into every aspect of our digital lives — from individual mindset, behavior and privacy protocols to the way networks are used and which products we run on them.

In general, we need to always be looking at the “big picture.” This means thinking about what kind of data a device is collecting, how it’s going to be used, and how that data will be protected.

Here’s the greatest hits of what a sea change might look like:

The sea change we need is a mindset, one that is constantly evolving, and includes the never ending socialization of current security and privacy best practices. It is the institutionalization of reality-based paranoia when it comes to the security of connected devices.

Adam K. Levin is chairman and founder of CyberScout (formerly IDT911) and co-founder of Credit.com. He is a former director of the New Jersey Division of Consumer Affairs and is the author of Swiped: How to Protect Yourself In a World Full of Scammers, Phishers, and Identity Thieves, which debuted at #1 on the Amazon Hot New Releases List.