Steve Grobman and

Allison Cerra

The Second Economy

The Race for Trust, Treasure and Time in the Cybersecurity War

Foreword by Christopher Young, Cybersecurity Executive

Steve Grobman

Santa Clara, California, USA

Allison Cerra

Plano, Texas, USA

Any source code or other supplementary materials referenced by the author in this text are available to readers at www.apress.com . For detailed information about how to locate your book’s source code, go to www.apress.com/source-code/ . Readers can also access source code at SpringerLink in the Supplementary Material section for each chapter.

ISBN 978-1-4842-2228-7

e-ISBN 978-1-4842-2229-4

DOI 10.1007/978-1-4842-2229-4

Library of Congress Control Number: 2016955488

© Copyright © 2016 by Intel Corp. 2016

The Second Economy: The Race for Trust, Treasure, and Time in the Cybersecurity War

Managing Director: Welmoed Spahr

Lead Editor: Natalie Pao

Technical Reviewer: Patty Hatter

Editorial Board: Steve Anglin, Pramila Balan, Laura Berendson, Aaron Black, Louise Corrigan, Jonathan Gennick, Robert Hutchinson, Celestin Suresh John, Nikhil Karkal, James Markham, Susan McDermott, Matthew Moodie, Natalie Pao, Gwenan Spearing

Coordinating Editor: Jessica Vakili

Copy Editor: Lori Jacobs

Compositor: SPi Global

Indexer: SPi Global

Artist: SPi Global

For information on translations, please e-mail [email protected] , or visit www.apress.com .

Apress and friends of ED books may be purchased in bulk for academic, corporate, or promotional use. eBook versions and licenses are also available for most titles. For more information, reference our Special Bulk Sales–eBook Licensing web page at www.apress.com/bulk-sales .

This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed.

Trademarked names, logos, and images may appear in this book. Rather than use a trademark symbol with every occurrence of a trademarked name, logo, or image we use the names, logos, and images only in an editorial fashion and to the benefit of the trademark owner, with no intention of infringement of the trademark. The use in this publication of trade names, trademarks, service marks, and similar terms, even if they are not identified as such, is not to be taken as an expression of opinion as to whether or not they are subject to proprietary rights.

While the advice and information in this book are believed to be true and accurate at the date of publication, neither the authors nor the editors nor the publisher can accept any legal responsibility for any errors or omissions that may be made. The publisher makes no warranty, express or implied, with respect to the material contained herein.

Printed on acid-free paper

Distributed to the book trade worldwide by Springer Science+Business Media New York, 233 Spring Street, 6th Floor, New York, NY 10013. Phone 1-800-SPRINGER, fax (201) 348-4505, e-mail [email protected], or visit www.springeronline.com. Apress Media, LLC is a California LLC and the sole member (owner) is Springer Science + Business Media Finance Inc (SSBM Finance Inc). SSBM Finance Inc is a Delaware corporation.

Foreword

The second economy is at risk. It need hardly be said that the magnitude and prevalence of cybersecurity threats in our lives is increasing. In 2006, McAfee Labs counted an average of 25 threats a day; by 2016, the number was more than 400,000, or more than 300 threats per minute. New malware alone is up 60 percent, there has been a 30 percent increase in targeted attacks, and a billion personal records are stolen every year. As it has been for more than 30 years, cybersecurity is the very definition of dynamic.

In 1997 three business partners and I embarked on a startup journey in cybersecurity. You might say we were among the last white hats to enlist in the cybersecurity cause before the new century began. Online security then was largely a back-office function, and often it was physically situated in the basement, or fitted into some other less than desirable piece of real estate, as if an afterthought. It’s not that the computing experience wasn’t already under threat by then, or that online safety wasn’t important to each of us living digital lives. Nuisance attacks via numerous worms and viruses in the 1980s generated a great deal of media coverage and drove broad public awareness. Accordingly, much of the focus in the late 1990s was on deploying antivirus software and monitoring e-mail for corrupt attachments. We were still a few years away from targeted efforts that began with attacks on credit cards in the early 2000s.

My partners and I had a business vision that was easy to rally behind 20 years ago: protect trust. Others might guess we would have defined our work as something like this: keep outsiders from getting inside by monitoring for suspicious activity across systems. While that’s technically true—it’s what our software did—our higher aim was to ensure trusted, and trustworthy, computing. After all, safe information powers the world. The data that defines us, the patents and designs that differentiate our brands, the records of our institutions, and government—indeed, the knowledge of all humankind—is the very stuff of which the Internet is made.

Still, two decades ago, my partners and I didn’t foresee how cybersecurity would evolve. How quickly trust would come under relentless attack. How eventually cybersecurity would move from the basement to the boardroom. And I certainly didn’t know then that cybersecurity now would be my life’s work. The second economy is built on trust, and protecting it is my personal focus. That hasn’t changed since my startup days, even as many things about the cybersecurity landscape have.

The caricature of the social misfit hacker working alone popularized in popular culture is outdated. Attacking computer infrastructure is now mainstream and global. Coordinated efforts of nation-states, criminal organizations, and networks of politically motivated hacktivists have brought targeted attacks to the front pages. From thefts of retail customer data to publication of national security data to billion-dollar international financial industry attacks, the breadth and scope of cybersecurity attacks have increased exponentially. The size of the target has also increased. Where once individual retailers or banks would be targeted, now entire supply chains, financial networks, and stock markets are targeted. What was once a threat to one computer at a time now has the potential to affect the integrity of international financial systems or a country’s GDP (gross domestic product).

Furthermore, as automation pervades more and more of our world, the targets for cyberattacks increase as well. Many systems once isolated and mechanically driven are now networked and automated or controlled remotely via the Internet, often wirelessly, greatly expanding the target surface and nature of cyberattacks. The race to be the first to market with new automation technologies has also meant that some devices in the growing “Internet of Things” are proving to be vulnerable to hacking with only moderate effort. Location tracking is also routinely accessed by phone apps, providing yet another security risk to consumers if hacked. And this is all before drones and autonomous transportation have become commonplace.

Before I made cybersecurity my career, all this was more limited in scope. Computer access was less pervasive, and systems were limited in their ability to connect to other networks and devices. The issue of cybersecurity was the province of a small number of specialists within the information technology (IT) community, working within the operations team within individual organizations. Today, even in the Oval Office, cybersecurity is front and center, and I’m certainly proud and gratified to have been appointed by President Obama to the NSTAC (National Security Telecommunications Advisory Council). Securing our communications infrastructure is central to everything we value in the 21st century, and protecting data and systems across all aspects of government, and throughout every sector, is only increasing in importance with each passing day.

But while events in the news have by and large gotten everyone’s attention, those in the executive suite often have no tools, history, context, or experience to understand the magnitude and nature of new threats. Recently, chief information officers (CIOs) of several large corporations admitted that they had only paid attention to cybersecurity for a few years. How can critical organizational decisions be made in an informed way in such an environment?

This book helps explain in clear layman’s terms the fundamental landscape of the second economy, its foundations, basic concepts in security, and the threats to it, so that you can better understand the issues at hand. If you are a cybersecurity professional, the book will magnify your world through a different lens, particularly by challenging conventional wisdom that is rooted in cybersecurity’s early beginnings. If you are an executive, you will gain an appreciation for the complexity of the issues at hand and be provided with practical takeaways to ensure your cybersecurity agenda is not compromised by internal politics or flawed incentive systems. And, if you are an employee, you will grasp the magnitude of the virtual battle that is fought each day, many times with your unwitting participation. But what exactly is meant by the second economy , anyway?

Not that long ago, references to a second economy would have referred exclusively to the underground economy of unregulated and illegal commerce (as, for example, the black market in the former Soviet Union). Though this secondary underground economy differed in many ways from the first economy, it was bound by the same physical limits and operated at the pace of humans transacting business directly in the physical world.

In today’s society, the second economy refers to the vast and interconnected set of digital systems that move alongside or serve as underpinnings for our first economy. Billions of IP (Internet Protocol)-enabled sensors are like oxygen in the always on, always connected world. Through the proliferation of smart devices in this new second economy, transactions occur instantaneously and globally, often with no direct human involvement.

But the unregulated and illegal activities of the physical world have successfully migrated to this second virtual economy as well. Whatever nefarious schemes go down in the physical world can happen in the virtual world as well. How do we combat threats that know no physical barriers and attacks that occur either instantaneously with apparent damage or surreptitiously but gradually, causing great cumulative harm? While the first economy relies on physical barriers and safety mechanisms for security, the second economy relies on trust: consumer trust in a company’s security structure for ecommerce, for instance.

But, the second economy is also about treasure—be it the enemy’s pursuit for profit, principle, or province and the defender’s relentless fight to protect what is most sacred. This book covers the economic principles undergirding incentive structures for black hats and white hats. It does so by juxtaposing the clarity of incentive schemes for adversaries against the unclear, and sometimes misdirected, reward structures of their targets. In this highly asymmetric battle, it’s critical that those of us on the good side of the fight understand our enemy and how we may be unintentionally playing into its hands with rewards that do not drive optimal cybersecurity outcomes.

Finally, the second economy is about time. When a breach does occur, time becomes the ultimate weapon. Adversaries use it to their advantage to surreptitiously pilfer their loot, if not surprise their victim with a very visible attack designed to grab news. Victims are in a virtual race against both their enemy and the clock—detecting and remediating threats as quickly as possible becomes the goal in a race where every second matters. Time is critical. And, the “supply” of time available in one’s war reserves—or how quickly an organization is able to shift from its heels to its toes when an attack occurs—depends on an organization’s tools, policies, and political structures in place before any such notion of a threat is even recognized.

Unfortunately, not every organization has evolved to meet the demands placed on it by today’s industrialized hackers. Often, separate divisions within a corporation or organization still have separate security policies, allowing one lax team to open up the others to attack. Inertia and reluctance to comply with corporate standards compound the problem of keeping security measures up to date.

Although this situation is changing to one where cybersecurity standards are being more consistently enforced within organizations, the complexity of electronic connectivity with business partners, cloud computing, automated supply chains, and connected devices have provided more opportunities for attacks along with additional convolution. Cybersecurity vendors have naturally responded with more tools to help manage this increasingly complex landscape.

The cybersecurity industry is experiencing tremendous growth in response to well-publicized threats: in just four years, more than 1,200 new firms found VC (venture capital) backing of some $7 billion. Corporate expenditures for cybersecurity today are around $100 billion and growing. In addition to this expansion, the movement to pool threat information for mutual aid in such industry initiatives as the CTA (Cyber Threat Alliance) has provided enormous amounts of threat and attack data to analyze. Making cybersecurity a financial priority and working together to combat cyberattacks are both steps in the right direction.

However, within organizations, the need to justify expenditures and show a return on investment in the conventional way leads to, in many cases, simply purchasing (and perhaps actually deploying) the latest tools on the market, and reacting to each new threat by logging ever more alerts and collecting more and more data. To some extent, this tool sprawl is throwing money at a problem. What you get in return is not always more protection. Sometimes all you get is more complexity, higher costs, and massive volumes of data. As we have learned from intelligence initiatives in the past decade or so, sometimes just having the data won’t protect you unless you can make sense of it. With all this attention and financial investment, there is a dire shortage of trained cybersecurity experts to rank all these alerts and analyze all this data in an intelligent way. And while data analytics and artificial intelligence are promising technologies, the need for better-trained and better-staffed cybersecurity teams remains a critical choke point in moving forward (i.e., we don’t have enough white hats—we’re on track to be short two million qualified personnel by the end of the decade). And we don’t just need more bodies. Conventional paradigms must be challenged: the more the teams are expanded to include those not narrowly focused on IT security, the sooner fresh approaches and new perspectives can be gained to help with identifying and combating current attacks as well as anticipating potential targets that need to be protected.

Cybersecurity is about outcomes—it’s that simple. Which is why a thorough change in the organization, from the boardroom to security operations, needs to occur in order to successfully address current threats and prepare for future ones. Are you asking the right questions? Skilled teams need to be developed to identify and assess the most likely serious threats based on an understanding of the business, the infrastructure, the data, and recent targeted attacks. For the foreseeable future, the most highly trained teams are a scarce and valuable resource, and they must be used wisely. This implies that metrics need to be rehashed and reevaluated to make sure that likely risks are given higher priority for more in-depth assessment by such teams, while lower-level alerts are dealt with using vetted cybersecurity software and best security practices. I often put it this way: deploy automation to deal with the 99 percent of threats that are noise, and put your best talent on the hunt for the 1 percent of attacks that would steal headlines.

A framework for dealing with risk needs to be established and then constantly revisited to check for inertia, institutional bias, incorrect or outdated assumptions, and the like. Understanding how to use a more cooperative and adaptive defense strategy requires a renewed interest and focus on cybersecurity at the highest levels of the organization. This book does a great job of presenting memorable and engaging illustrative examples from history and current events that provide key insights and perspectives gleaned from the collective experiences of the security industry in a context that helps it all make sense.

It takes courage and dedication to move from a siloed, reactive, back-office approach to cybersecurity to one that is adaptive, aggressive, and proactive in its orientation. In order to develop the framework to meet these demands and push these efforts forward, leaders must have a basic understanding of cybersecurity and what has and has not been effective in terms of corporate strategy to meet the cybersecurity threats head on. They need to know what is at risk, what is perceived as potentially vulnerable or a rich target, what motivates the black hats to develop their attack campaigns, and how the white hats can anticipate these attacks, defend against them, and move from defense to offense. This book provides a foundational understanding of the challenge in a thought-provoking way. It can be an invaluable jumping-off point for the evolution in thinking that needs to occur to adapt and survive in the world of the second economy. A world where trust, treasure, and time are the spoils.

—Christopher Young

Senior Vice President and General Manager

Intel Security

Prologue

“Because that’s where the money is.”

—Quote attributed to notorious felon William Francis “Willie” Sutton when asked by reporter Mitch Ohnstad why he robbed banks

Merriam-Webster defines an urban legend as “a story about an unusual event or occurrence that many people believe is true but that is not true.” Willie Sutton’s 40-year criminal record, in which he scored nearly $2 million and escaped from prison three times, is the stuff of which urban legends are made. Indeed, with an estimated 100 bank heists to his credit, Sutton rightfully earned his place in history as one of the most prolific bank robbers of the 20th century.

Yet, despite his prodigious career as criminal mastermind, the one defining mark of Sutton’s legacy would become so inextricably linked to him that it could only be dubbed “Sutton’s Law”—that is, his oft-quoted response to the question of why he robbed banks, to which Sutton allegedly quipped, “Because that’s where the money is.” Beyond demonstrating the brilliant simplicity (and wit) of one of the most famed bank robbers of a generation, Sutton’s Law would live on in other more respectable trades. In the medical community, it served as a metaphor encouraging doctors to focus on the most likely diagnosis, rather than waste resources investigating every potential possibility. In management accounting, it gained traction in activity-based costing, where the highest-cost items are scrutinized to uncover commensurate savings.

Despite all the notoriety of Sutton’s Law, the truth, according to Sutton himself, is that he never made the comment:

  • The irony of using a bank robber’s maxim as an instrument for teaching medicine is compounded, I will now confess, by the fact that I never said it. The credit belongs to some enterprising reporter who apparently felt a need to fill out his copy. I can’t even remember where I first read it. It just seemed to appear one day, and then it was everywhere. i

And so it goes: urban legend born from one journalist’s active imagination attributed to a one-man-crime-spree whose record hardly needed embellishment continues to this day. And, as Sutton’s Law has gone down as one of the most fascinating (if not completely fictitious) retorts in modern history, it pales in comparison to the widespread popular opinion of early bank robbers and their reign of terror over what American historians would label the country’s “frontier period.” The mere mention of the “Wild Wild West” conjures images ripped from the silver screen of gun-wielding, mask-donning bank robbers, intent on cashing in before darting out on their trusty steeds. Here’s the problem with this image: Like the Sutton quote, it is born of fiction.

To clarify, there certainly were bank robberies during this period, but the number hardly warrants the moniker, yet alone icon, associated with a “Wild West.” In their book, Banking in the American West from the Gold Rush to Deregulation , authors Larry Schweikart and Lynne Doti examine primary and secondary sources from all the states of the “frontier west” during the period 1859-1900. Based on their extensive research, including additional interviews from well-intentioned sources bent on clarifying the record following the book’s release, Schweikart and Doti report roughly a half dozen bank robberies over a 40-year period and across 15 states. Putting the number into context, there were more bank robberies in Dayton, Ohio, in one year at the turn of this century than there were in the entire Old West in a decade and perhaps in the whole frontier period. ii

While the results were not entirely surprising to Schweikart and Doti, the average layperson may be puzzled by the lack of robberies among what would have represented a lucrative target for inspired thieves. After all, whether Sutton said it or not, banks really were where the money was. In deconstructing the success of these early frontier bankers, the authors point to a relatively simple blueprint that established a financial bedrock for society.

  • Bankers were often first something else. Despite several early bankers having ties to eastern financial firms, many did not inhabit a town and immediately set up a bank. Instead, they typically opened a general merchandise store. The reason was simple, if not profound. These early businessmen recognized that a bank’s foundation was predicated on the psychological currency of trust. Introducing a general store allowed these leaders to build trust with those in the community before attempting to monetize it via a banking relationship.

  • Bankers looked the part. Before the days of federal regulation or financial insurance, a banker’s appearance was paramount in convincing customers of his authenticity and credibility. A banker’s dress denoted success and wealth; more important, it conveyed assurance of a person behind the bank, one capable of supporting his business during times of trouble. With trust still the principal currency in play, a banker who effectively played the part connoted competence.

  • Banks were secure. Often placed in the center of town and constructed by some of the leading architects in the country, the bank building itself was one that deterred would-be criminals. Flanked on both sides by other merchants, a bank’s most vulnerable entry was through the rear of the building. Still, blasting through this rear entry proved no simple task, as many bankers double-reinforced this wall. Even if the most industrious of criminals found their way in, they would find themselves confounded with a seemingly impenetrable iron safe. The physical representation of the institution was the final marker upon which to build trust, one where customers had confidence in the construction of the bank itself.

Of course, there were exceptions to the rule and notorious bank robbers, including Butch Cassidy and his clan, were successful in major scores. While fiction is quick to glamorize the shoot-out matches likely present in these escapades, it fails to convey the excruciating planning behind such heists. As a case in point, Cassidy was known to be an expert with horses and would strategically station his stallions at deliberate checkpoints between his score and hideout, allowing his team to switch “vehicles” mid-course at precisely the moments the animals were most likely to fatigue. iii

But the capers of Cassidy and other notorious felons were rare cases. Based on Schweikart and Doti’s own account, the Wild West bank robbery was virtually nonexistent. While the money certainly was at the bank, so too were considerable obstacles and risks to the criminally inclined. Instead, stagecoaches and trains became the risk-averse targets of choice, rendering most banks during the frontier era safe havens upon which a burgeoning economy would ultimately flourish—one where physical currency traded on the basis of an underlying trust relationship.

Only when the playing field was leveled between experienced and amateur robbers did the bank heist become a more common occurrence. Specifically, the introductions of the automobile and highway system allowed crooks the advantage once enjoyed exclusively by innovators like Cassidy – the ability to evade pursuit. Once banks became softer targets, thieves responded in kind.

Fast forwarding to modern times, the economics of bank robbery still prove elusive but for the most adept masterminds. According to a study by a team of economists at the University of Sussex, who crunched data on more than 350 robberies between 2005 and 2008, the average haul for a British robber was a rather insignificant £20,330 ($31,610). In the United States, the take was even lower—just $10,025, on average, according to the FBI. iv Just as mythical as the prolific Wild West bank heist is the notion that current bank robbers abscond with huge sums of money for their risk and trouble. Contrary to the images so common on a Hollywood set, less than 10 percent of US bank robbers even make it inside the vault, leaving their spoils subject to what can be collected at a bank teller’s window. v

And so, the annals of bank robberies have been relegated but to the most notorious of criminals, including Sutton, Cassidy, and their ilk, leaving most thieves in the category of petty nuisance to the financial bastions they infiltrate. That is, until 2015, when security firm Kaspersky Labs uncovered what would be heralded as the largest bank heist in history. In an attack on more than 100 banks in 30 countries, criminals made off with close to an estimated $1 billion, of which only one-third was even traceable. vi There was no need to determine how to crack a seemingly impenetrable vault or orchestrate a strategic escape plan across jurisdictional lines. This attack was perpetrated by savvy hackers across Russia, China, and Europe.

First, the trap was set, as cybercriminals targeted bank employees with e-mails appearing to come from trusted colleagues (known as a phishing scheme in industry parlance). Once unwitting employees clicked on the e-mail attachments, malicious programs did their part to trace employee behavioral patterns. After capturing photo and video surveillance of employees’ computers, the hackers used their victims’ credentials to siphon money in what would otherwise appear as authorized bank or ATM (automated teller machine) transactions. One such tactic involved inflating individual bank account balances, such as showing $10,000 in an account where only $1,000 was actually deposited, allowing the criminals to abscond with the $9,000 in counterfeit withdrawals. And, perhaps the scariest fact in the case: unlike the quick in-and-out approach of “traditional” bank robberies, these perpetrators took their time, literally spending as much as two years camping out incognito within the virtual perimeter of their targets—collecting data, learning behavioral patterns, and inconspicuously taking up to $1 billion in treasure over several quarters. vii

Though newsworthy given the size of take, the $1 billion, nameless, faceless, virtual hack is one of so many stories that make daily headlines. In the financial industry alone, consider some of the more notable hacks in recent years.

  • At 1:07 p.m. Eastern Standard Time on April 23, 2013, the official Twitter account belonging to the Associated Press released this tweet to its nearly two million followers: “Breaking: Two Explosions in the White House and Barack Obama is injured.” viii Over a three-minute period that followed, the Dow nosedived nearly 150 points, temporarily obliterating $136 billion in equity market value before stabilizing. The recovery came when the tweet was exposed as fake. A group of Syrian hackers claimed credit for the breach and, though a financial institution was not the direct target, the group was able to wreak havoc on Wall Street for three minutes. ix Imagine the consequences if the hackers were successful in seizing the official Twitter accounts of multiple news organizations simultaneously with consistent counterfeit messages.

  • British banking customers fell prey to another phishing scam in October 2015, losing up to £20 million to Eastern European hackers. The real target of the attack were global financial institutions as hackers lured consumers to click on otherwise legitimate e-mails which activated the insidious Dridex virus, succumbing the victims’ computers—and online banking details—to the hackers’ control. x

  • In November 2015, four hackers were indicted for infiltrating a JPMorgan Chase server containing the contact records of more than 80 million customers. The case didn’t involve a complex phishing scheme or zero-day attack exploiting an unknown software vulnerability. Instead, criminals simply stole the username and password of an employee.

    Normally, such a simplistic attempt would be thwarted, as most servers require two-factor authentication. Multifactor authentication is common security practice, requiring at least two forms of verification before allowing a user access to a system. As an example, consider a withdrawal from a cash machine, which requires both the authorized bank card and associated PIN (personal identification number) for the account, to be executed. In the JPMorgan Chase hack, a typical server would have required at least one more piece of verification beyond a user name and password for access. However, in JPMorgan Chase’s vast network of servers, including those gained via mergers and acquisitions, the one that lacked this additional layer of security offered adversaries entry to more than 90 other servers on the bank’s network. xi

    Though no account data was stolen, the criminals still enjoyed a healthy payday—netting more than $100 million in a bogus stock-pumping scheme and online gambling operation. xii In the scam, the hackers used the stolen contact data to con victims into buying stocks and manipulate their prices. When asked whether buying stocks was popular in America, one of the perpetrators allegedly responded, “It’s like drinking freaking vodka in Russia.” xiii

Make no mistake: the nature of these attacks do not merely compromise a few companies’ bottom lines. They call into question the stability and integrity of the financial system itself—a system that, at its foundation, is built on the psychological currency of trust. Early bankers knew that their very success depended on first gaining customer trust, hence the reason so many were first general merchants and carefully looked the part of credible financier capable of covering any potential losses. Historically, bank robbers proved more nuisance than threat, targeting banks meeting certain physical criteria and limiting their spoils largely to what they could quickly take when seconds matter.

However, with a virtual and highly interconnected monetary network now in play, cybercriminals increasingly have the entire financial system in their sights. The stakes of this game couldn’t be higher as law enforcement officials are becoming all too aware. When federal prosecutor Preet Bharara brought charges against an Eastern European hacking ring in 2013, he presciently added, “Cybercriminals are determined to prey not only on individual bank accounts, but on the financial system itself.” xiv These adversaries have a vast attack surface to target: a 2013 report from Iosco and the World Federation of Exchanges reported that 89 percent of the world’s financial exchanges listed hacking as a “systemic risk.” xv

And, the financial system is just one target. Hackers are not prone to discrimination, pursuing everyone from consumers to companies and everything from data centers to utility grids. Like the urban legends that pervasively represent a Wild West as a distant notion from reality, many still imagine a hacker as the pimple-faced teen in his parents’ basement with nothing better to do with his time and talent. While hobbyist hackers still exist, the reality is that insidious cybercrime is increasingly at the hands of organized crime syndicates and nation-states, whose profits produce a staggering economic burden. According to the Center for Strategic and International Studies, a Washington think tank, the estimated global costs of cybercrime and economic espionage are nearly $450 billion, placing cybercrime in similar company with drug trafficking in terms of economic harm. Put another way, if cybercrime were a country, its GDP (gross domestic product) would rank in the top 30 of nations, exceeding the economies of Singapore, Hong Kong, and Austria, to name just a few.

And, similar to bona fide businesses, in the world of cybercrime, time equals money. Consider the dwell time—or the time between when a breach occurs and is finally detected—in which hackers enjoyed unauthorized access to their victims’ most sensitive files and systems in some of the above-mentioned hacks:

  • for JPMorgan Chase, cybercriminals were in the perimeter several months before being detected, xvi

  • for at least some of the banks targeted in the $1B heist, up to two years went by with no knowledge of a breach, xvii and

  • although the Associated Press Twitter hack lasted just a few short minutes before discovery, the temporary damage of more than $100 billion in market value was palpable nonetheless.

Cybercrime turns the tables on unsuspecting victims. Unlike physical threats that are readily seen and understood, virtual adversaries often enjoy a cloak of invisibility upon infiltration. The time of this clandestine advantage becomes a major weapon in the fight to contain damage or losses. Unfortunately, time is increasingly not on the side of the victim. A 2015 Ponemon Institute Survey reported the average dwell time at 98 days for financial services firms. For retail companies, the results were worse: breaches were not discovered for 197 days following attack. xviii Even more sobering, 58 and 71 percent of financial services and retail organizations, respectively, were not optimistic about improving their responsiveness to these virtual attacks within the coming year. xix Making matters worse, the volume of strikes would be sufficient on their own to cause concern, even if they could be immediately detected—more than 80 percent of financial service companies experience more than 12 attacks per week. Retail companies fared a bit better, but with nearly half of these companies reporting the same volumes at more than twice the dwell time of their financial counterparts, their results are equally disconcerting. xx

The physical world knows no such threat. Imagine a thief being in your house or place of business rummaging through your most sensitive belongings and remaining there undetected for months, seasons, or even years. Couple this with popular phishing schemes used to lure unsuspecting employees (Verizon reports 23 percent of recipients open phishing e-mails xxi ) and you now also have a case where you, as the victim, offer the thug the key to your very own dwelling.

As adversaries have grown in number and sophistication, so too have their incentives. Just as the reporter who fabricated what would become known as Sutton’s Law was seeking an answer to what would motivate such an individual, victims are left to ponder what would compel nameless, faceless hackers to strike. Assuming all are motivated by profit, as Sutton, seriously simplifies much more complex psychological undercurrents. Hacktivists enlist recruits to their virtual army to fight for principle. Nation-states identify targets to expand their province. And, yes, there are still hackers who view the hobby as a means to prank their victims. Whether for profit, principle, province, or prank, each attack serves to erode the trust of customers in a company’s ability to withstand future breaches and protect their interests.

While threat actors may differ in incentive models, they universally share a currency of time. Time becomes the critical strategic weapon in the cyberwar. Whether using time against a victim, as in the recent spate of ransomware attacks, or dwelling inconspicuously for as long as possible to pilfer sensitive records, the way time is used in the battle depends on the hacker’s incentive model. The two are often inextricably linked.

This book explores all of the above: the underlying incentives that are foundational to various cybercriminals and their victims, the time imperative when a cyberattack occurs, and the trust that is eroded between supplier and customer with each hack. The Second Economy pertains to all three: treasure, time, and trust. Like urban legends that seduce their believers into succumbing to an alternate reality, preconceived security notions—even those held by the most well-intentioned professionals employed to defend their organizations—are dangerous delusions that demand a second look to overcome an increasingly powerful enemy.

To thoroughly examine the problem, the book is divided in its approach. The first half explores the incentive models in play for cybercriminals acting for profit, principle, or province and the underlying trust economy that is ultimately corroded with each company breach. This part of the book is more observational in its orientation, as understanding how threat actors are changing their methods to abscond with treasure and trust is fundamental to formulating the solution. The second half offers a practical prescription for critical stakeholders of private and public organizations—including chief information officers (CIOs), chief executive officers (CEOs), and boards of directors—to remediate the threat and compete effectively in The Second Economy . This part of the book is more opinionated in its tone, as we respectfully challenge conventional security paradigms, based, in part, on a McAfee primary research study surveying more than 1,000 security professionals globally to understand attitudes, beliefs, and actions underlying their organization’s security posture—many of which, we submit, must change for successful outcomes.

In writing a book like this, it is tempting to devolve to fear-mongering or hyperbole when discussing such a sensational topic. While we will resist such tendencies, we would be remiss in not placing a spotlight on how and where threat actors increasingly surround us. In fact, it is human nature to underestimate or misjudge risk entirely—a weapon the adversary exploits in his arsenal. As such, our intention is not to fuel exaggerated scare tactics but to inspire a sense of urgency among key decision makers to respond to their enemies in kind.

Organizations have historically lacked this bias for action, with cybersecurity dwelling in the shadows of traditional information technology (IT) organizations. Some have argued that IT, prone to commoditization, is a function best relegated to being a fast follower of innovation. However, the opposite is true for cybersecurity, as threat actors invest their own research and development preparing the next assault and seeking the most vulnerable victim—a follower, be it fast or not—to attack. It has only been fairly recently, with notable public hacks on significant targets like Sony, Target, and The Home Depot, that cybersecurity has elevated itself from a back-office function in IT to a conversation worthy of boardroom debate, as organizations scramble to prevent themselves from being the next headline or punch line.

The Second Economy provides a different lens through which to examine cybersecurity issues that ultimately affect each one of us, particularly as we increasingly inhabit a world comprised of the cloud, mobility, the “Internet of Things,” and a seemingly infinite number of goods and services that are exchanged online. In the end, we hope to answer the reader’s fundamental questions with regard to an ongoing and escalating battle of which we are all now part: as either prey, predator, or unwitting participant in this virtual marketplace. Among them are the following:

  • How has the threat landscape changed over time and what is likely next?

  • Where are preconceived security notions limiting successful outcomes for victims in the fight?

  • What measures can organizations take to protect themselves?

We will also carefully embark on answering another critical question: Why? Why do cybercriminals do what they do? Specifically, for the financially motivated adversary, cause-oriented hacktivist or power-induced nation state, we will rely on the principles of another underlying economy in play—that of cybercrime itself. By deconstructing the incentives and addressable market available to different types of assailants, juxtaposed against the risk for various assaults, we will attempt to understand how motives are influenced by opportunity. While we will answer this question as it pertains to the mentality of those in pursuit of profit, principle, or province, the same cannot be offered for the mind-set of other cybercriminals who do not follow one of these walks of life and for whose motives we will likely never understand. And, while it is human nature to attempt to find an explanation for such destruction, sometimes the answer itself leaves one wanting more. It isn’t surprising that a reporter asked the infamous Willie Sutton why he robbed banks, and when one considers his real answer, perhaps the falsified response becomes a bit more understandable. According to Sutton:

  • If anybody had asked me [why I robbed banks], I’d have probably said it [because that’s where the money is]. That’s what almost anybody would say … it couldn’t be more obvious.

  • Or could it?

  • Why did I rob banks? Because I enjoyed it. I loved it. I was more alive when I was inside a bank, robbing it, than at any other time in my life. I enjoyed everything about it so much that one or two weeks later I’d be out looking for the next job. But to me the money was the chips, that’s all. xxii

We may never fully understand what motivates these predators, though we can certainly examine the economic nature of crime itself as a precursor to knowledge. And, we can definitely make progress in altering our own beliefs and behaviors to be more successful in the battle. It starts with understanding what form of treasure is in play for various threat actors, why trust is often taken for granted, and how time is the most valuable weapon in the arsenal. It ends when we each recognize our part in The Second Economy .

Notes

  1. W. Sutton and E. Linn, Where the Money Was: The Memoirs of a Bank Robber (New York: Viking Press, 1976), p. 160.

  2. Larry Schweikart, “The Non-Existent Frontier Bank Robbery,” Foundation for Economic Education, January 1, 2001, http://fee.org/articles/the-non-existent-frontier-bank-robbery/ , accessed March 28, 2016.

  3. Ibid.

  4. “The economics of bank robbery: More swagger than swag,” The Economist , June 16, 2012, www.economist.com/node/21556980 , accessed March 29, 2016,.

  5. Ibid.

  6. Chris Smith, “The largest bank robbery ever: up to $900M possibly stolen, and no need for a getaway car,” BGR , February 16, 2015, http://bgr.com/2015/02/16/300-million-bank-theft-hackers/ , accessed March 29, 2016,.

  7. Ibid.

  8. Max Fisher, “Syrian hackers claim AP hack that tipped stock market by $136 billion. Is it terrorism?,” The Washington Post , April 23, 2013, www.washingtonpost.com/news/worldviews/wp/2013/04/23/syrian-hackers-claim-ap-hack-that-tipped-stock-market-by-136-billion-is-it-terrorism/ , accessed April 1, 2016.

  9. Ibid.

  10. Nick Gutteridge, “Is YOUR computer affected? Hackers use virus to steal £20 MILLION from UK bank accounts,” Express , October 13, 2015, www.express.co.uk/news/uk/611873/hackers-steal-money-UK-bank-accounts-malware-virus-national-crime-agency , accessed March 31, 2016,.

  11. Peter Bright, “JPMorgan Chase hack due to missing 2-factor authentication on one server,” ArsTechnica , December 23, 2014, http://arstechnica.com/security/2014/12/jpmorgan-chase-hack-because-of-missing-2-factor-auth-on-one-server/ , accessed April 1, 2016.

  12. Kim Zetter, “Four Indicted in Massive JP Morgan Chase Hack,” Wired , November 10, 2015, www.wired.com/2015/11/four-indicted-in-massive-jp-morgan-chase-hack/ , website accessed on March 31, 2016.

  13. Reuters and NBC News, “’Hacking as a Business Model’: Three Indicted in JPMorgan Hack,” November 10, 2015, www.nbcnews.com/tech/tech-news/jp-morgan-hack-three-indicted-cyberattacks-major-companies-n460671 , website accessed on March 31, 2016.

  14. Owen Davis, “Hackers Steal $1 Billion In Biggest Bank Heist In History: Could They Take Down The Whole System Next Time?,” International Business Times , February 16, 2015, www.ibtimes.com/hackers-steal-1-billion-biggest-bank-heist-history-could-they-take-down-whole-system-1818010 , accessed April 1, 2016.

  15. Ibid.

  16. Bright, 2note 11 supra .

  17. Smith, note 6 supra .

  18. Arbor Networks, “New Ponemon Institute Survey Reveals Time to Identify Advanced Threats is 98 Days for Financial Services Firms, 197 Days for Retail,” Yahoo! Finance, May 19, 2015, http://finance.yahoo.com/news/ponemon-institute-survey-reveals-time-130000481.html , accessed April 1, 2016.

  19. Ibid.

  20. Ibid.

  21. Verizon 2015 Data Breach Investigations Report, file:///C:/Users/acerra/Downloads/rp_data-breach-investigation-report-2015_en_xg.pdf.

  22. Sutton and Linn, note 1 supra .

Acknowledgments

The authors wish to gratefully acknowledge the contributions of the following individuals who helped make this project a reality:

  • Patty Hatter, for your critical insights and invaluable perspectives as a technical reviewer of the content.

  • Vincent Weafer, for your expertise in framing the nuances of the current threat intelligence landscape.

  • Tom Quillin, Raja Patel and John Loucaides, for your constructive review of the material and helpful advice.

  • William Chance Hoover, for your research assistance.

  • Mark Murray, for your mastery in deconstructing complex principles into elegant simplicity.

Thanks also to all our white-hat comrades the world over, for faithfully defending your organizations and consumers against virtual adversaries few even realize exist. It is a privilege to stand in the fight with you.

Contents

  1. Part I: A Second Bite at the Problem
    1. Chapter 1:​ The Second Side of the Story
      1. The Cryptowars
      2. Follow the Silk Road
      3. “You Must Be Punished”
      4. Enemy Within the Gates
      5. Gone Phishing
      6. A State of Emergency
      7. A Second Thought
      8. Notes
    2. Chapter 2:​ The Second Nature of Markets
      1. Making It Up in Volume
      2. Without a Trace
      3. Follow the Money Trail
      4. Tick Tock
      5. Rise of the Machines
      6. A Second Thought
      7. Notes
    3. Chapter 3:​ Seconding the Cause
      1. Déjà vu
      2. Leaking Secrets
      3. A Legion Joins the Fight
      4. A Second Thought
      5. Notes
    4. Chapter 4:​ No Second Chance
      1. Somebody Crossed the Rubicon
      2. A Cyber Pearl Harbor
      3. Fun with a Dash of Smarts
      4. A Second Thought
      5. Notes
    5. Chapter 5:​ Second-Guessing the Obvious
      1. Enough, Already!
      2. Passing the Buck
      3. The Long Game
      4. A Second Thought
      5. Notes
  2. Part II: A Second Look at Conventional Wisdom
    1. Chapter 6:​ Playing Second Fiddle
      1. Initial Battle Lines Are Drawn
      2. The Underestimated Troublemakers
      3. The Domesticated Heroes
      4. A Second Thought
      5. Notes
    2. Chapter 7:​ Take a Second Look
      1. Taking the Keep
      2. Securing the Virtual Castle
      3. Erring on the Side of Caution
      4. Ignoring One’s Defenses
      5. A Second Thought
      6. Notes
    3. Chapter 8:​ When Seconds Matter
      1. Losing the Race
      2. The More Things Change .​ .​
      3. The Red Queen’s Head Start
      4. A Second Thought
      5. Notes
    4. Chapter 9:​ Second to None
      1. Doing the Unthinkable
      2. Protecting One’s Advantage
      3. Celebrating a Hollow Victory
      4. Facing the Dilemma
      5. Punishing the Free Rider
      6. Raising the Elevation
      7. A Second Thought
      8. Notes
    5. Chapter 10:​ Cybersecurity’s Second Wind
      1. Raising the Noise
      2. Obeying the Law
      3. Running the Gauntlet
      4. A Second Thought
      5. Notes
  3. Epilogue
  4. Index

About the Authors and About the Technical Reviewer

About the Authors

Steve Grobman A self-proclaimed cybersecurity pragmatist, Steve Grobman (@stevegrobman) has spent over two decades in senior technical leadership positions related to the field of cybersecurity. He has the distinction of serving on both sides of the white hat fight: both in defending his company against adversaries and in building innovative cybersecurity defense technology to protect consumers and organizations around the world. An avid student and teacher of the trade, Grobman earned his bachelor’s degree in computer science from North Carolina State University, has published multiple technical papers and books, and holds 24 US and international patents in the fields of security, software, and computer architecture, with another roughly 20 patents pending. He regularly provides perspectives on the adversary, the evolving threatscape, and the measures organizations and consumers alike can take in protecting themselves to industry insiders, media, analysts, and customers the world over—all delivered in laymen’s terms that distill extraordinarily complex problems into actionable prescriptions.

Allison Cerra (@acerra1) found her life’s calling at 18 years of age, when she fortuitously stumbled into a lifelong career of marketing complex technologies. A frustrated anthropologist at heart, Cerra enjoys understanding how the technologies around us are fundamentally altering the way we live, work, learn, and play. Whether in dissecting how broadband upends traditional economies, how technology influences and reflects company culture, or how virtual and physical worlds converge to create a new human psyche, Cerra has explored the intersection of technology and behavior in several books. In 2015, motivated by a desire to stand on the good side of a fight too important to lose, Cerra joined the ranks of cybersecurity professionals, where she currently marries her calling for marketing with a cause of educating unwitting participants in a virtual battle that is underestimated, if not ignored, by far too many.

About the Technical Reviewer

Patty Hatter (@pattyhatter) is guided by a fundamental philosophy centered on building connections across the information technology (IT) ecosystem. The multiplier effect of her collaborative approach means better outcomes by every measure. She has led all parts of the business, from sales and service to operations and IT. As a result, she intimately understands her customers. For more than two decades, she’s developed an authentic leadership style marked by clear communication and tackling challenges head-on. She often appears at industry events to share her uniquely qualified perspective as a chief information officer (CIO) and cybersecurity leader. Hatter’s advocacy of STEM education, mentoring of women, and full inclusion in technology amplifies the impact of her leadership on these critical industry issues. She also donates her free time to support children’s education and the arts, and currently is on the board for the Silicon Valley Education Foundation (SVEF).

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.224.95.38