U.S. Senate See Full Big Line

(D) J. Hickenlooper*

(D) Julie Gonzales

(R) Janak Joshi

80%

40%

20%

(D) Michael Bennet

(D) Phil Weiser
55%

50%↑
Att. General See Full Big Line

(D) Jena Griswold

(D) M. Dougherty

(D) Hetal Doshi

50%

40%↓

30%

Sec. of State See Full Big Line
(D) J. Danielson

(D) A. Gonzalez
50%↑

20%↓
State Treasurer See Full Big Line

(D) Jeff Bridges

(D) Brianna Titone

(R) Kevin Grantham

50%↑

40%↓

30%

CO-01 (Denver) See Full Big Line

(D) Diana DeGette*

(D) Wanda James

(D) Milat Kiros

80%

20%

10%↓

CO-02 (Boulder-ish) See Full Big Line

(D) Joe Neguse*

(R) Somebody

90%

2%

CO-03 (West & Southern CO) See Full Big Line

(R) Jeff Hurd*

(D) Alex Kelloff

(R) H. Scheppelman

60%↓

40%↓

30%↑

CO-04 (Northeast-ish Colorado) See Full Big Line

(R) Lauren Boebert*

(D) E. Laubacher

(D) Trisha Calvarese

90%

30%↑

20%

CO-05 (Colorado Springs) See Full Big Line

(R) Jeff Crank*

(D) Jessica Killin

55%↓

45%↑

CO-06 (Aurora) See Full Big Line

(D) Jason Crow*

(R) Somebody

90%

2%

CO-07 (Jefferson County) See Full Big Line

(D) B. Pettersen*

(R) Somebody

90%

2%

CO-08 (Northern Colo.) See Full Big Line

(R) Gabe Evans*

(D) Shannon Bird

(D) Manny Rutinel

45%↓

30%

30%

State Senate Majority See Full Big Line

DEMOCRATS

REPUBLICANS

80%

20%

State House Majority See Full Big Line

DEMOCRATS

REPUBLICANS

95%

5%

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
February 20, 2011 06:13 PM UTC

Government policy and your computer

  •  
  • by: richardmyers

There are now well over a million malware computer programs — viruses, worms, and trojan horses — in circulation. One perception of computer users: we need computer firewalls and anti-virus software because there are bad people out there. These evil actors are anti-social types who create dangerous software which threatens to infect our computers. Except for rare exceptions — for example, when a “cracker” (a malicious computer hacker) is discovered and prosecuted no one seems to know who creates all of these “malware” programs, or why.

The now apparent reality: computer viruses, worms, and trojan horses are routinely contracted for by major corporations, and the contracts are fulfilled by so-called “security” corporations which cultivate a reputation for protecting computers, but who in fact charge lavish sums for creating programs that may pollute or endanger computers.  

How do we know this? A group of hackers recently engaged in a cyber-altercation with a government contractor/cyber warfare corporate subsidiary by the name of HBGary Federal. Sixty thousand of the company’s emails were copied and made available on the Internet. These emails demonstrate that malware, including the worst sort of software creation — the notorious rootkit — can be routinely ordered by major corporations, for unknown purposes, and virtually without any qualms.

What is a rootkit? It is a software program which infects an operating system at the most basic level. If written correctly, it is extremely difficult to detect. It may be very difficult, if not impossible, to remove. Yet it is designed to provide unknown parties undetectable control over someone else’s computer — perhaps your computer.

What might major corporations use rootkits for? There could be a variety of purposes — spying, commercial exploitation, political intrigue, sabotage, industrial espionage, or even cyber warfare.

The most notorious known use so far was a rootkit-enabled copy protection scheme secretly implemented by Sony Corporation in 2005. It was triggered simply by playing a music CD on your computer, and was only discovered by a security researcher’s rootkit detection program, resulting in a major scandal. Customers just don’t want secret, undetectable programs that gives control to someone else, and which cannot easily be deleted, on their computers.

Another concern: the more programs your operating system must execute, the slower your computer will become!

Yet if it wasn’t for one experienced researcher, we might never have known about Sony’s secret abuse.

It seems that corporations haven’t been inhibited by the Sony backlash. For example, in 2009 HBGary (the parent to HBGary Federal) demonstrated a program for defense contractor General Dynamics which “when executed, loads and enables a covert kernel-mode implant that will exfiltrate a file from disk” and would “cater to a [remote] command and control element.” “As part of the exploit delivery package,” the software will install “a usermode trojan…” They refer to this capability as an “exploit.”

HBGary is just one of many thousands of “security” companies, and perhaps the only company whose internal emails have been posted on the web.

What are the implications? It seems probable that a majority of computer worms, viruses, trojan horses, and rootkits are secretly-developed commercial products, some of which “escape” into the wild, entailing significant data risks, and necessitating an anti-virus expense for millions of users.

In light of the HBGary fiasco, the U.S. Senate has just established a new subcommittee chaired by Senator Al Franken to monitor Internet-related privacy and security issues. Please let your representatives and senators know that computer malware creation should be prohibited or carefully monitored, and that abuses should no longer be tolerated.

Comments

Recent Comments


Posts about

Donald Trump
SEE MORE

Posts about

Rep. Lauren Boebert
SEE MORE

Posts about

Rep. Gabe Evans
SEE MORE

Posts about

Colorado House
SEE MORE

Posts about

Colorado Senate
SEE MORE

83 readers online now

Newsletter

Subscribe to our monthly newsletter to stay in the loop with regular updates!