2
24 Infosecurity Today July/August 2005 i n f o s e c u r i t y t o d a y i n t e r v i e w B ob Ayers collects antiques. Early English drinking silver and German World War II militaria are his two main areas of expertise, but his eye was recently caught by a small blue ceramic elephant in a charity shop window.He bought it for four pounds, but it is worth about £150.“I knew the elephant had been made by the Van Briggle pottery factory in Colorado Springs. Collecting antiques is a variant on intelligence.When you go to an auction if you know more about what's being sold you will be successful”. Ayers moved into the commercial sector after thirty years service in the US military and civil service as an intelligence and counter-intelligence specialist. He learned most, he says, as the director, Defensive Information Warfare Program and Department of Defense Information Systems Security Improvement Program.There, he established the first DoD Computer Emergency Response Team (CERT), the first DoD Vulnerabilities Analysis Assessment Programme, and the first twenty-four by seven security operations centre to monitor DoD systems. Countering organized adversaries The concept of information warfare has a central part in his philosophy of security.“If you think of IT security as having the objective of keeping a teenager from breaking into your computer systems - which is, essentially,what it is - then defensive information warfare is a programme designed to keep an organized, systematic adversary from breaking into your machines.As a problem, it is an order of magnitude more difficult”. Ayers is now bringing some of his military intelligence experience and terminology to bear on security problems in the corporate sphere. “People in the private sector are not as concerned as they should be about adversaries getting at their information.They know what information is important to them, true, but they tend not to have in place mechanisms to ensure that their information is not leaking out electronically, and casually, by way of emails to friends, and so on”. He tells a story of a European banking client who had procured his consultancy's services to do an email survey.The good news, for the managing director of the bank, that there was no leakage of information to the outside.The bad news? That the MD's second in command was conspiring to have him removed in a boardroom coup.The would-be conspirator was fired on the spot. Background checks A standard practice in military counter-intelligence is the pursuit of the 'developed character reference' as opposed to the character references that people themselves provide. “There is a very risky absence in the UK of personnel security”, says Ayers. “You have to dig into the information that people supply when making applications.You need to speak to the references they list on their CVs.You ask the listed character references for the names of others who may know the applicant. Developed character references are where the really good information comes from”. He bewails the lack of online information in the UK as opposed to the US. "There is a lot more information available online in the States than there is here - for example, property records, voting records, driving licence information, and criminal records . So you can do a fairly good check not possible in the UK. “It just makes no sense to spend millions of pounds on IT security if you have a crook as your system administrator!” Ayers gives a couple of examples from his time in the military of when the 'developed character reference' came into its own. He recalls that, when he was the head of security, and the clearance authority in a nuclear capable unit, he got a slim dossier on an army Dig deep and look sideways Brian McKenna Robert Lee Ayers was the director of the US's information warfare programme, and holds security clearance in the UK, where he now lives. He spoke to Brian McKenna about the need for IT security specialists in the commercial world to dig a bit more, and think more laterally. [email protected] Bob Ayers: business counter- intelligence goes beyond IT security

Dig deep and look sideways

Embed Size (px)

Citation preview

24In

fosecu

rity Tod

ayJuly/A

ugust 2005i

nf

os

ec

ur

it

y

to

da

y

in

te

rv

ie

w

Bob Ayers collects antiques. EarlyEnglish drinking silver and German

World War II militaria are his two mainareas of expertise, but his eye wasrecently caught by a small blueceramic elephant in a charity shopwindow. He bought it for four pounds,but it is worth about £150.“I knew theelephant had been made by the VanBriggle pottery factory in ColoradoSprings. Collecting antiques is a varianton intelligence.When you go to anauction if you know more about what'sbeing sold you will be successful”.

Ayers moved into the commercial

sector after thirty years service in the

US military and civil service as an

intelligence and counter-intelligence

specialist. He learned most, he says, as

the director, Defensive Information

Warfare Program and Department of

Defense Information Systems Security

Improvement Program.There, he

established the first DoD Computer

Emergency Response Team (CERT),

the first DoD Vulnerabilities Analysis

Assessment Programme, and the first

twenty-four by seven security

operations centre to monitor DoD

systems.

Countering organized adversariesThe concept of information warfarehas a central part in his philosophy ofsecurity.“If you think of IT security ashaving the objective of keeping ateenager from breaking into yourcomputer systems - which is,essentially, what it is - then defensiveinformation warfare is a programmedesigned to keep an organized,systematic adversary from breaking

into your machines.As a problem, it isan order of magnitude more difficult”.

Ayers is now bringing some of hismilitary intelligence experience andterminology to bear on securityproblems in the corporate sphere.“People in the private sector are notas concerned as they should beabout adversaries getting at theirinformation.They know whatinformation is important to them,true, but they tend not to have inplace mechanisms to ensure thattheir information is not leaking outelectronically, and casually, by way ofemails to friends, and so on”.

He tells a story of a Europeanbanking client who had procured hisconsultancy's services to do an emailsurvey.The good news, for themanaging director of the bank, thatthere was no leakage of informationto the outside.The bad news? Thatthe MD's second in command wasconspiring to have him removed in aboardroom coup.The would-beconspirator was fired on the spot.

Background checksA standard practice in militarycounter-intelligence is the pursuit ofthe 'developed character reference' asopposed to the character referencesthat people themselves provide.“There is a very risky absence in theUK of personnel security”, says Ayers.“You have to dig into the informationthat people supply when makingapplications.You need to speak to thereferences they list on their CVs.Youask the listed character references forthe names of others who may know

the applicant. Developed characterreferences are where the really goodinformation comes from”.

He bewails the lack of onlineinformation in the UK as opposed tothe US. "There is a lot moreinformation available online in theStates than there is here - for example,property records, voting records,driving licence information, andcriminal records . So you can do a fairlygood check not possible in the UK.

“It just makes no sense to spendmillions of pounds on IT security ifyou have a crook as your systemadministrator!”

Ayers gives a couple of examples

from his time in the military of when

the 'developed character reference'

came into its own.

He recalls that, when he was the

head of security, and the clearance

authority in a nuclear capable unit,

he got a slim dossier on an army

Dig deep andlook sidewaysBrian McKenna

Robert Lee Ayers was the director of the US's information warfareprogramme, and holds security clearance in the UK, where he nowlives. He spoke to Brian McKenna about the need for IT securityspecialists in the commercial world to dig a bit more, and think morelaterally.

[email protected]

Bob Ayers: business counter-intelligence goes beyond IT security

IS0206_interview (Read Only) 18/07/2005 14:15 Page 24

in

fo

se

cu

ri

ty

t

od

ay

i

nt

er

vi

ew

25In

fosecu

rity Tod

ayJuly/A

ugust 2005

officer with thirty years service.“He

was a great soldier, but the odd

thing was that there was no

verifiable record of his life prior to

his eighteenth birthday, when he

had signed up”.

His fingerprints were checked with

the FBI, and it turned out he was a

deserter. He had signed up, illegally, as

a fifteen-year-old, angry that his

brother had been killed in Korea. He

then got scared when about to be

shipped overseas.

“After years of living with the

shame of being a deserter, he re-

enlisted under an assumed name to

make amends for what he perceived

to be his earlier cowardice.

“He started crying when I

confronted him with this information” ,

says Ayers.The upshot was that the

soldier was given a non-judicial

commanding officer punishment of

two weeks confined to barracks -

which was suspended.And so, his

record was cleaned up.

A less happy incident involved a UScaptain whose German wife turnedout to be a spy.“Her mother'sbirthplace was in the DDR, and she'dmade over 40 trips to East Berlin in ashort space of time. Now, you don'tgo to East Berlin for the shopping. Itwould be like going to the tip.Anyway, it turned out that herrelatives in the DDR were beingthreatened by the Stasi, and she was,indeed, a spy.The husband knewnothing of her trips to East Berlin”.

Incidental patterns

The most enjoyable interlude in Ayerscareer also demonstrates a preferencefor the lateral.

From 1979-1983 he served as staffofficer at the US DoD Indications andWarning System Secretariat.There heconceived, developed andimplemented the DoD WorldwideIndicator Monitoring System, whichwas an automated programme todetect and predict attacks on USmilitary forces. He developed detailedscenarios used for Soviet/Warsaw Pactattack on NATO forces, North Koreanattack on South Korea and Sino-Vietnamese conflict.

“Essentially, I was interested in seeinghow automation could be brought tobear on to solve indication and warningproblems. I got sent out to Stanford towork with mathematicians there, and

became the subject matter expert onthe North Korean warning problem.Sowe would lay out the problem, thelikely sequence of events, the Stanfordpeople would convert that intocomputer programmes.We automated aproblem that no one had previouslythought was automatable”.

Cyber-terrorismAyers is impatient with the view that

cyber-terrorism is over-hyped.“No,

the threat is very real.The technology

coming out of Afghanistan and Iraq

indicates that people you might see

as technically illiterate terrorists

waving AK-47s in the air are, in fact,

technologically sophisticated.And the

more effective physical counter-

terrorist programmes become the

more likely it is that these people will

turn to logical weapons”.

The irony of information warfare, he

says, is that “the more technologically

advanced you are, the greater is the

harm that you can have happen to you.

The less technologically sophisticated

you are, the more immune to

significant damage you are. It's an

asymmetric relationship.

“We've been very fortunate not to

have had a real systematic attack.Think

about the damage done by the

malicious code programmes released

over the last few years, and imagine

what would happen if you had 50

people working on a multitude of

attacks. It would be catastrophic".

Curriculum VitaeCareer2003 - 2004 Director, Critical National Infrastructure Defence, Northrop Grumman Information Technology2002 - 2003 Director, Business Risk Services, @stake, United Kingdom 2000 - 2002 Managing Director, Para-Protect Europe, United Kingdom 1998 - 2000 Principal Security Consultant, Admiral plc, United 1997 - 1998 Senior US Representative, Polish NATO C2 Interoperability, US 1992 - 1997 Director, Defensive Information Warfare Program and DoD Information Systems Security Improvement Program,

Defense Information Systems Agency (DISA)1979- 1992 Defense Intelligence Agency (DIA)

Director, DoD Intelligence Information Systems (DoDIIS) Computer Security Program (1990-1992)Deputy, Information Systems Operation and DoDIIS Architecture and Engineering Directorate (198 -1990)Program Manager, Consolidated CIA and DIA Support to Analysts File Environment (SAFE) Program (1983 -1988)Staff Officer, DoD Indications and Warning System Secretariat (1979 - 1983)

1969 - 1979 US Army Intelligence Officer, Worldwide Service

Education1965-69 Lynchburg College, Lynchburg, VA1976 State University of New York, Buffalo, NY, Bachelor of Science, Psychology

In antiques as in security : knowledgeis power

IS0206_interview (Read Only) 18/07/2005 14:15 Page 25