Fall 2019 CYBERSECURITY

The BRIDGE LINKING ENGINEERING AND SOCIETY

A Framework to Understand Cybersecurity David D. Clark

Cybersecurity: Revisiting the Definition of Insider Threat Nicole Lang Beebe and Frederick R. Chang

Learning from Cybersecurity Breaches: The Trouble with Recommended Best Practices Josephine Wolff

Cybersecurity in Higher Education: One University’s Approach Christian Hamer

Policy Dimensions of Cybersecurity Engineering Challenges Fred B. Schneider and Lynette I. Millett

Raising Awareness of Security Challenges for the of Trillions of Things John A. Stankovic and Jack W. Davidson

Security of Connected and Automated Vehicles Mashrur Chowdhury, Mhafuzul Islam, and Zadid Khan

What Every Engineer Should Know about Cybersecurity Thomas A. Longstaff and Noelle K. Allon

EES Perspective: When White Hats Wear Black Hats: The Ethics of Cybersecurity C. Dianne Martin

A Call to the Engineering Community to Address Human Trafficking Jonathan P. Caulkins, Matt Kammer-Kerwick, Renata Konrad, Kayse Lee Maass, Lauren Martin, and Thomas Sharkey

The mission of the National Academy of Engineering is to advance the well-being of the nation by promoting a vibrant engineering profession and by marshalling the expertise and insights of eminent engineers to provide independent advice to the federal government on matters involving engineering and technology. The BRIDGE

NATIONAL ACADEMY OF ENGINEERING

Gordon R. England, Chair John L. Anderson, President Corale L. Brierley, Vice President Julia M. Phillips, Home Secretary James M. Tien, Foreign Secretary Martin B. Sherwin, Treasurer Editor in Chief: Ronald M. Latanision Managing Editor: Cameron H. Fletcher Production Associate: Penelope Gibbs The Bridge (ISSN 0737-6278) is published quarterly by the National Acad­ emy­ of ­Engineering, 2101 Constitution Avenue NW, Washington, DC 20418. Periodicals

­postage paid at Washington, DC. Vol. 49, No. 3, Fall 2019 Postmaster: Send address changes to The Bridge, 2101 Constitution Avenue NW, Washington, DC 20418. Changes of address or requests to unsubscribe should be sent to [email protected]. Papers are presented in The Bridge on the basis of general interest and timeliness. They reflect the views of the authors and not necessarily the position of the National Academy of Engineering. The Bridge is printed on recycled paper. C © 2019 by the National Academy of Sciences. All rights reserved.

Mission Statement of The Bridge The Bridge publishes articles on engineering research, education, and practice; science and technology policy; and the interface between engineering and technology and society. The intent is to stimulate debate and dialogue both among members of the National Academy of Engineering (NAE) and in the broader community of policymakers, educators, business leaders, and other interested individuals. The Bridge relies on its editor in chief, NAE members, and staff to identify potential issue topics and guest editors. Invited guest editors, who have expertise in a given issue’s theme, are asked to select authors and topics, and inde- pendent experts are enlisted to assess articles for publication. The quarterly has a distribution of about 7,000, including NAE members, members of Congress, libraries, universities, and interested individuals all over the country and the world. Issues are freely accessible at www.nae.edu/Publications/Bridge.aspx.

A complete copy of The Bridge is available in PDF format at www.nae.edu/TheBridge. Some of the articles in this issue are also available as HTML documents and may contain links to related sources of information, multimedia files, or other content. The Volume 49, Number 3 • Fall 2019 BRIDGE LINKING ENGINEERING AND SOCIETY

Editors’ Note 3 Cybersecurity: A Growing Challenge for Engineers and Operators Ruth A. David and Robert F. Sproull

Features 6 A Framework to Understand Cybersecurity David D. Clark An internet-centric view of cybersecurity challenges sheds light on ways to address them. 12 Cybersecurity: Revisiting the Definition of Insider Threat Nicole Lang Beebe and Frederick R. Chang The definition of insider threat must be expanded from the malicious human insider to include the unwitting human insider and the technological insider. 20 Learning from Cybersecurity Breaches: The Trouble with Recommended Best Practices Josephine Wolff Previous incidents highlight the need for clear, specific guidance on cybersecurity best practices and incentives for their use. 27 Cybersecurity in Higher Education: One University’s Approach Christian Hamer We believe it is critical to involve and work with our community as much as possible to support the mission of the university. 33 Policy Dimensions of Cybersecurity Engineering Challenges Fred B. Schneider and Lynette I. Millett Efforts to address cybersecurity challenges require theoretical perspectives, practical and organizational approaches, and policy understanding. 40 Raising Awareness of Security Challenges for the Internet of Trillions of Things John A. Stankovic and Jack W. Davidson The massive scale and decentralized nature of the IoTT provide attackers with a large attack surface for exploitation. (continued on next page)

46 Security of Connected and Automated Vehicles Mashrur Chowdhury, Mhafuzul Islam, and Zadid Khan We describe cyberattack surfaces and potential solutions for securing connected and automated vehicles and transportation infrastructure. 57 What Every Engineer Should Know about Cybersecurity Thomas A. Longstaff and Noelle K. Allon Cybersecurity is not an end in itself but an ongoing set of practices throughout the system lifecycle to achieve system goals and requirements. 62 EES Perspective: When White Hats Wear Black Hats: The Ethics of Cybersecurity C. Dianne Martin 67 A Call to the Engineering Community to Address Human Trafficking Jonathan P. Caulkins, Matt Kammer-Kerwick, Renata Konrad, Kayse Lee Maass, Lauren Martin, and Thomas Sharkey There are opportunities for engineering to make transformative contributions to the curtailment of human trafficking. 74 An Interview with… Deanne Bell, TV Host and Founder-CEO of Future Engineers

News and Notes 83 NAE Newsmakers 84 2019 China-America Frontiers of Engineering Hosted by Qualcomm in San Diego 86 Summer Interns in the NAE Program Office 87 Calendar of Meetings and Events 87 In Memoriam

89 Publications of Interest

The National Academy of Sciences was established in 1863 by an emy of Sciences to advise the nation on medical and health issues. Act of Congress, signed by President Lincoln, as a private, nongov- Members are elected by their peers for distinguished contributions to ernmental institution to advise the nation on issues related to science medicine and health. Dr. Victor J. Dzau is president. and technology. Members are elected by their peers for outstanding contributions to research. Dr. Marcia McNutt is president. The three Academies work together as the National Academies of ­Sciences, Engineering, and Medicine to provide independent, objec- The National Academy of Engineering was established in 1964 tive analysis and advice to the nation and conduct other activities under the charter of the National Academy of Sciences to bring the to solve complex problems and inform public policy decisions. The practices of engineering to advising the nation. Members are elected ­Academies also encourage education and research, recognize out- by their peers for extraordinary contributions to engineering. Dr. John standing contributions to knowledge, and increase public understand- L. Anderson is president. ing in matters of science, engineering, and medicine.

The National Academy of Medicine (formerly the Institute of Medicine) Learn more about the National Academies of Sciences, Engineering, was established in 1970 under the charter of the National Acad- and Medicine at www.nationalacademies.org. 3 Editors’ Note

larly, complex infrastructures on which people depend for transportation, energy, communications, food pro- duction, water distribution, and healthcare delivery are increasingly computerized, as are the manufacturing and design processes that will create the next genera- tion of systems and infrastructures. To be sure, the engineers who design and develop Ruth A. David (NAE) is retired these systems and infrastructures play a vital role in president and chief executive addressing security concerns, but they cannot antici- officer of ANSER. pate every conceivable threat that may manifest during operational use of their product—particularly since new attack surfaces are introduced when individual systems are connected to networks. Cybersecurity is defined by the National Institute of Standards and Technology (NIST 2011, p. B-3) as Robert F. Sproull (NAE) is “the ability to protect or defend the use of cyberspace retired vice president and direc- from cyber attacks,” and cyberspace is defined as “a tor of Oracle Labs and now an global domain within the information environment adjunct professor of computer consisting of the interdependent network of informa- science at the University of tion systems infrastructures including the Internet, at Amherst. tele­communications networks, computer systems, and embedded processors and controllers.” Thus, cyber­ Cybersecurity: security focuses on thwarting attack vectors that exploit network connections, but those connections A Growing Challenge for typically occur in individual systems put into use by Engineers and Operators individual, organizational, or institutional operators who therefore play an equally vital role in addressing In today’s increasingly connected and interdependent security concerns. world, cybersecurity is an issue that touches virtu- ally every individual, organization, and institutional Origins and Evolution of Cybersecurity ­entity—governmental and nongovernmental alike. Cybersecurity traces its roots to 1971, when Bob ­Thomas According to ITSP Magazine, “There are three types unleashed what is considered the first computer worm of people in the world: those who have been attacked, (Townsend 2019). The worm was not malicious but was those who will be attacked, and those who are being capable of jumping from one computer to another, a 1 attacked right now and just don’t know it yet.” The behavior not previously observed. Years later, in 1989, same could be said of organizations or institutions. All the first recognized denial of service (DoS) attack was have a role to play—both in safeguarding personal attributed to Robert Morris (Townsend 2019). Once devices and in contributing to the protection of the sys- again, the intent was not malicious—Morris intended tems to which these devices are connected. to highlight security flaws—but this time the damages As computers shrink in size, computational were real. In the three decades since, attacks have grown ­capabilities—hardware and software—are increasingly in both sophistication and variety, and motivations embedded in everyday objects, from personal devices now include monetary gain, , espionage, such as smart phones and watches to personal vehicles and operational disruption. Cybersecurity has become and even dwellings (e.g., smart home systems). Simi- an arms race—and unfortunately, the odds favor the attackers. 1 https://www.itspmagazine.com/cybersecurity-quotes

The 4 BRIDGE

The market for cybersecurity products and services is In This Issue large and continues to grow rapidly, primarily because of This issue of The Bridge cannot hope to cover the increasing activities. Cybersecurity ­Ventures breadth or depth of important cybersecurity issues. reports that the global cybersecurity market was worth Rather, we have selected papers intended to provide a only $3.5 billion in 2004 and was expected to exceed basis for understanding the evolving nature of cyber­ $120 billion by 2017, and predicts that global cyber- security threats, for learning from past incidents and security spending will exceed $1 trillion cumulatively best practices, and for anticipating the engineering during the period from 2017 to 2021 (Morgan 2019a). challenges in an increasingly connected world. In spite of substantial growth in cybersecurity spend- In the first article, David Clark takes an internet- ing, damages attributable to security breaches are also centric view of cybersecurity and parses the problem growing. In its Annual Cybercrime Report, Cybersecurity into four parts to provide insights about measures to Ventures identified cybercrime as one of the biggest improve the situation. He observes that “perfect secu- challenges confronting humanity and predicted that rity is not possible.” Viable mitigation measures are related costs will double—from $3 trillion in 2015 to context-specific. $6 trillion annually by 2021 (Morgan 2019b). Notably,­ Nicole Beebe and Frederick Chang make the case the growing cost estimates are based not only on signifi- for expanding the traditional definition of the insider cant projected growth in adversarial attacks but also on threat to include both unwitting human agents and increasing attack opportunities stemming from a cyber- technology that act as trusted agents. They note that the attack surface projected to be an order of magnitude complexity of this issue cannot be effectively addressed greater by 2021 than it is today (Morgan 2019b). absent a true systems-engineered solution. Josephine Wolff uses perpetrator motivations— Cybersecurity: Why Is It So Hard? financial theft, espionage, public humiliation—as a Attackers have the edge in the cybersecurity arms race. framework for examining past cybersecurity incidents Reasons for this include the following: to distill recurring themes and lessons. She argues that • Attackers need to find only a single exploitable vul- improving cybersecurity best practices will require nerability, while defenders must identify and elimi- consideration of the entire security ecosystem, which nate or mitigate all vulnerabilities. extends well beyond a single entity under attack. Christian Hamer offers an experience-based perspec- • Because many copies of products or software are tive from Harvard University in which he addresses two deployed, a single vulnerability can be widely ­exploited. types of cyberattacks: unauthorized access and business • A stealthy attack may not be detected while it’s disruption. He lays out the key elements of a risk-based underway, leaving little opportunity for real-time program and describes solutions that work in a large and defense. very diverse organization, while acknowledging the need to anticipate ways in which future threats may • Geographic borders do not impede traffic in cyber- evolve. space, enabling stand-off attacks that often are hard Fred Schneider and Lyn Millett use case studies to to attribute. examine the role of nontechnical issues in what appear • Cybersecurity is not just a technical problem—­system to be technical matters, exploring the policy dimensions operators and users also provide attack surfaces. of cybersecurity engineering. Their paper draws on dis- cussions hosted by the Forum on Cyber Resilience, a • System builders often sacrifice security measures for roundtable of the National Academies to facilitate operational convenience or market share motivations.­ the exchange of ideas among scientists, practitioners, • International norms, cybersecurity law, policy, and and policymakers concerned with the resilience of the practice are not yet mature. nation’s computing and communications systems. John Stankovic and Jack Davidson anticipate the These and related factors contribute to the complexities cybersecurity challenges inherent in the rapidly grow- inherent to cybersecurity. ing Internet of Things, which presents new attack sur- faces as well as new types of consequences for successful

FALL 2019 5

breaches. They note the dangers that may arise if speed investment profiles for operators and may degrade user to market and low-cost competition drive design trade- convenience, particularly for legacy systems. Options offs to sacrifice security considerations during product could include offensive as well as defensive measures. development. While it is important to continue to learn from past Ronnie Chowdhury, Mhafuzul Islam, and Zadid Khan incidents and to effectively implement relevant best address the rapid evolution of transportation systems practices, these measures are insufficient in an era of based on advances in connected and automated vehicle rapid growth in both the quantity and sophistication technologies. Their article provides a deeper dive into of attackers together with rapid expansion in both the one type of cyberphysical system that will connect to quantity and variety of attack surfaces. Robust explo- the growing Internet of Things. ration of proactive ways to change the cost-benefit In the final invited paper, Tom Longstaff and Noelle ­equation for attackers is needed. Allon provide a perspective on what every engineer should know about cybersecurity, summarizing some key points Acknowledgments from the other papers and putting them into the systems We offer many thanks to the authors of these papers, engineering context. While acknowledging that every who worked hard to deliver important messages to a engineer will not become a cybersecurity expert, given broad audience in short articles. In addition, The Bridge the likelihood that virtually every newly engineered asks outside readers to comment on papers and suggest system will contain some computational elements and improvements; we are grateful to Chris Bronk, Azim will be connected to other systems in its environment Eskandarian, Kevin Fu, Paul Kocher, Steve Lipner, in some way, every engineer should have at least a basic Keith Miller, Bill Scherlis, David Sherry, and Mary understanding of cybersecurity principles. Ellen Zurko, who generously dedicated their time to evaluate the papers in this issue. Looking to the Future This issue offers a limited window into current and References expanding cybersecurity challenges confronting Morgan S. 2019a. Global cybersecurity spending predicted ­designers, developers, operators, and users of connected­ to exceed $1 trillion from 2017 to 2021. Cybersecurity systems. The articles illustrate the need to address ­Ventures’ 2019 Cybersecurity Market Report, Jun 10. today’s vulnerabilities while anticipating increasingly Morgan S. 2019b. Cybercrime damages $6 trillion by 2021. sophisticated attackers. They also acknowledge that 2019 Official Annual Cybercrime Report. Northport NY: the increasing propensity to interconnect systems yields Cybersecurity Ventures and Toronto: Herjavec Group. new benefits while simultaneously increasing both the NIST [National Institute of Standards and Technology]. quantity and variety of attack surfaces. This environ- 2011. Managing Information Security Risk: Organization, ment continues to favor the attackers. Mission, and Information System View. NIST Special Pub- A key question is, therefore: What is needed to change lication 800-39. Gaithersburg MD. the cost-benefit equation for the attacker? Answers will Townsend C. 2019. A brief and incomplete history of cyber­ undoubtedly have policy implications and impact design security. Cybersecurity Magazine, Jan 18. choices. They could also result in different cybersecurity An internet-centric view of cybersecurity challenges sheds light on ways to address them.

A Framework to Understand Cybersecurity

David D. Clark

Better cybersecurity is an admirable aspiration. But aspirations, as such, are not actionable. Calling for better cybersecurity does not give any hint of what actions should be taken, and by whom, to improve the situation. The goal of this paper is to break the challenge of improved cybersecurity into parts that are potentially actionable, provide a roadmap to better secu- rity, and illustrate why the challenge of better security is so vexing. Since David Clark (NAE) is a the internet is at the heart of cyberspace—without the internet or something senior research scientist similar there would just be a bunch of disconnected computers—I take an in the Computer Science internet-centric view of security in this paper. There are, of course, other and Artificial Intelligence opinions about how to structure the thinking about security, but I find that Lab at the Massachusetts this framework can provide good insights about which actors have to do Institute of Technology. what to improve the situation. I consider four types of internet security challenges: (a) third-party attacks on mutually trusting users trying to communicate, (b) attacks by one user on another, (c) attacks on the network itself, and (d) denial of service attacks.

Third-Party Attacks on Mutually Trusting Users In this case, two (or more) users are attempting to have a mutually desired communication and a hostile third party attacks it. This situation affects information security, which is traditionally described as having three sub­ components: confidentiality, integrity, and availability. FALL 2019 7

• The goal of confidentiality is to ensure that a hostile encrypted traffic to try to force the communicants to third party cannot observe what is being communi- send “in the clear,” so that the third party can see what cated. The motivation of that third party might range is being sent. from demographic profiling for targeted advertising to content-based censorship to national security sur- Ignored Warnings veillance. A strong mechanism for confidentiality For most users, fears about confidentiality are real— will ensure that these goals are thwarted. concerns about privacy include the fear that ISPs are observing what users send and selling that information • The goal of integrity is that a third party cannot mod- for targeted advertising. However, loss of availability is ify what is being sent by the communicants. also a problem, often arising from the key management • The goal of availability is that communication can system put in place for confidentiality and integrity. still succeed despite attempts by a third party to dis- Encryption keys are usually distributed in what is rupt it. called a certificate, a signed attestation that binds the name of an entity to a particular key. For security rea- With respect to confidentiality and integrity, the sons, certificates are valid for a limited time and need to current approach in the internet is end-to-end encryp- be updated periodically by the owner of the key. If the tion. If a transmission is encrypted, a third party cannot owner neglects to do so (or makes other errors), software observe it, and while encryption cannot prevent modifi- (e.g., the user’s browser) will present warning messages cation, the modification will always be detected, so the that are both dire and sometimes obscure, saying that outcome may be a failure of availability but the attacker the user should not proceed because it is possible that cannot actually modify what is being sent. the communication is under attack. As tools for encryption are embedded in the most common applications (such as the Web) the fraction of encrypted traffic is increasing rapidly. This outcome is the result of efforts over many years by researchers, Encryption is not magic. standards setters, and implementers. Just using it does not make The Limits of Encryption all the problems go away. Encryption is not magic. Just using it does not make all the problems go away. Its mathematics may be Even worse, the warning may not give the user a ­beautiful, but the actual encryption is embedded in a backup method to continue working—the choice is to larger system that has the task of managing the encryp- quit (a total failure of availability) or take the risk and tion keys, the information that must be shared among proceed. Since users need to get their work done, and the parties so that the encryption can work. The weak most of these failures are not malicious, users conclude part of most encryption schemes is not the algorithm (correctly, in my opinion) that the pragmatic option is but how the keys are managed. If an attacker can steal to ignore the error, which has the effect of undoing the the keys (which may just be stored on a user’s personal benefit of encryption in the case of an actual attack. In ­computer—not the most secure device on the internet), my view, parts of the security community have some- or otherwise manipulate the key management system, what ignored the goal of availability in their pursuit of they can completely thwart the goals of confidentiality confidentiality and integrity. and integrity. Availability also cannot be improved using encryp- User Attacks on Each Other tion. If an attacker is in a position to block the traffic While information security among communicating between communicants, the only benefit of encryption users has received a lot of attention from the research is to blunt the attacker’s instrument—if the attacker community, many of the problems that plague users do cannot see what is being sent, the blocking cannot be not fit here. Instead, problems arise because one of the discriminating: it becomes an all-or-nothing attack. parties to the communication is not trustworthy. There are some contexts in which a third party (com- Most users understand that email may be spam, may monly a state actor or an internet service provider, or contain in attachments, or may pretend to be ISP, acting as an agent of the state) has blocked all The 8 BRIDGE from someone other than the apparent sender (so-called and the benefits are substantial. For many people, the phishing email falls in this category). Some users may Web and email are essentially indispensable. So how do understand that connecting to a website can lead to the we deal with these risks? download of malware onto their computer. Other appli- In the larger world, when actors interact but don’t cations suffer from different consequences of untrust- trust each other, they depend on constraints on the worthy actors, including false reviews of restaurants, interaction and trusted third parties to provide pro- abusive comments on sites that allow posting, and fake tection. When we buy or sell a house, we depend on news. registries of deeds, escrow agents, and the like to make sure the transaction is trustworthy, even if one of the actors is not. And the role of credit card processors To make applications more in facilitating interactions between buyers and ­sellers (and essentially insuring the transaction by reim- secure, the challenge is not bursing fraud) allows buyers and sellers that have no knowledge of each other to complete a transaction in to fix implementation bugs a trustworthy fashion. but to change their design. On the other hand, people may engage in potentially risky activities because they know and trust each other (I might lend money to a friend, but not a stranger). While attacks by one user on another can exploit People tend to treat friends differently from strangers. many aspects of the internet architecture, I think the most common attacks exploit applications—spam and Assessing Identity phishing via email, bogus restaurant reviews on Yelp, How might an application be designed to provide both and so on. Unfortunately, while it would be nice if we the advantages of powerful but risky modalities and pro- could give the job of fixing all these attacks to one sort tection from attack? Applications could be designed to of actor (e.g., ISPs), we cannot do that. ISPs are not modify their behavior depending on the degree of trust responsible for internet apps. Attacks have to be fixed among the participants—an email client might allow one application at a time. attachments from a known party to be downloaded, but block them from an unknown sender. However, for this Built-in Risks approach to work, it would be necessary for the applica- Why do applications allow these unwelcome behaviors? tion to “know” who the other parties are to a sufficient With respect to email, an application designed in the degree to determine the right degree of trust. It makes early days of the internet, the designers (including me) no sense to talk about whether someone is trustworthy did not appreciate the many ways it could be abused. if you have no idea who they are. This line of reasoning But with respect to more recent applications, risky suggests that some concept of identity needs to be a part modalities have sometimes been knowingly included of internet security. because they provide powerful features. The Web-based Calling for better identity verification could be attack in which malicious code is downloaded to a user’s taken to mean that all actions on the internet should computer would not be possible if Web protocols did be traceable to known persons. Calls for an “account- not include the ability to download and execute code in able internet” seem to suggest that what is needed is the first place. When that feature was proposed, security universal strong identity associated with every action. I experts were clear on the risks; the feature was added think that would be a very bad idea. On the one hand, anyway because of its utility. So to make applications it would preclude any sort of action, which more secure, the challenge is not to fix implementa- is often desirable, and on the other hand, it would not tion bugs but to change their design. That challenge work well. How confident should we be about identity is a big one, because it may require changes to a highly credentials issued by nation-states with interests adverse distributed system where the parts are under control of to ours? What sort of recourse would we have if one of many actors. those actors did something unwelcome? Despite these risks, people continue to use applica- In my view, identity cues need to be designed differ- tions on the internet—the benefits outweigh the risks, ently for different applications. Your bank really does FALL 2019 9

need to know who you are; Yelp does not. A site offering protocol was first described in 1982.1 So why do these medical advice about sensitive issues may commit not to vulnerabilities persist? The problem is not the lack of a identify you. For email, what may matter is not that the technical solution. recipient is given proof of who the sender actually is, but that the sender is the same person as in prior messages. Over a sequence of messages, a receiver can build up a There is no organization in model of whether a sender is trustworthy (this version of identity is sometimes called continuity identity). But charge of the global internet this approach to managing identity again pushes the responsibility for improved security back to the applica- to dictate an answer, so a tion layer. workable solution is elusive. Trade-offs? Depending on the security threat, the response may One problem is that there are competing solutions, differ. Consider old-fashioned physical mail. Most with fierce advocates for each. Solutions differ, in part, people would probably say that their mail should not with respect to exactly what security problem is being be opened by a third party while it is in transit—mail addressed, and it has been very hard to get agreement as is private. But if the envelope contains anthrax dust, to what the actual risk is. The security improvements are it would be very good if it were opened by someone costly in performance (most of them involve encrypted else—properly trained and in a hazmat suit. In the messages among routers, which adds substantially to internet context, it might be nice if incoming mail the overhead of processing the messages) so there is were inspected to see if it was spam or contained no enthusiasm for deploying them until it is clear that ­malware, but that task would be impossible if the email they are needed. And because BGP is a global system, was encrypted, although encryption is the best way to many actors would have to agree on the solution and preserve confidentiality. deploy it. Disagreements about how to improve BGP have persisted for years. There is no organization that is Attacks on the Network sufficiently in charge of the global internet that it can It is possible for a region of the internet itself to be dictate an answer, so a workable solution is elusive. attacked, by either another region or a user. As a packet carriage infrastructure, the internet is a global system, DNS Vulnerabilities and it should not be surprising that some regions of it The DNS maps a name (e.g., www.example.com) to an are malicious or have interests that are adverse to each internet address. If the DNS is subverted by a malicious other. Attacks often target a key service of the internet; actor, it can be made to return the wrong address for a the three most common services are the global routing name so that traffic intended for a legitimate destina- system (the Border Gateway Protocol, BGP), domain tion is instead sent to an attacker. With the DNS, there name system (DNS), and certificate authority (CA) is perhaps less debate about what the threat is, but it system. has still been hard for the community to make progress on a solution. BGP Vulnerabilities Encryption can help mitigate DNS problems. If one Using BGP, each region of the internet tells other user has an encryption key that is specific to another, regions which addresses are located in that region so that packets can be sent there. If a malicious region 1 In the design document describing the predecessor of BGP, the announces that it is a good route to some addresses that author stated: “If any gateway sends an NR [network reachabil- don’t belong to it, traffic may flow to that region instead ity] message with false information, claiming to be an appropriate of the legitimate destination and the information may first hop to a network which it in fact cannot even reach, traffic destined to that network may never be delivered. Implementers be examined, blocked, or manipulated in the malicious must bear this in mind” (Eric C. Rosen, Exterior Gateway Pro- region. tocol (EGP), Internet Request for Comment 827, October 1982, The vulnerabilities in the BGP (and DNS) have available at https://tools.ietf.org/html/rfc827, p. 32). The poten- been known for decades—the limitation in the routing tial vulnerability was not flagged as a security risk, but more as a mistake to avoid. The 10 BRIDGE intended user, then a rogue clone cannot decrypt what ally called a botnet, and the person controlling it is a the user sends and the malicious interception will fail. botmaster. (This is a successful attack on availability, but at least There are a number of ways to counter a DDoS no other harms will occur.) So if attackers want to pen- attack (or to disrupt a botnet). Ideally, end-nodes on etrate an encrypted communication, they must not only the internet would be secure enough to resist takeover deflect the traffic to the rogue endpoint but also disrupt by a botmaster. Indeed, security on traditional personal­ the key management system so the user under attack computers has greatly increased in the last decade. has the wrong key for the corresponding party (the key However, a new generation of inexpensive edge devices for the rogue clone and not the intended endpoint). have come on the market—surveillance cameras, smart doorbells, and the like—many of which are designed CA System Vulnerabilities with no thought to security. So botmasters have a new On the internet, encryption keys are most commonly generation of easy targets to exploit. managed by the CA system, so attackers are ­motivated The botmaster must control his infected machines, to attack this system. It has not proven resistant to which requires some sort of command and control sys- attack. tem. Defenders can attempt to disrupt that system, but To oversimplify, the design of the CA system was based the internet is a general-purpose data transport net- on a technically simplifying assumption that was flawed work, so botmasters invent new schemes to control when deployed in the real world: that the servers­ that their ­botnets as the old ones are disrupted. make up the CA system would be trustworthy. In a global Botnet disruption can also be prevented by replicat- system, that was an unrealistic assumption. Some CAs ing the potential target system until there are enough have proven corrupt, some have been penetrated, and copies that the traffic from the botnet cannot over- some (specifically CAs operated by state actors) have whelm all of them at the same time. If there are 100 been known to hand out false keys as part of a state- copies of a service scattered across the internet and the sponsored action. attacker targets all of them, then his botnet has to be 100 times as large as if there were only one copy. If the attacker concentrates on one copy, it can be disabled, Security is getting better. but that leaves 99 still running. Some of the most effective countermeasures to botnets­ But attackers are getting have involved identifying the botmasters and taking them to court. But this approach is often ­thwarted by better as well. cross-jurisdictional issues and variation in law.

If attackers can both intercept traffic and hand out Conclusions false keys, they can penetrate a connection that a user This picture may seem bleak. But at the level I have thought was protected by end-to-end encryption. This described, the problems are specific enough that there state of affairs holds today. is a chance of action. And security is indeed getting ­better, although attackers are getting better as well. Denial of Service Attacks Google has put in place a scheme to improve CA A DoS attack disables a host, application, or region of system security that does not require changes to the the network by flooding it with so much extraneous CA providers themselves. It is called certificate trans­ ­traffic that legitimate traffic is squeezed out. The attack parency, and while it has drawbacks, it is a path in the requires many simultaneous sources of traffic and so is right direction. Other measures are emerging to improve usually called a distributed denial of service (DDoS) email sender authenticity, and so on. attack. A number of lessons can be drawn for the future of The first step in a DDoS attack is to penetrate and cybersecurity: subvert many end-nodes on the network, installing mal- • First, while encryption is a powerful tool, it is not ware that can later be commanded to undertake various magic. For encryption to be successful, it must be tasks, from sending spam to participating in a DDoS embedded in a system that can manage keys (such as attack. This collection of infected machines is colloqui- FALL 2019 11

the CA hierarchy), and flaws are more likely to arise negative externality—one actor bears the cost while in that system than in the encryption algorithm itself. another benefits. There are many examples in the cyber­security space of coordination problems and • Second, some attacks are complex and multistage. negative externalities. A successful attack today does not come from simple exploitation of a vulnerability but may require several • Finally, there is nobody in charge. To a significant steps, with subversion of more than one system. This degree, this fact has been a strength, not a weakness. reality signals the sophistication of attackers—but Since the internet evolves bottom-up by consensus, also the possibility of thwarting an attack at multiple it is very hard for any single actor to dominate its stages. future. But when a collective decision is needed, mak- ing that decision can be difficult and slow. Power­ful • Third, perfect security is not possible. Security is a actors (such as Google, with certificate transparency)­ multidimensional space of sometimes conflicting are finding solutions to problems that they may threats and responses. Is encryption a good idea or a hope to impose unilaterally. This outcome may be bad idea in a specific context? Should an application very beneficial for security, but reflects a change in allow a risky operation or block it? internet governance toward a more centralized char- • Fourth, the case of BGP illustrates two nontechnical­ acter. Increasing centralization (of many aspects of barriers to better security: coordination problems and the internet) may be a byproduct of a push for better negative externalities. To undertake an improve- security. ment to BGP, the operators of the more than 70,000 regions that make up the internet have to agree to Acknowledgments make the change. But why should they? They bear I greatly appreciate the very thoughtful, detailed cri- the cost of implementation and operation, but do tique by Mary Ellen Zurko, as well as the meticulous not themselves benefit: it is users that are harmed editorial efforts of Cameron Fletcher. when ­traffic is deflected by rogue routing. This is the The definition of insider threat must be expanded from the malicious human insider to include the unwitting human insider and the technological insider.

Cybersecurity: Revisiting the Definition of Insider Threat

Nicole Lang Beebe and Frederick R. Chang

The insider threat problem is older than the cybersecurity problem itself and has similarly proven to be exceedingly resilient to solution. Organiza- Nicole Lang Beebe tions work hard to establish adequate defenses to combat external cyber risk, but the insider threat may actually be a greater concern.

Redefining Insider Threat As technological advances provide better tools to detect and prevent ­insider threat attacks, they also introduce new threats. They not only make it ­easier for adversaries to engage trusted human actors in a network but also introduce new, nonhuman trusted agents, such as mobile devices, internet-connected­ devices, and artificial intelligence (AI). Indeed, the definition and treatment of insider threat need to be expanded to include unwitting human actors and technology that act as trusted agents within networks. Frederick R. Chang

Nicole Beebe is professor and chair, Department of Information Systems & Cyber Security, Melvin Lachman Distinguished Professor, and director of the Cyber Center for Security & Analytics at the University of Texas at San Antonio. Frederick Chang (NAE) is professor and chair, Department of Computer Science, Bobby B. Lyle Centennial Distinguished Chair in Cyber Security, and executive director of the Darwin Institute for Cyber Security at Southern Methodist University. FALL 2019 13

Types of Human Insiders information acquisition and financial gain in vulnerable Human insiders are individuals with legitimate access internet-connected systems. to an organization’s computers and networks and whose Technology has also resulted in an increase in exter- volitional actions put organizational data, processes, nal adversary use of unwitting insiders to gain a digi- or resources at risk in an unwelcome or disruptive tal foothold in an organization: the adversary can then way, whether their intent is malicious or nonmalicious pivot, move laterally, and escalate privilege levels to (e.g., policy violations motivated for organizational obtain access and control over targeted digital asset(s). good without regard to unintended consequences that The unwitting insider has become a critical component may introduce security risks) (Pfleeger et al. 2010). In in the system and process used by external the recent years, the definition has expanded to include the world over. Until zero trust network model design prin- unwitting insider (Costa et al. 2014; Guo et al. 2011; ciples (Kindervag 2010) become the norm, ­external ­Maasberg et al. 2015; Willison and Warkentin 2013). hackers will continue to be enabled by the unwitting There are three broadly characterized types of human insider, by virtue of the operational trust given to the insider. Malicious insiders knowingly and willingly seek authorized user account. In fact, the most difficult to harm their organization through espionage, theft of insider threat to defend against is the unwitting insider intellectual property (IP), fraud, or sabotage (Moore et (Verizon 2019). al. 2013). In contrast, nonmalicious insiders may know- ingly violate organizational policy but believe they are doing so for the greater good of their organization. They Technology has resulted may, for example, circumvent security policies to get their job done more efficiently. in an increase in external Insiders in the third class are often referred to as adversary use of unwitting unwitting insiders. They neither intend their organi- zation harm, nor even know they are doing anything insiders to gain a digital wrong. Such insiders are dangerous to organizations (Greitzer et al. 2014), as they are susceptible to social foothold in an organization. engineering attacks (e.g., phishing), nefarious websites, or malware (Verizon 2019). Technology Itself as Insider Threat The Role of Technology As discussed, technology is both a target and an enabler Malicious insider attacks appear to be on the rise, (its role as a defender, detecting insider activity through arguably due to, or at least enabled by, technological data loss prevention appliances and security informa- advancement. Exfiltrating information from an orga- tion event management devices, is assumed). Looking nization no longer requires surreptitiously photocopy- ahead, however, it is poised to become a ­perpetrator— ing large amounts of documents in small increments the next insider. This prediction is based not on or secretly removing hard-copy data from an organiza- machine-initiated malfeasance in the evolution of a tion. Technological advances such as removable thumb far-flung view of sentient AI, but rather on technology drives, email, and cloud storage facilitate espionage and as a trusted insider in a complex system: a machine is IP theft. The electronic ledger enables fraud and theft given access and its outputs are trusted inputs to other without stealing a physical dollar. The information machines (and humans) in a larger system. technology (IT) infrastructure critical to organizations Trusted Machines and Systems is a target for cybersabotage. In criminal justice terms, technological advance- The prevailing paradigm to trust the machine remains. ment has increased the motive, opportunity, and means In industrial manufacturing environments, for exam- for the malicious insider. Insiders are (1) increasingly ple, system and manufacturing process engineers design motivated by information-based targets, (2) equipped to cyberphysical systems whose mechanical devices commit such crimes through a robust market of point- and machinery are automated by human-designed and-click exploitation suites and ready-to-deploy mal- ­computer-based algorithms (commonly referred to as ware, and (3) able to easily identify opportunities for ­Industry 4.0). Unfortunately, these systems are designed The 14 BRIDGE for reliability without sufficient regard to cybersecurity nonvolitional and whether the motive is malicious or (Thames and Schaefer 2017). In effect, the computer- nonmalicious. based algorithm becomes a trusted agent within the sys- tem, as do the robotic manufacturing devices carrying The Need for a Systems-Level Approach out the computer-based directives. Both the software The complexity and interdependency of the modern and the hardware are treated as trusted agents within organization necessitates a systems-level view of securi- the system. ty that is integrated into the full systems design from the In critical infrastructure contexts, research has illu- beginning. Security practitioners have long argued that minated an array of security vulnerabilities introduced security must be “baked in,” not “tacked on” at the end, by interconnecting operational technology (OT) and but unfortunately this philosophy has largely focused on IT networks (Lun et al. 2016; Murray et al. 2017). device-level design without taking into account a sys- These challenges are becoming evident as 50 billion tems engineering perspective. The security of systems Internet of Things (IoT) devices (Afshar et al. 2017) of systems and across interconnected systems remains are increasingly interconnected—to each other, to underaddressed. manufacturing systems, to traditional networks, and Furthermore, the conceptualization of the insider has beyond. The problem is only going to worsen when fifth remained focused on the vulnerable but trusted human. generation (5G) networks come online and machine- Not only is it inadvisable to trust all insiders to act with- to-machine interconnectivity promised by Industry 4.0 out malicious intent, it is essential to increase vigilance becomes a reality. against the unwitting insider. In advocating for an expanded view of the insider threat to include the technological insider, we are The insider is a trusted actor informed by important earlier work that has described similar concepts—including some of the pioneering on a network, computer security work from the 1970s that proposed the notion of subverted software or hardware as a seri- whether that actor is human, ous security threat to computing systems of the time an embedded device, (Anderson 1972; Lampson 1973; Schell 1979). The problem was critically important then—and it still is. the software, the network, Indeed, the case can be made that in today’s advanced technological landscape, greater awareness of and atten- or the AI. tion to the problem are long overdue.

Last, the added layer of evolving AI in next-genera- Mechanisms of Technological Insider Threats tion manufacturing environments (Industry 5.0), with The US National Insider Threat Policy (DNI 2012), writ- its envisioned human-machine symbiosis, means that ten in response to Executive Order 13587, “Structural AI will become the next trusted agent in the system. Reforms to Improve the Security of Classified Networks­ But research on adversarial AI techniques (Carlini and and the Responsible Sharing and Safeguarding of Classi­ Wagner 2017; Dalvi et al. 2004; Lowd and Meek 2005) fied Information” (Obama 2011), sets expectations and and on efforts to detect and counter them (Tramèr et al. identifies best practices for deterring, detecting, and 2017; Yuan et al. 2019) makes it clear that AI cannot mitigating insider threats. However, it focuses entirely necessarily be trusted. Yet AI is still widely trusted. on the human insider and turns to technology only to In sum, a system-based view of the insider threat deter and detect the human insider threat. It calls for necessitates an evolved perspective of “who” the insider program establishment, training of program personnel, is. A continued human-centric approach that focuses monitoring of user and network activity, and employee solely on malicious actors is myopic and dangerous. training and awareness. The more recent Insider Threat The insider is the trusted actor on a network, whether Guide (NITTF 2017) and maturity framework (Belk and that actor is human, an embedded device, the software, Hix 2018) from the National Insider Threat Task Force the network, or the AI, and its risk should be consid- (NITTF) continue this trend. Yet the risk posed by the ered regardless of whether the action is volitional or technological insider is clear and present. FALL 2019 15

Personal Devices Used for Work This all sounds promising, except that 70 percent of According to a 2018 study of 500 IT executives, CEOs, small businesses fail to implement MDM or container­ and other senior managers in the United States, commis- ization (Parizo 2018). Without such protections, sioned by and conducted in partnership with ­Samsung, ­millions—and potentially billions—of are nearly 80 percent of employees cannot accomplish connected to organizational networks as trusted insiders,­ their required work effectively without a mobile device gaining access to sensitive data, propagating malware, (Oxford Economics 2018). The vast majority of these and giving adversaries footholds in their networks. devices are personally owned and managed, and 61 per- Embedded Devices cent of the respondents expected their employees to be available remotely. According to the study, companies Embedded devices affect enterprises through supply save approximately 15 percent with a bring your own chain security risks and through interconnectivity device (BYOD) policy over an enterprise-owned device between IoT devices and enterprise networks. policy, so many companies opt for BYOD. Supply Chain Vulnerabilities Poor Security Practices Supply chain vulnerabilities jeopardize enterprise net- With so many organizations dependent on personally works when individual computing components in sys- owned mobile devices as part of their workflow, user tems are compromised (e.g., through integrated circuit security awareness and implementation are chips from untrusted sources). The resulting challenges critical. Unfortunately, however, many users continue to the security of the computational system may affect to demonstrate poor security awareness and hygiene on the authenticity of materials and components, physical their mobile devices (Parker et al. 2015), putting their tracking and antitampering efforts, secure communica- organizations at risk as smartphones become part of an tions, and the installation of backdoors, among others. organizational network infrastructure through email access, file activity, workflow processing, and much more. Mobile device users incur risks by How trustworthy are the • using poor password policies; computing components vital • failing to use device and screen locks (and when they do, often employing weak authentication mecha- to the vast array of devices nisms), virus protection, encryption, remote device used daily in work and locator services, and/or remote wiping services; and personal life? • visiting unsafe websites and/or installing risky soft- ware (Mylonas et al. 2013; Parker et al. 2015; ­Sebescen and Vitak 2017). How trustworthy are the computing components vital to the vast array of computational devices used Defenses daily in work and personal life? This is a significant To combat poor user security on BYOD devices, compa- and growing concern, as evidenced by several major nies are deploying mobile device management (MDM) research funding programs by US federal agencies. software that enables software network access control, In 2007 the Defense Advanced Research Projects identification of outdated or nonexistent virus detec- Agency committed nearly $25 million to the Trust tion software, enforcement of passcode requirements, in Integrated­ Circuits Program (Adee 2007). In 2011 detection of “jailbroken” phones, remote location and it invested another $49 million in the Integrity and wiping, application-level security through VPN tunnels, Reliability of Integrated Circuits Program (Rawnsley white-/blacklisting, and dynamic policy enforcement. 2011). The Intelligence Advanced Research Project Other organizations are opting for a containerization Agency followed suit with a Trusted Integrated Chips 1 approach, wherein company data, communications, and Program. The National Institute of Standards and work-related applications are stored in an encrypted Technology has issued comprehensive guidance on partition/area of the device. 1 https://www.iarpa.gov/index.php/research-programs/tic The 16 BRIDGE cyber supply chain risk management (­Boyens et al. Network Devices 2015), and supply chain security is a major thrust of The problem of the personal device insider and the the Department of Energy’s latest $70 million funding embedded device insider is about to get worse with announcement for a cyber­security institute for energy the rollout of 5G, which will enable greater device- efficient manufacturing (DOE 2019). to-device connectivity, interconnectivity between physical and virtual devices, and greater/faster band- Interconnectivity Risks width. 5G’s enhanced encoding, air interface, chan- Embedded devices are increasingly connected in nel frequencies, and antenna technologies mean that every area of life, especially with the rapid adoption cellular ­devices will be able to do even more and IoT of IoT devices and their interconnectivity with enter- devices will be able to interconnect on a much grander prise networks. This interconnectivity may be direct scale. An individual’s smartphone will be connected (enterprise IoT devices as part of the network) or to his home automation system, vehicle, peers when indirect (personal­ IoT devices connected to personal ­gaming—and BYOD work environment (and every- smartphones, which are then connected to enterprise thing in between). networks). Gartner (2016) predicts that by 2020 over 25 percent of identified security attacks in enterprises Software (AI/Autonomy) will involve IoT devices, a prediction that seems to be The last technological insider is associated with AI and borne out by the exponential increase—nearly 3700 autonomous systems. The scenario has been fiction- percent—in IoT malware: Kaspersky Lab (2018) saw ally illustrated on the big screen and in novels for quite 3,219 pieces of IoT malware in 2016, 32,614 in 2017, some time, but the threat is real. and 121,588 in the first half of 2018. It appears clar- Most existing machine learning (ML) classifiers are ion calls about the ­problem were well founded (e.g., not particularly robust or immune to adversarial attacks Schneier 2014). (also known as adversarial learning or adversarial AI) (Kurakin et al. 2018). This was well known and of suffi- cient concern for Google Brain to organize a competition Research into detecting at the 2017 Conference on Neural Information Process- ing Systems to generate new adversarial attack samples and defending against and develop defenses to counter them.2 Research into adversarial AI attacks detecting and defending against adversarial AI attacks, however, remains limited, in both quantity and success remains limited, in both (Athalye et al. 2018; Kurakin et al. 2018). In addition to adversarial input attacks, data poi- quantity and success. soning (Biggio et al. 2012) and model stealing attacks (Tramèr et al. 2017) against ML systems must be addressed. Organizations that use AI, even with human- The Mirai botnet, for example, leveraged IoT devices in-the-loop designs, must carefully consider the trust such as webcams, DVRs, and routers to launch a dis- models associated with AI and autonomous systems and tributed denial of service attack on internet service vigilantly monitor for nefarious concept drift (systems provider Dyn, taking down a significant portion of the slowly moving outside of reasonable parameters). internet on October 21, 2016, and preventing millions The risk of AI or autonomous systems becoming of people from accessing over 1,200 websites, including a witting insider may be many years off, but the very Twitter and Netflix, for nearly an entire day (Kolias et near reality is that they can be manipulated nefariously,­ al. 2017). Home and building automation systems have much like the nonmalicious/nonvolitional (i.e., been shown to have significant vulnerabilities in criti- ­unwitting) human insider. The quest for reliable adver- cal systems such as those for HVAC; fire detection, sup- sarial AI detectors and defense systems must accelerate, pression, and alerts; security and access control, such as because the widespread deployment of AI, ML-based, cameras/CCTVs and door locks; and lighting (Peacock and autonomous systems is already underway. and Johnstone 2014). 2 https://kaggle.com/c/nips-2017-non-targeted-adversarial-attack FALL 2019 17

Addressing the Challenge through Systems to-machine transport protocols (e.g., MTConnect Engineering and MQTT) or secure 5G wireless interconnectivity, The complexity of the insider threat problem—three secured with software, trusted hardware components, classes of human insiders as well as the technological and intrusion detection systems. In addition: insiders discussed here—necessitates a true systems- engineered solution. • Interdevice trust and dataflow are secured through When systems are designed with a systems engineer- trusted protocols, access management, and security ing perspective, their constituent components and analytics. interconnectivity are fully and intentionally integrated • Predictive analytics based on the application of synergistically to optimally perform a collective func- machine learning and artificial intelligence are rou- tion. Security may be viewed as both a subsystem and a tinely calibrated and verified, not blindly trusted. system design characteristic. However, all too often it is treated only as a design characteristic at the subsystem • Digital twin and digital thread technologies are level rather than being considered in the design across employed for cyberphysical vulnerability detection. the entire system of systems. • Proactive mitigations, response, and resiliency are The relatively new field of security engineering has performance requirements that drive functional attempted to remedy this, but still falls short. Security requirements such as isolation, containerization, engineering typically takes a multilevel approach that moving target defense, advanced sensing, anomaly considers software security, information security, physi- detection, self-healing, forensic data retention, rapid cal security, and technical surveillance separately rather information sharing, and full system visualization. than in an integrated system design. Integrated secu- rity engineering from a systems engineering perspective should consider information/data flows, subsystem inter- connectivity, human-to-system and system-to-system Enterprises are connecting access controls, and privilege design and protection. more and more weak links Information and data flow security has largely been researched within, not between, systems. Examples to their network include system call monitoring (Hofmeyr et al. 1998) and anomaly detection (Bhatkar et al. 2006), as well through personal, as the more recent concept of data flow assertions (Yip embedded, network, et al. 2009) for application layer security, wherein an explicitly identified data flow plan is checked for com- and autonomous devices. pliance at runtime. There has been little attention to the need to integrate security and systems engineering Conclusion throughout the system development process (Mourati- dis et al. 2003). A system is only as strong as its weakest link, and enter- Most integrated system development security has prises are connecting more and more weak links to been geared toward identifying and mitigating secu- their network through personal, embedded, network, rity risks associated with OT-IT interconnectivity or and autonomous devices. Progress in addressing the between legacy and modern systems. But the problem insider threat has been made since the establishment goes much deeper. As attackers gain a foothold in an of the NITTF in 2011, but unfortunately, the focus has inconsequential system and then move to more con- been on the malicious human insider. The scope must sequential targets through pivoting and lateral move- be broadened to include the unwitting insider and the ment, escalating privileges along the way, they are able technological insider as well. to obtain access disturbingly easily wherever the target The wave of 5G interconnected IoT devices, inter- may be within a network. connectivity between home and work through the Consider the design of an advanced manufacturing notoriously undersecured smartphone in an increasingly system, for example. Manufacturing subsystems are BYOD enterprise, and the development and spread of interconnected through secure versions of machine- AI-enabled software are all making it increasingly dif- The 18 BRIDGE ficult to defend digital networks. These trends, along tional Conf on Knowledge Discovery and Data Mining, with the growing interconnectedness of critical infra- Aug 22–25, Seattle. structures, are cause for great concern. DNI [Director of National Intelligence]. 2012. National Insider Threat Policy. Online at https://www.dni.gov/files/NCSC/ Acknowledgments documents/nittf/National_Insider_Threat_Policy.pdf. Special thanks to Steve Lipner for his constructive DOE [US Department of Energy]. 2019. DOE announces comments that materially improved the perspectives $70 million for Cybersecurity Institute for Energy Efficient and contributions of this article. Additional gratitude Manufacturing. Energy.Gov, Mar 26. to Cameron Fletcher and Jenni Simonsen for their care- Gartner. 2016. Gartner says worldwide IoT security spending ful editing to improve the readability of the ideas and to reach $348 million in 2016. Apr 25. Stamford CT. thoughts conveyed herein. Greitzer FL, Strozer JR, Cohen S, Moore AP, Mundie D, ­Cowley J. 2014. Analysis of unintentional insider threats References deriving from social engineering exploits. 2014 IEEE Secu- Adee S. 2007. Contracts awarded for DARPA’s Trust in Inte- rity and Privacy Workshops, May 17–18, San Jose. grated Circuits Program. IEEE Spectrum: Technology, Guo KH, Yuan Y, Archer NP, Connelly CE. 2011. Under- Engineering, and Science News, Dec 6. standing nonmalicious security violations in the workplace: Afshar V. 2017. Cisco: Enterprises are leading the Internet of A composite behavior model. Journal of Management Things innovation. HuffPost, Aug 28. Information Systems 28(2):203–236. Anderson JP. 1972. Computer Security Technology Planning Hofmeyr SA, Forrest S, Somayaji A. 1998. Intrusion detec- Study, Vol I. Report ESD-TR-73-51. AFSC Electronic Sys- tion using sequences of system calls. Journal of Computer tems Division, Hanscom AFB, Bedford MA. Security 6(3):151–180. Athalye A, Carlini N, Wagner D. 2018. Obfuscated ­gradients Kaspersky Lab. 2018. New IoT-malware grew three-fold in H1 give a false sense of security: Circumventing defenses to 2018. Press release, Sep 18. adversarial examples. Proceedings, 35th International Kindervag J, with Balaouras S, Coit L. 2010. No more chewy Conf on Machine Learning, Jul 10–15, Stockholm. centers: Introducing the zero trust model of information Belk RW, Hix TD. 2018. Insider Threat Program: Maturity security. Cambridge MA: Forrester Research. Framework. McLean VA: National Insider Threat Task Kolias C, Kambourakis G, Stavrou A, Voas J. 2017. DDoS in Force. the IoT: Mirai and other botnets. Computer 50(7):80–84. Bhatkar S, Chaturvedi A, Sekar R. 2006. Dataflow anomaly Kurakin A, Goodfellow I, Bengio S, Dong Y, Liao F, Liang M, detection. 2006 IEEE Symposium on Security and Privacy, Pang T, Zhu J, Hu X, Xie C, and 13 others. 2018. Adver- May 21–24, Berkeley/Oakland. sarial attacks and defences competition. The NIPS ’17 Biggio B, Nelson B, Laskov P. 2012. Poisoning attacks against Competition: Building Intelligent Systems, eds Escalera support vector machines. ArXiv:1206.6389. S, Weimer M. Cham, Switzerland: Springer International Boyens J, Paulsen C, Moorthy R, Bartol N. 2015. Supply Publishing. Chain Risk Management Practices for Federal Informa- Lampson B. 1973. A note on the confinement problem. tion Systems and Organizations. NIST Special Publication ­Communications of the ACM 16(10):613–615. 800-161. Gaithersburg: National Institute of Standards and Lowd D, Meek C. 2005. Adversarial learning. Proceedings, Technology. 11th ACM SIGKDD International Conf on Knowledge Carlini N, Wagner D. 2017. Adversarial examples are not Discovery in Data Mining, Aug 21–24, Chicago. easily detected: Bypassing ten detection methods. Proceed- Lun YZ, D’Innocenzo A, Malavolta I, Di Benedetto MD. ings, 10th ACM Workshop on Artificial Intelligence and 2016. Cyber-physical systems security: A systematic map- Security, Nov 3, Dallas. ping study. ArXiv:1605.09641. Costa DL, Collins ML, Perl SJ, Albrethsen MJ, Silowash Maasberg M, Warren J, Beebe NL. 2015. The dark side of the GJ, Spooner DL. 2014. An ontology for insider threat insider: Detecting the insider threat through examination indicators: Development and applications. Online at of dark triad personality traits. 48th Hawaii International https://resources.sei.cmu.edu/asset_files/ConferencePaper/ Conf on System Sciences, Jan 5–8, Kauai. 2014_021_001_426817.pdf. Moore AP, McIntire D, Mundie D, Zubrow D. 2013. Justifica- Dalvi N, Domingos P, Sanghai S, Verma D. 2004. Adversarial tion of a pattern for detecting intellectual property theft classification. Proceedings, 10th ACM SIGKDD Interna- by departing insiders. Technical note CMU/SEI-2013- FALL 2019 19

TN-013. Pittsburgh: Carnegie Mellon University Software Pfleeger SL, Predd JB, Hunker J, Bulford C. 2010. Insiders Engineering Institute. behaving badly: Addressing bad actors and their actions. Mouratidis H, Giorgini P, Manson G. 2003. Integrating secu- IEEE Transactions on Information Forensics and Security rity and systems engineering: Towards the modelling of 5(1):169–179. secure information systems. In: Active Flow and Combus- Rawnsley A. 2011. Can DARPA fix the cybersecurity tion Control 2018 (Vol 141), ed King R. Cham: Springer “­problem from hell”? Wired, Aug 5. International Publishing. Schell RR. 1979. Computer security: The Achilles’ heel Murray G, Johnstone MN, Valli C. 2017. The convergence of the electronic Air Force? Naval Postgraduate School, of IT and OT in critical infrastructure. Proceedings,­ ­Monterey CA. ­Australian Information Security Management Conf, Schneier B. 2014. The Internet of Things is wildly insecure— Dec 5–6, Perth. and often unpatchable. Wired, Jan 6. Mylonas A, Kastania A, Gritzalis D. 2013. Delegate the Sebescen N, Vitak J. 2017. Securing the human: Employee smartphone user? Security awareness in smartphone plat- security vulnerability risk in organizational settings. Journal­ forms. Computers and Security 34:47–66. of the Association for Information Science and Technology NITTF [National Insider Threat Task Force]. 2017. Insider 68(9):2237–2247. Threat Guide: A Compendium of Best Practices to Accom- Thames L, Schaefer D, eds. 2017. Cybersecurity for ­Industry pany the National Insider Threat Minimum Standards. 4.0: Analysis for Design and Manufacturing. Cham: McLean VA. Springer. Obama B. 2011. Structural Reforms to Improve the Security Tramèr F, Kurakin A, Papernot N, Goodfellow I, Boneh D, of Classified Networks and the Responsible Sharing and McDaniel P. 2017. Ensemble adversarial training: Attacks Safeguarding of Classified Information (Executive Order and defenses. ArXiv:1705.07204. 13587). Federal Register 76(198). Online at https://www. Verizon. 2019. Insider Threat Report. Online at https://­ dni.gov/files/NCSC/documents/nittf/EO_13587.pdf. enterprise.verizon.com/resources/reports/insider-threat- Oxford Economics. 2018. Maximizing Mobile Value: Is BYOD report/. Holding You Back? Oxford. Willison R, Warkentin M. 2013. Beyond deterrence: An Parizo C. 2018. What is MDM? Does your small business need expanded view of employee computer abuse. MIS ­Quarterly it? Samsung Business Insights, Oct 23. 37(1):1–20. Parker F, Ophoff J, Belle JV, Karia R. 2015. Security aware- Yip A, Wang X, Zeldovich N, Kaashoek MF. 2009. Improving ness and adoption of security controls by smartphone users. application security with data flow assertions. Proceedings, 2nd International Conf on Information Security and Cyber ACM SIGOPS 22nd Symposium on Operating Systems Forensics, Nov 15–17, Cape Town. Principles, Oct 11–14, Big Sky MN. Peacock M, Johnstone MN. 2014. An analysis of security Yuan X, He P, Zhu Q, Li X. 2019. Adversarial examples: issues in building automation systems. Proceedings, 12th Attacks and defenses for deep learning. IEEE Transactions Australian Information Security Management Conf, Dec on Neural Networks and Learning Systems. 1–3, Perth. Previous incidents highlight the need for clear, specific guidance on cybersecurity best practices and incentives for their use.

Learning from Cybersecurity Breaches: The Trouble with Recommended Best Practices

Josephine Wolff

One of the recurring themes in discussions of cybersecurity is how rapidly the landscape of threats is evolving and how difficult it is for defenders to keep pace with ever-changing attack vectors and vulnerabilities. While it is true that security threats and controls change over time as technologies con- tinue to develop, that idea sometimes leads to the dismissal of older security breaches as irrelevant in the context of trying to defend against tomorrow’s Josephine Wolff is an threats. But there is considerable value in reexamining past attacks for clues assistant professor of about the ways they remain relatively static over time and how those pat- cybersecurity policy at the terns can be used to do a better job of defending against future attacks. Fletcher School of Law and Diplomacy at Tufts Introduction University. Past incidents are particularly helpful in efforts to understand the strengths and weaknesses of the many recommended cybersecurity best practices. There are recommendations issued by government agencies, industry consor- tiums, international standard-setting organizations, private companies, non- profits, and individual security experts. With the wealth of recommended best practices, many organizations are unsure which policies and security controls to implement. This article looks at selected cybersecurity incidents through the lens of the perpetrators’ motivations—financial theft, espionage, and public humili- ation of the victims—to show how they shape the trajectory of the incidents, FALL 2019 21

creating repeated attack patterns over time. These pat- Types of Motivation terns can help guide defensive interventions aimed at The three classes of attacker motivation discussed here— preventing similar incidents. They also shed light on financial gain, espionage, and public humiliation—are why existing cybersecurity best practices have often not comprehensive or exclusive. For instance, the ­Stuxnet failed to clarify effectively the essential security respon- worm was used for none of these purposes but instead to sibilities and controls for organizations. cause physical damage to an Iranian uranium enrichment Although recommended practices provide a useful plant (Zetter 2014). This goal of physical sabotage is yet starting point for organizations trying to implement another potential attacker motivation—one that may stronger security protections, they are designed to tar- become increasingly common as more physical devices get very specific stages of breaches and draw on the are connected to the Internet of Things and it becomes capabilities of only a single stakeholder involved in possible to control them through computer networks. the incident—the organization directly targeted. This However, at present, there are too few examples of such ­narrow focus limits the effectiveness of the best prac- incidents to allow for extensive analysis. tices because they take advantage of only one small part of both the larger defensive ecosystem and the range of involved stakeholders online. The recommended practices can also be extremely It is useful to consider challenging for organizations to adopt and implement. For instance, the most recent, fourth revision of the an attacker’s motives NIST 800-53 catalogue1 includes 115 low-impact secu- because those goals shape rity controls, 159 moderate-impact controls, and 170 high-impact controls—more than 440 options. For a the final, most essential small or medium-sized enterprise looking for guidance, this can be an oppressive and impractical quantity of stages of an attack. controls. Furthermore, the lack of empirical evidence that Profit, espionage, and public shaming are not mutu- these best practices actually reduce the risk of cyber- ally exclusive motives. For instance, in the cases of both security incidents makes it difficult for organizations to the 2014 Sony Pictures data breach and the 2015 Ashley­ decide which ones to use. Madison breach, the theft of data was motivated by the perpetrators’ desire to publicly shame the victims, but What Drives Cyberattacks? the resulting dumps of sensitive information were then There are many ways to categorize cybersecurity inci- used by others to commit financially motivated crimes dents—according to their targets, their perpetrators, or involving identity theft and financial fraud. Simi- the technical exploits the perpetrators use, for instance. larly, the GameoverZeus botnet operated by Evgeniy Each classification scheme is useful in different contexts, Bogachev’s organization in was used by Bogachev such as trying to understand which types of organiza- and his associates to steal millions of dollars through the tions are most likely to be targeted, or which criminal Cryptolocker ransomware, but some of the information groups require the most attention from law enforce- was provided to the Russian government to aid espio- ment, or which technical vulnerabilities are most fre- nage efforts (Schwirtz and Goldstein 2017). quently exploited. For identifying attack patterns, or repeated sequences of behavior that persist over years Motivation and Methods and years in, it is especially useful to consider perpetra- Despite the potential for overlap, goals still provide a tors’ motives because those goals shape the final, and useful framework for considering how best to defend most essential, stages of their attacks. against future attacks because the final attack stages are often not replaceable for the perpetrators and are there- fore repeated year after year, breach after breach, even as computing technology evolves. 1 Available from the National Institute of Standards and Many of the earlier, technical stages of the breaches ­Technology National Vulnerability Database, online at https:// that enable an intruder’s initial access to target systems nvd.nist.gov/800-53. The 22 BRIDGE

(e.g., phishing, exploiting software vulnerabilities, or Several payment card networks and issuing banks stealing credentials) are easily replaced: If one avenue that bore the brunt of covering the costs of the resulting of access is cut off by effective security controls, the payment card fraud sued TJX for its negligence in failing perpetrators simply switch to another. But the final to secure the card data more effectively. The lawsuits stages of their attacks—when they carry out their ulti- focused on the company’s failure to encrypt its stores’ mate aims—are not so easily substituted to achieve the wireless networks using WPA encryption. same goal. That makes these stages the most crucial for But TJX’s failure to use up-to-date WiFi encryption defenders to cut off and also the most static over time. was only one missed opportunity in a long chain of events that led up to the execution of the breach— Financially Motivated Incidents from packet sniffing, credential theft, and remote Most reported cybersecurity incidents are motivated ­logins on TJX servers to exfiltration of stored payment by money (Verizon 2019). The specific techniques card data and the manufacture and sale of fraudulent whereby cybercriminals steal data they can use to make payment cards. The insecure was no money have certainly evolved over time, but the desire more responsible for the entirety of the breach than to make money and the mechanisms for converting any of the other decisions by TJX and other stake­ ­stolen data into financial gain have changed much more holders that enabled the later stages of the breach. And slowly. One of the earliest and most common forms of yet, because WPA encryption was specified in the Pay- these crimes is the theft of large volumes of payment ment Card Industry Data Security Standard (PCI DSS) card information that can be sold on the black market at the time, both the media and the courts viewed and used for large-scale financial fraud. that ­particular decision as, in many ways, the crucial mistake that demonstrated the company’s negligence The TJX Breach (2005) (Wolff 2018). The 2005 breach of TJX, Inc. by Albert Gonzalez and a The recommended best practices that organizations few coconspirators resulted in the theft of 45.6 million are routinely faulted (in the aftermath of a breach) for payment card numbers, making it one of the largest such not implementing often do not address the stages of an breaches at the time of its discovery. incident that are most susceptible to effective defen- sive interventions. In this case, the emphasis on wire- less network encryption in the legal proceedings that Recommended best practices followed the breach shifted focus away from the inci- dent’s monetization stages in which Gonzalez and his often do not address the coconspirators sold the stolen data and repatriated their profits to the United States—the process by which law stages of an incident that are enforcement officials were ultimately able to identify most susceptible to effective and arrest them (Verini 2010). defensive interventions. The SCDOR Breach (2011) As explained above, often it is not clear which prac- tices an organization should adopt. In the wake of Gonzalez and his team had first identified the firm as the 2011 breach of millions of tax records from the a potential target while “wardriving” on a Miami high- South ­Carolina Department of Revenue (SCDOR) way using a long radio antenna to detect insecure wire- ­critics questioned whether the SCDOR had adhered less networks. They found a Marshalls store, owned by to required standards and recommended best practices. TJX, that had a wireless network encrypted using older, Then–South Carolina governor Nikki Haley blamed less secure WEP encryption. They parked in the store’s the IRS for failing to instruct the state to encrypt its tax lot and proceeded to collect packets off the wireless net- records. The IRS, in turn, invoked NIST as the respon- work until they had sufficient information to reverse- sible entity for setting technical security standards for engineer the encryption key and retrieve in plaintext government agencies. Meanwhile, the South Carolina the necessary credentials to connect to the company’s state legislature expressed outrage that the SCDOR had main servers in Framingham, MA (Verini 2010). not required multifactor authentication, which might FALL 2019 23

have defended against the phishing attack that initiated identify the safeguards those customers should take as the breach (Mandiant 2012). part of their coverage, and find they cannot rely on exist- The uncertainty around which stakeholders were ing best practices as guidance. This has led many insurers responsible for determining security best practices and to partner with security firms to provide customer assess- which best practices were essential for the protection ments and security services (Wolff and Lehr 2018). of sensitive information contributed to the inability to clarify responsibility and liability for the incident.

The GameoverZeus Botnet and Cryptolocker Not all recommended Ransomware (2013–2014) security controls provide The GameoverZeus botnet that distributed the ­Cryptolocker ransomware program in 2013 and 2014 measurable improvements was able to bypass many forms of multifactor authentica- in system security, tion and monetize previously worthless data by selling it back to its original owners for a cryptocurrency ­ransom. and some do more harm The cryptocurrency payments allowed the perpetrators to evade the centralized financial intermediaries,­ such than good in the long term. as banks and payment card networks, that had power- ful defensive forces to combat payment card fraud and The monetization stages of financially motivated identity theft. And because Cryptolocker targeted indi- have traditionally been the most vulner- viduals’ computers it distributed the costs to thousands able to defensive intervention because they relied on a of disparate users rather than concentrating them in small set of intermediaries, such as well-known online the fraud ledgers of credit card companies and issuing black markets for stolen cards and fraudulent card man- banks. This cost distribution diminished the incentives ufacturers. For instance, law enforcement authorities for any intermediaries to intervene and eliminated the were able to take down Gonzalez’s operation through his class action lawsuits that had driven liability regimes fence for stolen card data, a man named Maksym Yast- and the associated need for clear recommended best remskiy. Later models of financial cybercrime shifted to practices to distinguish between negligent and unlucky enable other types of monetization that relied less on breach victims. fencing operations like Yastremskiy’s.

Liability and Cyberinsurance Challenges Cyberespionage The challenge with relying on catalogues or lists of best Defending against political or economic cyberespionage practices to determine even partial liability for security typically requires restricting the exfiltration of data and incidents is that it narrows the scope of organizations’ segmenting sensitive portions of networks to contain security responsibilities to relatively confined, non­ intrusion attempts and subsequent access to high-value exhaustive recommendations that are often based more information. But adhering to these best practices is not on generally accepted consensus than on empirical always sufficient, especially when the espionage efforts evidence. In fact, not all recommended security con- are state-sponsored and carried out by actors with con- trols provide measurable improvements in system secu- siderable expertise and resources. rity, and lists of best practices can sometimes be used The following cases highlight both the vulnerability to propagate controls (e.g., requirements to regularly of a company that rigorously followed recommended change passwords) that do more harm than good in the security standards and the absence of serious conse- long term (Wolff 2016). quences for organizations that failed to do so. These The lack of clear correlation between security best examples do little to encourage others to pay more practices and security outcomes is a significant challenge attention to these recommendations. for the rapidly growing number of insurance firms offer- ing cyberinsurance policies. These firms typically do not The Case of DigiNotar (2011) have the in-house security expertise that would allow The Dutch certificate authority DigiNotar was compro- them to audit potential customers’ security postures or mised in 2011 as part of what was later hypothesized to The 24 BRIDGE be an espionage operation by the Iranian government and directed at more than 100 private companies and (Hoogstraaten et al. 2012). An intruder penetrated government agencies, primarily based in the United ­DigiNotar’s multiple lines of defense to generate rogue States, were described in a 2013 report by security firm certificates for Google’s domain, and these certificates Mandiant. Some of the incidents were confirmed in an were then likely used to capture credentials for thousands indictment of several PLA officers the following year; of Iranian Google accounts (Hoogstraaten et al. 2012). like the Mandiant report, the indictment pointed to The DigiNotar compromise is an example of how many phishing emails and other social engineering campaigns stages can be involved in completing espionage attacks. as the primary means of access for the state-sponsored Not only did the perpetrators have to compromise a cer- economic espionage efforts (Mandiant 2013). tificate authority, they then had to redirect users to fraud- In 2015, in another espionage operation attributed to ulent web pages, probably through Domain Name System the Chinese government, the US Office of ­Personnel (DNS) cache poisoning, to use the rogue certificates they Management was breached and information about had generated (Hoogstraaten et al. 2012). 21.5 million people who had worked for the federal government or received security clearances was stolen (Chaffetz et al. 2016). Congressional hearings high- Officials blamed other lighted OPM’s lack of encryption, multifactor authen- tication, and intrusion-monitoring technology, but in agencies for hindering a move reminiscent of the SCDOR breach aftermath, OPM officials deflected blame to the Department of their ability to implement Homeland Security, NIST, the Office of Management security upgrades or and Budget, and other agencies that they felt had ­hindered their ability to implement security upgrades establish clear expectations or establish clear expectations for information security for information security. (Chaffetz et al. 2016). Public Shaming Incidents Besides highlighting the numerous opportunities for Security incidents aimed at publicly shaming the vic- defensive intervention, the DigiNotar attack illustrates tims often involve publicly denouncing or embarrassing the limitations of adhering to industry best practices. the target before as large an audience as possible. This DigiNotar had a rigorously segmented network struc- broadcasting stage can be an especially tricky element ture to separate the high-security certificate-issuing of cyberattacks to regulate because such regulations may portion of the network from the company’s outward- resemble speech or press restrictions that run counter to facing web presence. Every request for a new certificate many countries’ fundamental principles. had to be approved by at least two company ­employees and the servers used to generate certificates were stored The Sony Pictures Breach (2014) in a secure room that could be accessed only by using When North Korea breached Sony Pictures in 2014 biometric hand recognition, a key card, and a PIN and released large volumes of stolen emails and internal (­Hoogstraaten et al. 2012). records, several people, including lawyers hired by Sony, DigiNotar’s security setup reads like an excerpt from suggested that it was, or should be, illegal for reporters a manual on how to design a secure system, and yet to write about the stolen information because it sup- the intruders were able to find a way to tunnel into the ported the mission of the attackers and infringed on most secure portion of the network and generate rogue Sony’s intellectual property (Boies 2014). While it was certificates. true that the widespread media attention to the breach aided North Korea’s supposed mission of humiliating The OPM Data Breach (2015) Sony Pictures and undermining the company’s busi- In other cases of espionage, organizations demonstrated ness, regulating the media and online intermediaries much less rigorous adherence to basic tenets of security that helped distribute the stolen information would best practices. A series of espionage efforts led by the have been a problematic solution to a cyberattack that Chinese People’s Liberation Army (PLA) Unit 61398 aimed to spread discord and wreak havoc on its target. FALL 2019 25

Spamhaus DDoS (2013) Fourth, examining the controls that courts, legislative By contrast, the massive distributed denial of service hearings, and media reports most often emphasize in cases (DDoS) attacks against Spamhaus in 2013, by a group such as those discussed in this article reveals a tendency to frustrated by the organization’s widely used spam block- highlight the absence of controls that might have blocked lists, did not rely on media coverage or popular atten- early, technical stages of the intrusions rather than more tion. Rather, they depended on DNS operators that had systemic interventions that would have involved third- failed to restrict their servers to only resolve queries from party intermediaries, law enforcement, and/or regulators. computers in their administrative domains. These open This is in part because those controls can be most easily resolvers enabled the Spamhaus attackers to send DNS implemented by the breached party rather than requiring queries that pretended to be from Spamhaus­ servers, cooperation from other stakeholders.­ But that is exactly causing the open DNS servers to respond to ­Spamhaus what makes them less effective and more likely to address with large DNS files that bombarded the antispam orga- stages of attacks that can easily be substituted for new nization’s servers and forced them offline (Prince 2013a). attack vectors by perpetrators. Not operating open resolvers was a known security best practice for DNS operators but there were inade­ quate incentives for many of them to adhere to the Cooperation among practice. At the time of the Spamhaus DDoS attacks, the Open Resolver Project estimated there were stakeholders is needed to 21.7 million open resolvers online (Prince 2013b). But it was Spamhaus, not the open resolver operators, that make controls more effective. bore the brunt of the DDoS attacks, pointing again to the challenge of incentivizing organizations to imple- Conclusions ment security standards when that investment does not directly benefit them. Improving cybersecurity best practices requires defining clearer guidelines with less onerous implementation, Lessons and Takeaways collecting better data on their efficacy, and fighting Several recurring themes and lessons emerge from the against the narrative that any given security incident is high-profile cybersecurity incidents of the past decade the result of one particular missing control. More than and the failure of best practice recommendations to pre- that, though, it requires a more comprehensive under- vent them. standing of the entire security ecosystem that these best First, it is often extremely difficult for organizations practices aim to strengthen, so that recommendations to navigate the many sets of security best practices both for merchants, nonprofits, and government agencies are because there are so many and because so few data exist not developed separately from those for DNS operators, to indicate which are actually effective at preventing or payment processors, or browser manufacturers. mitigating bad outcomes. So long as best practices are limited in scope to indi- Second, the uncertainty about which best practices vidual organizations and do not include mechanisms to to follow creates a loophole of sorts for breached organi- enable cooperation and support from all stake­holders, zations, such as the SCDOR and OPM, to blame other they will continue to serve only a narrow function agencies for failing to tell them exactly which security and defend against only a small subset of the stages of controls they should have been using. cyberattacks. Third, the TJX and SCDOR breaches show that References regulators and courts are often reluctant to close the loophole by clarifying the security expectations for firms Boies D. 2014. RE: Your possession of privileged and/or con- because they do not want to be responsible for dictating fidential information stolen from Sony Pictures Entertain- those expectations. Although this approach makes clear ment. Deadline, Dec 15. that there is no set combination of controls that obvi- Chaffetz J, Meadows M, Hurd W. 2016. The OPM Data Breach: ates an organization’s liability, it makes it more difficult How the Government Jeopardized Our National Security for for organizations to determine which recommendations More than a Generation. House Committee on Oversight they should follow. and Government Reform, 114th Congress. Washington. The 26 BRIDGE

Hoogstraaten H, Prins R, Niggebrugge D, Heppener D, Verini J. 2010. The great cyberheist. Times, Nov 10. Groenewegen F, Wettinck J, Strooy K, Arends P, Pols P, Verizon. 2019. Data Breach Investigations Report. New York. Koupprie R, and 3 others. 2012. Black Tulip report of the Wolff J. 2016. Perverse effects in defense of computer systems: investigation into the DigiNotar Certificate Authority When more is less. Management Information Systems breach. Delft: Fox-IT BV. 33(2):597–620. Mandiant. 2012. South Carolina Department of Revenue: Wolff J. 2018. You’ll See This Message When It Is Too Late: Public Incident Response Report. Alexandria VA. The Legal and Economic Aftermath of Cybersecurity Mandiant. 2013. APT1: Exposing One of China’s Cyber Breaches. Cambridge: MIT Press. ­Espionage Units. Alexandria VA. Wolff J, Lehr W. 2018. Roles for policy-makers in emerging Prince M. 2013a. The DDoS that knocked Spamhaus offline cyber insurance industry partnerships. TPRC46: Research (and how we mitigated it). Cloudflare Blog, March 20. Conference on Communications, Information and Inter- Prince M. 2013b. The DDoS that almost broke the internet. net Policy, Sep 21, Washington. Cloudflare Blog, March 27. Zetter K. 2014. Countdown to Zero Day: Stuxnet and the Schwirtz M, Goldstein J. 2017. Russian espionage piggybacks Launch of the World’s First Digital Weapon. New York: on a cybercriminal’s hacking. New York Times, March 12. Crown Publishing Group. We believe it is critical to involve and work with our community as much as possible to support the mission of the university.

Cybersecurity in Higher Education: One University’s Approach

Christian Hamer

Universities tend to be complicated organizations, diverse and decentral- ized, with a number of business units. The analogy of a “miniature city” is appropriate: Universities have housing, dining, retail operations, hospitals, power and other utility plants, and even police forces with real jail cells. These operations come with their own information technology systems, risks, and compliance regimes, all of which are in addition to the student, Christian Hamer is chief research, and administrative data that are core to supporting the institution’s information ­security ­officer mission of teaching and research. at Harvard University. Universities thus have a vast array of systems and data that must be protected. In addition, faculty or administrators may be targets for cyber­ attackers because of the research they do, the organizations with which they are affiliated, or unpopular opinions that they share publicly. The challenge is to apply appropriate protection to the data, systems, and people without obstructing the school’s mission.

Types of Cyberattacks and Cyberattackers Cyberattacks can be categorized into two types: unauthorized access and business disruption. Unauthorized access may result in the theft or ­inappropriate exposure of confidential information. Business disruption usually involves rendering systems or data inaccessible or altering them in some way. The 28 BRIDGE

Cyberattackers can be categorized into four types, First, a risk-based approach is appropriate. What does based on their motivations. Nation-state attackers such an approach mean or look like in practice? At are interested in espionage and/or disruption. Cyber­ Harvard, we have created an annual process to gather criminals are interested in financial gain. “Hacktivists” information about risks from numerous sources across and terrorists are motivated by their cause. And hobby- the university: the Institutional Risk Management pro- ists are in it for their own entertainment. While there gram, a self-assessment process, our faculty and research are some groups that blur the lines a bit, especially in communities, and a team that monitors and responds the nation-state and cybercriminal areas (e.g., some to cybersecurity incidents. We analyze the information nation-states have pursued financial gain via cyber­ and use it to evaluate and update, as appropriate, our attacks), most attackers fit into one of these categories. service catalogue and our project roadmap each year. Historically, nation-states have had access to the We use an industry-recognized framework to guide our most sophisticated tools and techniques, followed by program. There are many available; the NIST Cyber- cybercriminals. However, advanced tools are becoming security Framework, ISO 27000 series, and COBIT more available to the general public, making it easier for are among the most popular. Harvard uses the NIST novices to carry out attacks that once required a high Cybersecurity Framework (CSF),1 which covers five level of sophistication. functions: identify, protect, detect, respond, recover. To help prioritize which program elements to address first, Elements of a University Cybersecurity we use the Center for Internet Security’s Critical Secu- Program rity Controls (CIS Controls),2 which map to a subset of Universities may be subject to each type of attack the CSF functions. and targeted by all of the groups. Furthermore, there Whichever framework one chooses, it is critical to do are constantly new threats to cybersecurity: every day the basics first. While that statement may sound obvi- new vulnerabilities are discovered, as are attacks that ous, it can be easy to get lost amid the challenges of exploit them (often with confusing or scary names, such the latest attack or product and ignore the importance as “dragonblood”) and new groups thought to be behind of cybersecurity “blocking and tackling”: understand- them. It can be very difficult to know what to worry ing the computer and software assets that must be pro- about, let alone keep up with the latest attacks. tected, keeping them protected and regularly, and ensuring strong identity and access management processes. Advanced tools are Finally, we believe it is critical to involve and work with our community as much as possible. We view our becoming more role as enabling the mission of the university. Therefore, we need to devote time to ensure that we understand available to the public, what our partners in the community are trying to accom- making it easier to carry out plish, what their challenges are, and how we can help them meet their goals securely. This approach is much attacks that once required a more effective than being perceived as a barrier,­ and is high level of sophistication. critical to successfully partnering with our community. Solutions That Work In cybersecurity efforts to defend a university’s data, Among hundreds of products, technologies, projects, systems, and people, the idea that “one size can fit all” and initiatives, three stand out as the most effective is unrealistic. But the problem can be made manageable in our environment: multifactor authentication, end- by breaking the complexity into simpler subcomponents point detection and response, and end user awareness. (e.g., based on type of attack or attacker), using con- I will describe each, explain why we implemented it at sistent, repeatable processes to understand risk, using Harvard, and report what results we observed. Every frameworks to guide the selection of controls, focusing on the basics, and involving the whole community in 1 https://www.nist.gov/cyberframework the process. 2 https://www.cisecurity.org FALL 2019 29

environment is different, of course, and these may not Our last challenge was to make sure that our commu- be appropriate in other environments, but they have nity understood both why the new approach was impor- proven very effective in ours. tant and that it would be easy for them to use. Most of the community wasn’t aware of the attacks we were Multifactor Authentication experiencing and, if they were aware, didn’t think they could or would be a target. We changed that by relating What Is It? Why Use It? anonymized stories of real incidents that had happened Three “factors” can be used to authenticate the user of to others on campus, and made it clear what might be a computer or application: “something you know” (e.g., at stake for them personally. Then we talked about how a password), “something you have” (e.g., a phone or easy and unobtrusive the solution was, addressing some token), and “something you are” (e.g., a fingerprint). of the perceived pain points we had heard about. Multifactor authentication (MFA) requires two or more Finally, we brought the solution to the community of these factors for a user to log in to a computer or in the form of clinics across the university to ensure application. Multiple versions of the same factor (e.g., that those who wanted help with onboarding had very security questions in addition to a password—both easy and convenient access to it. In addition to the “something you know”) are not, by definition, MFA. clinics, we provided documentation and support. We Over the past couple of decades, time-based one-time ­onboarded some 65,000 members of our community in password tokens that generate a different number every about seven weeks. minute were the most well-known implementation of “something you have,” used with a password (“something you know”) to provide a second authentication factor. Today, mobile devices are often used instead of a token, People generally through a smartphone application or even a text message. want to do the secure thing At Harvard, we implemented MFA because we had a problem with accounts compromised by phishing, pass- and the best way to leverage word reuse, and brute force (a trial-and-error method of password guessing). While there are means to address that intent is to make it easy each of these issues, we didn’t think any of them would for them to do so. be as effective or efficient as adding a second factor to passwords for authentication. Our success was largely due to our focus on the user How to Get User Buy-In experience. This project demonstrates that people gen- Implementation of MFA was a big change for our commu- erally want to do the secure thing and the best way to nity, so we strongly emphasized the user experience. This leverage that intent is to make it as easy as possible for focus started with the name: We called the new approach them to do so. two-step verification because that’s the term Google had The problem we set out to solve was that of com- used and it was familiar to at least some in our commu- promised accounts. The results have been exactly as nity. There was no reason to introduce another technical we hoped: In the nearly three years since we rolled out term when we could use a familiar one. MFA, the number of protected accounts that have been The next challenge was with onboarding. During compromised is almost zero. user testing with the native experience offered by our ­vendor, it became clear that it was not simple enough Endpoint Detection and Response and would not allow us to deploy at scale without a negative impact on the community. So our Identity Detection Challenges and Access Management team developed a simpler and Like most organizations of a few years ago, we relied on ­easier interface that they integrated with the vendor’s various configurations of antivirus and antimalware to product. Once we had simplified the experience as protect our systems and as a means to detect intrusions. much as possible, we invested a lot of time and effort While these technologies were never perfect, they in clear and complete documentation in a variety of seemed adequate for detecting simple attacks. However, ­formats, from checklists to videos. most of them are based on the concept of “enumerating The 30 BRIDGE badness”: they use cryptographic signatures of known us to take steps to stop the activity before the attackers malicious software as a means of detection. Such detec- can move to their ultimate targets. An important fea- tion requires that someone has already identified the ture is that EDR has no impact on our users unless there software as malicious. It also means that the databases is a real security issue. of known malicious software will continue to grow at an While EDR may be a point-in-time technology that accelerating rate. is replaced in the future, it has earned its place on this This approach provides attackers with at least two list by helping us detect and quickly respond to sophis- opportunities. The first is to slightly modify their mali- ticated attacks significantly better than any other tech- cious software so that its signatures go from “known nology we have tried and without any negative impact malicious” to “unknown.” In fact, there is a category on our community. of software (called “packers”) that obfuscates malicious software so that it will not be detected by signature- End User Awareness based tools. End user awareness has long been a controversial topic in cybersecurity circles. People often say that “users are the weakest link,” and it is true that many attacks focus EDR provides critical on end users (“phishing” may be the most well known of them). But we have found it valuable to treat our com- early warning of malicious munity as a resource and a partner rather than consider activity and allows us them “the weakest link.” to take steps to stop it. From User Awareness to Action We know that our community members want to do the right thing and just need the proper resources to know The second opportunity for attackers is to “live off the what the right thing is and how to do it. Our goal is to land”: to use the tools and accounts of legitimate system identify a small set of behaviors that we can influence administrators (used to operate and maintain systems) to significantly increase security outcomes. We work on to attack the systems. This is a practice favored by more influencing behavior because awareness without action sophisticated attackers and against which traditional does no good. We called our campaign “Small Actions, antivirus and antimalware are completely ineffective. Big Difference” to emphasize the simple things people can do to make themselves a lot more secure. Our Experience with EDR We adopted the Fogg Behavior Model3 as a framework We confronted a series of attacks that used both of these for the campaign. According to this model, ­behavior techniques and quickly realized that we lacked visibil- change requires motivation, ability, and prompts. While ity into when or where the attacks were happening. At the prompts are important—users have to recognize the the same time, new endpoint detection and response situation—we have found that the motivation and ability­ (EDR) products were evolving. These products ana- are the components on which we need to focus the most. lyze the behavior of software, not just its cryptographic To ensure that we provide users appropriate motiva- signature, and look for anomalies and patterns that tion to take a desired action, such as applying updates are indicative of malicious activity. That makes them when they are available, we highlight the benefits to equally adept at catching both malicious software that the user. Emphasis on the personal benefits of a particu- has been slightly modified and attackers using built-in lar action has been the most effective approach for us. tools for system administration in malicious ways. When we deployed EDR on our computer systems, it Realistic Requests for Action did two things. First, and most importantly, it gave us the The “ability” component of influencing behavior visibility we needed into the kinds of malicious activity addresses two questions, an obvious one and a more described above. Second, it highlighted how poor a job subtle one that can be overlooked. The obvious ques- the more traditional protective tools were doing. While tion is “Does the user have the skills and abilities to take EDR doesn’t always stop attacks on its own, it provides critical early warning of malicious activity. This allows 3 https://www.behaviormodel.org/ FALL 2019 31

the desired action and have we made the process easy ized access attacks. However, there are no “magic silver enough that s/he can follow it?” This again speaks to the ­bullets” in information security, so it is not a surprise to criticality of good user experience in fostering security. find that this technology has flaws that are starting to be The more subtle question is “Is what we are ask- exploited. ing realistic?” For example, the advice “don’t click on MFA implementations that use a phone call or text links in emails or open attachments” may be realistic message are vulnerable to attacks in which criminals for some, depending on their job function, but it is not trick a service provider into moving a realistic for most people. We always want to make sure number to a different phone. Attacks like these have we do not provide advice that sounds simple but is effec- been responsible for the losses of large sums of crypto- tively impossible to follow. currencies (Chavez-Dreyfuss 2019). Though less com- Asking the community to “click wisely” is an impor- mon, attackers have also set up fake portals to capture tant part of our awareness campaign. Although it will and “relay” MFA responses, and it is likely these will never be 100 percent effective, it is possible to enlist occur more often. As these attacks evolve, technologies the people who do recognize phishing emails to protect will change to phase out phone calls and emails in favor those who do not. When even one person reports these of more secure means of authentication. emails to us, we can take technical steps to protect the Business disruption attacks typically destroy data entire community. Now thousands of messages are for- and systems, as happened in the well-publicized Sony warded to us each month and fed into an automated ­Pictures Entertainment attack of 2014 (Peterson 2014). processing system to prioritize the most important ones Business disruption is also the effect of ransomware, for immediate action. wherein files are locked by an attacker and promised to be returned in exchange for payment, often in crypto- Talent and Collaboration currency that is difficult to trace. Recruitment and retention of talented people are a challenge in cybersecurity. One of the most effective ways to meet that challenge is to look for people who We work on influencing have diverse backgrounds and experiences and can help find novel solutions to problems. behavior because Because universities, given their scope and scale, offer some of the most interesting problems in cybersecurity­ awareness without action and have a huge spectrum of systems con­nected to their does no good. networks, they offer a variety of challenges for those interested in cybersecurity. And it’s in keeping with the mission of higher education to invest in training and The next iteration of these attacks is likely to be those development. The diversity of challenges and focus on that alter data in subtle but important ways. Recently, professional development are among the benefits that researchers used artificial intelligence (AI) to add the universities can offer information security professionals. appearance of cancerous regions to 3D CT scans that Universities also value collaboration and information fooled medical professionals (Mirsky et al. 2019). Such sharing. In my experience, those in higher education attacks will probably become more common, so the are willing to take time to help others learn, within industry needs to increase efforts to protect and prove the team, across departments, or across universities. data and system integrity. Higher education has a formal Information Sharing and Vendors in the cybersecurity space have been pro- ­Analysis Center (ISAC) that is used to exchange infor- moting AI and machine learning as the solutions to mation and best practices. The spirit of collaboration today’s and tomorrow’s problems. There are some prac- and sharing is one of the things that I and my colleagues tical applications of machine learning to analyze large most treasure about higher education. datasets and produce actionable information, and these technologies promise to make cybersecurity analysts What’s on the Horizon? much more productive. It is natural, then, to expect I mentioned above that multifactor authentication that attackers may use the same techniques to make was an effective means to prevent certain unauthor- their tools and attempts more effective. The 32 BRIDGE

Conclusion path to success is in simplifying the landscape, making The challenge of information security in higher educa- good security easier, and identifying and executing on tion is to protect the critical data, systems, and people the most important priorities. in support of—and without obstructing—the mission of References teaching and research. To confront that challenge, the information security team at Harvard tries to simplify Chavez-Dreyfuss G. 2019. US investor awarded $75 million the complexity, use a repeatable risk-based approach in cryptocurrency crime case. Reuters, May 10. to identify and mitigate risks, and use a framework to Mirsky Y, Mahler T, Shelef I, Elovici Y. 2019. CT-GAN: organize and guide controls, focusing on the basics and ­Malicious tampering of 3D medical imagery using deep involving the community in the process. One of the learning. 28th USENIX Security Symposium, Aug 14–16, most important contributing factors to our most success- Santa Clara. Online at https://arxiv.org/pdf/1901.03597. ful projects has been ensuring a good user experience. pdf. With the pace of change in cybersecurity continually Peterson A. 2014. The Sony Pictures hack, explained. increasing, and new threats always on the horizon, the ­Washington Post, Dec 18. Efforts to address cybersecurity challenges require theoretical perspectives, practical and organizational approaches, and policy understanding.

Policy Dimensions of Cybersecurity Engineering Challenges

Fred B. Schneider and Lynette I. Millett

Computing systems are increasingly subject to attack in support of criminal activities as well as nation-state espionage, sabotage, and now information- influence campaigns. New technical developments are providing ingredients Fred B. Schneider for better defenses, but there is still much work to be done. However, a focus only on the technical aspects of cybersecurity will produce solutions that are unlikely to be effective in practice. Organizational, social, economic, and policy issues must be considered in concert with any technical developments. Case studies are one way to understand the critical role of nontechnical issues in what, at first, appear to be technical matters. Three are discussed in this paper: quantum-resistant encryption (NASEM 2017), managing data breaches (NASEM 2016), and microarchitectural vulnerabilities in proces- sors (NASEM 2019a). Each was the subject of a workshop organized by the National Academies’ Forum on Cyber Resilience (www.cyber-forum.org).

A Goal: Trustworthy Systems Lynette I. Millett For a system to be considered trustworthy, stakeholders require a basis to believe that a system will do what is expected and not do the unexpected.

Fred Schneider (NAE) is the Samuel B. Eckert Professor of Computer Science in the Department of Computer Science at Cornell University and chair of the Forum on Cyber Resilience, Computer Science and Telecommunications Board, National Academies of Sciences, Engineering, and Medicine. Lynette Millett is director of the forum. The 34 BRIDGE

Cybersecurity is the dimension of trustworthiness con- come at some cost, though—the mechanisms themselves cerned with resisting attacks. Expected and unexpected need to be secure and additional assumptions might have behaviors here are often characterized broadly in terms to hold to ensure their correct operation. of three classes of properties: With this approach, design choices can be justified, as befitting an engineering discipline. As in other fields of • Confidentiality. Which principals are allowed to learn engineering, design will be an iterative process, deemed what information or, equivalently, what must be kept finished only when the remaining assumptions are secret? (believed) difficult or unlikely to be violated. • Integrity. What changes to information and uses of resources are allowed? Quantum-Proof Encryption and Cryptoagility Nearly all computing systems in use today rely on crypto­ • Availability. When must inputs be read and outputs systems to protect confidentiality and integrity of infor- produced? mation, whether that information is “at rest” (i.e., in Whether a system satisfies these properties depends some form of storage) or “in motion” (i.e., in transit on a on the soundness of assumptions made by designers, network). A few public key cryptosystems are prevalent, developers, and users. Moreover, by making additional and the security they provide depends on an assumption assumptions about the deployment environment, it that specific mathematical computations, such as fac- generally becomes easier to build a system, although toring or computing discrete logarithms on sufficiently assumptions can have cybersecurity consequences. For large numbers, are computationally infeasible given the example, if a component behaves as expected only processing power that may be available to an adversary. while an assumption holds, then an attacker can cause Based on current mathematical understanding, this is a disruption by falsifying the assumption. safe assumption for digital computers that can be built today and are expected in the future. Even though digi- tal computers are likely to get ever more powerful, they For a system to be will not have the capacity to factor the large numbers used in public key cryptosystems. considered trustworthy, The Threat of Quantum Computers it must do what is expected A sufficiently large general-purpose quantum computer, if it could be built, would invalidate assumptions about and not do the unexpected. the difficulty of performing the mathematical opera- tions that underpin today’s widely used public key algo- Other cybersecurity consequences of assumptions are rithms. For example, if a powerful quantum computer more subtle. For instance, to express expectations about could be built (NASEM 2019b), any actor could use it system behaviors in terms of operations and interfaces (as to execute Shor’s algorithm (Shor 1994) to factor large is common) is to make an implicit assumption that an integers. This would be detrimental to both network attacker’s actions are limited to certain restricted modes communications and the protection of long-term data of access for controlling the system or for learning its state. encrypted and stored using algorithms that depend on In summary, assumptions create room for vulnerabilities. the difficulty of factoring large integers. The possibility The design of a secure system can be viewed as an of breakthroughs in quantum computing is thus cause exercise in identifying assumptions and assessing whether­ for concern. researchers are developing they reflect reality and whether they can be violated by new public key algorithms that are resistant to crypto- motivated adversaries with certain capabilities. Security analysis by adversaries using any combination of classi- mechanisms can create environments where stronger cal or quantum computers. assumptions hold (e.g., because a broader­ range of behav- The good news is that it appears that such encryption iors are precluded or handled appropriately) and, there- algorithms can be built and with acceptable performance fore, some component runs in a more benign setting than on modern computers. The bad news is that simply it would have absent those mechanisms. The improved having quantum-resistant encryption algorithms avail- environment created­ by such security mechanisms does able is not enough. Installed software must use them, FALL 2019 35

requiring upgrades to an enormous amount of software. tant nontechnical factors come into play, too. Global And those upgrades will not be straight­forward. For one platform companies—even those based in the United thing, cryptographic keys and encrypted messages will States—respond to the needs and requirements of their undoubtedly be different sizes with these new crypto- customers around the world. Some of these customers systems, potentially requiring changes to any software may be governments, which may not want to use the that stores keys or manipulates encrypted messages. same cryptographic tools as others. Other customers Protocols to set up encrypted connections or do other may be subject to foreign government regulations aimed provisioning also have to be upgraded. at either improving security (e.g., by prohibiting risky In short, transitioning the internet ecosystem to practices) or undermining it (e.g., by mandating back- ­quantum-resistant cryptosystems will not simply be doors or other sorts of access). a matter of replacing the few routines that perform encryption and decryption; the upgrade likely will require making and distributing changes to all software that uses these routines, too. The general consensus Most software systems now in use were designed to is that it takes about allow upgrades after deployment. But few were designed to readily support cryptoagility, wherein encryption and a decade to substantially decryption routines (and perhaps a small amount of other code) are all that must be updated to replace a roll out a new cryptosuite cryptosystem. and retire the old one. Previous Cryptosystem Challenges History offers insight into the costs and challenges In the interests of its national security, a country may of replacing a cryptosystem widely used by the inter- wish to regulate surveillance-resistant cryptosystems or net ecosystem. The TLS (Transport Layer Security) insist on its own locally created cryptosuites—for exam- proto­col was standardized in 1999 (and version 1.3 was ple, to facilitate law enforcement access to encrypted recently finalized) as a revision of the early SSL (Secure content or to enable government surveillance of net- Sockets Layer) protocol; TLS encrypts all types of inter- work communications. A platform provider could be net traffic. Yet there are still systems in place that sup- caught in one of the following binds if the cryptosystem port SSL 2.0. So, even after two decades, some systems it uses to protect its software upgrades is not compliant have not been fully transitioned. The general consensus with a nationally mandated cryptosuite: among experts is that it takes about a decade to substan- • For consistency, scale, and to avoid having to trust a tially roll out a new cryptosuite and retire the old one. customer’s government, a company would want to dis- The experience with TLS suggests that, if usable tribute software upgrades using its own ­cryptography quantum computers may be achieved within a decade, and keep those keys secret. The company would now is the time to start upgrading to quantum-­resistant find it unacceptable to use a cryptosystem it did not cryptosystems. The most sensible course would be to trust or to provide a government with keys used by upgrade systems to improve cryptoagility, because even if its customers’­ systems, because that would risk losing quantum computers never become available, cryptosys- control of both the integrity of its installed systems tems might need to be changed to defend against attacks and the confidentiality of its intellectual property. developed based on new insights in the underlying mathematics or on bugs in the software implementation. • A software upgrade capability would have to be able to change locally installed cryptosuites. Govern- National Security Concerns ments, fearing supply chain attacks, would find that Efforts to update the protocols and software under­ unacceptable, since a (potentially foreign) company pinning the internet ecosystem bring many technical would then have control over what cryptography the and operational challenges to software producers and platform uses and would have the capability to either their customers. And if the upgrades are connected to a install backdoors for exfiltrating content or remove competitive or national security advantage, then impor- government-provided backdoors. The 36 BRIDGE

There are thus at least two parties—a company and • In early 2019, Marriott International revealed that a government—neither comfortable with the other several million of its customers’ unencrypted passport having needed control. Yet one of them must have numbers were stolen in a data breach that exposed that control. In addition, end users and companies that personal information of nearly 500 million indi­ provide networking capabilities may have interests that viduals (Gressin 2018). conflict with each other, with software companies, and/ • Breaches of credit card information at major retail- or with governments. A technical solution might satisfy ers are now so common that the process for issuing all these constraints, but none is currently known. Most new cards has become routine, often completed even likely, addressing these and other policy and interna- before a consumer is aware of a compromise. tional complications will require not just new forms of cryptoagility but also new thinking about what entities In these examples, recovery would superficially appear should have jurisdiction over encryption policies and to be straightforward to implement. Marriott said that what should be the goals of those policies. New poli- it will cover the cost of new passports when fraud can cies and norms formulated by international standards be shown. Banks incorporate the cost of frequent card ­bodies as well as other regulatory and political entities replacement into their business model. However, pass- are likely to be part of a solution. port replacement does not remedy the harm if the theft was undertaken to track movements of certain passport Managing Data Breaches holders. And there remain unaddressed costs to con- sumers for credit card disclosures, given the time it takes Two Approaches: Prevention, Recovery to correct and update accounts. Prevention, which takes the conservative stance of pro- hibiting actions that could violate some security policy, The Need for Other Approaches is one approach to managing the risk of cyberattacks. Identity theft sometimes goes well beyond the dis- With the other, recovery, the risk is made tolerable by closure of a single identifying number, and with not having the means to mitigate the effects of an attack. just financial but all manner of other harms to indi- Recovery typically involves both technical mechanisms viduals and institutions, as illustrated in the following to detect attacks and to return a computing system to examples: a preattack state, and nontechnical means to reverse effects of the attack on the system’s environment. • The breach of sensitive security clearance informa- tion at the Office of Personnel Management (OPM) in 20152 caused harm to national security, not least in that it revealed the names and personal networks What entities should have of individuals with clearance to the attacker. jurisdiction over encryption • Exposure of user identities and profiles in the Ashley Madison data breach in 2015 (Krebs 2015) caused policies and what should be people to suffer humiliation and reputational harm the goals of those policies? (but not identity theft). • An Equifax data breach in 2017 revealed the social security numbers and birthdates of nearly 150 million Prevention receives the lion’s share of attention in users of the credit bureau, undermining confidence in the cybersecurity research community, but the inevita- the company itself and in the entire credit manage- 3 ble failure of any defense implies that even prevention- ment infrastructure. based defenses benefit from implementations of recovery measures.1 Data breaches and identity theft commonly 2 OPM Cybersecurity Resource Center, Cybersecurity Inci- inspire discussions about recovery, with incident reports dents: What Happened (https://www.opm.gov/cybersecurity/­ like the following now a regular front page feature: cybersecurity-incidents/). 3 The US Federal Trade Commission provided guidance for con- 1 The challenges associated with supporting recovery were sur- sumers and business owners in a series of blogs, September 2017– veyed in a recent workshop (NASEM 2018). June 2018 (https://www.ftc.gov/equifax-data-breach). FALL 2019 37

• A national database in Singapore containing the The speculation allows processors to accomplish useful names and addresses of more than 14,000 people who work rather than idling, and this allows for ­parallel work. had tested positive for HIV was breached in early Results that are not needed because the program follows 2019 and the data were made public (Ives 2019). a path other than the predicted one are simply discarded. Unfortunately, instructions that are erroneously exe- In each example, approaches such as replacing credit cuted during speculative execution exhibit side effects cards, freezing credit accounts, or even remedying sig- by affecting resource availability or changing the state nificant identity theft are not sufficient to resolve the of the processor’s cache. Spectre and a related vulner- harms caused. The OPM example is especially problem- ability named Meltdown (Lipp et al. 2018), both dis- atic because security clearance applications hold vast covered in 2017 and revealed publicly in early 2018, amounts of personal and sensitive details, including exploit these side effects to deduce private memory con- information about family and social networks. People tents. Since then, numerous other attacks have been who provided this information were assured that the described that take advantage of differences between government would keep it confidential. Some indi- the architectural properties that programmers assume, vidual or entity now has a vast trove of information on the architectural specifications, and the actual micro­ people in positions of trust with the US government. To architectures of modern processors. remedy that national security harm in any meaningful way may not be possible. The straightforward, and now reflexive, responses after a data breach—replacing identifier numbers, The toolbox of responses is hardening­ systems, freezing certain credit accounts, notifying users—are based on an assumption about pos- insufficient to cope with the sible harms. But as should now be clear, that assumption scale, scope, nature, and is unsound: The toolbox of easy responses is insufficient to cope with the scale, scope, nature, and duration of duration of potential harms potential harms from many major data breaches. Furthermore, new kinds of data manipulation and from many major information distortion are now being deployed on social platforms, the effects of which may often be indi- data breaches. vidually intangible but globally intractable and socially toxic. The credibility and/or targeting of these postings Although some limited mitigations have been is enhanced by attacker access to information gleaned deployed, satisfactory comprehensive technical solu- from data breaches—data stolen in one breach may be tions for these kinds of vulnerabilities do not exist; used in another. research is ongoing. Moreover, there is some urgency in Policy, legal, and regulatory approaches are needed finding mitigations, because speculative execution is an to address the myriad ways in which data breaches can important performance feature of all modern processors, cause harm well beyond an individual’s credit rating. and solutions are likely to require hardware changes that Vulnerabilities in Computer Architectures take a long time to deploy. Nearly all modern comput- ing systems are vulnerable to these kinds of hardware- The recent discovery of the security vulnerability Spec- focused attacks, although software bugs are widespread tre (Kocher et al. 2018) and others (Canella et al. 2018) and often easier to exploit, so for the time being, easier- showed that software engineers and compiler designers to-exploit avenues for attack are plentiful. have, for the past two decades, been making unsound assumptions about what computers do—and don’t do— Policy and Practical Challenges when executing programs. Independent of technical mitigations for existing pro- Spectre exploits speculative execution, a micro­ cessors, vulnerability and the orchestration of any asso- architectural processor performance optimization ciated upgrades pose some formidable policy dilemmas. through which instructions are executed for ­predicted execution paths before it is known with ­certainty • Disclosure of a vulnerability is itself a vexing issue. ­whether the corresponding instructions will be ­executed. Who should be notified during the initial ­embargo The 38 BRIDGE

­(confidentiality) period, and, more controversially,­ who disclosure processes, especially for vulnerabilities whose should not be informed? The processor­ manufacturer?­ mitigations affect multiple layers of the computing stack Users? Wholesale customers of the manu­facturer? (e.g., hardware, operating system software, applications, Operating system vendors? Software developers? and cloud service implementations) and could therefore Cloud computing vendors whose products depend on require assistance from stakeholders ranging from small effective isolation? Disclosing to everyone who may software companies to multinational corporations to have a reasonable need to know can be dangerous­ national governments. because notifying too many people during an ­embargo Spectre and its ilk result from the success of com- period can result in attackers finding out about a vul- puter engineering itself—processor innovations driven nerability while defenders are in the dark. by performance needs have quietly and inadvertently undermined basic software engineering assumptions • Who is responsible for the repairs? For vulnerabilities about how data are handled. Those now incorrect discovered by those working on offense (e.g., - assumptions can be exploited, leading to the possibil- ligence agencies and companies that supply them ity of an attack that strikes at the heart of the interface with zero-day exploits4), the “embargo” objectives are between software and hardware. inverted. The goal is to maximize the power of the exploit, which includes keeping the bug from being What Next? patched. Engineering any artifact involves decisions about trade- offs, and these decisions are made relative to expecta- tions about the environment in which the artifact will Notifying too many people be deployed. Changes to the environment make it ­crucially important to revisit and change a design. about a vulnerability Computing systems and the internet ecosystem are a case in point. In the early days of computing, the envi- during an embargo period ronment in which computer systems were deployed was can mean attackers find out assumed to be relatively benign. Performance, time to market, and features were paramount; security was a about it while defenders concern in only a very small number of cases. But as dependence on computing systems—by nations, com- are in the dark. munities, and individuals—has grown, so have the threats. Assumptions about the environment that once • Because military and government computers use were acceptable are no longer sound, and can have modern processors, vulnerabilities constitute ­national ­dangerous consequences. Insofar as assumptions beget security risks from a defense perspective as well as vulnerabilities, old designs need to be rethought. opportunities to attack vulnerable systems used by An added challenge is the increasing sophistication rivals. When should governments be notified? Which and capabilities of adversaries. New assumptions need governments? There are additional policy­ challenges to be robust against not only today’s but also tomorrow’s when vendors are expected or required to inform a adversaries, because components built today will remain government about vulnerabilities. fielded for a long time and will become increasingly dif- ficult to replace. A recent workshop on this topic (NASEM 2019a) Security trade-offs are not just technical choices; covered the technical dimensions and explored how they have important policy implications, too. Efforts to researchers, manufacturers, and vendors managed the address underrecognized and multidisciplinary aspects of disclosure for Spectre. The workshop included discus- evolving cybersecurity challenges will require theoretical sion of the challenge of creating effective vulnerability perspectives (e.g., taxonomies of harm and remedies for data breaches, analyses of what system parameters affect 4 A zero-day exploit is a cyberattack that occurs before a software weakness becomes known to the software provider who would be what sorts of recoverability and update capabilities) as responsible for providing a mitigation. well as practical and organizational approaches (e.g., FALL 2019 39

how does the anticipated lifecycle affect the organiza- Gressin S. 2018. The Marriott data breach. Consumer tional structure that maintains the system; what mecha- Information blog, Dec 4. Washington: Federal Trade nisms are in place to ensure an orderly path to update ­Commission. cryptography suites when needed). Moreover, absent a Ives M. 2019. Singapore says records for 14,200 HIV patients, continuing dialogue across these disciplines, attempts at held by an American, were leaked. New York Times, Jan 28. solving cybersecurity problems are likely to fail. Kocher P, Genkin D, Gruss D, Haas W, Hamburg M, Lipp What’s needed are people who are not only expert M, Mangard S, Prescher T, Schwarz M, Yarom Y. 2018. in specific technical or policy matters but also comfort- Spectre attacks: Exploiting speculative execution. able in discussions concerning the entire spectrum of ­arXiv:1801.01203. technical and policy issues and solutions. The National Krebs B. 2015. Extortionists target Ashley Madison users. ­Academies’ Forum on Cyber Resilience is one such Krebs on Security, Aug 21. effort, but there is much ground to cover, so more efforts Lipp M, Schwarz M, Gruss D, Prescher T, Haas W, Fogh A, are needed. Horn J, Mangard S, Kocher P, Genkin D, and 2 others. 2018. Meltdown: Reading kernel memory from user space. Acknowledgments Proceedings, 27th USENIX Security Symposium, Aug Much of this paper is based on discussions in the 15–17, Baltimore. ­National Academies’ Forum on Cyber Resilience; NASEM [National Academies of Sciences, Engineering, and the authors are grateful to forum members for their Medicine]. 2016. Data Breach Aftermath and Recovery for thoughtful contributions at those meetings. Addi­ Individuals and Institutions: Proceedings of a Workshop. tional thanks are due to Paul Kocher, Jon Eisenberg, Washington: National Academies Press. and Emily Grumbling­ for their comments on a draft NASEM. 2017. Cryptographic Agility and Inter­operability: version of this paper. The forum is supported by the Proceedings of a Workshop. Washington: National National Science Foundation (award number CNS- ­Academies Press. 14194917), the Office of the Director of National NASEM. 2018. Recoverability as a First-Class Security Objec- Intelligence (award number 10004154), and the tive: Proceedings of a Workshop. Washington: National National Institute of Standards and Technology Academies Press. (award number ­60NANB16D311). We are grateful for NASEM. 2019a. Beyond Spectre – Confronting New Tech- their participation and vote of confidence in the work nical and Policy Challenges: Proceedings of a Workshop. and activities of the forum. Washington: National Academies Press. NASEM. 2019b. Quantum Computing: Progress and Prospects. References Washington: National Academies Press. Canella C, Van Bulck J, Schwarz M, Lipp M, von Berg B, Shor PW. 1994. Algorithms for quantum computation: Dis- ­Ortner P, Piessens F, Evtyushkin D, Gruss D. 2018. A crete logarithms and factoring. Proceedings, 35th Annual systematic evaluation of transient execution attacks and Symposium on Foundations of Computer Science, Nov defenses. arXiv:1811.05441v1. 20–22, Santa Fe. The massive scale and decentralized nature of the IoTT provide attackers with a large attack surface for exploitation.

Raising Awareness of Security Challenges for the Internet of Trillions of Things

John A. Stankovic and Jack Davidson

Computer security problems have evolved over the last 50 years from a minor concern to major operational risks. Every day new devices are added to the Internet of Things (IoT). Conservative projections have 50 billion John A. Stankovic devices on the internet by 2020, but—with autonomous vehicles, smart phones, smart wearables, smart cities, numerous other smart applications, and nanotechnology—we foresee an “Internet of Trillions of Things (IoTT)” before long. If computer security problems are formidable now, consider when there is an IoTT! The proliferation of devices and applications will give rise to many new complications and research challenges, especially in cyberphysical system (CPS) security. Because the smart devices of IoTT systems will be so numer- ous and easily accessible, and will interact directly with the physical world (including humans), they will exhibit tremendously large attack surfaces with increasing types and numbers of vulnerabilities. Attacks on these systems may cause the inoperability of major infrastructures such as transportation or Jack Davidson energy, great financial losses, and many other negative impacts, even death. CPS technology is required to build IoTT systems. It is therefore neces- sary to increase awareness of CPS security problems and to address them

John Stankovic is the BP America Professor and Jack Davidson is a professor, both in the Department of Computer Science at the University of Virginia. FALL 2019 41

CPS Attacks Physical Cyber

Cyberphysical

Insider Identity Supply Signal Network Malware threat spoofing chain jamming DDoS

Device Information Buffer Transduction spoofing disclosure overruns

Replay DoS Tampering SQL injection attacks

. . . Adversarial Control system . . . machine learning instability

. . .

FIGURE 1 Taxonomy of sample attacks on cyberphysical systems (CPS). DDoS = distributed denial of service; DoS = denial of service; SQL = structured query language. before trillions of devices are deployed with insufficient ing normal driving). This characteristic sets them apart security protections. from traditional IT systems, where confidentiality is In this paper we define a CPS security attack usually the most important property. ­taxonomy based on new problems for the cyber, physi- Figure 1 illustrates a taxonomy of CPS attacks. It does cal, and cyberphysical aspects of the IoTT, and discuss not show a complete range of attacks but rather pro- examples of new security problems for the physical vides examples in three categories: cyber, physical, and and cyberphysical­ areas. For each example, we explain cyberphysical. potential consequences and present approaches to solu- At the cyber layer, the IoT is susceptible to many tions. We do not discuss cyberattacks, such as network common types of attacks, such as malware and distrib- distributed denial of service and malware, as they are uted denial of service. A particularly serious concern well covered by existing literature. with the IoTT will be the timely application of critical patches and system updates, which often require tempo- CPS Attack Taxonomy rarily disabling system security protections. Given the Cyberphysical systems are engineered systems that are massive scale and decentralized nature of the IoTT, this built from, and depend on, the seamless integration update process provides an attacker with a window of of computational and physical components. They are vulnerability and a large attack surface for exploitation. often connected to the internet, with applications in Cyberphysical attacks combine software intrusion/ many domains, such as smart cities, health care, trans- alteration with effects on the physical aspects of a portation, energy, emergency response, agriculture, and system. Attacks by insiders, information disclosure, defense. CPS attacks can thus have serious and harm- replay, and denial of service (DoS) have been common ful physical results (e.g., an air bag being activated dur- and can now also be applied to the physical aspects of The 42 BRIDGE the IoT. Identity and device spoofing and control sys- delivered hardware/software platforms do not include tem instability are newer attacks, created—or signifi- hidden circuits or embedded software that can cause cantly increased in frequency—with the emergence of attacks. the IoT. With billions (or more) of IoT devices and easy access Many novel types of attacks have appeared at the to them, other types of tampering are also possible. For physical layer of systems. These include ways to disrupt example, an attacker can physically move sensors to systems by attacking different steps in the supply chain. an unwanted location, point a fixed-direction camera Attacks based on transduction (discussed below) are in the wrong direction, impede an actuator from its particularly debilitating. Physical tampering is a risk full range of motion, or jam wireless communications. because smart devices often operate in open environ- These changes may result in fires not detected, missed ments. And because most smart devices communicate detection of a serious crime at a previously monitored wirelessly, they are vulnerable to jamming. location, safety doors that don’t close properly, or com- plete inaccessibility of an IoT application system. Physical Attacks on the IoT Solutions for such attacks must be developed or improved. Unwanted movement of devices could Supply Chain and Other Tampering be detected with additional motion sensors or Many security solutions assume that hardware is trust- ­accelerometers. Correlation among data from a set of worthy, but with the common practice of outsourcing sensors could reveal that one sensor has been moved the construction of hardware platforms, the supply away from the others. Related sensing modalities (e.g., chain can be a source of security attacks (Ray et al. temperature, pressure, and volume sensors relate to 2018). Trojan horse circuits and embedded software each other by physics) could be used to detect attacks might be included in delivered products to cause harm on one modality. And frequency hopping, spread spec- or surreptitiously transmit data to an adversary. For trum, and other techniques can provide some resil- example, an internet router might not only transmit ience to the jamming of wireless communications. packets to the intended destination but also send copies­ to the adversary. Transduction Attacks One especially complex class of attacks for smart devic- es is transduction attacks, which exploit the physics and Many companies unintended functions of circuits and sensors to alter a automatically collect data sensor’s output (Fu and Xu 2018). for maintenance and Manipulation through Voice Recognition The Dolphin Attack (Zhang et al. 2017) uses an performance control. ­inaudible sound wave to trick a speech recognition system such as Siri, Google Now, or Alexa into taking Such data may be a source action that was not requested. It takes advantage of the of security attacks. fact that, while microphones are built to primarily hear the human voice, they can also detect (unintended) ­inaudible sounds, making them vulnerable to transduc- Compounding the problem is that many companies, tion attacks (Roy et al. 2017). such as those involved in communications and the Because more and more IoT systems have or are manufacture of printers, automobiles, and aircraft, want developing voice interfaces, the consequences of trans- to (or already do) automatically collect data for main- duction attacks are unbounded. The attacks may permit tenance and performance control. Such data may be a illegal entry to a location, open the door locks of a home source of security attacks. or business, or provide harmful advice via a medical cog- Supply chain attacks can affect all parts of society and nitive assistant. almost all applications: financial records and company Solutions must include better frequency filters and secrets can be stolen, automobiles and planes can be signal processing to avoid the appearance of ultrasound made to crash. New tools are needed to validate that resonances in the voice frequency range. FALL 2019 43

Backdoor Coupling The attacking device can act as a data source, pre- Another type of transduction attack is called senting fake data streams to the system, or even pretend coupling: signals enter a system indirectly via coupling to be a particular person and issue commands as if it between wires or components, so a sensor designed to were that person. Spoofing can cause an IoT system to detect one modality may be activated by another. For produce wrong, often safety-critical, results. For exam- example, it was shown that playing sounds embedded ple, an IoT-based process control plant may be errone- in a YouTube video allowed an adversary to control a ously informed that chemical vats are overheating and smartphone’s accelerometer, thanks to a mechanical shut them down, causing loss of revenue, or indicate coupling between the speaker and the resonant fre­ that they are operating well when they are not, resulting quency of the sensor (Fu and Xu 2018). This can have in overheating and even explosion. negative consequences for any application that relies on the accelerometer, such as a step counter, dead reckon­ ing location estimators, or a sensor that monitors an Adversarial machine learning elderly person’s level of activity. Most security solutions are ineffective for transduc- can cause misidentification tion attacks because they are designed for digital risks, not analog. Circuits must be manufactured to reduce the of a stop sign, with severe effects of resonance, increase the frequency of checking consequences for a sensor output by software, and enhance the layout of components on system boards to minimize unwanted self-driving car. coupling.

Cyberphysical Attacks Solutions require standard techniques such as authen- Types of security attacks that are exacerbated in the tication, encryption, and anomaly detection, as well as IoT are denial of service, spoofing, adversarial machine IoT-specific measures that coordinate among properly learning, and control system attacks. acting smart devices. The use of redundant sensors that are not accessible through the internet may also prove Denial of Service useful. A DoS attack diminishes or eliminates a system’s Adversarial Machine Learning ­capacity to perform its expected function. Hardware fail- ures, software bugs, resource exhaustion, environmental­ Machine learning (ML) is essential to the functionality conditions, or any complicated interaction between of many cyberphysical systems. For example, autono- these factors can cause a DoS. When a bug is detected mous vehicles use deep neural networks (DNNs) to attackers often use the internet to initiate DoS attacks. detect, identify, and locate objects in the environment As an example of a DoS in communications, ­attackers and navigate the vehicle. Deep learning algorithms are may induce a collision in only one byte of a trans­mission also used to analyze and recognize speech for voice-­ to disrupt an entire packet. A naïve link-layer imple- activated cyberphysical systems and to recognize people mentation may attempt retransmission repeatedly, cul- and objects in security systems. minating in the exhaustion of batteries in one or more The extensive use of ML algorithms has enabled a connected smart devices and disrupting system func- new type of CPS attack: adversarial machine learning. tion, such as transportation monitoring in a smart city. Attackers can develop adversarial inputs with small Solutions must detect such attacks and create power- (even imperceptible) perturbations that cause a trained aware smart devices that avoid using all the power when ML model to misclassify an object, such as a road sign under attack. (Eykholt et al. 2018); misidentification of a stop sign, for example, could have very serious consequences for Spoofing a self-driving car. In a spoofing attack, a person or program successfully Adversarial ML attacks can also target speech recog- masquerades as another to gain an illegitimate advan- nition systems (Carlini and Wagner 2018) and image tage. With the IoTT it could also be a smart device. recognition systems (Kurakin et al. 2017). A targeted The 44 BRIDGE attack causes the ML system to assign a specific (i.e., scheduling is often used to control nonlinear systems. targeted) label to the object; for example, an attack on Essentially, the system is controlled by a family of linear a voice-activated command and control system would controllers or gains, each of which is designed for a par- enable a command of the attacker’s choosing. Similarly, ticular operating region. Gain scheduling attacks can be a targeted attack on a facial recognition system that effected using techniques such as sensor spoofing and matches faces against a whitelist of approved people denial of service. (e.g., to control access for large events) could admit an Consider an autonomous aerial vehicle (UAV). It unknown, potentially malicious person. uses carefully constructed gains for operating modes Many cyberphysical systems (e.g., self-driving cars, such as takeoff, landing, cruising, or hovering. By tam- voice-activated command and control systems) can pering with the inputs, an attacker can cause a transition ­easily be acquired legally or illegally by attackers to carry­ from a gain that is appropriate for the UAV’s operating out black box attacks. A black box attack is defined as mode to one that is inappropriate. For example, when one that does not have direct access to the underlying the UAV is hovering, a change in the gain computed for ML model (as in a white box attack) to develop sophis- cruising could result in loss of the UAV. ticated attacks; the attacker can only deduce the CPS The ability to spoof a sensor reading or to delay operation by providing specific inputs and observing the receipt of a signal opens the possibility of a control output. Black box attacks on complex systems are more system instability attack. Many control systems are difficult than white box attacks, but they have been designed assuming that sensor readings are within cer- demonstrated in a number of domains. tain operating thresholds and that the communication channel to send both data and control signals operates as intended. By sending carefully constructed inputs using a replay attack, the adversary may make the con- A chemical plant control trol system unstable—and the system could enter a state system that becomes unstable where returning to a stable state is not possible. Similarly, using DoS techniques, an attacker could might rapidly open and cause a control system to become unstable by delay- ing packets that contain control information needed to close a critical valve, stabilize a system. The instability could result in severe causing it to fail. oscillations that could cause physical damage. For example, a chemical plant control system that becomes unstable might begin rapidly opening and closing a crit- Adversarial ML attacks are a relatively new CPS ical valve, causing it to fail. threat. Research is needed to understand them and Unlike purely cyber systems, cyberphysical systems to build robust ML models that are not susceptible to open the door to attacks that cause severe physical adversarial manipulation of the physical artifacts (e.g., ­damage—on par with the damage caused by kinetic signs, images, audio) that are inputs to the system. weapons. However, unlike kinetic attacks, CPS attacks can be stealthy and precise identification of the attacker Control System Attacks is often difficult. These attacks require a deep under- Control systems are a critical component of many types standing of the physics of both the process being con- of cyberphysical systems. Examples include industrial trolled and the logic that controls the equipment. A control systems, supervisory control and data acqui- well-publicized example of a CPS control system attack sition systems, autonomous vehicles, and medical is the Stuxnet attack on the Iranian Natanz enrichment devices. facility (Langner 2013). Sophisticated stealthy attacks on physical infra­ Instability and Physical Damage structure can also exploit the physics of the process In a control system attack, the adversary seeks to move being controlled. A compelling example is an attack the system from a region of stability to one of instabil- on an industrial pump in which the attack payload is ity where control outputs may fluctuate arbitrarily and a stream of cavitation bubbles created via malicious exceed normal operating parameters. For example, gain control of an upstream valve. Over time the stream of FALL 2019 45

­bubbles will pit the pump’s impellers and eventually of homogeneity keep the development of devices and cause the pump to fail (Krotofil 2017). systems from incorporating known security solutions. If these conditions persist and there are trillions of smart Protective Approaches ­devices, there may be widespread chaos and increased The attacks described in this section rely on mali- risks of physical danger. cious inputs that disrupt or hijack the control system. ­Standard software engineering techniques, such as References rigorous testing, can and do reduce the threat surface, Carlini N, Wagner D. 2018. Audio adversarial examples: but they often do not provide the necessary coverage— Targeted attacks on speech-to-text. Proceedings, 2018 especially for a complex system with a variety of sensors IEEE Security and Privacy Workshops, May 21–24, San and actuators. ­Francisco. An approach called fuzzing shows promise in uncover­ Eykholt K, Evtimov I, Fernandes E, Li B, Rahmati A, Xao C, ing CPS vulnerabilities not found by traditional tech- Prakash A, Kohno T, Song D. 2018. Robust physical-world niques. In fuzzing, inputs are automatically generated to attacks on deep learning visual classification. Proceedings, force coverage of unexplored code (Miller et al. 1990). 2018 IEEE/CVF Conf on Computer Vision and Pattern The technique is particularly applicable to cyberphysical­ Recognition, Jun 18–22, Salt Lake City. systems where the range of possible inputs is difficult to Fu K, Xu W. 2018. Inside risks: Risks of trusting the physics of enumerate or bound. sensors. Communications of the ACM 61(2):20–23. For stealthy physical attacks, solutions include redun- Krotofil M. 2017. Evil bubbles or how to deliver attack pay- dant sensors and consistency checks to detect a deterio- load via the physics of the process. Black Hat USA, Jul rating system. 22–27, Las Vegas. Kurakin A, Goodfellow IJ, Bengio S. 2017. Adversarial Summary examples in the physical world. 5th International Conf on The CPS-based IoTT presents an enormous increase Learning Representations, Apr 24–26, Toulon. in potential attack surfaces. Many of these systems will Langner R. 2013. To Kill a Centrifuge: A Technical Analysis interact with humans, further expanding the attack sur- of What Stuxnet’s Creators Tried to Achieve. Dover DE: face and resulting in significantly more vulnerabilities Langner Group. and potential negative impacts on society. If the past is Miller B, Fredriksen L, So B. 1990. An empirical study of the any harbinger of the future, the security attack-solution reliability of UNIX utilities. Communications of the ACM competition will continue. Highly inventive ­attackers 33(12):32–44. will exploit the physical, cyberphysical, and cyber Ray S, Peeters E, Tehranipoor MM, Bhunia S. 2018. System- ­layers to their advantage. Developers of smart devices on-chip platform security assurance: Architecture and vali- and smart applications must be aware of new classes of dation. IEEE Proceedings 106(1):21–37. potential attacks and build solutions for them as first Roy N, Hassanieh H, Choudhury RR. 2017. BackDoor: principles, not only after problems are uncovered. ­Making microphones hear inaudible sounds. MobiSys, Jun Some new solutions are promising, but of course they 19–23, Niagara Falls. will be useful only if actually implemented. Diverse Zhang G, Chen Y, Ji X, Zhang T, Zhang T, Xu W. 2017. techniques have proven helpful in computer secu- DolphinAttack: Inaudible voice commands. Proceedings, rity and should also help in the IoTT. However, too ACM Conf on Computer and Communications Security, often speed to market, cost in dollars, or the benefits Oct 30–Nov 3, Dallas. We describe cyberattack surfaces and potential solutions for securing connected and automated vehicles and transportation infrastructure.

Security of Connected and Automated Vehicles

Mashrur Chowdhury, Mhafuzul Islam, and Zadid Khan

Mashrur Chowdhury Mhafuzul Islam Zadid Khan

The transportation system is rapidly evolving with new connected and automated vehicle (CAV) technologies that integrate CAVs with other vehi- cles and roadside infrastructure in a cyberphysical system (CPS). Through connectivity, CAVs affect their environments and vice versa, increasing the size of the cyberattack surface and the risk of exploitation of security vulnerabilities by malicious actors. Thus, greater understanding of potential ­CAV-CPS cyberattacks and of ways to prevent them is a high priority. In this article we describe CAV-CPS cyberattack surfaces and security vulnerabilities, and outline potential cyberattack detection and mitiga- tion strategies. We examine emerging technologies—artificial intelligence,

Mashrur Chowdhury is the Eugene Douglas Mays Professor of Transportation, director of the Center for Connected Multimodal Mobility (C2M2), and codirector of the Complex Systems, Analytics and Visualization Institute, and Mhafuzul Islam and Zadid Khan are PhD students, all in the Glenn Department of Civil Engineering at Clemson University. FALL 2019 47

FIGURE 1 Overview of a cyberphysical system for connected and automated vehicles (CAVs). V2X = vehicle-to-everything. software-defined networks, network function virtualiza- smart infrastructure and services (figure 1). CAV-CPS tion, edge computing, information-centric and virtual will use connectivity to improve roadway operational­ dispersive networking, fifth generation (5G) cellular efficiency using real-time roadway traffic information networks, blockchain technology, and quantum and (e.g., about traffic signal phasing and timing, traffic inci- postquantum cryptography—as potential solutions aid- dents and queues) while improving safety in numerous ing in securing CAVs and transportation infrastructure ways, such as redundancy in case an automated vehicle’s against existing and future cyberattacks. onboard sensors fail. However, the highly interconnected CAV-CPS will Introduction introduce challenging security issues and vulnerabilities CAVs are the subject of research and development by (Deka et al. 2018), with far-reaching consequences for a both academia and industry because of their potential poorly secured system. For example, attackers could gain to improve traffic safety and operations. access to CAV control systems and cause catastrophic The limitations of human perception prevent motor- multivehicle crashes. Thus, it is critical to develop secu- ists from discerning what is beyond the range of human rity solutions to protect CAVs, their occupants, other sight, such as roadway incidents and work zones around road users, and the associated infrastructure. a corner or in the far distance. Even autonomous vehi- The Society of Automotive Engineers has created cles’ sensors fail to discern many such impediments. a cybersecurity guidebook of recommended practice, Vehicle-to-everything (V2X) communication provides SAE J3061, that establishes a common terminology a 360-degree view that transcends the limited capabili- for security threats, vulnerabilities, and risks across the ties of both human-driven and automated vehicles. vehicular CPS (SAE 2016). SAE J3061 recommended CAVs are planned to be part of a broader connected­ practices are based on ISO 26262, an established stan- city initiative, communicating with other CAVs and with dard for automotive functional safety (ISO 2018). The The 48 BRIDGE

TABLE 1 Examples of potential attacks and countermeasures on CAV sensors

Sensor Attack type type Attack description Potential countermeasures GPS Jamming Blocking or interfering • Multiple GPS receivers and GPS activity monitoring (Parkinson et al. 2017) with the satellite signals • Antijamming devices as GPS frequency filters (Chien 2015) received by the GPS Spoofing Modifying the position, • Navigation message authentication and cross-correlation of multiple GPS velocity, and time values receivers (Psiaki et al. 2013) of the GPS receiver • Integrated navigation systems combining GPS and inertial navigation system (Jwo et al. 2013) • GPS data validation using V2X communication (Anouar et al. 2017) Camera Illusion and Adversarial physical • Redundant sensors to verify camera data (Petit et al. 2015) blinding objects compromising • Machine learning models trained with adversarial data (Islam et al. 2019) the vision-based systems LiDAR Jamming Turning off or degrading • Protective glasses around a LiDAR that act as light filters (Tuchinda et al. its performance 2006) Spoofing Tricking it into detecting • Misbehavior detection system incorporating other sensor data, such as false objects from the camera (Petit et al. 2015) rapid evolution of CAV technologies requires adapting planning (Schwarting et al. 2018). Table 1 presents these standards and developing new ones to address examples of potential cyberattacks on GPS, camera, CAV-CPS security challenges. and LiDAR, as automated vehicle safety and operation largely depend on these sensors. CAV Security Vulnerabilities and Solutions We divide CAV-CPS cyberattack surfaces into three Software main groups— Modern vehicles are equipped with multiple electronic control units (ECUs) to manage vehicle functional- • in-vehicle systems, which include sensors, software, ity through signal acquisition, processing, and control. and in-vehicle network; ECUs may have vulnerabilities that can be exploited • V2X communication networks; and by an attacker, and CAVs, with their additional sensors and functionalities, have more ECUs than non-CAVs • supporting digital infrastructure— do (Wyglinski et al. 2013). One such additional ECU is and outline countermeasures to cyberattacks in each the navigation control module; if compromised, it may category. misdirect the vehicle toward an unintended destination or even off the road (Chattopadhyay and Lam 2018). In-Vehicle Systems Because ECUs are interdependent, if one is compro- Given the fatal consequences that may result if a CAV’s mised, others are affected. For example, an attack on the in-vehicle systems are compromised, ensuring their engine control module may result in the transmission security is of paramount importance to the automotive of false data about wheel speed to the electronic brake industry. control module, which may inappropriately activate the brakes (Parkinson et al. 2017). Sensors One of the biggest security concerns with CAV In addition to V2X systems, a CAV is generally software is the over-the-air update, which may allow equipped with light detection and ranging (LiDAR), ­malware injections and thus enable an attacker to gain camera, radio detection and ranging (RADAR), global remote access and control of the vehicle (Nie et al. positioning system (GPS) and inertial measurement 2017). Another security threat is software bugs in the unit sensors. They collaborate to improve vehicle safety source code of the ECU software/firmware. and operational efficiency and are responsible for local- A simple way to ensure software/firmware security ization, obstacle avoidance, and trajectory and path is to use strong cryptographic solutions, which include FALL 2019 49

message authentication, to prevent malware injec- • Black- and greyhole attacks: The compromised vehi- tions (Pike et al. 2017). Signature- and behavior-based cle stops forwarding all packets (blackhole) or some models can secure the communication between ECUs packets (greyhole) to other CAVs, so that other (Parkinson­ et al. 2017). However, using secured over- CAVs cannot receive safety-critical information, the-air updates, these mitigation strategies can be kept such as forward collision warnings. up to date to maintain and strengthen the security of • DoS and distributed DoS (DDoS): Attackers disrupt the CAV software/firmware (Mayilsamy et al. 2018). the V2X network by data flooding, causing a delay In-Vehicle Network in the transmission of safety-critical information and making the network services unavailable. ECUs in a CAV communicate with each other using communication message protocols, such as FlexRay, or • Jamming: An attacker broadcasts signals to corrupt controller area network (CAN). CAN is a universal data or disable communication channels. real-time messaging protocol widely used by the auto- • False message injection: The compromised vehicle motive industry given its lower implementation cost creates fake messages or alters received messages and (Liu et al. 2017). broadcasts them. Although the CAN bus has some basic security fea- tures, such as firewalls, it is vulnerable to cyberattacks. • Eavesdropping: The compromised vehicle uses false The absence of authentication and encryption allows identities to capture data packet information, thus unauthorized devices to join the CAN through an on- acquiring sensitive and confidential data. board device port. As a broadcast-based network, CAN • Certificate replication: An attacker conceals itself messages have neither source nor destination address, from certification authorities by replicating the cer- which means that every in-vehicle device can listen tificates of legitimate vehicles. to any unencrypted CAN message. The CAN bus is also vulnerable to denial of service (DoS) attacks. For • Sybil attack: An attacker creates multiple identities example, an attacker generating high-priority CAN to gain the trust of legitimate CAVs. messages can prevent ECUs from communicating with • Impersonation: An attacker establishes itself as trust- each other because of the prioritization rule of the CAN worthy in the network by impersonating a trusted protocol (Koscher et al. 2017). entity to gain access to sensitive information. Another alternative in-vehicle communication sys- tem is the automotive Ethernet, which provides a higher Solutions for V2X network security can be based on data transmission rate, better reliability and adaptability cryptography, behavior, or identity. (Huo et al. 2015), and more security than the CAN • Cryptography-based solutions include encryption, (because the Ethernet protocol contains source and secure key management and authentication. For destination addresses) (Jadhav and Kshirsagar 2018). In example, a security credential management system addition, the highly secure hardware security module,­ can prevent impersonation, false identity, and eaves- trusted platform module (Corbett et al. 2018), and dropping attacks (Ravi and Kulkarni 2013; Whyte et hardware authentication (Intel 2019) are viable solu- al. 2018). tions for in-vehicle network security. • Among behavior-based models, one of the most Vehicle-to-Everything Network popular is the weighted-sum method, in which a In a V2X network, to communicate with external level of trust of a connected vehicle is based on the agents such as pedestrians, other vehicles, roadside weighted sum of relevant criteria, such as the trans- transportation infrastructure, and servers (cloud-based mission range, vehicle speed, and vehicle direction or in-house), a CAV uses vehicle-to-vehicle (V2V) (­Sugumar et al. 2018). For example, a blackhole and vehicle-to-infrastructure (V2I) communication. attack can be detected by a reputation-based global Cyberattacks on the V2X network can compromise its trust model, where a CAV’s past behavior is con- availability, integrity, confidentiality, and authenticity sidered in determining its current trust value (Li et (Alnasser et al. 2019). Following are the most likely al. 2013). Behavior-based­ cooperative awareness attacks on a V2X network: between vehicles can prevent greyhole attacks (Ali The 50 BRIDGE

FIGURE 2 Cloud-based security for a connected and automated vehicle (CAV)–cyberphysical system (CPS) at the Center for Connected Multimodal Mobility (C2M2) testbed, Clemson, SC. DSRC = dedicated short-range communications; V2V = vehicle-to-vehicle.

Alheeti et al. 2016). DoS and DDoS attacks can be • connected vehicles communicating with each other detected and mitigated using policy- and rule-based using dedicated short-range communications or any techniques (Islam et al. 2018). other low-latency wireless network; • Identity-based security solutions can be used to detect • roadside infrastructure communicating with connected eavesdropping and secure vehicle privacy (Kang et al. vehicles via a low-latency wireless network and other 2016). roadside infrastructure using wireless/wired networks; • computing devices running connected vehicle Digital Infrastructure ­applications; In addition to V2X security, the security of the CAV- • cloud servers hosting a security controller for detect- CPS digital infrastructure is of major concern. Digital ing and mitigating cyberattacks to the V2X network. infrastructure includes roadside units, traffic signals and cameras, traffic management centers, and cloud infra- We used a cloud-based attack detection and mitiga- structure (figure 1). Digital infrastructure enables cloud- tion system to detect cyberattacks on the V2X net- based security solutions for different components of the work and roadside infrastructures in a testbed at the V2X network and CAVs (figure 2), such as Center for Connected Multimodal Mobility (C2M2), FALL 2019 51

a US Department of Transportation (USDOT) Tier 1 targets the DNN to compromise the performance of the University Transportation Center head­quartered in automated vehicle even as the changes to the sign are ­Clemson, South Carolina (Islam et al. 2018). imperceptible to humans (Papernot et al. 2017). Although the cloud would add some vulnerabilities When designing a CAV security solution using AI, to the system, cloud security is well studied, and pro- the AI system itself must be secured by improving its tective techniques are available (Basu et al. 2018). robustness. However, an attacker can take advantage of the vul- nerabilities of the protocols associated with message transfers between the CAVs/roadside infrastructure When designing a CAV and cloud servers to cut off the communication link between them (Dinculean˘a and Cheng 2019). Dis- security solution using AI, tributed security solutions using the software-defined network can solve this issue by giving autonomy to the the AI system itself must be CAVs or roadside infrastructure in terms of operating secured by improving its their corresponding security solutions independently (Darabseh et al. 2015). robustness.

Future Landscape for CAV Cybersecurity The rapid evolution of information technology has led Software-Defined Network to the development and use of emerging technologies to Traditional network management is nonprogrammable, enhance CAV security. Although all emerging technol- complex, and error-prone (Modieginyane et al. 2018), ogies are not fully tested and have their own challenges, but a programmable software-defined network (SDN) their potential for securing CAVs is beyond dispute. can be organized for more secure network management When creating CAV security solutions using these and enhanced CAV security (Nobre et al. 2019). emerging technologies, a security-by-design process that SDN involves a centralized controller for the data integrates cyberattack detection and countermeasures flow between vehicles and the roadside infrastructure needs to be adopted at the outset (Chattopadhyay and (Jaballah et al. 2019), making it an important tool Lam 2018). for CAV security. During a cyberattack, the roadside infrastructure routes the data to the SDN controller, Artificial Intelligence and a detection and mitigation application in cyber- Advances in computer hardware technologies and dis- space detects the attack and selects an appropriate tributed computing facilities (e.g., cloud computing) mitigation strategy (figure 3). An SDN controller can have led to numerous innovations in AI-based cyber­ push the mitigation strategy to SDN-enabled switches security that can be used to protect CAVs. (e.g., OpenFlow switches) in the physical space to Deep neural networks (DNNs) are used in the devel- deploy the updated mitigation strategy. Furthermore, opment of intrusion detection systems (IDS) for con- SDN combined with AI can be used to detect and nected vehicles (Aloqaily et al. 2019). Recurrent neural mitigate cyberattacks on the in-vehicle system (Khan networks, such as a long short-term memory, are perhaps et al. 2019). the most relevant and widely used deep learning model for IDS (Levi et al. 2018). Another use of AI for security Network Function Virtualization is context-aware user-behavior analytics, in which CAV Unlike legacy systems, in which network functions, behavior data are collected and used to detect security such as firewalls and IDS, are deployed in proprietary threats (Wasicek et al. 2017). hardware, network function virtualization (NFV) can However, AI itself can be subject to cyberattacks. For provide a cost-effective approach to CAV security example, by placing a small amount of graffiti or a sticker­ (Alwakeel et al. 2018). Virtualized network functions on a road traffic sign, an attacker can cause the DNN- can run on top of commodity/off-the-shelf hardware, based traffic sign recognition system of an automated such as industry-standard servers, storage, and switch- vehicle to misclassify the sign, which can lead to traffic es. Virtualization of network security functions can be crashes (Eykholt et al. 2018). The attacker specifically used to design security solutions that provide the same The 52 BRIDGE

FIGURE 3 Connected and automated vehicle (CAV)–cyberphysical system (CPS) cybersecurity using software-defined network (SDN) and network function virtualization (NFV). VM = virtual machine.

or better performance compared to security modules in Edge Computing proprietary hardware (Han et al. 2015). Edge computing, in which data are processed in any In addition, SDN can provide a platform to virtual- computing device (e.g., edge device, aggregation ize network security functions using virtual machines ­centers) close to the data source, ensures high band- (VMs). With NFV and SDN, security software in a VM width usage and distribution of the computational tasks can be launched in an SDN-enabled roadside infrastruc- among edge devices (Shi and Dustdar 2016). For exam- ture within a CAV network (figure 3). SDN and NFV ple, CAV security modules are deployed near the data thus act together to improve CAV security in terms of source (e.g., in CAVs or roadside devices) for faster pro- granularity, flexibility, scalability, and resiliency. cessing and effective protection. Edge computing– and FALL 2019 53

FIGURE 4 Cybersecurity research using edge computing, software-defined network (SDN), and network function virtualization (NFV) at the Center for Connected Multimodal Mobility testbed at Clemson University. CAV = connected and automated vehicle; DoS = denial of service; DSRC = dedicated short-range communications.

AI-based security solutions can be updated/modified in Braun 2018). ICN in combination with edge computing real time to improve cyberattack detection and mitiga- has the potential to add new dimensions to the network tion. Although the addition of edge devices adds new management of connected vehicles (Grewe et al. 2017). attack surfaces, edge computing can provide faster secu- Virtual dispersive networking is another new technol- rity solutions for CAVs by having the solutions closer ogy that differs from traditional networks as messages­ are to CAVs and thus reducing the data transmission delay. divided into numerous parts, encrypted, and sent through At C2M2 we use an edge computing–based testbed multiple paths so that attackers can’t intercept the whole for CAV cybersecurity research (figure 4) (Chowdhury message, preventing eavesdropping (Twitchell­ 2013). et al. 2018). Different cyberattacks are created against connected vehicles and transportation infrastructure 5G Network (e.g., traffic signal controllers and roadside devices) to Fifth generation cellular communications are expand- explore effective detection strategies using AI and miti- ing through the Internet of Things (Li et al. 2018). gations using edge computing, SDN, and NFV. Researchers are adopting 5G in CAVs to pioneer a more secure, reliable, and resilient CAV-CPS (Dey et Information-Centric and Virtual Dispersive al. 2018). 5G features such as ultralow latency, higher Networking throughput, and trustworthiness will increase CAV Information-centric networking (ICN) is a new para- robustness and security compared to the 4G network digm of communication networking. Unlike traditional (Jover and Marojevic 2019). host-centric networking, ICN centers on information However, a few 5G protocol specifications are or content and enables in-network caching and repli- unchanged from 4G, which may transfer some security cation; expected benefits include improved network vulnerabilities to 5G. Moreover, new vulnerabilities are efficiency, scalability, and robustness (Kalogeiton and bound to emerge, leading to new security requirements The 54 BRIDGE in 5G. The Next Generation Mobile Networks Alli- Researchers are exploring the use of quantum random ance has identified additional security requirements of number generators to develop ECUs for automotive 5G wireless networks (NGMN 2015). security (Nguyen et al. 2019). Among advantages of the 5G network, edge devices As with other technological advances, quantum com- can leverage its higher bandwidth to offload data into the puting may be used to create CAV cyberattacks. CAVs cloud server in real time to facilitate cyberattack detec- should leverage postquantum cryptography algorithms tion and mitigation. In addition, 5G features will make to protect against such attacks. it possible to support SDN and NFV in improving net- work scalability and management. Thus, 5G can make Conclusions the integration of security solutions easier in a CAV-CPS. Researchers in academia and industry are actively work- ing on developing new methods for the detection and mitigation of CAV-CPS cyberattacks. However, chal- Researchers are exploring lenges persist in this rapidly evolving area. Given security concerns regarding the acquisition the use of quantum random of sensitive information by an attacker, more research should focus on V2X security. CAV data privacy is a number generators concern because CAVs will connect with in-vehicle to develop ECUs for personal devices and the outside world. Therefore, ensuring V2X security is extremely important to pre- automotive security. vent the spread of cyberattacks from CAVs to ­connected infrastructures and vice versa. Meeting these challenges requires a concerted Blockchain effort in academia, industry, and government. Such The blockchain is a distributed and trust-based security ­collaboration can lead to improved standards for a secure solution. Using blockchain, CAVs can establish trust CAV-CPS and wide adoption of best security practices with each other, the roadside infrastructure, and cloud across the CAV industry. It will also pave the way for servers. The distributed nature of the blockchain makes better privacy, safety, and security counter­measures that it difficult to launch an attack as the blocks of data are complement and strengthen each other. protected by consensus protocols (Cachin and Vukoli´c 2017). The blockchain technology may enhance CAV Acknowledgments security (Singh and Kim 2017) and privacy (Dorri et al. This study is supported by the Center for Connected 2017) by providing a decentralized trusted V2X com- Multimodal Mobility (C2M2), a USDOT Tier 1 Univer- munication network. However, more research is needed sity Transportation Center, headquartered at ­Clemson to determine the potential of blockchain technology to University, South Carolina. Any opinions, findings, improve CAV cybersecurity. conclusions, or recommendations expressed in this article are those of the authors and do not necessarily Quantum and Postquantum Cryptography reflect the views of the C2M2, and the US government Although the development of quantum computers assumes no liability for the contents or use thereof. is still in its early stage, quantum computing has the The authors thank Cameron Fletcher for her time and potential to create breakthroughs in AI, optimization, effort in editing the article thoroughly and improving and cryptography (Smedley 2018). One potential use of its quality. quantum cryptography for CAVs is quantum key distri- bution, which can ensure secure key exchange between References ECUs in the in-vehicle network (Nguyen et al. 2019). Ali Alheeti KM, Gruebler A, McDonald-Maier K. 2016. Intel- However, this may require an optical fiber connection ligent intrusion detection of grey hole and rushing attacks in the network, which may not be feasible because of in self-driving vehicular networks. Computers 5(16). the higher production cost (Dennison 2019). Alnasser A, Sun H, Jiang J. 2019. Cyber security challenges One of the biggest threats to in-vehicle security is and solutions for V2X communications: A survey. Com- the encryption system based on nonrandom numbers. puter Networks 151:52–67. FALL 2019 55

Aloqaily M, Otoum S, Al Ridhawi I, Jararweh Y. 2019. An Eykholt K, Evtimov I, Fernandes E, Li B, Rahmati A, Xiao C, intrusion detection system for connected vehicles in smart Prakash A, Kohno T, Song D. 2018. Robust physical-world cities. Ad Hoc Networks 90:101842. attacks on deep learning visual classification. 2018 IEEE/ Alwakeel AM, Alnaim AK, Fernandez EB. 2018. A survey of CVF Conf on Computer Vision and Pattern Recognition, network function virtualization security. Conf Proceedings, Jun 18–22, Salt Lake City. IEEE Southeastcon, Apr 19–22, St. Petersburg FL. Grewe D, Wagner M, Arumaithurai M, Psaras I, Kutscher Anouar B, Mohammed B, Abderrahim G, Mohammed B. D. 2017. Information-centric mobile edge computing for 2017. Vehicular navigation spoofing detection based on connected vehicle environments: Challenges and research V2I calibration. IEEE Colloquium on Information Science directions. Proceedings, Workshop on Mobile Edge Com- and Technology, Oct 24–26, Tangier. munications, Aug 21, Los Angeles. Basu S, Bardhan A, Gupta K, Saha P, Pa M, Bose M, Basu K, Han B, Gopalakrishnan V, Ji L, Lee S. 2015. Network func- Chaudhury S, Sarkar P. 2018. Cloud computing security tion virtualization: Challenges and opportunities for inno- challenges & solutions: A survey. IEEE 8th Annual Com- vations. IEEE Communications 53(2):90–97. puting and Communication Workshop and Conf, Jan 8–10, Huo Y, Tu W, Sheng Z, Leung VCM. 2015. A survey of in- Las Vegas. vehicle communications: Requirements, solutions and Cachin C, Vukoli´c M. 2017. Blockchain consensus protocols opportunities in IoT. IEEE 2nd World Forum on Internet in the wild. arXiv:1707.01873. of Things, Dec 14–16, Milan. Chattopadhyay A, Lam K-Y. 2018. Autonomous vehicle: Intel. 2019. Intel Authenticate Technology: Hardware- Security by design. arXiv:1810.00545. enhanced security. Online at https://www.intel.com/ Chien YR. 2015. Design of GPS anti-jamming systems using content/www/us/en/security/authenticate/authenticate-is- adaptive notch filters. IEEE Systems Journal 9(2):451–460. hardware-enhanced-security.html. Chowdhury M, Rahman M, Rayamajhi A, Khan SM, Islam Islam M, Chowdhury M, Li H, Hu H. 2018. Cyber­security attacks M, Khan Z, Martin J. 2018. Lessons learned from the real- in vehicle-to-infrastructure applications and their preven- world deployment of a connected vehicle testbed. Trans- tion. Transportation Research Record 2672(19):66–78. portation Research Record 2672(22):10–23. Islam M, Chowdhury M, Li H, Hu H. 2019. Vision-based Corbett C, Brunner M, Schmidt K, Schneider R, Dannebaum ­navigation of autonomous vehicle in roadway environ- U. 2018. Leveraging hardware security to secure connected ments with unexpected hazards. arXiv:1810.03967. vehicles. WCX World Congress Experience, Apr 10–12, ISO. 2018. ISO 26262-1:2018 - Road Vehicles—Functional­ Detroit. ­Safety. Geneva: International Organization for Deka L, Khan SM, Chowdhury M, Ayres N. 2018. Transpor- ­Standardization. tation cyber-physical system and its importance for future Jaballah WB, Conti M, Lal C. 2019. A survey on software- mobility. In: Transportation Cyber-Physical Systems, eds defined VANETs: Benefits, challenges, and future direc- Deka L, Chowdhury M. Cambridge MA: Elsevier. tions. arXiv:1904.04577. Dennison C. 2019. How fiber protection is enabling next- Jadhav S, Kshirsagar D. 2018. A survey on security in auto- generation automotive systems. PPC blog. motive networks. 4th International Conf on Computing Darabseh A, Al-Ayyoub M, Jararweh Y, Benkhelifa E, Vouk Communication Control and Automation, Aug 16–18, M, Rindos A. 2015. SDSecurity: A software defined Puna, India. ­security experimental framework. 2015 IEEE International Jover RP, Marojevic V. 2019. Security and protocol exploit anal- Conf on Communication, London. ysis of the 5G specifications. IEEE Access 7:24956–24963. Dey K, Fries R, Ahmed S. 2018. Future of transportation Jwo DJ, Chung FC, Yu KL. 2013. GPS/INS integration accu- cyber-physical systems – Smart cities/regions. In: Transpor- racy enhancement using the interacting multiple model tation Cyber-Physical Systems, eds Deka L, Chowdhury M. nonlinear filters. Applied Research and Technology Cambridge MA: Elsevier. 11(4):496–509. Dinculean˘a D, Cheng X. 2019. Vulnerabilities and limitations Kalogeiton E, Braun T. 2018. Infrastructure-assisted commu- of MQTT protocol used between IoT devices. Applied nication for NDN-VANETs. 19th IEEE International Sym- ­Sciences 9(5):848. posium on a World of Wireless, Mobile and Multimedia Dorri A, Steger M, Kanhere SS, Jurdak R. 2017. BlockChain: Networks, Jun 12–15, Chania. A distributed solution to automotive security and privacy. Kang J, Yu R, Huang X, Jonsson M, Bogucka H, Gjessing S, IEEE Communications 55(12):119–125. Zhang Y. 2016. Location privacy attacks and defenses in The 56 BRIDGE

cloud-enabled internet of vehicles. IEEE Wireless Commu- lenges. IEEE Transactions on Intelligent Transportation nications 23:52–59. Systems 18(11):2898–2915. Khan Z, Chowdhury M, Islam M, Huang C-Y, Rahman M. Petit J, Stottelaar B, Feiri M, Kargl F. 2015. Remote attacks 2019. In-vehicle false information attack detection and on automated vehicles sensors: Experiments on camera and mitigation framework using machine learning and software LiDAR. Black Hat Europe, Nov 10–13, Amsterdam. defined networking. arXiv:1906.10203. Pike L, Sharp J, Tullsen M, Hickey PC, Bielman J. 2017. Koscher K, Czeskis A, Roesner F, Patel S, Kohno T. 2017. Secure automotive software: The next steps. IEEE Software Experimental security analysis of a modern automobile. 34(3):49–55. High Energy Physics 2017(11):1–16. Psiaki ML, O’Hanlon BW, Bhatti JA, Shepard DP, Humphreys Levi M, Allouche Y, Kontorovich A. 2018. Advanced TE. 2013. GPS spoofing detection via dual-receiver corre- ­analytics for connected car cybersecurity. IEEE 87th lation of military signals. IEEE Transactions on Aerospace ­Vehicular Technology Conf, Jun 3–6, Porto. and Electronic Systems 49(4):2250–2267. Li X, Liu J, Li X, Sun W. 2013. RGTE: A reputation-based Ravi K, Kulkarni SA. 2013. A secure message authentication global trust establishment in VANETs. Proceedings, 5th scheme for VANET using ECDSA. 4th International Conf International Conf on Intelligent Networking and Collab- on Computing, Communications and Networking Tech- orative Systems, Sep 9–11, Xi′an. nologies, Jul 4–6, Tiruchengode, India. Li S, Xu LD, Zhao S. 2018. 5G Internet of Things: A survey. SAE. 2016. Cybersecurity Guidebook for Cyber-Physical Industrial Information Integration 10:1–9. Vehicle Systems. SAE International. Liu J, Zhang S, Sun W, Shi Y. 2017. In-vehicle network Schwarting W, Alonso-Mora J, Rus D. 2018. Planning attacks and countermeasures: Challenges and future direc- and decision-making for autonomous vehicles. Annual tions. IEEE Network 31(5):50–58. Review of Control, Robotics, and Autonomous Systems Mayilsamy K, Ramachandran N, Raj VS. 2018. An integrated 1(1):187–210. approach for data security in vehicle diagnostics over inter- Shi W, Dustdar S. 2016. The promise of edge computing. net protocol and software update over the air. Computers Computer 49(5):78–81. & Electrical Engineering 71:578–593. Singh M, Kim S. 2017. Intelligent vehicle-trust point: Reward Modieginyane KM, Letswamotse BB, Malekian R, Abu-­ based intelligent vehicle communication using Blockchain. Mahfouz AM. 2018. Software defined wireless sensor arXiv:1707.07442. networks application opportunities for efficient network Smedley P. 2018. Autonomous vehicles in the quantum age. management: A survey. Computers and Electrical Engi- Connected World, Apr 3. neering 66:274–287. Sugumar R, Rengarajan A, Jayakumar C. 2018. Trust based NGMN [Next Generation Mobile Networks Alliance]. 2015. authentication technique for cluster based vehicular ad hoc 5G White Paper. Frankfurt am Main. networks (VANET). Wireless Networks 24(2):373–382. Nguyen HN, Tavakoli S, Shaikh SA, Maynard O. 2019. Tuchinda C, Srivannaboon S, Lim HW. 2006. Photo­ Developing a QRNG ECU for automotive security: Expe- protection by window glass, automobile glass, and sun- rience of testing in the real-world. 2019 IEEE International­ glasses. Journal of the American Academy of Dermatology Conf on Software Testing, Verification and Validation 54(5):845–854. Workshops, Apr 22–23, Xi′an, China Twitchell RW. 2013. Virtual dispersive networking systems Nie S, Liu L, Du Y. 2017. Free-fall: Hacking Tesla from wire- and methods. US Patent 9,071,607. less to CAN Bus. Black Hat USA, Jul 27. Wasicek A, Pesé MD, Weimerskirch A, Burakova Y, Singh Nobre JC, de Souza AM, Rosário D, Both C, Villas LA, K. 2017. Context-aware intrusion detection in automotive Cerqueira E, Braun T, Gerla M. 2019. Vehicular software- control systems. 5th ESCAR USA Conf, Jun 21–22. defined networking and fog computing: Integration and Whyte W, Weimerskirch A, Kumar V, Hehn T. 2018. A design principles. Ad Hoc Networks 82:172–181. security credential management system for V2V commu- Papernot N, McDaniel P, Goodfellow I, Jha S, Celik ZB, Swami­ nications. IEEE Transactions on Intelligent Transportation A. 2017. Practical black-box attacks against machine learn- Systems 19(12):3850–3871. ing. Proceedings, 2017 ACM Asia Conf on Computer and Wyglinski AM, Huang X, Padir T, Lai L, Eisenbarth TR, Communications Security, Apr 2–6, Abu Dhabi. ­Venkatasubramanian K. 2013. Security of autonomous Parkinson S, Ward P, Wilson K, Miller J. 2017. Cyber threats systems employing embedded computing and sensors. IEEE facing autonomous and connected vehicles: Future chal- Micro 33(1):80–86. Cybersecurity is not an end in itself but an ongoing set of practices throughout the system lifecycle to achieve system goals and requirements.

What Every Engineer Should Know about Cybersecurity

Thomas A. Longstaff and Noelle K. Allon

Computer science and engineering—which includes computer, compu- tational, communication, and information science and engineering—is the branch of engineering that concerns itself with cybersecurity. However, for Thomas A. Longstaff the safe and secure development and deployment of engineering systems, attention to and knowledge of cybersecurity should extend beyond the domain of computer science and engineering to other branches of engineer- ing. The participation of a cybersecurity engineer on a systems design team can ensure mitigations and modifications that will increase system resilience and longevity.

The Need for Cybersecurity Is Everywhere Engineers develop many capabilities by embedding software in the systems they produce, from kitchen appliances and baby monitors to home security systems and cars, to name just a few. A large subset of these systems offer internet connectivity and comprise devices that constitute the Internet of Noelle K. Allon Things. There are already more than 25 billion “things” connected to the internet, and the number is constantly growing.

Thomas Longstaff is chief technology officer of the Software Engineering Institute at Carnegie Mellon University. Noelle Allon is an analyst in the CERT Division of the Software Engineering Institute. The 58 BRIDGE

Even if a system is produced with no apparent need cybersecurity in engineering endeavors. We discuss how for security, it can be vulnerable to misuse. For example, organizations can address each question. a smart lightbulb may not seem to require traditional security, but if its computational resources (e.g., for What Is Cybersecurity Engineering? its settings and remote control) are misused, the light Cybersecurity engineering involves efforts to secure will not function as users expect it to. Engineers must systems from both intentional and unintentional harm. ensure that the embedded software of all systems meets Researchers learned early lessons in cybersecurity safety and security requirements in the environments in engineering from incident responses to detected attacks which the systems are deployed. and breaches, and these lessons have motivated better integration of cybersecurity in traditional systems and software engineering. From a financial and safety per- As system complexity spective, investing in cybersecurity up front is always cheaper than incurring the costs and risks associated increases, the number of with insufficient security. Cybersecurity is not an end in itself but an ongoing vulnerabilities does as well. set of practices in every stage of the system lifecycle to achieve all system goals and requirements. In addition to growing in number, devices are becom- ing more complex, especially as engineers incorporate Five Questions to Determine Whether machine learning and other artificial intelligence capa- Cybersecurity Engineering Is Needed bilities. As the complexity increases, the number of The following five questions are a starting point for vulnerabilities does as well. As a result, each and every incorporating cybersecurity goals and requirements in device is vulnerable to misuse, creating the potential any engineered system: for harm unless engineers can secure and continu- ally update devices. As of April 2019, there were over 1. What is the input to the system and who controls it? 120,000 Common Vulnerabilities and Exposure entries 2. What value does the system hold or need to protect? in the National Vulnerability Database.1 These vulner- 3. What harm can adversaries do if they take control of abilities can exist in the code, the environment, or the the system? system, and many can result in harm to the system itself 4. Is there a fail-safe when a cybersecurity event is or to people or other systems. Organizations can incur detected? multiple costs—such as the breach of sensitive infor- 5. Can the system adapt to an evolving environment of mation, loss of money, reputation, and time—when use, attacks, and interoperability? ­attackers successfully exploit a vulnerability. While it is not reasonable to expect that every engi- These questions do not represent a comprehen- neer will become an expert in cybersecurity, some sive set of cybersecurity concerns. Rather, they focus awareness of cybersecurity threats, risks, and trade-offs on (1) attack surface, (2) magnitude of consequence, can help any engineer understand cybersecurity require- (3) hazard, (4) resilience, and (5) system evolution, ments and how to work with cybersecurity engineers reflecting the most common ways that vulnerabilities throughout the system lifecycle. The participation of and unintended consequences are introduced into sys- cybersecurity engineers in systems engineering can help tems. Their answers can help an organization determine organizations reap benefits such as enhanced value of whether to include a cybersecurity engineering special- the system being engineered, improved system flexibil- ist on the engineering team. ity in a changing environment, protection of legitimate system users from harm, and greater likelihood that What Is the Input to the System and Who Controls It? engineers will meet system requirements. Keeping systems secure involves more than automat- We review cybersecurity engineering goals and tools ing security rules to reduce human labor costs and error and offer five questions to guide implementation of rates. It is important to know what the required inputs to the system are and who is controlling the system. 1 This database, hosted by the National Institute of Standards and Inputs to the system constitute the attack surface, which Technology, is available at https://nvd.nist.gov/. FALL 2019 59

presents opportunities for both an adversary’s control of would try to extract or manipulate the information held a system’s behavior and misuse by an authorized user. by the system and the attacker’s motivation for doing so. Attackers can exploit vulnerabilities to force a sys- The impacts of a successful attack are tied to the tem to violate safety constraints, divulge information, value of the information in a system. Evaluation of the change or destroy valuable information, or use unauthor­ extent of the impacts can inform engineering trade-offs ized resources. A cybersecurity engineer can use knowl- in the development and deployment of mitigation tech- edge of the source of the data and which users control nologies and the incorporation of data protections such the system to develop an appropriate threat model and as encrypted storage, secure protocols, and protected determine the controls necessary to restrict, detect, miti- processing. gate, and recover from adversarial use of the inputs. When a system contains confidential, private, or valu- able information, the data and actions that control system behavior must yield predictable outcomes. To achieve Many systems have failed such outcomes, cybersecurity engineers will ­model the by incorporating or system behavior under all foreseeable conditions to ensure that the model closes in a safe and secure state. implementing cryptography Complex systems with many interacting components can create conditions that are difficult to model; focusing with exploitable flaws in the on the portions of the system that are reachable through cryptographic components. the attack surface can help to manage the complexity. In addition, engineers can leverage advances in model- based system engineering (McDermott et al. 2019) and When a system holds information of significant formal methods such as static analysis tools to explore value, a cybersecurity engineer familiar with the use of mitigations for vulnerabilities in the attack surface. cryptography should participate in its design and devel- The incorporation of machine learning capabilities opment. Many systems have failed by incorporating or complicates this question because both the training implementing cryptography with exploitable flaws. The data and operational data will determine the system participation of a cybersecurity engineer is also impor- behavior, and both sets of data may be susceptible to tant when the system coordinates between distributed attacks. It is often difficult to discover attacks on these components, as detection of data in transit is a well- types of data through traditional monitoring. known attack strategy. A common example that illustrates this problem Other elements of a cybersecurity strategy include involves self-driving cars. They must be able to distin- appropriate encryption key management, access control guish between different traffic signs. But researchers through identity management, and authentication and have discovered that when attackers place just a few authorization of appropriate assets per user. In addition, stickers on a stop sign in a certain configuration, self- a monitoring and resilience strategy should be devel- driving cars incorrectly classify it as a yield sign (Silver oped to look for and mitigate any attempts to subvert 2017), potentially creating an unsafe condition. the proper behavior of the system.

What Value Does the System Hold or Need to What Harm Can Adversaries Do If They Take Protect? Control of the System? A system can house various types of data, from public It is relevant to know whether the system controls a material to medical histories of patients with the same safety-critical function or physical action that could health insurance to highly classified intelligence on benefit an adversary. For example, software that controls government adversaries. Knowledge of the value of the an alarm system and electronic locks may depend on an information that a system needs to protect will be used external time source that an adversary could manipulate to frame the goals and requirements for protecting that to allow unauthorized individuals to bypass the system information, both while it is at rest and while it is being and cause harm. For cyberphysical systems, such harm processed or transmitted. The answer to this question may affect physical materials or services managed by the also calls for identifying both the type of adversary who system (e.g., electric power, water, alarm systems). The 60 BRIDGE

With knowledge of the context in which the system of resilience tends to run more smoothly the earlier a operates and the harm that could result if an adversary cybersecurity engineer is involved in the project. controls the system behavior, it is possible to create a threat model to drive a realistic risk analysis to reduce Can the System Adapt to an Evolving Environment risks and harms to acceptable levels. This analysis could of Use, Attacks, and Interoperability? motivate the incorporation of cybersecurity capabili- Finally, it is simply not possible to anticipate all future ties that limit the system’s physical behavior to ensure uses and enhancements of the system under design. To that it always adheres to safety and security constraints achieve resilience, it is standard practice to design and regardless of software vulnerabilities or an adversary’s build a system that can adapt over time to an evolving control of the input. environment. Traditional attributes such as modifiabil- ity, detailed models, architecture, and documentation Is There a Fail-Safe When a Cybersecurity Event Is all contribute to the ability of a system to easily evolve Detected? based on changing conditions. Recognizing that a system has entered an undesired However, a system’s evolution must not be accessible state is a key area of software and systems engineering, to an adversary who could introduce vulnerabilities and developing a detection and response strategy is an and undesired behavior to a system. Furthermore, the area for a cybersecurity engineer. authorized modification of the system must not subvert or corrupt any previous cybersecurity capability. The modification could introduce undesired consequences Subversion or corruption is such as exposing encryption keys, removing monitor- ing capabilities, introducing previously mitigated vul- an unintended consequence nerabilities, and creating a new attack surface for an adversary. of a system modification Subversion or corruption is frequently an unintended because many cybersecurity consequence of a system modification because many cybersecurity capabilities remain silent until the sys- capabilities remain silent tem is attacked. Engineers cannot therefore easily test these capabilities through unit testing of the new system until the system is attacked. modification. Adaptability is key for system resilience, but to the Common cybersecurity strategies include develop- extent possible engineers must maintain cybersecurity ing detection and response capabilities when designing goals and requirements for any modifications they make. software-intensive systems to improve resilience. For a system to be resilient, engineers must design it to oper- Conclusion ate reliabily (with a specified minimum set of capabili- Investing in cybersecurity does not mean that all engi- ties) in foreseeable adverse conditions. Analysis of these neers will or should become cybersecurity experts. How- conditions may indicate the incorporation of a resilient ever, it does mean that engineers in different fields will fail-safe mechanism to manage potential cybersecurity be able to create a resilient system with safety and secu- events. rity assurances. Asking some simple questions can help A resilient design may involve a physical mecha- to determine when and how a cybersecurity engineer nism (e.g., a circuit breaker), but in software-intensive should be added to the team. systems, cybersecurity engineers more often establish The questions above are designed to be easily answered resilience through software exception handling. The by any trained engineer working with a system. Often, dependency analysis necessary to safely and securely however, the answers can reveal an unanticipated level implement resilience in a complex system is nontrivial. of complexity. Although this complexity may introduce A cybersecurity engineer can ensure inclusion of up-front cost in the design, the resulting system will be appropriate system monitoring and automation to acti- safer, more adaptable, and more secure than it would vate resilient mechanisms regardless of the input condi- be without those answers—i.e., if engineers rely only tions that lead to an undesired state. Implementation on patching the system after having designed and built FALL 2019 61

it. Mitigations at every layer—from code to software to References network—can help ensure that a system functions cor- McDermott TA, Canedo A, Clifford MM, Quirós G, Sitterle rectly even under adverse conditions. VB. 2019. System assurance in the design of resilient cyber- The addition of a cybersecurity expert to a system physical systems. In: Design Automation of Cyber-Physical design team will prompt needed thinking about ­security. Systems, eds Al Faruque M, Canedo A. Cham, Switzerland: As engineers incorporate more machine learning and Springer. other artificial intelligence capabilities in the systems Silver D. 2017. Adversarial traffic signs. Medium.com, they build, these questions are crucial to ensure the August 15. safe and secure operation of the systems that people ­encounter and use every day. EES Perspective

When White Hats Wear Black Hats: The Ethics of Cybersecurity

C. Dianne Martin

Codes of ethics for computer professionals have been evolving over the past four decades. The profession of computer science has matured to the extent that well-developed ethical principles have emerged to guide the gen- eral practice of the discipline.

Background Dianne Martin is Since the first code of computer ethics was adopted by the Association for ­professor emeritus of Computing Machinery in 1973, there has been a realization across the pro- computer science, George fession that the hardware, software, and networking systems developed by Washington University. information technology (IT) experts are embedded with serious social and ethical implications, and those who develop and maintain them must adhere to a high moral standard if the interest of a dependent public is to be pro- tected. This is particularly true in the area of cybersecurity, where the tools used by the guardians of cyberspace are often the same as those used by perpetrators of evil intent. The technical capabilities of computers in general and the internet in par- ticular continue to develop rapidly beyond the human ability to guarantee

This column is produced in collaboration with the NAE’s Center for Engineering Ethics and Society to bring attention to and prompt thinking about ethical and social dimen- sions of engineering practice. FALL 2019 63

a safe and ethical environment in cyberspace. While White hats are also sometimes involved in developing legal, medical, accounting, and other established profes- security products and tools…. sions have legally binding codes of conduct overseen by In contrast, black hats cause great intentional longstanding regulatory bodies, IT security profession- ­damage and profit at the expense of their targets.… als have yet to establish formal guidance or universal [They include] cybercriminals, cyber spies, cyber terror- ists and hacktivists…. Malicious actors may not always checks and balances. In addition, the industry lacks an be operating externally from their victim. Research sug- independent register maintained by an oversight entity gested that the insider threat within an organization’s to determine who can practice ethical hacking or secu- networks and premises, including from current or ­former rity research. ­employees and contractors, is responsible for a large Cyberspace is plagued with rogue individuals, groups, portion of successful hacks. To carry out attacks, black and even state-sponsored actors intent on fraud, crime, hats may develop their own malicious tools but will fre­ espionage, damage to infrastructure, even terrorism. This quently employ or repurpose existing white-hat software. causes the cybersecurity landscape to shift quickly as Grey hats, as the name suggests, are more ambiguous organizations seek to fill a growing gap for security experts in their definition. Their work may be classified as lean- amid a shortfall of skilled graduates (Knowles 2016b). ing toward good or bad on the spectrum depending on To combat this threat, it is necessary to train com- your perspective. The term grey hat is sometimes used to puter security experts along two fronts. The first is to describe those who break the law but without criminal intent. This definition may include cyber vandals who provide the technical training to use the same tools and deface websites and so-called rogue security researchers strategies as the bad actors in order to neutralize such who publicly share discovered vulnerabilities without threats. The second, often neglected, is to provide rigor- notifying or receiving prior permission from their ­targets. ous ethical training for cybersecurity professionals. In this charged climate, the tendency is to focus on fast-tracking the development of technical knowledge in order to deploy new talent to the front line quickly, Individuals’ reliance on their not considering the lack of maturity of the new recruits, who may end up abusing their abilities. Lacking aware- personal moral compass ness of the context of cybersecurity ethics, many have to defer to their personal moral compass, which can leads to mistakes as often as lead to mistakes as often as it leads to good decisions. it leads to good decisions. “Rainbow of Hackers” In addressing this issue, Aidan Knowles (2016a), an Without clear ethical standards and rules, cyber­ Ethical Hacking Engineer for IBM in Ireland, defines security professionals may be almost indistinguishable what he calls the “rainbow of hackers”: black hats (the from the black-hat criminals against whom they seek to bad guys), white hats (the good guys), and grey hats protect systems and data. (somewhere in between): Generally, white-hat and black-hat hackers do similar Standards and Codes of Ethics tasks. Both target applications, networks, computer sys- At present cybersecurity managers have to rely on repu­ tems, infrastructure and occasionally even people; often, tation and background checks to determine the trust- both camps use the same tools and resources. But their worthiness of potential hires. If new hires betray this work is not completely homogeneous, differentiating on trust by behaving unethically, there is no third-party some major points—including motivation, permission, committee or board to evaluate the consequences of legality and time. these actions and to rule in the context of the profession A white hat is commonly employed or contracted to as a whole. In most cases, rogue security professionals carry out an attack under explicit permission and clear-cut cannot be struck from a register or removed from a data- boundaries. The goal of white hats’ work is to research, find and test vulnerabilities, exploits and ­viruses in their base because an industrywide database does not exist. defined targets. The findings of these professional engage- What are appropriate ethical standards for cyber­ ments are reported directly to the target to enable them to security experts and how can those standards be inte- fix any holes and strengthen their overall security posture. grated in their training and job experiences? Several­ The 64 BRIDGE associations—the Information Systems Security Although the code is quite general, it does provide a Association (ISSA), International Information Sys- moral framework for ethical cybersecurity practice based tems ­Security Certification Consortium [(ISC)²], and on the principles of integrity, respect for confidentiality ­SysAdmin, Audit, Network and Security (SANS)— and privacy, and avoidance of conflicts of interest. have voluntarily developed ethics codes for cyber­ security (those of ISSA and (ISC)2 are reproduced (ISC)² Code of Ethics below). However, in general industry professionals are Similarly, (ISC)² recognized the need for an ethics code not required to subscribe to these bodies or adhere to to cover its certification of expertise in cybersecurity. their codes of conduct. The exception is the (ISC)² Information security professionals certified by (ISC)² Certified Information Systems Security Professional are informed that such certification is a privilege that (CISSP), who could lose this certification if evidence must be earned and maintained. In support of this prin- reveals violation of the (ISC)² Code of Ethics. ciple, all (ISC)² members are required to commit to fully support the (ISC)² Code of Ethics. Members who inten- tionally or knowingly violate any provision of the code are subject to action by a peer review panel, including What are appropriate possible revocation of certification. (ISC)² members ethical standards for are obligated to follow an ethics complaint procedure to report any action by another member that breaches cybersecurity experts and the code. There are only four mandatory ­canons in the code, which are high level and general. The (ISC)² how can they be integrated Code of Ethics Preamble and Canons2 are shown below: in training and (ISC)² Code of Ethics Preamble: • The safety and welfare of society and the common job experiences? good, duty to our principals, and to each other, requires that we adhere, and be seen to adhere, to the highest ethical standards of behavior. ISSA Code of Ethics • Therefore, strict adherence to this Code is a condi- To fill the compelling need for an ethics code for cyber- tion of certification. security professionals, the Information Systems Security (ISC)² Code of Ethics Canons: Association was the first to establish the following Code 1. Protect society, the common good, necessary public 1 of Ethics for its members in 2006: trust and confidence, and the infrastructure. 1. Perform all professional activities and duties in 2. Act honorably, honestly, justly, responsibly, and accordance with all applicable laws and the highest legally. ethical principles; 3. Provide diligent and competent service to principals. 2. Promote generally accepted information security 4. Advance and protect the profession. current best practices and standards; The basic elements of the canons are similar to all 3. Maintain appropriate confidentiality of proprietary codes of ethics for IT professionals: the need to serve or otherwise sensitive information encountered in and protect a dependent public, the requirement of the course of professional activities; competence to perform the work, and a focus on overall 4. Discharge professional responsibilities with diligence and honesty; integrity. As stated on the (ISC)² website, such high- 5. Refrain from any activities which might constitute a level guidance is not intended to be a substitute for the conflict of interest or otherwise damage the ­reputation ethical judgment of the professional. of or is detrimental to employers, the information security profession, or the Association; and Examples of Actions Requiring an Ethical 6. Not intentionally injure or impugn the professional­ Response reputation or practice of colleagues, clients, or Using the general ethical principles delineated by employers. ISSA and (ISC)² as guidelines, following are examples

1 https://www.issa.org/issa-code-of-ethics/ 2 https://www.isc2.org/Ethics FALL 2019 65

of inappropriate (“low road”) and appropriate (“high Conclusion road”) actions that fall within typical cybersecurity Cybersecurity experts—the white hats—work with sen- duties (Martin 2017; Tull 2016). sitive data, have access to company and national secrets and generally wield much power over networks, systems, Denial of Service Attack Recovery and data. How individuals handle this responsibility In the course of doing firewall security scans, the secu- comes down to their ethical yardstick, and reinforcing rity team may discover a port call that results in a denial that ethical yardstick is a fundamental responsibility of of service (DoS) attack. The low road response to such the programs that train these experts. an attack is to hack and attack back at the host. How- One way to move in this direction would be to ever, that could result in other sites being caught in the require certification for all cybersecurity experts, with DoS crossfire. The high road response—in keeping with mandated­ ethics training and periodic updates to this ISSA standards 1 and 2 as well as (ISC)² canons 1 and training required to maintain certification. Although 2—is to block the attack and gather forensic evidence this would not be a guarantee to prevent malicious to respond to it legally and ethically. hacking, it would at least ensure that all trained profes- sionals were made aware of ethical issues related to the Penetration Testing and Response exercise of their technical skills. Cybersecurity professionals often do penetration test- ing to determine the robustness of firewalls and security features in a system. If they detect a weakness or vulner- ability that could allow a remote to take control The high road response to a of the system and cause significant harm, there are two DoS attack is to block it and possible responses. The low road response is immediate full ­disclosure— gather forensic evidence publishing full details of the vulnerability as soon as possible and making the information available to respond to it to everyone without restriction. This could enable legally and ethically. ­black-hat ­hackers to exploit the weakness before it is fixed. The high road response, “responsible disclosure,” It is very likely that rogue actors will continue to prolif- is more nuanced. Responsible disclosure requires the erate on the internet regardless of the presence of legally security expert to confidentially report the weakness to binding codes of conduct and other measures, just as the company, work with the company to develop a fix criminal acts persist even in the presence of well-estab- ­within a given timeframe, and then publicly disclose the lished legal systems. This makes an even stronger case for vulnerability and the fix at the same time (Tull 2016). rigorous ethics training to be required for all cybersecurity This response would be in keeping with ISSA stan- professionals as one line of defense against such attacks. dards 3, 5, and 6 and (ISC)² canons 1 and 3. In a recent comprehensive white paper on cyber­ security and ethics (Yaghmaei et al. 2017, p. 3), the Fighting Malignant Worms with Benign Worms authors observe that A cybersecurity expert believes that a benign worm might be able to patch a known vulnerability, ­inoculate the ethics of cybersecurity is not an established subject. In all domains, cybersecurity is recognized as being an systems to protect them from a malignant worm, and instrumental value, not an end in itself, which opens up keep it from spreading. Should she release it “in the the possibility of trade-offs with different values in dif- wild”? The low road decision would be to release it and ferent spheres. The most prominent common theme is hope for the best. The high road approach, consistent the existence of trade-offs and even conflicts between with ISSA standards 2, 4, and 5 and (ISC)² canons 1, 2, reasonable­ goals, for example between usability­ and secu- and 4, would be to make the benign worm code publicly rity, accessibility and security, privacy and ­convenience. available with caveats that knowledgeable professionals They go on to state that one of the most important fea- should use it with care. tures of cybersecurity is to sustain trust in institutions and maintain the integrity of data. Given the ­inherent The 66 BRIDGE tension between possible end goals and the importance May 4. Online at https://securityintelligence.com/how- of preserving overall trust in the internet, it can be black-hats-and-white-hats-collaborate-to-be-successful/. argued that developing ethically aware cybersecurity Knowles A. 2016b. Tough challenges in cyber­security experts is as important as developing technically com- ethics. Security Intelligence, Oct 12. Online at petent cybersecurity experts. https://­securityintelligence.com/tough-challenges-­ cybersecurity-ethics/. Acknowledgments Martin CD. 2017. Black hat, white hat: The ethics of cyber- The author gratefully acknowledges the thoughtful security. ACM Inroads 8(1). suggestions and edits made to improve this article by Tull J. 2016. A Snapshot in Cybersecurity Ethics. Formerly Keith Miller, University of Missouri–St. Louis, and The available at-security-ethics. Bridge’s managing editor, Cameron Fletcher. Yaghmaei E, van de Poel I, Christen M, Gordijn B, Kleine N, Loi M, Morgan G, Weber K. 2017. CANVAS White References Paper 1: Cybersecurity and Ethics. Vrije Universiteit Knowles A. 2016a. How black hats and white hats collaborate ­Brussel. Online at https://ssrn.com/abstract=3091909. to be successful: The hacker rainbow. Security Intelligence, There are opportunities for engineering to make transformative contributions to the curtailment of human trafficking.

A Call to the Engineering Community to Address Human Trafficking

Jonathan P. Caulkins, Matt Kammer-Kerwick, Renata Konrad, Kayse Lee Maass, Lauren Martin, and Thomas Sharkey

Jonathan Matt Kammer- Renata Konrad Kayse Lee Maass Lauren Martin Thomas Sharkey Caulkins Kerwick

Human trafficking (HT) is a horrific and seemingly intractable problem that is typically construed as falling beyond the purview of engineers. This paper argues that engineering systems analysis can produce important insights concerning HT operations and ways to reduce its frequency. Three ­cases of such systems analysis illustrate (a) the limitations of individual-level­ interventions against sex trafficking, (b) the benefits of applying network ­analysis and interdiction models to HT supply chains, and (c) options to reduce the use of trafficked labor in the preparation and distribution of fish products.

Jonathan Caulkins (NAE) is Stever University Professor of Operations Research and Public Policy at Carnegie Mellon University’s Heinz College. Matt Kammer-Kerwick is a research scientist at the Bureau of Business Research at the University of Texas at Austin. Renata Konrad is associate professor of operations and industrial engineering at Worcester Polytechnic Institute. Kayse Lee Maass is an assistant professor of mechanical and industrial engineering at Northeastern University. Lauren Martin is an associate professor in the University of Minnesota’s School of Nursing. Thomas Sharkey is associ- ate professor of industrial and systems engineering at Rensselaer Polytechnic Institute. The 68 BRIDGE

The International Labour Office (ILO 2017) has esti- Labor trafficking is most common in agriculture, health mated that there are 25 million victims in forced labor and beauty services, landscaping, domestic work, con- around the world, including 4.8 million in forced sexual struction, and manufacturing (Polaris 2017). Victims in exploitation. There are opportunities for engineering to the United States include citizens and foreign nationals, make transformative contributions to the curtailment of for whom recency of immigration is a significant risk human trafficking. factor. Imported products may have been produced by trafficked labor abroad. Introduction Human trafficking is a fundamental human rights Trafficking Goods vs. Services abuse and far more common than the average person It is easy to spot similarities between HT and trafficking ­imagines. It has not traditionally been viewed as a prob- in drugs, weapons, and wildlife. They are all transactional lem for engineers to address, but it can be thought about crimes and, while HT clearly has victims, they usually do as a complex system and deserves attention alongside not report the crime. Yet there are important differences. other significant challenges for engineering. The other forms of trafficking involve criminals deliv- ering goods to consumers, whereas, from the traffickers’ Terminology perspective, the “object” in human trafficking­ is more Despite the word “trafficking” in the term, HT is defined akin to a capital asset: it is exploited to produce services not by the movement of victims but rather by their (sex acts, labor) and the services are sold to consumers. inability to escape exploitation. Victims are restrained This distinction has implications that some simple by debt bondage, threats to family, fear of deportation, calculations can elucidate. The parameter values used and shame more often than actual shackles.1 here and elsewhere in this paper are not laboratory- measured with high precision; it is difficult to gather reliable data on HT because it is hidden, illegal, and Human trafficking can be dangerous. Yet even approximate values can produce insight through the sorts of calculations engineers do. thought about as a Consider how often a gang with $500,000 in annual complex system. revenues purchases a trafficked “product” (human or drug) from its “suppliers.” A gang that generates such revenue by forcing HT victims to provide commercial HT is not the same as human smuggling, the facili- sex services might at any time be exploiting five HT tation of illegal border crossing by willing travelers. victims, assuming a typical HT victim in the United While some HT victims are smuggled across borders, States can produce about $100,000 in revenue per year, HT victims­ can be exploited in their own country, and e.g., by averaging ten $30 sex acts per day (Kara 2009). undocumented immigrants may not work at all or work If victims were exploited for an average of 2½ years under conditions that they are free to leave. before being released, sold, or killed (Kara 2009), the Sex trafficking is commercial sexual exploitation through gang would need to acquire only two HT victims per force, fraud, or coercion. Because only adults can give con- year, on average. In contrast, a drug gang with $500,000 sent, any commercial sexual exploitation of minors is con- in annual revenues might purchase drugs from its sup- sidered sex trafficking; the adult sex industry­ is composed plier almost daily if, as is typical, drugs were acquired in of both trafficked and non­trafficked individuals (Martin lots of 50 retail units that sold for $30 each (Caulkins et al. 2017). Sex trafficking­ networks in the United States et al. 2016), since $500,000/($30 * 50) = 333 days of differ depending on the citizenship of the victim (Busch- purchases. That difference in the number of “product Armendariz et al. 2009). Organizations that exploit US acquisitions” (two per year vs. almost daily) has implica- citizens often both recruit and exploit their victims, and tions for the supply chains’ structure, scale, and vulner- are often fairly autonomous; networks that traffic foreign ability to law enforcement. citizens often include multiple interdependent organiza- This introduction underscores three points: tions, including some that specialize in recruitment and transport and others that “employ” the victims in sex work. • Most HT is business activity that involves supply chains in ways that street crimes such as assault or 1 See UNODC (2000) for a formal definition of human ­trafficking. robbery do not. FALL 2019 69

• HT differs from other market crimes and must be ana- chase sex. That could leave the number of victims being lyzed from first principles, rather than presuming that exploited at any given time nearly unchanged, while conclusions concerning drug trafficking, for example, reducing the average duration of exploitation, leading apply to HT. to a greater flow of new victims to meet demand. Thus while comprehensive services and support for victims • HT encompasses diverse industries, and the particu- are important and needed, they may not be sufficient to lars matter. Polaris (2017, p. 2) identifies 25 types of reduce impacts on victims and society. HT in the United States, “Each [with] its own busi- ness model, trafficker profiles, recruitment strategies, Bringing Numbers to Bear victim profiles, and methods of control that facilitate There is no definitive research on pricing structures for human trafficking.” sex acts, lengths of time that victims are exploited, or This article offers three case studies illustrating how victim replacement costs, all of which vary by context, engineering systems analysis can shed light on different locale, country, type of sex act, market segment, and segments of HT and a brief guide to how engineers can more (Dank et al. 2014). help address it.

Victim-Level Interventions and the Problem of Replacement The number of human Human trafficking is a complex criminal activity, and “acquisitions” has interventions that address one component (e.g., root causes, services for victims, or interdiction of trafficking implications for HT supply operations) may affect other components. We show how victim-level interventions may paradoxically­ create a net chains’ structure, scale, increase in the number of victims. For ­simplicity’s sake, and vulnerability to law we focus on sex trafficking victims. A more thorough exploration would include independent sex workers, who enforcement. may experience exploitation but not trafficking per se.

Conceptual Model of Operational Costs and For this exercise, we consider estimates for a brothel- Market Equilibria type operation in , where a victim costs Sex trafficking operations profit by supplying sex to $3,000 to recruit, is trafficked for 2½ years, and performs ­buyers through the control and exploitation of ­victims ten $30 sex acts per day (Kara 2009). In this case, the who provide sex. Their operations are shaped by ­market traffickers’ revenues per victim recruited are $273,750 forces such as demand elasticity and the cost of replac- and the $3,000 recruitment cost thus consumes approxi- ing victims who escape their trafficking situation mately 1 percent of the traffickers’ gross revenue. (­Martin and Lotspeich 2014). It is relevant to consider When replacement costs are so low relative to how victim-level interventions affect operational costs, ­revenues per victim, victim-level interventions may the market clearing price and volume, and the number actually increase the number of HT victims: if the inter- of HT victims. ventions reduce by half the average time an individual From the perspective of an HT operation, interven- is trafficked, then traffickers must obtain two people tions that remove existing HT victims prompt the to provide the same volume of activity. Suppose the acquisition of replacement “workers.” This replacement demand elasticity is such that the ~1 percent increase imposes some costs that are passed on to sex buyers, in ­suppliers’ cost structure reduces market volume by potentially deterring some of them. 4 percent. Then, where there had been 100 organiza- If replacement costs are high, victim-level interven- tions recruiting 2 HT victims per year, there are now 96 tions could drive up prices enough to shrink the market organizations recruiting 4 per year. The number of vic- and decrease the number of trafficking victims. However, tims at any point in time has been reduced by 4 percent if replacement costs are low, the trafficker could obtain a from 500 to 480, but the number drawn into HT each replacement without much increase in the price to pur- year increases by 92 percent from 200 to 384. The 70 BRIDGE

of potential laborers and countries, regions, or towns. D nodes repre- sent US employers that are willing to hire for- eign ­laborers, who move through either a legal or illegal network to work in the United States. The network of solid blue lines represents the process of legally obtaining a visa, wheth- er directly (the arc from the supply point to the “visa process,” VP, node) or through a labor broker (represented by the B nodes). Note that the network bottlenecks at the visa arc, where the “visa accepted” (VA) node represents entry into the country. The FIGURE 1 Network model of labor supply chain of foreign nationals. Blue lines denote a legal net- network of red dashed work and red dashed lines an illegal network for foreign laborers entering the United States. B = labor lines represents persons broker; D = employer (demand); P = source of potential laborers (town, region, country); S = smuggler illegally entering the ­(trafficker); VA = visa accepted; VP = visa process. country to work. Laborers may be vul- Of course, not all commercial sex is supplied by HT nerable to HT whether they enter the United States victims, and not all HT organizations are identical through the legal or illegal network. Brokers may (­Martin and Lotspeich 2014). HT is a dynamic system demand large sums to begin the visa process, creating and improvement in one area may worsen conditions in a form of debt bondage that makes it difficult for the another. While it is imperative to support victims in exit- laborer to leave the US employer no matter the working ing an HT situation, such efforts may not deter traffickers conditions. After Hurricane­ Katrina, for example, bro- from continuing their operations by recruiting replace- kers required Indian welders to pay a recruitment fee of ments, particularly in market segments where the cost $10,000–$20,000 to help obtain an H-2B visa to work of replacing a victim is low, as in the New York example. for Signal International, and these workers became indentured to the brokers (Desai 2015). Network Analysis for Disrupting Human Laborers who enter the country illegally are more Trafficking likely to be victims of HT. For example, undocumented Network analysis can shed light on ways to disrupt farm laborers in North Carolina are 2.8 to 5.2 times more human trafficking. A network is a collection of nodes likely to be victimized than are documented ­laborers, and arcs where nodes model potential HT states, loca- depending on the type of victimization (Barrick­ et al. tions, or processes and arcs model the relationships 2013, 2014). Another study found that 31 percent of between the nodes. surveyed unauthorized migrant laborers in San Diego Figure 1 provides a conceptual network of the sup- County had been HT victims (Zhang 2012). ply chain of foreign nationals entering the United Therefore, one potential intervention for reduc- States for work. Nodes P1 through Pn are populations ing labor trafficking would be to decrease the flow of FALL 2019 71

­laborers in the illegal network. Interventions in the The diverse participants and the scale and complexity ­illegal network might increase its cost, making the of the international fishing supply chain create immense flow less economical than legal employment practices. challenges for monitoring HT; maritime enforcement Alternatively, policies could increase the capacity of the institutions cannot simply post observers on all 4.6 mil- legal network by reducing the visa bottleneck. Expand- lion vessels operating internationally. What is the least ing the supply of visas should reduce HT among foreign costly way to deploy inspections, audits, automatic nationals in the illegal network and will increase flow in identification systems (AIS), voluntary compliance, the legal network, where HT occurs at a much smaller satellite technology, or other methods to supervise fish rate. Further, it may shift the balance between foreign harvesting and processing to guarantee that the supply and domestic laborers in the workforce. chain is void of HT? How can such tools be combined The effectiveness of policy efforts to decrease HT in a cost-efficient manner to identify both illegal fishing will depend on the nature and extent of changes and and human trafficking? on whether the legal network is properly designed, resourced, and incentivized. Network analysis provides How can data analytics identify vessels that use HT victims? a framework for accounting for these effects in order to Algorithms could be developed to identify character- identify the most cost-effective way to have the desired istics associated with HT in deep seas and then (using impact on disrupting HT. tools such as Skytruth) detect vessels exhibiting suspi- cious behavior. For example, gaps in satellite data may Seafood Supply Chains and Labor Trafficking indicate that a fishing vessel turned off its AIS signal Fishing is big business: aquaculture and a global fish- to avoid disclosing its location (Sutton and Siciliano ing fleet of roughly 4.6 million vessels annually produce 2016). Likewise, a meeting between two ships at sea over 160 million tons of fish for global consumption may signal offshore transshipment to avoid landing at (FAO 2014). Demand for inexpensive seafood and poor port, or a fishing vessel that remains at sea for extended regulation have created conditions ripe for labor exploi- periods of time may be more likely to be associated with tation (Sutton and Siciliano 2016), leading to perva- human rights abuses (e.g., trapping its crew aboard). sive and well-documented human trafficking in the seafood supply chain (ILO 2012; IOM 2011; Pearson­ et al. 2006; Stringer et al. 2014), although, because illegal labor exploitation is intentionally hidden, it is difficult How can engineering design to quantify the extent. US retail seafood sales are approximately $100 bil- enhance inspection of the lion per year, of which only about 10 percent is domes- tically produced (White 2016). The US government is US fish supply chain not blind to problems in the seafood supply chain. Its to eliminate HT labor Seafood Import Monitoring Program (SIMP) imposes reporting and recordkeeping requirements to prevent exploitation? illegal, unreported, and unregulated-caught or misrepre- sented seafood. Effective January 1, 2018, it requires the tracing of 13 priority species from the point of harvest How can a systems approach be used to determine whether to entry in US commerce. But this new program applies monitoring efforts could be paid for with an excise tax on only to selected species and is motivated primarily by fish products? environmental concerns. Monitoring the seafood supply chain, even with an We offer the following questions to guide engineering efficient design, would not be free. Would consumers be design and to determine what it would take to effective- willing to pay for the cost to implement a supply chain ly inspect the entire US fish supply chain to eliminate monitoring system to ensure that fish products sold in HT labor exploitation. the United States are fair trade? Superficially, consumer financing of supply chain What is the least costly way to deploy a portfolio of monitor- monitoring seems feasible. If the estimated $100 billion ing tools to combat HT? seafood consumer market were taxed at 0.5 percent, The 72 BRIDGE

$0.5 million would be available to support monitoring particularly if it incorporates the dynamics between eco- and enforcement—far more than SIMP costs. However, system participants and recognizes the alternatives that such a tax would affect sales. Consumer demand, envi- are available when these actors make decisions. These ronmental sustainability, labor trafficking, aquaculture, dynamics and alternatives include the limited choices and socioeconomic development interact interdepen- available to ­victims and the various coercive strategies dently and form a large system with complex, dynamic, used by perpetrators and their agents to lure victims. diverse, and nonlinear characteristics. A simulation Interventional targets for such complex systems vary model could provide insights related to the effects of an in scale and effort to deploy. Technology-driven ini- excise tax on US fish consumption, global fish stocks, tiatives, like the monitoring tools discussed above for and trafficked labor, thereby addressing a range of policy ­illegal fishing, are complicated solutions in absolute and behavior questions. terms, but the benefits can be enhanced by parallel investment in changes to social norms through com- Guiding Thoughts for Engineers munity education and training about labor and basic We offer the following thoughts for those whose interest human rights (­Battista et al. 2018). Such funda­mental has been piqued to consider working in this domain. changes to social norms likely require more time to First, it is important to take account of the com­plexity diffuse through communities compared to the already and ambiguity inherent in these systems. Related crimes substantial time to design and deploy monitoring tools. and other misconduct against HT victims are common There are risks of unintended consequences to well- (Aronowitz et al. 2010)—identity theft, forgery, assault, intentioned interventions. Anyone working in this theft of documents, and forced participation in other domain needs to listen and look for potential harms as crimes—and HT overlaps other problem domains, such they bring important new insights from the application as drugs, warfare, other forms of violence, and labor of powerful systems thinking. For example, a fishing exploitation. tax as an intervention to fund antitrafficking programs might also reduce demand and suppress legal fishing operations with fair employment policies. Caution is There are risks of warranted particularly given the lack of empirical data on so many aspects of HT. unintended consequences Conclusions to well-intentioned Human trafficking is a morally wicked practice, and interventions. stopping it is a wicked problem in the formal sense of the term (Rittel and Webber 1973). It is a domain in which sincere efforts may absorb enormous energy with- Further complicating matters, substantial challenges out significantly shrinking the problem. exist in identifying and measuring victimization. For Efforts to reduce the scale of HT must be grounded in example, the criteria needed for prosecutorial proof of a systems-level understanding of its many interconnected­ victimization differ from the criteria needed by those and dynamically interacting parts. The primary actors— who provide services to victims. For engineers working the organizations that recruit, transport, and exploit HT in this field, it is important to dig deep and understand victims—are fundamentally business operations with the origins of numbers, available data, and their proper supply chains. Engineers understand how to describe and interpretation. manipulate supply chains. We usually work to make them Much current scholarship focuses analysis solely more efficient, but the same systems analysis applied in on HT victims and perpetrators. Engineers can con- reverse can shed light on ways to make those supply tribute by studying the entire system within which chains less efficient and, ideally, uncompetitive with HT occurs. There are multiple relevant decision ­supply chains that provide the same services without makers—employers,­ agents and recruiters, public offi- exploiting forced labor. HT is both a business operation cials, ­retailers, and ­consumers—with different goals and a violation of basic human rights. and ­levels of information. As illustrated by the seafood To date, engineers have not been much involved ­supply example, an ecosystem­ view may offer solutions, in combating HT. But the discipline now recognizes FALL 2019 73

engineers’ responsibility to address society’s grand chal­ FAO [UN Food and Agriculture Organization]. 2014. The lenges (Vest 2008), and defeating HT can certainly be State of World Fisheries and Aquaculture: Opportunities seen as a similarly worthy challenge for engineers. and Challenges. Rome. ILO [International Labour Office]. 2017. Global Estimates Acknowledgments of Modern Slavery: Forced Labour and Forced Marriage— We are grateful to Kelle Barrick for her thoughts and help Executive Summary. Geneva. in the preparation of this paper. The National Science­ IOM [International Organization for Migration]. 2011. Foundation provided funding for a four-day workshop Trafficking­ of Fishermen in Thailand. Bangkok. to explore new applications of Operations Research and Kammer-Kerwick M, Busch-Armendariz N, Talley M. 2018. Data Analytics to End HT (CMMI-1726895), which was Disrupting Illicit Supply Networks: New Applications of the impetus for this paper (Kammer-Kerwick­ et al. 2018). Operations Research and Data Analytics to End Modern Slavery. Workshop report and proposed research agenda. References University of Texas at Austin. Aronowitz A, Theuermann G, Tyurykanova E. 2010. Analys- Kara S. 2009. Sex Trafficking: Inside the Business of Modern ing the business model of trafficking in human beings to Slavery. New York: Columbia University Press. better prevent the crime. Vienna: Organization for Security Martin L, Lotspeich R. 2014. A benefit-cost framework and Co-operation in Europe Office of the Special Repre- for early intervention to prevent sex trading. Journal of sentative and Coordinator for Combating Trafficking in ­Benefit-Cost Analysis 5(1):43–87. Human Beings. Martin L, Melander C, Karnik H, Nakamura C. 2017. ­Mapping Barrick K, Lattimore PK, Pitts W, Zhang SX. 2013. Indica- the Demand: Sex Buyers in the State of ­Minnesota. tors of Labor Trafficking among North Carolina Migrant ­Minneapolis: University of Minnesota. Farmworkers. Research report prepared for the National Pearson E, Punpuing S, Jampaklay A, Kittisuksathit S, Institute of Justice, Washington. ­Prohmmo S. 2006. The Mekong Challenge: Underpaid, Barrick K, Lattimore PK, Pitts WJ, Zhang SX. 2014. Labor Overworked and Overlooked—The Realities of Young trafficking victimization among farmworkers in North Migrant ­Workers in Thailand, vol 1. Bangkok: Interna- Carolina: Role of demographic characteristics and accul- tional Labour ­Organization. turation. International Journal of Rural Criminology Polaris. 2017. The Typology of Modern Slavery: Defining Sex 2(2):225–243. and Labor Trafficking in the United States. Washington. Battista W, Romero-Canyas R, Smith SL, Fraire J, Effron M, Rittel HW, Webber MM. 1973. Dilemmas in a general theory Larson-Konar D, Fujita R. 2018. Behavior change inter- of planning. Policy Sciences 4(2):155–169. ventions to reduce illegal fishing. Frontiers in Marine Sci- Stringer C, Simmons G, Coulston D, Whittaker DH. 2014. ence 5:403. Not in New Zealand’s waters, surely? Linking labour issues Busch-Armendariz N, Nsonwu M, Cook Heffron L. 2009. to GPNs. Journal of Economic Geography 14(4):739–758. Understanding human trafficking: Development of typolo- Sutton T, Siciliano A. 2016. Seafood Slavery. Washington: gies of traffickers, Phase II. 1st Annual Interdisciplinary Center for American Progress. Conf on Human Trafficking, Oct 29–31, Lincoln NE. UNODC [United Nations Office on Drugs and Crime]. 2000. Caulkins JP, Disley E, Tzvetkova M, Pardal M, Shan H, Zhang United Nations Convention against Transnational Orga- X. 2016. Modeling the structure and operation of drug sup- nized Crime. Vienna. ply chains: The case of cocaine and heroin in Italy and Vest CM. 2008. Context and challenge for twenty-first cen- Slovenia. International Journal of Drug Policy 31:64–73. tury engineering education. Journal of Engineering Educa- Dank M, Khan B, Jay J, Downey CPM, Mayer D, Owens tion 97(3):235–236. C, Yu L. 2014. Estimating the Size and Structure of the White C. 2016. American seafood consumption up in 2015, Underground Commercial Sex Economy in Eight Major landing volumes even. Seafood Source, Oct 27. US ­Cities. Washington: Urban Institute. Zhang SX. 2012. Looking for a hidden population: Trafficking Desai R. 2015. Landmark human trafficking case ends with of migrant laborers in San Diego County. San Diego State bankruptcy for Signal International, Inc. Human Rights University. First, Jul 24. An Interview with . . .

that we dreamt up, we made a massive musical washing Deanne Bell, TV Host machine with eyelashes that could be played remotely; it spun and shot out golf balls painted to look like bubbles­ and Founder-CEO of that played drums. We usually presented our inventions in the context of a skit, so there was a stylistic element Future Engineers to our creations. Each of us on the team had our different specialties. The engineering side of things resonated with me and another girl and we both ended up becoming engineers. I loved using power tools when I was little. RML: I can sense that, given your involvement with the DIY Network. Were your mom and dad engineers? MS. BELL: My father is an electrical engineer and my mother was a math teacher before becoming a full-time homemaker. I was raised in a family that embraced the sciences and engineering, but I was also raised to be very well-rounded. I did lots of sports and music lessons and all kinds of things. I wasn’t necessarily encouraged to pursue engineering, but it was something I really wanted to pursue. It’s funny, though, because when I was little I didn’t know what an engineer did for a living. I remember being in elementary school and my dad offering to help me with math homework. I scoffed at him and said, “No, Mom’s the math teacher.” For a long time I didn’t know what an engineer was, and I think that’s part of the reason I’m committed now to communicating it to RON LATANISION (RML): Deanne, thank you for the younger generation, so we can build that identity joining us today. We’re very happy to have this oppor- and give students an idea of what engineering is even at tunity to talk with you. Let’s begin right at the begin- the youngest ages. ning. You got your undergraduate degree in mechanical engineering from Washington University in 2002. How RML: That’s certainly something that the National did you become interested in mechanical engineering? Academy of Engineering shares in terms of our inter- est in getting young people, particularly young women, DEANNE BELL: As a little girl I loved to tinker involved in engineering. Tell us about Future Engineers. and invent and build. I participated in an afterschool ­problem-solving program and was on a team of mainly­ MS. BELL: I’m an engineer and worked in mechanical girls. The team would come over to my house after design before I became a television host. Between TV school and my parents let us build and invent in my shows there was some down time so I found myself col- backyard. We were very resourceful—we would go to laborating with a local nonprofit to create engineering thrift stores, ask them for junk they weren’t using, and workshops and I thought, ‘How can I extend this? On TV take it apart. For example, for a “wash world” theme there is an engaged audience and a lot of students watch- ing. How can I take this further and integrate my engi- neering work on TV into curriculum?’ That simmered This conversation took place May 14. It has been edited for con- for a long time. And when I was speaking at corporate cision and clarity. FALL 2019 75

events I kept hearing “We want to get more involved in For example, our second challenge was to design a STEM but we don’t know the best way to plug in.” Then container to 3D print in space. We had high school stu- I thought, ‘How can I combine my experience commu- dents designing hydroponic plant growth chambers, and nicating engineering in the media, and my experience younger students designing little boxes to collect rocks developing workshops for students, and my experience on Mars. We left it open so that students from kinder- with industry? How can we come up with challenges garten to 12th grade could participate and feel a sense of based on research and emerging technologies to create accomplishment in completing the challenge. something fun, new, and relevant for kids out there?’ The idea simmered until one day I decided, ‘Let’s make this happen.’ I saw that NASA had a 3D printer I cold-called NASA and going to the International Space Station and I cold- called NASA’s In-Space Manufacturing Manager and proposed a national said, “I think we should do a national challenge and get students all across the country to design objects for challenge for students astronauts to 3D print on the Space Station.” to design objects for Most people would probably think I’m crazy, but the person I spoke with loved the idea. She had two daugh- 3D printing on ters herself. I ended up bringing in the ASME Founda- tion. It took a number of months to get a Space Act the Space Station. Agreement1 in place, which was the critical link to get the first challenge off the ground. And Future Engineers Students enter all challenges online. Everything is was born. online—the challenge, submission portal, curriculum We hosted the first 3D Printing in Space challenge resources, videos, links to free design tools that teachers and it was well received. It happened at the same time and students can use in classrooms. Our goal is always federal agencies were coming up with commitments for to have challenges be free or low cost. Students can par- the White House Maker Initiative—it was the perfect ticipate either at home or in class—we’re now at about synergy and timing. 80 percent participation from classes. Students submit Initially, Future Engineers was synonymous with 3D their entries to the website and get a gallery page dedi- printing challenges. Based on that experience, Future cated to their entry. They can see all of the innovative Engineers then applied for, and was awarded, SBIR submissions received from across the country. funding from the US Department of Education to For the first challenge, students designed objects that develop an online technology platform that can host they wanted to be 3D printed in space. The winning engineering student challenges of all kinds. design, a multipurpose precision maintenance tool, became the first student-designed 3D print in space. RML: How does it work? For example, how did the stu- The winner, Robert Hillan, was invited to NASA’s dents interface with NASA and how did the challenge Marshall Space Flight Center, where he went into pay- roll out? load operations and spoke to astronauts live on the ISS MS. BELL: We brainstorm to come up with a theme. and saw his 3D print floating in space. Sometimes the theme might seem simplistic, but the RML: What a great experience. So NASA actu- intent is to develop a challenge where students can par- ally printed in space the design that your challenger ticipate not only at a very elevated level but also at a developed? very basic level. Everyone can complete the challenge, regardless of experience level. MS. BELL: Yes.

1 “The National Aeronautics and Space Act (the Space Act) RML: This is a great experience for kids. They learn provides NASA with the unique authority to enter into a wide about not only computers and software and design but range of ‘other transactions,’ commonly referred to as Space Act also interaction with a huge organization like NASA. Agreements (SAAs). The Agency enters into SAAs with vari- ous partners to advance NASA mission and program objectives, MS. BELL: There are also finalist interviews online including international cooperative space activities.” (https:// with judges. Students in the final interview present www.nasa.gov/partnerships/about.html) The 76 BRIDGE their designs to experts—and they don’t just get a pat Currently, we’re hosting a challenge with NASA on the head: the experts really dig in and ask about how where K–12 students all across the country are asked to the students created the design, how it could be useful, name the Mars 2020 Rover. The contest is open in fall or how it could be improved. 2019 so make sure to tell your kids or grandkids to go to The 3D printing challenges were actually part of FutureEngineers.org and submit a name. NASA’s research in terms of thinking about how they’re CAMERON FLETCHER­ (CHF): You’ve been work- going to leverage 3D printing technologies on future ing so far with NASA as your primary institutional part- missions. K–12 students have extremely creative ideas, ner, but now you’re branching out to other institutions so it’s great that NASA’s public engagement efforts or companies? could inspire these young innovators in such a mean- ingful way. MS. BELL: We started by working with the ASME Foundation, with technical assistance from NASA, and RML: What’s the frequency of the challenge? now we have a partnership with NASA on the Name MS. BELL: Well, we’re at a transition point. Recently the Rover contest via a Space Act Agreement. Also, Future Engineers launched our 2.0 platform, which can the support of the US Department of Education’s SBIR host as many challenges as we want simultaneously and program has been pivotal. But we’re very excited to be aligned to all kinds of topics, themes, and education branching out to develop partnerships with new organi- standards, not necessarily space or 3D printing. We plan zations to create other kinds of challenges. to work with all kinds of industry partners to come up CHF: Can you tell us who some of those other entities with challenges that showcase the diversity of STEM. are? For example, we just hosted a Bright Art Challenge focused on properties of light, a Weather Balloon chal- MS. BELL: Not yet. But I can mention others that lenge focused on data visualization and payload design, we’ve previously worked with on themes or educational a Future Creatures challenge focused on adaptations, prizes. One theme was aligned with Star Trek’s 50th and a Name That Molecule challenge focused on 3D anniversary. Makerbot has graciously donated many 3D molecular visualizations. Students’ entries go into their printers to schools of winning students. We’ve had stu- portfolio on our site, and teachers can build classroom dents visit with SpaceX engineers at their headquarters. portfolios as well. We collaborated with Digital Domain, a visual effects company in Los Angeles,­ where the winning stu- dents got to suit up in motion capture suits to see how digital models are used to make mov- ies. They made their own movie of themselves on Mars, which was really fun. For each of our chal- lenges there’s a different theme and we try to come up with educational expe- riences and educational prizes to illustrate for stu- dents what they might do for a living as an engineer and how they can apply the skills they’ve learned Deanne (left) with winning students in motion capture suits at Digital Domain, where they made a in the challenge. simulated movie on Mars. FALL 2019 77

CHF: Do you have any sense of how many stu- dents you’ve reached and engaged over the years? And is there any kind of follow-up to create a community of these par- ticipants, like an alumni group? MS. BELL: We defi­ nitely have a growing community of students and educators, but once the students graduate from high school we don’t currently have a way to engage them, except as judges. We’re looking at how we can leverage col- lege students as mentors and expand to college challenges as well. We’re Girl Scouts at the Future Engineers pop-up makerspace, 2017 G.I.R.L. National Convention, excited to bridge that gap, Columbus, OH. ­especially with women in engineering. A lot of research shows that girls need to be appropriate standards. Our focus is on creating chal- engaged before they’re 12, so we try to do challenges that lenges that can be done as a classroom activity. Teachers engage students at the youngest ages to get them excited are amazing so we strive to support them as best we can. and inspired, to help create an engineering identity and CHF: You’ve mentioned engaging girls and you just then keep building on the momentum to strengthen the used the word demographics. Do you have outreach pipeline as students get older. We recently completed a efforts to other demographic groups, like under­ research study using six prototype challenges with mid- represented minorities or socioeconomically disadvan- dle school classrooms, which showed significant gains taged kids? in enjoyment of engineering. The gains were primarily driven by girls, so we’re on a good path. MS. BELL: We do public engagements focusing on different demographics. We’ve focused a lot on girls CHF: You acknowledged earlier that there are separate and women to date; for example, in 2017 we were at challenges for, say, kindergartners and other youngsters G.I.R.L., the Girl Scouts National Convention where as opposed to high school participants. Are there dif- we collaborated with the ASME Foundation to teach ferent criteria or are different submissions selected from over 2,000 girls to use CAD. And last year we helped different age groups? coordinate an event in Washington at the Smithsonian MS. BELL: Sometimes we use the same criteria for the National Air & Space Museum, where local students different competitive age groups, but we select a junior asked an astronaut questions live as she was on the and a teen winner. With our new platform, we can do a International Space Station. kindergarten-only challenge or a high school challenge, Also, most of our challenges involve multimedia con- or only DC public schools or only Florida students, for tent. I’m a TV host and we make launch videos for our example. We can design challenges for different ages, challenges as well as educational media for the website. grades, demographics, or regions. We make sure that the media we create is representative Education standards are aligned to different grades of engineers of all kinds. We’re committed to diversity so we make sure our challenge themes align to grade- and to making sure our challenges are accessible and The 78 BRIDGE free so that there’s no barrier to entry to participate in A year later I decided to take a leave of absence to engineering. travel. I’m a big traveler. I had saved my pennies and wanted to hike in Tibet and in New Zealand and just RML: We’ve spent a lot of our time talking about a travel. While in the Philippines, I was thinking ‘I really topic that is of great interest to us and to the NAE: need to get my act together and figure out what I’m encouraging young people to become involved as engi- doing next in life.’ I was at a hostel, looking at online neers. What you’re doing sounds very commendable. job boards—and again, an ad popped up: “Looking for I’d like to turn the conversation to your TV hosting. an engineer to host a TV show on PBS.” What are the How did you make the transition from being a practic- chances of that?! ing engineer with Raytheon and then with a startup in So I sent in my application from the Philippines, a Boston to TV host? picture and a few sentences, and I heard from the cast- MS. BELL: It was a leap of faith. I was working in Los ing agent. “You look great. Our last audition is in two Angeles. I’m from Florida originally and went to college days in Boston.” I wrote back, “I’m in the Philippines, in St. Louis. I got my first job offer for a job in LA and can you wait?” And they responded, “Let us know if you came here. I was working as an engineer at Raytheon. It can make it.” was wonderful—I had fantastic mentors, I was given a That night I had a glass of wine with a German pig lot of responsibility, I was thrown in the fire. farmer and he said, “You know what, I think you should go.” And I agreed. I decided, ‘I need to do this.’ I called the travel agency and got everything rearranged. I flew I just needed that one person back and arrived in Boston at about 9:00 p.m., auditioned the next morning at 9:00 a.m., and ended up getting the to say yes, to take that leap job. That was my very first job as a television host. of faith. It changed my life. CHF: Did you send a thank you note to the German pig farmer? Of course, there’s another industry in Los Angeles: MS. BELL: I don’t even know his name. But I think the media industry. I didn’t really have much involve- about that pig farmer often. There I was on the cusp of ment with it until I went on vacation for a week and saw taking this big risk, this leap, and I just needed some- an ad posted for an engineer to host a television show. I one to say ‘yes.’ There’re so many reasons to say ‘no,’ to was kind of joking with a friend and I sent in some stuff think ‘This is probably a waste of my time. It’s going to and gave my landline phone number. A week later I got cost money. It isn’t going to be worth it.’ I just needed back from vacation and I had all these messages from that one person to say yes, to speak to the inner voice the casting director saying “We want to bring you in.” in my head to take that leap of faith. It changed my life. I put on a suit, brought my resume, went in—and was RML: Which show was it? put in front of a green screen and given a cue card and told to read lines. I thought, ‘Whoa, I have no idea what MS. BELL: My very first hosting job was on a show I’m doing.’ Then they sat me down on a stool and asked called Design Squad on PBS. It still exists online, but me to talk about technology that I had worked on. And I only cohosted the first season. It’s basically a reality I just talked. show where they would give students a design chal- I remember the casting agent being really surprised lenge. For example, “You have a red wagon or a tricycle that I existed. I was disheartened by the fact that this and two drills and you have to make a dragster. You have person hadn’t encountered many female scientists or two days to design and build.” Then we took them to engineers when casting for these kinds of shows. But the speedway and tested their cars. The students com- when I asked myself, ‘What female engineer have I seen peted and at the end of all the challenges the student on TV?,’ I couldn’t think of one. I thought, ‘We need to with the most points won a college scholarship. It was change this. Women need to have more representation produced in Cambridge on the MIT campus, in the in the media.’ solar car garage, I think. I went through a series of auditions for that show, but CHF: I see from your website that you’ve been involved the show never got greenlit, it just disappeared. in quite an array of activities—Smash Lab and Money FALL 2019 79

Hunters, The Egyptian Job and Rise Up. How on earth did you get involved in each of these? MS. BELL: I’m fortunate that the momentum just kept going. I got called to host a Discovery ­Channel show not long after host- ing the first season of Design Squad. Then at some point you get an agent and go from there. I am a very “niche” tal- ent on TV, but the beauty of science and engineer- Deanne (right) with nurse-inventor Bobbie Sue McCollum and her Goldilocks Valves prototype, on ing is that they’re in Make Me a Millionaire Inventor. every­thing. I hosted a show about trying to figure out how an ­Egyptian pyra- ground level, so we had to inflate them to create a pres- mid that was built in the 19th century BC was broken sure differential as if they were at altitude, but we found into—I ran a bunch of physics calculations about how that the planes were riddled with holes, so first we had to certain rocks were moved back when. And then a show patch the planes, then inflate them, and then our explo- on ESPN—who would think you could be an engineer sives expert initiated the explosions. We used pressure on ESPN? We renovated athletic facilities for schools sensors, temperature sensors, and a bunch of high-speed and my cohost was a professional football player; he photography to analyze the events, but our attempted worked on the athletics program side of it and I worked solution was a flop against that very difficult scenario. with the contractors to renovate the physical facilities. Most recently I cohosted a show on CNBC called That was Rise Up. It was kind of like a home makeover Make Me a Millionaire Inventor. It’s a business show. We show but for athletic facilities. worked with hardware inventors who had an idea for Smash Lab is probably the most sensational show I a product and maybe had a great prototype but didn’t worked on. I like to say that I specialized in the science know how to take it to the next level. We had an in- of smashes, crashes, and destruction. It was a difficult house product development team who would bring their show to make—and definitely an adrenaline rush every idea to life with a fully fleshed-out prototype like you day. We had to stage a massive crash or disaster, use would see on a showroom floor. I mentored the inven- instrumentation to figure out how bad it was, and then tors on the product development process as well as the invent something that could potentially make it safer. process of developing a business plan. At the end of It could be the most ridiculous invention ever. We had each episode the inventors would pitch their idea to an a couple of weeks or less to do these big inventions, so investor for a chance at getting money to launch their it was just proof-of-concept stuff. product into a business, and many of them did. We went out and simulated these things in the Some of the products didn’t receive an investment ­desert—I spent a lot of time out in the desert in South- on the show but the inventors persevered after being ern California. We did one show involving a high-rise rejected. For example, a nurse named Bobbie Sue escape out of a building that was on fire. There were McCollum works in the ER where they use bag valve also big rigs running into things, train crashes, we simu- masks to manually put air into patients’ lungs. A nurse lated a logging truck rolling over on a sharp turn, and we is supposed to squeeze it and then wait 6 seconds, then simulated the equivalent of a shoe bomb on an airplane. squeeze again and wait 6 seconds, then squeeze again…. For that one we rented airplanes in the Mojave Desert But in the adrenaline of the moment the bag might get to conduct the final test. One plane had a blast-proof squeezed too soon and overinflate the patient’s lungs. material applied and the other didn’t. The planes were at She invented a device that attaches to the bag valve The 80 BRIDGE mask and regulates the reinflation so the nurse knows I’m so grateful every day for my engineering mindset. I’m when it’s safe to squeeze the bag again. trained as an engineer to ask the right questions, to find She didn’t get an investment on the show, but she the answers and to figure things out. Great ideas are com- got great advice about the healthcare market and how mon to all the inventors we’ve worked with. But engi- to pursue licensing opportunities with larger medical neering is what takes great ideas to the next level. manufacturers, and she’s now adapting her business plan A lot of people talk to me about inventions and how to go after these opportunities. do you come up with the next big idea. I think some- times people think too far in advance—they think about RML: How do inventors find their way to the show? For how to create the next Facebook—when really almost example, how did Bobbie Sue discover the show and get every prototype is something that’s close to you. With into your broadcast? Facebook, it was kids in a dorm room trying to con- MS. BELL: There was a lot of work by the produc- nect with other students in their college. That’s what I tion company to find inventors that were a good fit. tell people: Think of a problem around you that inspires Once the show was on the air, the show itself became a you, solve that, and then figure out how to scale it. recruitment tool for inventors to reach out. What’s great on the show is that these inventors come in and we show them their prototype—and the RML: Many people have very good ideas, they just tears roll. It’s amazing that engineering can do that for don’t know how to implement them in order to solve a someone. Engineering can take something that’s been problem. We all see problems every day and sometimes an idea that they’ve been working on for so long, it’s so you have a sparkling idea that might pan out but people personal to them—and there it is: they can see it, touch don’t know how to follow through. I just wonder how it and hold it. It’s awesome to show that engineering can a person who sees a problem, like the inflation valve in have such an emotional element. It’s one of my favorite the ER, and then is clever enough to decide that there shows that I’ve worked on. must be a way to solve this and regulate the device, finds her way to your show. There must be a screening pro- CHF: What are some inventions that you’ve pursued as cess to determine whether there’s an invention that has an entrepreneur? some merit or if it’s blue sky and totally unworkable. MS. BELL: I stumbled into becoming an entrepreneur MS. BELL: There’s definitely a screening process. with Future Engineers and it took me a while to realize There’s screening in terms of intellectual property and that I’m the founder and CEO of an education technol- what exists on the market, and in terms of viability for ogy company. I’m trained as a mechanical engineer but the product in the marketplace. And then screening for my day-in and day-out work to build Future Engineers is the TV show: Is this going to make a good TV show as chief architect of a sophisticated online platform that about this journey? navigates the complexities of running innovation chal- lenges for students of all ages, at home and in class, on a national scale. We have to deal with privacy, working Engineering can with minors, student IP, and contest/promotion regula- tions. I dove into driving the software development and evoke emotion. had to wear a million different hats to get Future Engi- neers up and running. I just filed my first patent applica- It can empower people. tion, so I guess I’m officially an inventor myself now too. I tell people I became an entrepreneur by accident. I think what’s interesting about Make Me a Millionaire­ I was following my passion. I really wanted to inspire Inventor is that it illustrates how engineering can evoke more engineering outreach and I thought, ‘How can emotion. It can empower people. We had these inven- I best facilitate this?’ Doing in-person workshops was tors, some of them had been sitting on an idea for hard to scale, and not cost effective. I decided that a 15 years, paralyzed because they didn’t know how to platform was the best way to connect students all across take the next step. the country on a common goal, a common challenge. It’s about having the courage to do it and of course And I think students love that they can see how a kid the means or the resources. But it’s also about mindset. in Boston and a kid in Florida solved the same prob- FALL 2019 81

lem, and they can learn by looking at the innovations systems that serve society—but we don’t necessarily of other­ students and get inspired. A lot of students interface very well with society. I think what you’re who have won our challenges say they participated as a doing is terrific. beginner and saw these amazing inventions that ­other MS. BELL: Thank you. students were coming up with and that encouraged them to hone their skills. RML: Where do you see yourself in 5 or 10 years? CHF: So you have repeat participants? MS. BELL: I often talk about imagining the impos- sible—if you can dream it, you can build it, you can MS. BELL: Yes, very much so. make it happen. You just have to dream it up first. I’m RML: I get the sense, Deanne, that you have a lot of fortunate in that I imagined the impossible of being a things going on all at the same time—and you’re han- TV host and it happened. dling them all beautifully. That’s in itself quite a story. I understand that you also speak to audiences of young people? I became an entrepreneur MS. BELL: Yes, I speak to audiences of all ages. by accident. RML: About engineering as a career, or what are you asked to address? I was following my passion. MS. BELL: Often with students I talk about my In 5 to 10 years I see myself, in addition to being a ­journey—my passions, but also my frustrations and how television host, having a role in producing a television I persevered, and how I now have this crazy job that I show, being on the creative side of the production as love. You can look at my career and see successes and well as in front of the camera—or maybe just behind atypical engineering paths that I’ve taken, but there the camera—and inspiring girls to pursue science and are a lot of times I failed or second-guessed myself or engineering. thought maybe I didn’t fit. I also see an enormous future for Future Engineers. I In college, there was a time in my junior year when see us hosting hundreds of challenges, simultaneously I thought about dropping engineering entirely. I could engaging students all across the globe, building engi- do the classes just fine, but I didn’t know if engineering neering portfolios, developing an engineering identity was the right path for me. I felt like my career ambitions with students as young as 5 years old, highlighting the were very different than my peers. awesome science and technology work that’s being done Thank goodness for a female professor who mentored in our world, and showing students that there is engi- me in college. She showed me that what I was learn- neering in everything. It’s everywhere around us! ing were tools that I could apply in industry and that I I see Future Engineers having engineering chal- would thrive with my personal skills and passions. She lenges paired with movies, paired with emerging tech- was 100 percent right! I try to communicate that to nologies, paired with global challenges or needs, and students. engineering challenges that inspire students to learn RML: That’s very important. I think most engineers technology tools from 3D design to data visualization are not typically in the public eye. They’re great at to designing augmented reality software—a whole solving problems, they can bring things to the market, world of engaging students in challenges. they can build all sorts of interesting devices—but they CHF: Thank goodness your mentor talked you out of don’t have the same inclinations or skills to interact dropping out of engineering. I have one more question with the public that I think can be helpful. You’re pro- for you, Deanne. Would you like to offer any particular viding ­public access to the engineering enterprise in thoughts to the readers of The Bridge? a way that can be inspirational to young people. You bring an important dimension that isn’t typical of the MS. BELL: I guess to summarize I’ll say that we need engineering community. It just isn’t typical of engineers to engage students with engineering early and often. to be outright publicly visible. And yet, all the things This absolutely requires investments in the future, but engineers do affect the public—we build engineering it also applies to our everyday life. Think about your The 82 BRIDGE vocabulary. Just as I can paint something without being and I’m going to make sure they all tune in to your show a professional painter, or I can nurse someone back to because I think this is really important stuff. health without being a registered nurse, we all have the MS. BELL: That’s wonderful to hear. ­capacity to engineer. Next time you see a young girl or boy iterate, improve, or innovate something new, tell CHF: Deanne, it sounds like you are having fun on them they were doing engineering. We learn from con- company time. text and kids need to see and hear more about engi- MS. BELL: I am! And I should add that when I audi- neering to build an understanding of what engineers do tioned for CNBC I was 8 months pregnant and when and who we are. And just because someone becomes a I launched Future Engineers I was 8 months pregnant. TV host or a politician—or anything, really—it doesn’t It has been a journey navigating that as well, but I’m mean they left engineering, it means they chose to apply a huge proponent of giving women the flexibility they their engineering mindset in a new way, to solve a new need. When you do, they will thrive and excel. It’s problem. The more we celebrate the zillions of things been great to be able to create my own situation that engineers do in this world, the more inclusive and fits me perfectly, with TV hosting and doing education diverse our profession will be, and the greater problems work, and at the same time building my family. I have a we can solve—together. 4-year-old and another who just turned 1. And if you ever want to talk with another atypical engineer, my husband is a software engineer but works The more we celebrate as a visual effects supervisor at Marvel—he recently worked on Avengers: End Game and Infinity War—so the zillions of things we’re an interesting duo. That’s kind of a funny story, engineers do, actually. When we met, I told him I was an engineer— and he said, “I’m an engineer.” So I added, “But I don’t the more inclusive and have a traditional engineering job.” And he said, “Nei- ther do I.” Then I asked him, “What do you do?” He diverse our profession will be said, “I blow up stuff in movies.” And I said, “I blow up and the greater the problems stuff on TV.” It was a match made in heaven. We went on our first date the next day and every day since. we can solve—together. CHF: That’s great. MS. BELL: Wonderful to speak with you both. RML: Deanne, we want to thank you for this wonderful CHF: Thank you, Deanne. conversation. I think what you’re doing is truly inspira- tional. I hope a lot more young men and women will get RML: Thank you. to know what you’re doing. I have five grandchildren FALL 2019 83

NAE News and Notes NAE Newsmakers

Gilda A. Barabino, dean of the complex geometry.” Dr. Nemirovski­ semiconductor industry to produce Grove School of Engineering and received the prize “for his fun- exponentially advanced products at Daniel and Frances Berg Professor, damental contributions to high- lower cost. He will accept the award City College of the City University dimensional optimization and for on November 7 in San Jose. of New York, is the recipient of the his discovery of key phenomena in Ann P. Dowling, president of the 2019 AIChE Award for Service to the theory of signal estimation and Royal Academy of Engineering and Society. Dr. Barabino is being recog- recovery.” professor of mechanical engineering nized for her approach in using engi- Barry W. Boehm, TRW Distin- at the University of Cambridge, is neering principles to solve medical guished Professor of Software Engi- to receive the Royal Medal from the issues that include disease thera- neering, University of Southern Royal Society. Three Royal Medals, pies and tackling health disparities; California, was recently chosen to also known as the Queen’s Medals, for her public policy leadership to receive the INCOSE 2019 Pioneer are awarded annually by the sover- advance the engineering profession; Award, the International Associa- eign on the recommendation of the and for her career-long efforts and tion of Top Professionals Top Pro- Council of the Royal Society. Dame transformative impact to broaden fessor of the Year 2019 Award, and Ann is recognized for her leading participation in the engineering the Marquis Who’s Who Lifetime research on the reduction of com- fields through advocacy, mentor- Achievement Award 2019. bustion emissions, aerodynamic ship, and professional development Pablo G. Debenedetti, dean of noise, and the design of aircraft, as of underrepresented minority stu- research and Class of 1950 Profes- well as her distinguished service to dents and faculty. The award will sor in Engineering and Applied engineering. be presented November 10 at the Science, Princeton University, has Rensselaer Polytechnic Institute annual meeting of the American been selected for the AIChE Alpha has honored Nancy D. Fitzroy, Institute of Chemical Engineers. Chi Sigma Award for Chemical retired, General Electric Corpo- Marsha J. Berger, Silver Pro- Engineering Research. He was rate Research and Development. fessor of Computer Science and ­cited for “seminal research contribu- On May 16, the Admissions Build- Mathematics, Courant Institute, tions on the metastable liquid-liquid ing was dedicated and renamed the New York University, and ­Arkadi phase transition and properties of Nancy Deloye Fitzroy ’49 and S. Nemirovski, John Hunter Chair water at supercooled conditions.” Roland V. Fitzroy Jr. Admissions­ and professor, School of Industrial He will receive the award Novem- Building. Dr. Fitzroy was the first and Systems Engineering, Georgia ber 10 at the AIChE annual meet- woman to graduate from the insti- Institute of Technology, received ing in Orlando. tute with a degree in chemical 2019 Norbert Wiener Prizes The Semiconductor Industry engineering. from the American­ Mathematical­ Association has announced Robert Naomi Halas, Stanley C. Moore Society (AMS) and the Soci- H. Dennard, IBM Fellow Emeritus, Professor of Electrical and Com- ety for Industrial and Applied IBM Thomas J. Watson Research puter Engineering and founding ­Mathematics. The prizes were pre- Center, as winner of the 2019 Robert­ director of the Laboratory for Nano- sented at the 125th annual meeting N. Noyce Award. Dr. ­Dennard photonics at Rice University, has of the AMS in Baltimore in January. is recognized for inventing the been elected a fellow of the Royal Dr. Berger was honored “for her fun- memory technology underpinning­ Society of Chemistry. To be eli- damental contributions to adaptive every computer, smartphone, ­tablet, gible for RSC fellowship, one must mesh refinement and to Cartesian and other ubiquitous­ electronic have made “a substantial contribu- mesh techniques for automating the devices and for pioneering the scal- tion to the improvement of natural simulation of compressible­ flows in ing physics that have allowed the knowledge, including mathematics, The 84 BRIDGE engineering science, and medical ment in the field of nanotechnology ­Rensselaer Polytechnic Institute, science.” and its application to medicine and has been awarded the Roebling Tobin J. Marks, Vladimir N. biology. The award will be presented Medal by the Mineralogical ­Society ­Ipatieff Professor of Catalytic November 13 in Chicago. of America. The MSA’s high- Chemistry and professor of materials­ Washington University in St. est honor is bestowed for scien- science and engineering, North- Louis will present the Chancellor’s tific eminence in the broad field of western University, has been ­elected Award for Innovation and Entre- mineralogical science. The award a foreign fellow of the European preneurship to Yoram Rudy, Fred was presented during MSA’s joint Academy of Sciences in recogni- Saigh Distinguished Professor of annual meeting with the Geological tion of his scientific contributions. Engineering and professor of bio- Society of America in Indianapolis Dr. Marks is a world leader in the medical engineering, at a ceremony November 4–7, 2018. fields of organometallic chemistry, on November 8. Professor Rudy Eric Horvitz, Distinguished chemical catalysis, materials sci- is honored for his inventions that Scientist and director, Microsoft ence, organic electronics, photo- have changed the way cardiologists Research, and Eric E. Schmidt, voltaics, and nanotechnology. The measure deadly irregular heartbeats. chair of the Defense Innovation induction ceremony will take place Emanuel M. Sachs, chair, Sci- Board and technical advisor to the in Madrid in October. entific Advisory Board, 1366 Tech- board, Alphabet Inc., have been Chad A. Mirkin, director, Inter- nologies Inc., and Professor Post appointed to serve on the National national Institute for Nanotech- Tenure, Massachusetts Institute of Security Commission on Artificial nology, and George B. Rathmann Technology, has been awarded the Intelligence. The commission will Professor of Chemistry, Northwest- 2019 SME Industry Achievement review advances in artificial intelli- ern University, has been selected Award. Dr. Sachs is recognized for gence, machine learning, and asso- to receive one of two 2019 inter- being instrumental in transforming ciated technologies with national national Kabiller Awards. The global manufacturing; he and col- security implications, including the awards biennially recognize two top leagues at MIT first developed the competitiveness of US efforts, inter- scholars, one pioneer and one rising concept of 3D printing in the late national trends and cooperation, star in the field of nanoscience and 1980s while inventing and estab- workforce and education incentives, nanomedicine. Professor Mirkin lishing binder jet technology. data standards, and ethical consid- was chosen to receive the Kabiller Bruce Watson, Institute Pro- erations for future application. Prize in Nanoscience and Nano- fessor of Science, Department of medicine for outstanding achieve- Earth and Environmental Sciences,

2019 China-America Frontiers of Engineering Hosted by Qualcomm in San Diego

The 2019 China-America Fron- Consistent with the design of Communication Technology, and tiers of Engineering Symposium was the bilateral FOEs, this meeting New Materials. held June 20–22 at Qualcomm in brought together approximately 60 Advances in neuroengineering San Diego. NAE member Zhenan early-career engineers from US and have transformed neural interfacing Bao, K.K. Lee Professor and chair ­Chinese universities, companies, and technology for recording and stimu- of chemical engineering, and Jing government labs for a 2½-day meet- lating neurons, thereby enhanc- Cheng, Cheung Kong Professor of ing to discuss leading-edge devel- ing both computational capacity in Biomedical Engineering at Tsinghua­ opments in four engineering fields. ­neural decoding/encoding and the University, cochaired the sympo- The session topics were Frontiers translation of neurotechnology to sium. The NAE carries out this of Neuro­engineering for Restoring clinical applications. This session activity with the Chinese Academy Human Sensory and Motor Func- focused on system-level research in of Engineering. tions, Smart Cities, 5G Wireless neuro­engineering that aims to restore FALL 2019 85

2019 China-America Frontiers of Engineering Symposium attendees get to know each other during a “speed dating”–type session on the first morning. human motor or sensory function. ciency, sustainability, and resilience planning that promotes the physi- The four talks covered ­bidirectional of urban infrastructure systems cal and mental health of residents. brain-computer interfaces; pas- needed to support this expanding In both the United States and sive brain-computer ­interfaces, and urbanizing population. The China, 2019 marks the year for the which provide information from approaches taken by China and commercial rollout of 5G wireless user mental activity to a comput- the United States in the develop- communication systems based on erized application without the ment of smart cities technologies the global 3GPP 5G New Radio need for the user to control his are often distinct, with top-down (5G-NR) standard. The expansive brain activity; invasive and non- approaches needed in China to range of 5G wireless communica- invasive stimulation technologies achieve scale quickly, while organic tion technology and applications to treat hearing loss; and neuro­ approaches are more common in has resulted in very active R&D modulation, an emerging field that the United States. The first speaker efforts in academia and industry. offers a cross-disciplinary approach described how to exploit smart cit- Talks in this session covered base- for investigating neural circuits and ies technologies to make urban band design and implementation treating neurological and psychiat- infrastructure systems more resilient for 5G, the state of the art for 5G ric disorders. to natural hazards and malicious with a focus on low-latency and The world’s urban population attack. This was followed by a pre- high-reliability applications, next- is expected to grow by 2.5 billion sentation on mobile crowdsensing generation applications enabled by people between now and 2050, for smart ­cities. The third presenter ultra-low-power integrated circuits, with much of the growth concen- described the challenges of mesh- and the impact of 5G on high-speed trated in urban areas. Technology- ing cyberphysical and sociotechni- railway communications. focused smart cities approaches are cal systems. The session concluded Materials are the building blocks being explored to improve the effi- with a talk on a method for city for societal advances, from com- The 86 BRIDGE puting miniaturization to smart, In addition to the formal presen- meeting will be held in China in energy-efficient homes. Underly- tations, an icebreaker on the first 2021. ing these technological advances morning in a “speed-dating” format The NAE has been hosting an is the development of new mate- helped attendees from the two coun- annual US Frontiers of Engineering rials, inspired by natural systems, tries become acquainted. In the after- meeting since 1995 and, in addi- motivated by synthetic and manu- noon, a poster session preceded by tion to CAFOE, has bilateral FOE facturing innovations, and driven flash poster talks provided an oppor- programs with Germany, Japan, and by sustainability concerns. The tunity for all participants to share the European Union. The meetings first presentation covered nano­ information about their research and bring together highly accomplished materials that can be used to solve technical work. The posters were left early-career engineers from industry, the pressing problem of water scar- up throughout the meeting, facilitat- academia, and government and pro- city. Next was a talk on biomimetic ing further discussion and exchange vide an opportunity to learn about adhesives that retain performance during the ­coffee breaks. On the developments, techniques, and under water. The third speaker second afternoon attendees toured approaches at the forefront of fields discussed additive manufacturing the Qualcomm Museum and areas other than their own. The program of complex materials, for example devoted to the Internet of Things also facilitates the establishment of in bio­printing and multi­material and Qualcomm’s Snapdragon™ plat- contacts and collaboration among printing. The session concluded form. The symposium program, list of the next generation of engineering with a talk on mass production of attendees, and presentation slides are leaders. high-quality flexible metamaterials­ available at the 2019 CAFOE link at For more information about the through a roll-to-roll process for www.naefrontiers.org. activity, or to nominate an out- large-area assembly of ­photonic Funding for this activity was pro- standing engineer to participate in crystals, which has applica- vided by Qualcomm, The Grainger future FOE meetings, go to www. tions in sensors, 5G, and medical Foundation, and the National Sci- naefrontiers.org or contact Janet treatments. ence Foundation. The next CAFOE Hunziker at [email protected].

Summer Interns in the NAE Program Office

SOUMYA CHAPPIDI is a Univer- sity of Virginia undergraduate stu- dent in the School of Engineering and Applied Sciences, studying for a BS degree in systems engineering and a BA in mathematics, with a minor in computer science. She has a side business in photography, is passionate about STEM education, and hopes to serve in the Peace Corps after finishing her undergrad- uate studies. Soumya is bilingual in English and Telugu. She worked with the Grand Challenges Scholars Program. SUDHIR (SID) SHENOY earned his bachelor of engineering in elec- tronics and communication from Jain University School of Engineer- ing and Technology in ­Bangalore. Interns Sid Shenoy and Soumya Chappidi with President John Anderson. FALL 2019 87

He is finishing his master’s­ degree puting, and cyber­physical systems, with the NAE’s Center for Engineer- in computer engineering at the Uni- and supervised project research ing Ethics and Society in the area of versity of Virginia, where he has on cryptography in cloud comput- ethics of AI and machine learning. ­studied machine learning, design ing. His particular interest is in Soumya and Sid were a great addi- and analysis of algorithms, computer­ driverless cars/trucks, ­robotics, and tion to the NAE Program Office architecture, autonomous mobile man-machine inter­faces. For extra- and contributed meaningfully to the robots, robots and humans (HRI), curricular activities Sid engages in GCSP and CEES efforts. We wish cooperative autonomous systems, swing dancing, ballroom dancing, them well as they continue their sensors and perception, cloud com- filmmaking, and debate. He worked studies!

Calendar of Meetings and Events

October 4–5 NAE Council Meeting November 10 EngineerGirl Steering Committee Meeting October 5 NAE Peer Committee Meeting Anaheim, California October 6–7 NAE Annual Meeting November 11–12 NAE Grand Challenges Scholars October 22–23 Working Ethics into the Conversation: Program Annual Meeting Introducing STEM Faculty to Teaching November 18–20 EU-US Frontiers of Engineering Symposium Ethics Stockholm October 24–25 OEC (Online Ethics Center) Advisory Group and Editorial Board Joint Meeting All meetings are held in National Academies facilities in November 7–9 EngineerGirl Ambassador Training Meeting Washington, DC, unless otherwise noted. Anaheim, California

In Memoriam

KEN AUSTIN, 87, founder, A-dec tions to the understanding and and for continued leadership in the Inc., died May 1, 2016. Mr. Austin­ management of turbulent mixing development of innovative ocean was elected in 1999 for invent- with application to chemical laser engineering. ing, designing, manufacturing, and design. marketing­ innovative dental equip- FERNANDO J. CORBATO, 93, ment systems and facilities. LLOYD S. CLUFF, 85, retired professor emeritus of computer sci- director, Earthquake Risk Man- ence and engineering and senior VLADIMIR V. BOLOTIN, 82, agement, Pacific Gas and Electric lecturer, Massachusetts Institute head, Laboratory of ­Reliability, Company, died June 4, 2019. Mr. of Technology, died July 12, 2019. ­Russian Academy of Sciences, Cluff was elected in 1978 for contri- Dr. Corbato was elected in 1976 for died May 28, 2008. Dr. Bolotin butions in identifying active seismic contributions to the development of was elected a foreign member in faults and their potential motions multiple-access computer systems. 1996 for contributions to technical with applications to earthquake leader­ship in the dynamics, stability, engineering. HARVEY G. CRAGON, 89, strength, and reliability of structure Ernest Cockrell Jr. Centennial and machines. BRUCE G. COLLIPP, 88, marine Chair Emeritus in Engineering, engineering consultant, died University of Texas at Austin, died JAMES E. BROADWELL, 97, November 29, 2017. Mr. Collipp was September 7, 2018. Mr. Cragon was consultant, Redwood City, CA, elected in 1991 for pioneering con- elected in 1978 for contributions to died June 22, 2018. Dr. Broadwell tributions to the semisubmersible­ the development of large-scale digi- was elected in 1987 for contribu- offshore floating drilling platform tal computer systems. The 88 BRIDGE

CHARLES B. DUKE, 81, retired March 18, 2019. Dr. Jeffs was elected contributions in inertial navigation, vice president and senior fellow, in 1978 for contributions to integer including the Navaho, ­Nautilus, Xerox Corporation, and research programming and its applications Minuteman, and submarine fleet professor of physics, University of to the scheduling and planning of system. Rochester, died June 28, 2019. Dr. industrial facilities. Duke was elected in 1993 for pro- DONALD W. PEACEMAN, viding the theoretical foundations JACK L. KERREBROCK, pro- 91, retired senior research advi- for developments in xerography. fessor emeritus of aeronautics and sor, Exxon­ Production Research astronautics, Massachusetts Insti- Company, died June 19, 2017. Dr. ELMER G. GILBERT, 89, pro- tute of Technology, died July 19, Peaceman was elected in 1999 fessor emeritus of aerospace engi- 2019. Dr. Kerrebrock was elected in for contributions to the develop- neering, University of Michigan, 1978 for contributions in the devel- ment and usage of transient three-­ died June 16, 2019. Dr. Gilbert was opment of propulsion and energy dimensional multiphase simulators elected in 1994 for contributions to conversion systems design and for predicting performance of petro- the theory and practice of multi­ research, education, and national leum reservoirs. variable, optimal, nonlinear, and service. computer control systems and to JACQUES PETERS, 95, professor control engineering education. CHRISTOPHER C. KRAFT emeritus, Department of Mechani- JR., 95, retired director, NASA cal Engineering, Catholic Univer- ROBERT C. HANSEN, 91, ­ohnson Space Center, died July 22, sity of Louvain, died December 12, president, R.C. Hansen Inc., died 2019. Dr. Kraft was elected in 2003 2018. Dr. Peters was elected a for- February 9, 2018. Dr. Hansen was for contributions to engineering eign member in 1977 for contribu- elected in 1992 for contributions through the planning and direction tions to the engineering of machine to the understanding of electro­ of the nation’s manned space flight tool and manufacturing processes. magnetic near-fields, electrically missions. small ­antennas, and phased arrays. ROBERT PLUNKETT, 100, JOHN L. MASON, 95, indepen- retired professor of mechanics, Uni- LEE A. IACOCCA, 94, Lee ­Iacocca dent consultant, died June 3, 2019. versity of Minnesota, Minneapolis, and Associates, died July 2, 2019. Dr. Mason was elected in 1988 for died March 19, 2019. Dr. Plunkett Mr. Iacocca was elected in 1986 for pioneering developments in space was elected in 1974 for contribu- outstanding engineering manage- power generation, vehicle power tions to experimental and analytical ment and coordination of engineer- plant heat exchangers, and environ- mechanics to solve noise, vibration, ing, manufacturing, marketing, and mental control systems. and fatigue problems. corporate planning activities in the automotive industry. KARL H. NORRIS, 98, retired CALVIN F. QUATE, 95, Leland research leader, Instrumentation T. Edwards Professor of Engineering SRINIVASA H. IYENGAR, 85, Research Laboratory, US Depart- Emeritus, Stanford University, died retired partner, Skidmore, Owings ment of Agriculture, died July 17, July 6, 2019. Dr. Quate was elected & Merrill, died July 4, 2019. Mr. 2019. Mr. Norris was elected in 1980 in 1970 for research, teaching, and Iyengar was elected in 2000 for lead- for research and development of sys- management in microwave and ership and contributions in struc- tems for simple and rapid analysis of ­solid-state electronics. tural design of tall buildings and quality factors in food products and long-span structures and advances similar materials. RICHARD J. ROBBINS, 85, in fire-resistive construction. president, The Robbins Group NORMAN F. PARKER, 87, LLC, died May 30, 2019. Dr. GEORGE W. JEFFS, 94, Univer- retired president and CEO, Varian­ ­Robbins was elected in 1991 for sity Professor and Thomas Lord Associates Inc., died March 29, pioneering development of tunnel Professor of Operations Research, 2011. Dr. Parker was elected in 1976 boring machines, and for enhanc- Carnegie Mellon University, died for leadership in electronics and ing the worldwide US techno- FALL 2019 89

logical leadership position in rock WALTER J. SCHRENK, 85, RICHARD N. WRIGHT, 87, tunnel construction. retired senior research scientist, retired director, Building and Fire Dow Chemical Company, died Research, National Institute of Stan- JOSEPH C. SALAMONE, 79, October 31, 2018. Mr. Schrenk dards and Technology, died May 31, chief science officer, Rochal Indus- was elected in 1994 for invention, 2019. Dr. Wright was elected­ in 2003 tries, died July 9, 2019. Dr. Salamone research, and development of poly- for sustained leadership­ in building was elected in 2011 for advances mer fabrication processes that have research, for the development of in ophthalmological devices and enabled broad use of plastics in new standards, and for representing the wound healing therapies and for applications. US building industry and research distinguished academic and profes- community worldwide. sional service. Publications of Interest The following reports whose author- tion, techniques that have been Harvey in Houston (2017), caused ing committees included NAE used for many years to increase the billions of dollars in property dam- members were recently published speed at which computers operate. age, adversely affected millions of by the National Academy of Engi- The discovery upends a number of people, and damaged the economic neering or the National Research common assumptions about cyber- well-being of major metropolitan Council. Unless otherwise noted, security and draws attention to the areas. Flooding takes a heavy toll all publications are for sale (pre- complexities of the global supply even in years without a named paid) from the National Acade- chain and global customer base for storm or event. Major freshwater mies Press (NAP), 500 Fifth Street the vast range of devices and cloud flood events from 2004 to 2014 cost NW–Keck 360, Washington DC capabilities that all computer users an average of $9 billion in direct 20055. For more information or to rely on. In October 2018 the Forum damage and 71 lives annually, and place an order, contact NAP online on Cyber Resilience hosted a work- the cumulative costs of frequent, at ­­ or by phone at shop to explore the implications of small floods can be similar to those (888) 624-6242. (Note: Prices quoted this development. This publication of infrequent extreme floods. This are subject to change without notice. summarizes the workshop presenta- report examines examples in spe- There is a 10 percent discount for tions and discussions. cific metropolitan areas and iden- online orders when you sign up for a Fred B. Schneider (chair), tifies commonalities and variances MyNAP account. Add $6.50 for ship- ­Samuel B. Eckert Professor of among the areas in terms of causes, ping and handling for the first book and Computer­ Science, Cornell Univer- adverse impacts, unexpected prob- $1.50 for each additional book. Add sity, and Butler W. Lampson, tech- lems in recovery, or effective miti- applicable sales tax or GST if you live nical fellow, Microsoft Research, gation strategies. It also relates, as in CA, CT, DC, FL, MD, NC, NY, served on the workshop committee. appropriate, causes and actions of VA, WI, or .) Free PDF. urban flooding to existing federal resources or policies. Beyond Spectre: Confronting New Framing the Challenge of Urban Flood- David R. Maidment (chair), Technical and Policy Challenges – ing in the United States. Flooding is Hussein M. Alharthy Centennial ­Proceedings of a Workshop. In 2017 the natural hazard with the greatest Chair in Civil Engineering, ­Center researchers discovered a vulner- economic and social impact in the for Water and Environment, Uni- ability in microprocessors used in United States, and these impacts versity of Texas at Austin, and computers and devices all over the are becoming more severe. Cata- Dara Entekhabi, professor, Parson world. The vulnerability, named strophic flooding from recent hurri- Laboratory, Massachusetts Institute Spectre, combines side effects from canes, including Superstorm Sandy of Technology, served on the study caching and speculative execu- in New York (2012) and Hurricane committee. Paper, $58.00. The 90 BRIDGE

Quantum Computing: Progress and a wide range of terrestrial environ- design a future without pollution Prospects. Quantum mechanics, the ments. Combining scientific inter- and waste; create efficient, healthy, subfield of physics that describes est and public appeal, the search for resilient cities; and foster informed the behavior of very small (quan- life in the solar system and beyond decisions and actions. tum) particles, provides the basis for provides a scientific rationale for Craig H. Benson, dean, School a new paradigm of computing. First many activities of NASA and other of Engineering, Hamilton Endowed proposed in the 1980s as a way to national and international agen- Chair in Civil and Environmental improve computational modeling cies and organizations. This study, Engineering, University of Virginia;­ of quantum systems, quantum com- requested by NASA, offers a science G. Wayne Clough, secretary puting has recently garnered signifi- strategy for astrobiology that out- emeritus, Smithsonian Institution, cant attention thanks to progress in lines key scientific questions, iden- and president emeritus, Georgia building small-scale devices. How- tifies the most promising research in Institute of Technology; John C. ever, significant technical advances the field, and indicates the extent to Crittenden, director, Brook Byers will be required before a large-scale, which mission priorities in decadal Institute for Sustainable Systems, practical quantum computer can be surveys address the search for life’s Georgia Institute of Technology; achieved. This report provides an origin, evolution, distribution, and Maxine L. Savitz, retired general introduction to the field, includ- future in the universe. The consen- manager, Technology/Partnerships, ing the unique characteristics and sus report makes recommendations Honeywell Inc.; Norman R. Scott, constraints of the technology, and for advancing research, obtain- professor emeritus, Department of assesses the feasibility and implica- ing measurements, and realizing Biological and Environmental Engi- tions of creating a functional quan- NASA’s goal to search for signs of neering, Cornell University; and R. tum computer capable of addressing life in the universe. Rhodes Trussell, chair and founder, real-world problems. The report Philip M. Neches, founder, Trussell Technologies Inc., served considers hardware and software ­Teradata Corporation, served on the on the study committee. Paper, requirements, quantum algorithms, study committee. Paper, $80.00. $45.00. drivers of advances in quantum computing and quantum devices, Environmental Engineering for the Strategic Investments in Instrumenta- benchmarks associated with rele- 21st Century: Addressing the Grand tion and Facilities for Extraterrestrial vant use cases, the time and resourc- ­Challenges. Environmental engi- Sample Curation and Analysis. The es required, and how to assess the neers support the well-being of United States has a treasure trove probability of success. people and the planet in areas of extraterrestrial samples that were Mark A. Horowitz (chair), where the two intersect. Work in returned to Earth via space mis- Yahoo! Founders Chair, EE and this field has improved countless sions over the past four decades. CS, Stanford University, and Dan lives through innovative systems Analyses of these samples have led Boneh, professor, computer science for delivering water, treating waste, to major breakthroughs in under- and electrical engineering, Stanford­ and preventing and remediating standing of the age, composition, University, served on the study pollution in air, water, and soil. and origin of the solar system. Hav- committee. Paper, $55.00. These achievements are a testa- ing the instrumentation, facilities, ment to the multidisciplinary,­ prag- and qualified personnel to analyze Astrobiology Strategy for the Search matic, ­systems-oriented approach such samples, especially from mis- for Life in the Universe. Astro­biology that characterizes environmental sions that take up to a decade or is the study of the origin, evolu- engineering, This report outlines longer from launch to return, is thus tion, distribution, and future of life the crucial role for environmental of paramount importance if NASA in the universe. The inherently engineers and identifies five press- is to capitalize on its investment in interdisciplinary field encompasses ing challenges that environmen- these missions and to achieve the astronomy, biology, geology, helio- tal engineers are uniquely poised full scientific impact afforded by physics, and planetary science, with to help address: sustainably supply these extraordinary samples. This complementary laboratory activi- food, water, and energy; curb climate consensus report assesses current ties and field studies conducted in change and adapt to its impacts; planetary science capabilities for FALL 2019 91

sample return analyses and curation, ment program, including estimated importance of MSIs to other stake- and determines what capabilities are costs and potential impact. holders in the nation’s higher edu- missing and will be needed for future Mark A. Barteau, vice president cation system and the organizations sample return missions. It evaluates for research, Texas A&M Univer- that support them. whether current laboratory support sity, College Station, served on the Wesley L. Harris, Charles Stark infrastructure and NASA’s invest- study committee. Paper, $115.00. Draper Professor of Aeronautics and ment strategy are adequate to meet Astronautics, Massachusetts Insti- these analytical challenges and Minority Serving Institutions: America’s tute of Technology, served on the advises how the community can Underutilized Resource for Strengthen- study committee. Paper, $65.00. keep abreast of evolving and new ing the STEM Workforce. There are techniques in order to stay at the over 20 million young people of Offshore Well Completion and Stimu- forefront of extraterrestrial sample color in the United States whose lation: Using Hydraulic Fracturing and analysis. representation in STEM educa- Other Technologies – Proceedings of a James H. Crocker, retired vice tion pathways and in the STEM Workshop. While the public is gen- president, international, Lockheed workforce remains far below their erally aware of the use of hydrau- Martin Space Systems Company, numbers in the general popula- lic fracturing for unconventional served on the study committee. tion. Their participation could resource development onshore, it is Paper, $65.00. help re­establish US preeminence in less familiar with the well comple- STEM innovation and productivity tion and stimulation technologies Negative Emissions Technologies and while also increasing the number used in offshore operations, includ- Reliable Sequestration: A Research of well-educated STEM workers. ing hydraulic fracturing, gravel Agenda. To achieve goals for cli- Nearly 700 minority-serving insti- packs, “fracpacks,” and acid stimu- mate and economic growth, nega- tutions (MSIs) provide pathways lation. Just as onshore technologies tive emissions technologies (NETs) to STEM educational success and have improved, well completion that remove and sequester carbon workforce readiness for millions of and stimulation technologies for ­dioxide (CO2) from the air will need students of color. They vary in their offshore hydrocarbon resource to play a significant role in mitigat- origins, missions, student demo- development have progressed over ing climate change. Unlike carbon graphics, and levels of institutional many decades. To increase public capture and storage technologies selectivity, but overall provide a understanding of these technolo- that remove CO2 emissions directly­ gateway to higher education and gies, a NASEM workshop in Octo- from large point sources such as the workforce for underrepresented ber 2017 examined the unique coal power plants, NETs remove students of color and those from features of operating in the US CO2 directly from the atmosphere low-income and first-generation-to- offshore environment, with discus- or enhance natural carbon sinks. college backgrounds. The challenge sions of well completion and stimu- Storing the CO2 from NETs has the is to capitalize on the unique attri- lation technologies, environmental same impact on the atmosphere and butes of these institutions and to considerations and concerns, and climate as simultaneously prevent- equip them with the resources, fac- health and safety management. Par- ing emission of an equal amount of ulty talent, and vital infrastructure ticipants from government, indus- CO2. Analyses show that deploying needed to educate and train current try, academia, and nonprofit sectors NETs may be less expensive and less and future generations of scientists, shared their perspectives on opera- disruptive than reducing some emis- engineers, and health professionals. tional and regulatory approaches to sions, such as a substantial portion of This consensus report examines the mitigating risks to the environment agricultural and land-use emissions nation’s MSIs and identifies prom- and to humans in the development and some transportation emissions. ising programs and effective strate- of offshore resources. This publica- This report assesses the benefits, gies that have the highest potential tion summarizes the workshop pre- risks, and “sustainable scale poten- return on investment for the nation sentations and discussions. tial” for NETs and sequestration. by increasing the quantity and qual- David A. Dzombak, Hamerschlag­ It also defines the essential com- ity of MSI STEM graduates. It also University Professor and head, ponents of a research and develop- provides information about the Department of Civil and Envi- The 92 BRIDGE ronmental Engineering, Carnegie ing committee acknowledges that can be used to determine the suc- ­Mellon University, was a member of improved models for projecting cess or risks of failure of the system, the workshop planning committee. impacts of changes in truck size and focusing on safety, corrosion, perfor- Paper, $60.00 weight limits, while necessary, will mance, and reliability, availability, not guarantee the success of future and maintainability. Continuous Manufacturing for the Mod- truck size and weight policy studies. Ronald M. Latanision, senior ernization of Pharmaceutical Production: Such studies will be useful as guides fellow, Exponent Inc., served on the Proceedings of a Workshop. In July for decisions only if policy objec- study committee. Free PDF. 2018 a NASEM workshop explored tives and practical policy options are business and regulatory concerns clearly defined, the analysis is logi- Final Report of the Committee on a associated with the use of continu- cally structured to reveal the most Strategic Plan for US Burning Plasma ous manufacturing techniques to promising policies, and uncertain- Research. Fusion offers the prospect produce biologics such as enzymes, ties are properly characterized. The of virtually unlimited energy, and monoclonal antibodies, and vac- committee’s first report, in 2018, the United States and many nations cines. Participants also discussed summarized the research recommen- around the world have made enor- challenges to integration across the dations of past truck size and weight mous progress toward achieving manufacturing system, including limit studies and identified criteria fusion energy. With ITER sched- upstream and downstream process- for deciding the priority of topics for uled to go online within a decade es, analytical techniques, and drug inclusion in the research plan. and demonstrate controlled fusion product development. The work- Dennis F. Wilkie, retired cor- ten years later, now is the time for shop addressed these challenges porate vice president, Ford Motor the United States to develop plans broadly across the biologics domain Company and Motorola Inc., and to benefit from its investment in but focused particularly on drug cat- Sharon L. Wood, dean, Cockrell burning plasma research and take egories of greatest FDA and indus- School of Engineering, University steps to develop fusion electricity trial interest such as monoclonal of Texas at Austin, served on the for the nation’s future energy needs. antibodies and vaccines. This pub- study committee. Free PDF. At the request of the Department of lication summarizes the workshop Energy, a NASEM committee was presentations and discussions. Metrics for Successful Supercritical organized to develop a strategic plan Gintaras V. Reklaitis, Burton Water Oxidation System Operation at for US fusion research. This report’s and Kathryn Gedge Distinguished the Blue Grass Chemical Agent Destruc- two main recommendations are that Professor of Chemical Engineer- tion Pilot Plant: Letter Report. The the United States should (1) remain ing, Purdue University, chaired supercritical water oxidation sys- an ITER partner as the most cost- the workshop planning committee. tem at the Blue Grass Chemical effective way to gain experience Paper, $65.00. Agent Destruction Pilot Plant near with burning plasma at the scale of a Richmond, Kentucky, is a second- power plant and (2) start a national Research to Improve Estimates of ary waste processing reactor that program of research and technol- Impacts of Changes in Truck Size and is an important unit in the func- ogy to support the construction of Weight Regulations. This TRB report tion of the Blue Grass Chemical a compact pilot plant that produces defines a program of 27 coordinated­ Agent Pilot Program. The system electricity from fusion at the lowest research projects in six areas to is designed to reactively destroy the possible capital cost. reduce major sources of uncertainty primary products of agent hydrolysis,­ C. Paul Robinson, president in projections of the consequences thus preventing chemical reforma- emeritus, Sandia National Labora- of proposed changes in truck size tion of the original agents. This tories, served on the study commit- and weight limits. The author- letter report develops metrics that tee. Paper, $95.00.

The Periodicals BRIDGE Postage Paid (USPS 551-240)

National Academy of Engineering 2101 Constitution Avenue NW Washington, DC 20418