Tags Posts tagged with "hackers"

hackers

Pixabay photo

By Frank Artusa

For as long as there have been nation states, spies have been hard at work trying to gather intelligence for strategic advantage. Historically, the direct victims of such efforts have been government agencies, the military and corporate intellectual property, but recent events have put us all in the crosshairs when it comes to our digital communications.

Though sophisticated methods like collecting radio frequency emanations, tapping above ground and undersea communications cables, and other signals intelligence techniques, have been historically employed by adversary nations, few could have predicted the massive data breach recently perpetrated by an elite hacker group attributed to the People’s Republic of China called Salt Typhoon.

Salt Typhoon, a codename assigned by Microsoft’s cyber threat intelligence team, was first discovered in Fall 2024 to have compromised telecommunications systems and networks belonging to Verizon, T-Mobile, Spectrum and several others. The widespread compromise involved the exposure of data associated with phone calls, voicemails, and text messages impacting millions of Americans. The true extent of this massive breach has yet to be revealed, and it’s unknown whether the affected systems have been fixed.

The idea that any hacker group could obtain access to such critical infrastructure and persist, undetected, for apparently up to a year or more, is difficult to comprehend. The Federal Government’s Cybersecurity and Infrastructure Security Agency (CISA) indicated that Salt Typhoon was able to obtain access due to unpatched network hardware and leveraging entry points designed for use  by law enforcement, or “backdoors”.

Some experts blame the Communications Assistance for Law Enforcement Act (CALEA), a 1994 digital wiretapping law that compels telecommunications companies to assist law enforcement in conducting electronic surveillance with a court order. This tool by the very nature of its existence presents a potential backdoor into the telecom’s network. However, federal, state, and local law enforcement authorities utilize this technique to investigate criminal activity, with probable cause, to uncover evidence of crimes ranging from gang activity, organized crime, public corruption and everything in between. This makes CALEA a double edged sword: supporters laud its criticality to criminal investigations and detractors argue for its potential misuse by hackers or a corrupt government. 

Despite the obstacle described above, in December 2024 the FBI and CISA took the bold step of recommending that individuals utilize communication apps that offer end to end encryption (E2EE). E2EE is an encryption methodology that is used by apps like Whatsapp, Signal, and iMessage (when communicating between apple devices). 

E2EE makes it impossible for an interloper to read data due the advanced encryption utilized to encode data. As an example, it would require thousands, if not millions of years for a supercomputer to break encryption implemented by these applications. Quantum computing, a radical new computer processing technology poses a threat, but this innovation is still years away and governments are aggressively working to develop quantum proof encryption as well.

A clear use of the government’s own utilization of this E2EE technology was recently demonstrated when U.S. national security and defense officials used Signal to communicate tactical war plans in Yemen, albeit with unintended recipients.

Threats posed by advanced nation states capable of funding top tier cyber espionage operations is growing, with dozens of capable groups originating from Russia, Iran and North Korea as well as China. Additionally, this doesn’t include independent cyber criminal groups looking to steal and sell personal data. Considering the wide array of potential threats to digital data, E2EE appears to be one of the few tools guaranteed to stop hackers from eavesdropping on digital communications.

Internet Crime Complaint Center — www.ic3.gov

Frank Artusa, a resident of Smithtown, is a current cybersecurity professional and retired FBI Special Agent.

Haley Olson. Photo from SCCC

Two Suffolk County Community College Computer Science students, Haley Olson and Joseph Hanrahan recently took top honors and a cash prize at the Center of Excellence in Wireless and Information Technology (CEWIT) at Stony Brook University’s Sixth Annual Hackathon.

“I congratulate our students for excelling at this year’s Hackathon,” said Suffolk County Community College President Dr. Edward Bonahue. “Our students demonstrate year after year that they have the skills and training needed to succeed in demanding technology environments, and their accomplishments underscore the value of Suffolk County Community College’s education.”

Olson and Hanrahan created a game for the coding competition that utilized computer languages they learned on the fly.

“One challenge we ran into was not knowing JavaScript at all. It was a completely new language for us. HTML and CSS were relatively new to us too.  Also, we had to learn how to web scrape in order to get our NFT data for our project,” the pair wrote in their project description for their game, that “that informs the public about NFT’s as well as shows the shocking price tags.”

An NFT — non-fungible token — is a special kind of crypto asset in which each token is unique — as opposed to “fungible” assets like Bitcoin and dollar bills, which are all worth exactly the same amount. Because every NFT is unique, they can be used to authenticate ownership of digital assets like artworks, recordings, and virtual real estate.

Olson and Hanrahan’s game Guess the Most Expensive NFT involves a player choosing from among three random NFTs to guess which is most expensive. After finishing the game, the player can look at the information on each NFT via the links that appear under each picture.

Olson, of Port Jefferson Station, who will graduate in May with an Associates in Computer Science said the challenging part was learning the new languages. “We programmed using Java Script, HTML and CSS and learned how to create a web site, guessthenft.net,” Olson said. Olson previously earned a B.A. in actuarial science from SUNY Binghamton in 2020 and interned at Memorial Sloan Kettering Cancer Center last summer creating data visualizations for the radiology department’s finance manager.

Professor Bin Li had praise for the college’s program and students.

“Haley established a STEM students’ research club in the spring semester of 2022, and is serving as president of the club,” Li said, and explained that Haley and Joseph competed with 4-year college students and won the award for outstanding innovation in their project.”

“Our students have participated in Hackathon events hosted by Stony Brook University and won awards for three consecutive years,” Li said, “and several students are interned at top institutions, including 3DQI Lat at MGH, Harvard Medical School, Brookhaven National Lab.”