Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Government Businesses The Military News Apple

Army Buys Macs to Beef Up Security 342

agent_blue writes "The Army is integrating Macs into their IT network to thwart hack attempts. The Mac platform, they argue, is more secure because there are fewer attacks against OS X than Windows-based systems. 'Military procurement has long been driven by cost and availability of additional software--two measures where Macintosh computers have typically come up short against Windows-based PCs. Then there have been subtle but important barriers: For instance, Macintosh computers have long been incompatible with a security keycard-reading system known as Common Access Cards system, or CAC, which is heavily used by the military. The Army's Apple program, created [in 2005], is working to change that.'"
This discussion has been archived. No new comments can be posted.

Army Buys Macs to Beef Up Security

Comments Filter:
  • How many times? (Score:4, Insightful)

    by morgan_greywolf ( 835522 ) on Friday December 21, 2007 @04:17PM (#21783658) Homepage Journal
    How many times do I have to keep telling people that security is more about the skill of the IT staff than it is about the operating system it runs on?

    Yes, Windows has vulnerabilities. Windows sucks as far as security goes. That goes for Vista, too. But waving around an OS like it was some magic bullet that's going to somehow fix your security problems is, well, insanity.

  • Re:How many times? (Score:5, Insightful)

    by VirusEqualsVeryYes ( 981719 ) on Friday December 21, 2007 @04:28PM (#21783838)
    Psh, yeah. That 8% of Macs -- only a few tens of millions? All with no anti-virus software whatsoever? And the fame/infamy of being the first to write a self-replicating virus for Macs?

    Yeah. Totally not worth it.

    Stop perpetuating simple-minded myths.
  • Re:How many times? (Score:5, Insightful)

    by Daniel Dvorkin ( 106857 ) on Friday December 21, 2007 @04:30PM (#21783884) Homepage Journal
    How many times do I have to keep telling people that security is more about the skill of the IT staff than it is about the operating system it runs on?

    "More about" is not the same as "entirely about." Sure, a good IT staff with a bad system will be more secure than a bad IT staff with a good system. But a good IT staff with a good system will be more secure than either. And Unix-based systems, including OS X, are demonstrably better in terms of security than Windows-based systems are.

    Do you think the Army should go back to using bolt-action rifles? It's true that a good marksman with an M1903 is more useful on the battlefield than a bad marksman with an M16, but ...
  • by someone1234 ( 830754 ) on Friday December 21, 2007 @04:31PM (#21783896)
    Maybe because no one would bribe anyone to buy linux, the profit margin is thin.

  • by QuietLagoon ( 813062 ) on Friday December 21, 2007 @04:31PM (#21783900)
    But waving around an OS like it was some magic bullet that's going to somehow fix your security problems is, well, insanity.

    If you read the article instead of the headline, you'll see that the Army is making the attack target more diversified, so that a single attack will not bring down all computers. What's wrong with that tactic?

  • Re:OpenBSD??? (Score:4, Insightful)

    by ByOhTek ( 1181381 ) on Friday December 21, 2007 @04:34PM (#21783960) Journal
    Yes, and no.

    I think they should use tools available cross-architecture for their software, and then have a multi-arch setup. For example:

    30% Free/Net/Open BSD
    30% Linux
    25% Mac
    15% Windows

    This would alleviate the issues of an entire-network compromise from potentially overlooked vulnerabilities in any one system. Because you can get fairly simple general interaction for the operating systems listed (given modern desktop environments offered on Linux/BSD, Mac would be the most "different" and not terribly so even then), and applications That had cross-platform natures would be all that's used, there would be little difficulty for the end users to go between systems.

  • by WinterSolstice ( 223271 ) on Friday December 21, 2007 @04:35PM (#21783974)
    As a long time opponent of homogeneous computing/infrastructure I think this is a great move. Any security conscious shop makes certain to balance the management benefits along with the heterogeneous benefits.

    Sure, it's cute and cheap to run everything on any one platform, but like they always say "spread out or one grenade will get you all".
  • Re:OpenBSD??? (Score:4, Insightful)

    by eli pabst ( 948845 ) on Friday December 21, 2007 @04:35PM (#21783982)
    Apple may have unix roots, but openBSD it is not. There is no comparison security-wise, openBSD wins hands down. If you need user-friendliness and usability, then that significantly changes the equation. My guess is they are looking for improved security with the happy clickiness that Macs provide.
  • by theshowmecanuck ( 703852 ) on Friday December 21, 2007 @04:38PM (#21784022) Journal

    ... The Mac platform, they argue, is more secure because there are fewer attacks against OSX than Windows-based systems. ...

    Not any more.

    If the army is using it for that reason then you know the Chinese, Russians, and any other tech savvy nation will now point their hackers at Macs.
  • by SamP2 ( 1097897 ) on Friday December 21, 2007 @04:41PM (#21784058)
    The simple thing that's wrong with that tactic is that instead of having to provide security for one OS, they now have to provide security for both.

    When protecting data, think "serial" and not "parallel". You won't get extra security by diversifying your OSs because hackers don't need to hack ALL of them, but just ONE of them, to compromise data. This is not a case of "redundant systems", but rather a case of "the weakest link". The more OSs are supported the more chances that AN OS will get hacked (as opposed to ALL OSs), but when it comes to protecting data, hacking that ONE OS is all it takes. Hackers are certainly more agile than the government, and the government should try to minimize its profile, together with hacking avenues, rather than build redundant systems where redundancy is not the solution for the problem at hand.

    In other cases when the issue IS parallel, such as protecting a mission-critical system (think Space Shuttle), then yes, multiple OS's increase the chance that any one will survive. But this doesn't apply to data security. They should stick to one OS as well as one of everything else, preferably as secure as possible (NetBSD, some Linux distros, etc). But even JUST Windows is more secure than Windows and OTHER stuff together, because you keep all the risks of Windows while adding the extra (even if relatively smaller) risk of the other system on top of the original risk.
  • You first. (Score:0, Insightful)

    by Anonymous Coward on Friday December 21, 2007 @04:42PM (#21784066)
    Macs are nothing in the eyes of malicious hosers out there.

    The majority of compromisation attempts happen now in order to set up botnets. There are two huge targets for this. First, Windows. Your average home cable modem has a decent chunk of bandwidth and - let's face it, it's Windows. By default, it's completely insecure. There's not much work at all involved in getting into Joe User's Windows box.

    Second is - surprise surprise, Linux. Why Linux? Because Linux is insecure by default as well. Oh, I know, I'm invoking the wrath of the Open Sores Horde here, but it is. "UNIX PERMISSIONS LOL" - my ass, a credit card phishing site can sit in /home/moron just as easily as /var/www/html. Linux is secure - sure, until you install a CMS on it and never update said CMS software. Once that happens, you might as well be using Windows.

    Botnets are just as easy to run from /home/moron.

    And frankly, Linux is as easy to compromise as Windows - once you get on. Install crappy CMS software and never update? You're asking to be hosed. Using passwords instead of SSH keys for user login? You're asking to be hosed.

    And compromisation of Linux systems happens far more often than the frothing Linux zealots would have you believe. By default - sure, Linux is 'more secure'. Nobody using Linux leaves the system in a default state. That's the problem.

    Now, where's Mac in all this?

    Nowhere. Mac isn't popular enough to warrant the attention of script-kiddy like prepackaged exploit tools. Nine times out of ten, if you hit up a residential IP, you'll find Windows boxes at the other end. Why bother wasting time with Mac-related crap?

    Conversely, you're more likely to hit Linux and Windows if you hit up boxes sitting in a datacenter.

    For the two high-priority targets of malicious idiots - Mac is nowhere to be found. That's the reason your Mac is safe. Sure, you can go on about e-mail worms and other exploits of twelve year olds, but we're talking systems being hacked, not ill-trained users who click on WICKEDSCREENSAVER.zip.exe.
  • Re:How many times? (Score:2, Insightful)

    by runningduck ( 810975 ) on Friday December 21, 2007 @04:44PM (#21784100)
    Even if the market was split evenly there is still an advantage to utilizing two different platforms which the article clearly points out; a single attack is unlikely to take down all systems. This falls in line with the principal of using different platforms between a DMZ and an internal server when providing a service to the Internet. The difference, mathematically speaking, greatly reduces the probability of a successful internal compromise.
  • Re:How many times? (Score:4, Insightful)

    by mi ( 197448 ) <slashdot-2017q4@virtual-estates.net> on Friday December 21, 2007 @04:47PM (#21784136) Homepage Journal

    If the military starts using them, it's only a matter of time until attackers hone their Mac skills and then the Army is right back to where it started, possibly even worse off because they evidently wouldn't see it coming.

    Well, if they mix the OS-vendors like they (finally) mix aircraft-engine suppliers [aviation.com], it will be harder for an adversary to knock out all computers with the same (cyber-)attack. If a flow is found and/or exploited in some of the systems, they can be shut down and the same tasks performed on systems of (an)other type(s).

    This argument — strength of diversity — floated here before...

  • by Foofoobar ( 318279 ) on Friday December 21, 2007 @04:55PM (#21784260)
    so whats wrong with supporting more than one OS? Would you prefer one point of failure? A good sys admin can support multiple platforms. The only people I ever hear complain about this are Windows people who can't support anything else. Linux admins can ALWAYS support Windows and Mac platforms so why is it so hard for the vast majority of Windows admins to support the other platforms? Hmmm...? Do you just prefer having a single point of failure?
  • Re:You first. (Score:2, Insightful)

    by Anonymous Coward on Friday December 21, 2007 @04:59PM (#21784314)

    Because Linux is insecure by default as well.

    Linux is secure - sure, until you install a CMS on it and never update said CMS software.
    I'm sensing some cognitive dissonance here...
  • by QuietLagoon ( 813062 ) on Friday December 21, 2007 @05:02PM (#21784350)
    The simple thing that's wrong with that tactic is that instead of having to provide security for one OS, they now have to provide security for both.

    And your point is? That extra security costs money?

    When protecting data, think "serial" and not "parallel". You won't get extra security by diversifying your OSs because hackers don't need to hack ALL of them, but just ONE of them, to compromise data.

    In one instance you may be correct, but in other instances, you are not. Whether or not data are compromised depends upon how that data are partitioned and where the data reside.

    You do get extra security by diversification, because you have the ability to continue to function while one OS's computers are struggling with a malware attack.

    Note that the article is not saying that diversification of OS will make an installation 100% secure, just that it will improve the likelihood of continued operation albeit at reduced levels.

  • Re:Ubuntu? (Score:3, Insightful)

    by damburger ( 981828 ) on Friday December 21, 2007 @05:02PM (#21784358)

    Because Linux is for European communist queers who pirate music. Macs are all-american and manly (sort of).

    Seriously though, its probably to do with letting Apple join in at the endless corporate trough that is the US military, in order to expand their domestic support. Geeks will be more likely to be in favour of an idiotic war if it generates tech jobs.

    Also, the international, share-everything ethos associated with Linux is unlikely to be popular with the people who came up with ITAR.

  • Re:OpenBSD??? (Score:3, Insightful)

    by nightgeometry ( 661444 ) on Friday December 21, 2007 @05:13PM (#21784506) Journal

    Macs have a large corporation backing them. With the partial exception of Red Hat, any given flavor of *nix doesn't.


    So I guess AIX [ibm.com], HP-UX [hp.com] and Solaris [sun.com] don't have large corporations backing them.

    Always best to be careful what you say about who does back those three, they all seem to have blood thirsty ninja vampire lawyers to hand...
  • Re:How many times? (Score:4, Insightful)

    by jackpot777 ( 1159971 ) on Friday December 21, 2007 @05:14PM (#21784526)
    Let's put this in a language we can all understand.

    Money.

    According to one of these links, a press release, on Google [google.com], ID thieving alone "costs more than $56 billion, or $6383 per victim, annually". That's US, obviously.

    Social hacks (phishing) can be done to anyone clever enough to hold a conversation but stupid enough not to be even slightly cynical when strangers start asking certain questions. But many phishing techniques ask the hapless victim to download an attachment, or get access to the victim's computer using online foot-in-the-door tricks like eCards that are more than they appear [hexus.net].

    What's the level of Mac penetration? 5%? 8%? Let's say it's the lowest number. Five percent of $56 billion is still $2.8 billion a year. If anyone manages to write malware that could spread in the way PC malware can multiply, especially with the average Mac user's attitude ("virus protection? Why should I save a PC user's arse when I send them Word documents? My iBook's fine..."), imagine the draw for crime syndicates. A guaranteed first shot at nearly three billion EVERY YEAR.

    And yet it hasn't happened. An illegal industry that pays better than drugs, without the inherent violence on the streets, and Mac users steadfastly refuse to get fleeced.

    Which means either the criminals either aren't really that hungry for this potential sector, or there's an easier way to get the money.

    Just having the standard feature in a Mac that asks for your password for any new program being installed means you're put on guard. "Hey, I went to see this funny ReindeerYourself card and it's asking for my passowrd? No way..." and the keylogger software remains off your computer. It wouldn't matter if Mac penetration was 12%, 15%. If it's so much easier to hack the PC system for financial gain, it's not financially viable for anyone to write the keylogger software and then wait for enough Mac owners to be stupid enough to install the software to recopu their costs. Just let Windows users visit the page you mass-maile and enough will click the link with high speed connections. Ker-ching.

    So this is finally put-up-or-shut-up for the Windows fanboyz. If the US Army puts its weight behind it, this shifts the whole landscape for writing malware. You see: before this announcement, any jihadist that wanted death to America would just do what all the other fanboys did: learn Visual Basic and send away. But now? Now they'll need to try and sneak through the Mac architecture. And unlike the Russian Mafia, cost isn't an issue. The 'enemy' will throw everything they have to bring the Army system down. Cost isn't an issue if money is not what you're after.

    So if it turns out that a world full of hate-filled terrorists that care nowt for money can't hack their way in, what then for the Apple bashers?
  • Re:OpenBSD??? (Score:5, Insightful)

    by peragrin ( 659227 ) on Friday December 21, 2007 @05:15PM (#21784538)
    Actually on a properly designed system not even the Administrator's should be able to install applications alone. And no one should be able to open every file.

    Files should be locked, So while the Admin's can see them, move/copy them, they can't actually open the file itself. security should extend to more than just the file system, but to the files themselves. Of course being open to all should also be a manual changed possibility.

    I wonder how long it will take for someone who makes more money than I will ever see to figure that out.
  • by Anonymous Coward on Friday December 21, 2007 @05:41PM (#21784860)
    It's hardly surprising that the military is buying Macs. Security through obscurity has ALWAYS been their security model. That's why they are getting hacked by China all the time.

    But hey, when you let kids under 20 with no experience make decisions like this, don't be surprised when they start making poor decisions. You can't blame them, they have been hearing anti-MS FUD for most of their lives, and don't have any real IT experience under their belt (yet) to know how many lies the FOSSies and Leoptards have been telling.
  • Re:OpenBSD??? (Score:4, Insightful)

    by 99BottlesOfBeerInMyF ( 813746 ) on Friday December 21, 2007 @05:55PM (#21785050)

    Actually, given that it is military and should have very fine grained security, nobody should have the rights to install a program, not even on their own space, except administrators.

    One of the biggest security problems is when security reduces usability to the point where users bypass the security for convenience, or simply because it is easier. I've even seen situations where no one had rights to install any software because of security policies, and the admins were then ordered to look the other way for security violations in general because a company still needed to get work done and make money. Good security does not reduce usability. If users don't have the ability to run the software they want to, you've greatly reduced usability and should not be surprised when users start rebooting from a flash drive or working on their home PCs with basically no security.

  • by Jesus_666 ( 702802 ) on Friday December 21, 2007 @06:22PM (#21785374)
    Probably because they already use Linux [slashdot.org]. It's hard to start using something you already use.
  • Re:OpenBSD??? (Score:5, Insightful)

    by UnknowingFool ( 672806 ) on Friday December 21, 2007 @06:33PM (#21785516)
    While openBSD may be more secure, remember the Army is about procedures. Leopard has been certified as Unix like AIX and Solaris. Leopard has gone through the time and expense to be certified, and it has a better UI whereas openBSD has not.
  • by fermion ( 181285 ) on Friday December 21, 2007 @06:38PM (#21785562) Homepage Journal
    One side would say that there are benefits to supporting only one system. One can get expertise in supporting, maintaining, and securing the system. There are cost savings in not having to maintain separate inventories. There are cost saving in being able to hire a cheaper labor who must only know the rote procedure for the system, rather than understand the basic principles that will allow the person to work on multiple systems.

    However, predictability poses a significant security risk. If I know exact schedule of a patrol, I know exactly when to attack. If I know exactly how a system functions, I know exactly how to disable that system. Though security through obscurity is not a valid primary means of defense, no one said that publishing every fact and inflexibility is a valid defense either. The military, of all people, should be able to see the value of unpredictability, for instance a surprise attack.

    In my opinion the issue is one you touched on. Like all arguments involving hardware platform, at some point the reality is that people are just scared for their jobs. If Windows goes away, how can they feed their family. In private industry one can justify maintaining inefficiencies, as long a profit is made. The government, however, does not have the freedom to waste public money, and entitlements cannot be continued to infinity. As much as it pains us, if at some point these Windows support personnel have to be let go, I am sure they can all be retrained so as to become productive members of society.

  • Re:How many times? (Score:4, Insightful)

    by gnasher719 ( 869701 ) on Friday December 21, 2007 @07:14PM (#21785924)

    The worst part about this all is that there are usually just about as many vulnerabilities affecting Apple's platform as there are vulnerabilities affecting Microsoft's platform for any period of time. I invite you to review a few pages and look at the volume by date range.
    On the other hand, when you compare the number of Macs that have actually fallen victim to any vulnerabilities with the number of PCs, then the Macs are outnumbered more than one to a million.
  • by Bo'Bob'O ( 95398 ) on Friday December 21, 2007 @10:29PM (#21787346)
    Well, isn't that part of the idea? If you can divide your opponent's attention in half with only a small amount of your own resources, that seems like it would be a worthwhile tactic.
  • Re:OpenBSD??? (Score:4, Insightful)

    by Junta ( 36770 ) on Saturday December 22, 2007 @12:50AM (#21788130)

    Being certified a Unix doesn't mean but one thing, your organization was willing to throw a pile of money at another organization, nothing more and nothing less.
    Which was implicitly his point, perhaps you missed the part...

    While openBSD may be more secure, remember the Army is about procedures
    Essentially declaring that perhaps one bullet point on a requirement to address this problem somewhere was 'UNIX platform'. Technical reality be damned, per the grandparent post, it could be the Army had that criteria and was therefore limited to Solaris, AIX, or OSX in terms of actively released/maintained platforms.

    Of course, even restricted to these choices, Solaris might have been a better choice. OSX is the sort of vendor lock in I would hope my taxpayer dollars wouldn't go toward supporting. Windows is bad enough, but with OSX you get lock-in of hardware and software. Recalling how skiddish the US government got about Thinkpads and the like when Lenovo bought those bits, I wonder what the contingency plan would be if Apple sold off their computing bits to an offshore company. Even in and of the software platform itself, despite the Darwin base, OSX software tends to require the proprietary Quartz/Cocoa underpinnings, so supporting third party software with new hardware without Apple's blessing would be challenging. Windows is a little better in terms of hardware support, but the software portion is bad enough, though at least there is an excuse of the market situation as to why they haven't thrown it out completely.

    Meanwhile, Solaris has an equally reputable backer, doesn't implement many proprietary APIs that common applications would make use of (AIX goes this far as well), has an unlocked x86 implementation (no hardware vendor ties, unlike any other officially certified UNIX), and is also under an open source license. In terms of an official UNIX with options for contingency plans, it doesn't get better than that.

    *BSD, Linux, et. al. may or may not be even better choices, but this was sticking strictly to the assumed criteria of being able to officially declare it a Unix system.

    BTW:

    The Aqua interface is no more special or better than KDE.
    Which may well be true, but wanted to emphasize the converse is not true. KDE/Gnome/Motif/Xaw/raw Xlib all have full stacks in terms of implementation available as truly open-source. If serious about security, the potential to audit your running stack as resources permit would be great. Also, goes back to the futureproofing mentioned earlier, if ultimately the organization can fork a private copy and do whatever the hell they want, they can avoid vendor lock in.

All the simple programs have been written.

Working...