Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×
Security Businesses Government IT

Cybersecurity and the Tylenol Murders 74

HughPickens.com writes: Cindy Cohn writes at EFF that when a criminal started lacing Tylenol capsules with cyanide in 1982, Johnson & Johnson quickly sprang into action to ensure consumer safety. It increased its internal production controls, recalled the capsules, offered an exchange for tablets, and within two months started using triple-seal tamper-resistant packaging. Congress ultimately passed an anti-tampering law but the focus of the response from both the private and the public sector was on ensuring that consumers remained safe and secure, rather than on catching the perpetrator. Indeed, the person who did the tampering was never caught.

According to Cohn the story of the Tylenol murders comes to mind as Congress considers the latest cybersecurity and data breach bills. To folks who understand computer security and networks, it's plain that the key problem are our vulnerable infrastructure and weak computer security, much like the vulnerabilities in Johnson & Johnson's supply chain in the 1980s. As then, the failure to secure our networks, the services we rely upon, and our individual computers makes it easy for bad actors to step in and "poison" our information. The way forward is clear: We need better incentives for companies who store our data to keep it secure. "Yet none of the proposals now in Congress are aimed at actually increasing the safety of our data. Instead, the focus is on "information sharing," a euphemism for more surveillance of users and networks," writes Cohn. "These bills are not only wrongheaded, they seem to be a cynical ploy to use the very real problems of cybersecurity to advance a surveillance agenda, rather than to actually take steps to make people safer." Congress could step in and encourage real security for users—by creating incentives for greater security, a greater downside for companies that fail to do so and by rewarding those companies who make the effort to develop stronger security. "It's as if the answer for Americans after the Tylenol incident was not to put on tamper-evident seals, or increase the security of the supply chain, but only to require Tylenol to "share" its customer lists with the government and with the folks over at Bayer aspirin," concludes Cohn. "We wouldn't have stood for such a wrongheaded response in 1982, and we shouldn't do so now."
This discussion has been archived. No new comments can be posted.

Cybersecurity and the Tylenol Murders

Comments Filter:
  • by samantha ( 68231 ) * on Monday June 01, 2015 @04:57PM (#49818201) Homepage

    The same people that say it is OK that the NSA weakens security paradigms and that take seriously government demands for backdoors in all crypto systems and that OKs spying on everyone is not about to do a complete 180 and actually do anything to build up security. The corporations can do little for better security while the government is busy weakening and limiting all security tools. So simply making more demands on companies is useless.

  • by Fire_Wraith ( 1460385 ) on Monday June 01, 2015 @05:04PM (#49818243)
    There are definitely some important points to be made in the comparison here, but some of them are a bit off. For one, it makes the comparison to sharing customer lists for Tylenol/Bayer Aspirin/etc, but that's a bit off.

    There is a value in 'information sharing', it just depends on the information being shared. Sharing the sorts of data associated with an intrusion, so that others can check their networks for similar activity or vulnerabilities? That's a good thing. The comparison here would be having Tylenol's makers share the information on how their supply chain was possibly compromised in the first place, so that we don't wind up having them fix the problem, only for other companies to get hit with the same thing because the details were kept secret.

    That's what's important - the information about the vulnerabilities and exploits, not the customer data. This is why we have to be especially wary about nebulous proposals that hand over truckloads of unnecessary data, since there are certainly agencies in the government that would love to have free access to it in order to entirely unrelated things like go on witch-hunts.

    At the same time, we have to keep in mind that most companies won't share information about attacks unless they're required to do so. Imagine if Tylenol had just ignored clear signs of a break-in at their plant, and ignored the possibility that thousands or millions of capsules could have been poisoned, and decided to just pretend nothing ever happened, only for it to come to light years later, because that was roughly what has happened in many past instances of major retailers getting hacked.
    • There is a value in 'information sharing', it just depends on the information being shared. Sharing the sorts of data associated with an intrusion, so that others can check their networks for similar activity or vulnerabilities? That's a good thing. The comparison here would be having Tylenol's makers share the information on how their supply chain was possibly compromised in the first place, so that we don't wind up having them fix the problem, only for other companies to get hit with the same thing because the details were kept secret.

      Except it wasn't. The poisoning turned out to happen inside a home, and the public was never in any danger. So, we ended up with a huge cost increase on every single product, dangerous or not, along with multiple layers of "safety" straps,coatings, etc. which are incrediblyannoying to remove and do very little to improve the alleged tamper-proofness of the product itself. Really: do you think some creep could manage to drop poison pills into hundreds of nsaid bottles in CVS stores (assuming no tamper-pr

  • It's a oversimplification to say the creators of software and hardware that make up networks and services must be held accountable for security. There is an inherent state that many of the bugs that get exploited are unknowable until somone stumbles upon them. Either the software's creator or the bad-actor finds it first and that's where the trouble lies.

    I think the larger issue is the design of the internet is way too open and without any accountability.

    • by JustNiz ( 692889 )

      >> It's a oversimplification to say the creators of software and hardware that make up networks and services must be held accountable for security.

      No it isn't. I blame Microsoft. The widows architecture and development culture around windows both encourage/require allowing apps to extend/modify parts of the operating system itself (example: the registry and the windows/system32 directories). Microsoft have been notirious in encapsulating executable stuff in things that should be data-only, such as doc

      • Blame the widows, not the orphans!

    • We have been trying to handle security by wrapping various "condoms" around software that doesn't defend itself from bad input. That allows it to be used without fixing it. But this whole strategy is about to break with the widespread use of encryption. We currently protect traffic by inspecting it to observe abuse of the recipient of a message; and yes, it's functionally identical to surveillance in how it works. Ultimately, we need to do something like what LANSEC suggests, and require very strong inp
    • by AK Marc ( 707885 )

      There is an inherent state that many of the bugs that get exploited are unknowable

      I'd agree if 99% of exploits weren't one of a basic set of vulnerabilities. "I never though someone would get a Privilege escalation though a buffer overflow from an improperly sanitized input." The threats aren't "bugs" A "bug" is bad code that allows a threat a vector of attack.

      Computer security is saying that you secure doors and windows on a house only after each of them has been broken in, and only in the minimum way to prevent the previous attack from working. "Oh, they got in with a credit-card j

      • by Anonymous Coward

        Computer security is saying that you secure doors and windows on a house only after each of them has been broken in, and only in the minimum way to prevent the previous attack from working.

        But, that is exactly what we actually do.

        If you were to use state-of-the-art methods to break into one of Johnson and Johnson's manufacturing facilities, I doubt the locks on the doors would keep you out. By state of the art, I mean any technology of any kind available to anybody anywhere, including tanks, aircraft, and so on.

        The reason that Johnson and Johnson doesn't have to defend against tank platoons is that governments already provide protection against these kinds of attacks. The same is not true o

  • Regarding the Tylenol tampering murders: (maybe) started by a lone wolf who was never caught (although some folks were who already wanted to kill their spouses either jumped on the imitation bandwagon or planted the random poisoned bottles themselves).

    Regarding the inevitable use of the internet for data collection: yeah, someone was first, but a metric fuck ton more suspects.Governments, corporations, recruiters, employers, prospective suitors, suspicious spouses, etc.

  • by trout007 ( 975317 ) on Monday June 01, 2015 @05:18PM (#49818309)

    It's pretty simple. There were alternatives to Tylenol and they knew if they didn't act it would cost them billions. There is no alternative to the internet so people are pretty much stuck with the standards in use. The losses are socalized enough that there isn't much reason for most people to change. If people personally stood to lose tens of thousands of dollars they might take things seriously.

  • "Patriot [sic] act" and the "USA Freedom [sic] act". I am so disgusted that congress acting to circumvent the Supreme Court through technicalities, while changing nothing at all is being called "surveillance reform [sic]". If you ever hoped that Obama's background as a professor of constitutional meant that he would protect the bill of rights like I did, you just got shat on.

    Yes, I understand that having the entire world under surveillance all the time is very convenient for law enforcement and keeps us "safer [sic]" than having any right to privacy would. It's just a shame that no one in the government cares.

    Also, do you know how many terrorists they caught with the metadata program? They caught ONE taxi driver who wanted to send a couple thousand to Hamas. That's it. Well, now you know what your freedom used to be worth! Less than one taxi driver's donation.

  • Apples and Oranges (Score:3, Insightful)

    by Anonymous Coward on Monday June 01, 2015 @05:32PM (#49818389)

    From TFA:

    For example, Johnson & Johnson developed new product protection methods and ironclad pledges to do better in protecting their consumers in the future. Working with FDA officials, they introduced a new tamper-proof packaging, which included foil seals and other features that made it obvious to a consumer if foul play had transpired. These packaging protections soon became the industry standard for all over-the-counter medications. The company also introduced price reductions and a new version of their pills — called the “caplet” — a tablet coated with slick, easy-to-swallow gelatin but far harder to tamper with than the older capsules which could be easily opened, laced with a contaminant, and then placed back in the older non-tamper-proof bottle.

    Packaging for over the counter drugs became safer because Johnson & Johnson invested a 100 million dollars to protect their customers with tamper-resistant seals on their packaging and harder to contaminate pills, which showed the rest of the industry how do it as well. Congress passed the law mandating that the rest of the industry follow suit only after Tylenol successfully did it first. In addition, and this is important, the FDA worked with Johnson & Johnson for the common goal of protecting consumers.

    With computer security, though, you have the US government that is openly hostile to allowing users to completely secure their systems. For one thing, you have the law enforcement and intelligence branches of the government that lobby Congress for more surveillance laws, and also actively subvert standards for encryption, OS security, and security applications as well as weaponizing exploits of software vulnerabilities. And even when there are companies leading way on how to provide secure applications and services, you have the government stepping in forcing it to compromise its security. Lavabit is just one public example of the government's zeal to snoop overriding consumer's need for secure communication.

    Another thing is you have the software industry lobbying Congress against passing laws which would apply product liability rules to software applications. Software companies have been thwarting efforts to hold them accountable for ages. All software has bugs, but a lot of bugs are just howlers that might not have got through to release if companies were held a little responsible for the harm they can cause.

    Nope, the Tylenol case and the case for secure computers and networks are not the same. In the Tylenol case, the gov and drug industry had a common goal to protect the consumer. In the case of computer security, the gov and software industry have their own goals, but they're not to protect the common user.

    • And that's ignoring the fact that computer security is nearly intractable to begin with. Even if you have an air-gap, it can still be breached.

      So if the companies aren't even trying (which they aren't......increased liability can help with that, though), there's no way they'll succeed.
  • by zr ( 19885 ) on Monday June 01, 2015 @05:44PM (#49818451)

    ..never was, never will be.

    If we the people want our data safe, we have no choice but to keep ever vigilant about defending against laws that allow the government access to data we don't wish be open.

    Thank you Dr Paul.

  • The Tylenol killer was caught. I remember hearing about it on the CBS evening news - HE did it in an attempt to get the stock price to fall, in order to make money on his short options.
    • by Snotnose ( 212196 ) on Monday June 01, 2015 @06:23PM (#49818709)
      Nope. The guy they caught wrote a ransom note demanding $$$ to stop poisoning the bottles. He got caught and sent away for extortion. AFAIK they never did charge anyone with the actual murder.
      • Nope. The guy they caught wrote a ransom note demanding $$$ to stop poisoning the bottles. He got caught and sent away for extortion. AFAIK they never did charge anyone with the actual murder.

        Indeed. And, he lived in New York whilst the poisoned capsules were found in and around the Chicago area.

        Johnson and Johnson's handling of the total recall[tm] was wildly applauded at the time, perhaps in contrast to the number of stars we are currently awarding to the nationwide surveillance alliance.

        • So the original (incorrect) post is modded at +3, while both mine and the guy saying I'm right are at +2. Thanks, moderators, for fact checking.

          Wikipedia says I'm right and OP is wrong.
          • So the original (incorrect) post is modded at +3, while both mine and the guy saying I'm right are at +2. Thanks, moderators, for fact checking.

            Wikipedia says I'm right and OP is wrong.

            If it were not for your relatively low UID number, I'd say "you must be new here".

            Facts and logic are fungible and elastic among Slashdotters when they negatively impact stubbornly-held (but incorrect nonetheless) worldviews, politics, (anti-)religious beliefs, and ideologies.

            To a large extent Slashdot negative moderation serves the same purpose as sticking one's fingers in one's ears and going "lalalala I can't hear you!".

            Strat

            • when they negatively impact stubbornly-held (but incorrect nonetheless) worldviews, politics, (anti-)religious beliefs, and ideologies.

              You don't say.

    • I guess I get the 3rd competing story for how it most likely happened..

      A man poisoned his cronically ill wife and placed more poisoned pills on store shelves to produce the doubt he didn't murder his wife.

      Who actually did the poisoning was not proven due to the number of cases.

      "As the tampered-with bottles came from different factories, and the seven deaths had all occurred in the Chicago area, the possibility of sabotage during production was ruled out. Instead, the culprit was believed to have acquired bo

  • by Snotnose ( 212196 ) on Monday June 01, 2015 @06:20PM (#49818681)
    I was 22-23, there was a guy at work 10-15 years older that hated me. Why? I don't know. But I was the kind of guy that anything you threw at me I threw 2x back. When this Tylenol poisoning hit I bought a bottle of Tylenol and put it on his desk. No note, nothing, just the bottle.

    I ran into him some 20 years later. He told me he didn't know why he didn't like me and apologized for being an ass. I told him I put the Tylenol bottle on his desk, he said "shit Jim, I knew that as soon as I saw it".
    • Your parents named you "shit Jim"?

      • Dad thought he was hitting the backdoor when I was conceived.

        / Dad doesn't read /.
        // Mom's dead
        /// no way they'll hear I said that :)
    • by Anonymous Coward

      Is that so off-topic, after all? Imagine if you did the same thing today. The coworker, or someone else in the office, reports the Tylenol bottle as being suspicious. Everyone gets locked down in the office, the police are called, a hazmat crew comes out and looks around. Security camera footage from your office is confiscated. The Tylenol bottle is fingerprinted and swabbed for DNA. And if they find anything that ties you to that bottle, you're off to prison for a few years for making terroristic threats,

  • by Anonymous Coward

    This is all second hand info, of course, but as a kid I knew a worker at the 'pill' factory.
    That chemical is used to clean the pill dies. The theory produced was that it was an
    industrial accident (yes, the makers confirmed that that chemical is used to clean the
    dies, but downplayed its significance - do the research!). It was my first experience of
    a major corporation ducking responsibility and I was taught a good lesson from it.

    Because of the egregious way in which people died from the accident, the compa

    • by AK Marc ( 707885 )
      That theory only works if there were deliberate poisonings of copycats. The distribution was too narrow, and the incidents too spread out to account for all of the poisonings with a single industrial accident. Unless Tylenol committed murder as part of a cover-up.
  • Because the list of things she knows clearly does not include the concept of "community based threat intelligence". The sharing of threat intel, especially among industry peers (financial services, healthcare, etc.) can be a very powerful tool. If the security people at Acme Widgets and Cogswel Cogs alert me that their seeing a specific attack coming from a particular IP address, we here at Spacely Sprockets can proactively take steps to defend against that attack.

    FTFA:
    "Opening debate of the bill on Wedne

  • "trusted computing", locked bootloaders, ... controversial stuff like this are all improvements in security that are easy to mandate, are pushed by big companies and closely match the Tylenol example (where tamper resistance was the solution).

  • The Tylenol safety problem of the 80s and the privacy protection concerns we have today are not synonymous in the way the author depicts them to be; in both cases the response is about the bottom line. Tylenol knew if it didn't respond appropriately, and huge profits could have been lost. In the case of securing private information, if the powers that be were actually to do that, huge profits could be lost. Got it yet?

Think of it! With VLSI we can pack 100 ENIACs in 1 sq. cm.!

Working...