cover of episode Srsly Risky Biz: The proliferation of spyware in Southeast Asia

Srsly Risky Biz: The proliferation of spyware in Southeast Asia

2024/5/16
logo of podcast Risky Business News

Risky Business News

AI Deep Dive AI Chapters Transcript
People
P
Patrick Gray
T
Tom Uren
Topics
Tom Uren:Amnesty International 的报告揭示了印尼可能存在的间谍软件滥用问题,印尼作为世界第四人口大国和主要民主国家,却常常被忽视。报告调查了间谍软件在印尼的出口和使用情况,调查方法包括分析商业贸易数据库和进行基础设施映射。调查发现印尼实体购买了来自多个公司的间谍软件,部分域名模仿反对派政党,可能用于不正当目的。报告没有直接证明间谍软件被用于侵犯人权,但其隐蔽的购买和使用方式本身就是一个问题。即使撇开人权问题,非法将间谍软件用于政治目的也是不可接受的。印尼的政治历史背景使得间谍软件的滥用更令人担忧。必须打击间谍软件的恶意使用。印尼法律允许在司法授权下进行窃听,但缺乏足够的监督。 Tom Uren还谈到了美国计划对医院实施最低网络安全要求,不达标将减少政府支付。这项规定对小型医院来说是不现实的,因为它们资源匮乏,难以满足安全标准。这项规定可能导致小型医院倒闭。这项规定应该针对中大型医院,并为小型医院提供例外。政府应该鼓励为小型医院提供托管服务,以提高其网络安全水平。小型医院的网络连接有限,即使遭受勒索软件攻击,影响也相对较小。大型医院资源丰富,网络连接完善,遭受勒索软件攻击的影响更大。盈利性医疗机构应该承担更多网络安全责任。 Patrick Gray:间谍软件的隐蔽性使其更容易被滥用,间谍软件的易获得性鼓励了其滥用。间谍软件是否是通往威权主义的“入门毒品”,值得深思。应该严厉打击间谍软件的滥用,特别是当其成为通往威权主义的途径时。印尼的政治历史背景中存在着滥用权力的文化,间谍软件可能会加剧这种倾向。解决间谍软件问题需要更宏观的视角,不能仅仅关注技术层面。印尼是一个运作中的民主国家,但其法治体系尚不完善。民间组织在推动政府采取行动方面发挥了重要作用。各国应该采取行动,打击间谍软件的扩散。美国在打击间谍软件公司方面采取了积极措施。新加坡和马来西亚可能是打击间谍软件扩散的关键节点。美国医院网络安全监管政策需要细致的调整,应该只针对中大型医院。美国医疗行业存在巨大的差异,部分机构盈利能力强,部分机构则资源匮乏。美国医院协会的反对意见并不具有说服力,因为其内部观点并不统一。美国医疗体系的保守、分散和复杂性使得政策制定更加困难。与美国相比,澳大利亚的医疗体系相对简单,因此类似的政策更容易实施。

Deep Dive

Chapters
The podcast discusses Amnesty International's report on the use of spyware in Indonesia, highlighting the potential for human rights abuses and the broader implications for democracy in the region.

Shownotes Transcript

Translations:
中文

And this week's edition of the podcast is brought to you by Okta. And Tom...

You know, of course, this is the podcast where we talk through the newsletter that you put together every week. And you've, you know, it's a fantastic newsletter this week. I read it this morning. It hasn't gone out yet, but yeah, it's absolutely fantastic. And you've covered two things in depth. One of them is an Amnesty International report into possible spyware abuse in Indonesia. And you rightly note in this piece that you've written that

that people tend to sort of ignore Indonesia a little bit, which is weird considering it's the world's fourth most populous country and one of the largest democracies in the world. But why don't you walk us through the rough shape of Amnesty's report here? So Amnesty International, they've got a security lab and they've done several reports over time on different types of spyware. And in this report, they looked at exports to Indonesia.

And they have, I guess, two arms to their research. So one arm is commercial trade databases. And they look through that and try and see if they can find sales from, I call them the usual suspects. So groups like NSO Group, Kandiru, Intellectual Alliance. So organizations that sell spyware that has often been implicated in human rights abuses.

So they found some information there. They also do infrastructure mapping. So they describe spyware servers as having different, basically, they call them distinct fingerprints. And so they look for those fingerprints across the internet and they try and map it out. And so at times they can map a type of spyware to a domain and to an agency even.

And so they find, or they found, that Indonesian entities, sometimes they could tie it to the police, but not necessarily, had bought a variety of different spyware. So stuff from the Intellectual Alliance, Candiru, Finfisher, firms linked to NSO Group. And you look at the domains, and some of them are

sus in the sense that they're sort of emulating opposition political parties or... Yeah, they're like lookalike domains for organisations that the police should not be targeting, basically. I think that's the easiest way to put that. Yeah, that's right. But they don't go so far as to say we have proof that these technologies have been used for human rights abuses. So the way they frame the report is...

Indonesia is a significant country in Southeast Asia. A lot of these transfers came via Singapore or Malaysia. Being able to buy these types of technologies in a covert way where you can sort of sneakily get them and perhaps you can use them for human rights abuses without anyone knowing, that's a problem. Yeah. I mean, even if you take human rights out of it, like using this sort of stuff illegally for political purposes is

You know, is that a human rights abuse or is that just sort of backsliding into a less than democratic form of government, you know? I think... Are they the same thing? I think I would argue that they're the same thing. I mean, I'm splitting hairs at this point, but you get what I'm saying. Like, you know, quite often when we hear about this stuff, it's like some activist winds up imprisoned based on stuff collected from their device or whatever. Whereas this... Yeah, I mean, for those who don't know a great deal about Indonesia, it was...

you know, a dictatorship for over three decades under Suharto. And then in, when was that? 1998 became a democracy. The transition to democracy was actually bloodless mostly, which was fantastic. And, you know, they, they do have a, you know, a healthy democracy. So it's concerning when you see stuff like this. And it reminded me reading this, it reminded me of like,

the cleanup happening in Poland now where the new government is still mopping up the previous government's abuse of this stuff and you really do get the impression

that because these things can be bought, as you point out, covertly, there's just such a temptation to acquire these tools and use them because you can kind of keep it quiet. Whereas if you're trying to spin up an organization to develop this stuff, it's a lot of budget. It's a lot of headcount. People are going to find out about it. This seems to be the sneakier way to do it. And as I say, the availability kind of encourages the use. So I think it's great that Amnesty is doing this work.

It really made me think about is we're a kind of gateway drug to more authoritarianism or is...

just another tool that governments with authoritarian tendencies tend to use? And the answer to that question makes you think about how hard you should go on spyware. So my personal view is, you know, you can use these technologies for legitimate purposes and you can abuse them. And if it's a gateway drug to

to sort of sliding into further authoritarianism. You really want to go very, very hard on them. So that was the sort of question it raised with me. So I spoke to Dr. Gatra Priyandita.

Yeah, you can pronounce it better than I can. So he's at the organization I used to work at. He's Indonesian and he looks at cyber and Indonesian foreign policy. And so his take was that it is a lot easier, but he thought that there'd been this tendency ever since the transition to democracy for Indonesian elites to sort of subvert power structures for their advantage. So, you know, they'd get...

members of the security apparatus to silence critics. They'd use laws. And so this is just another example, and it predated the use of spyware by some time. But he did agree that it's probably easier and more attractive to abuse power

So to me, you know, we absolutely need to try and crack down on the sale of spyware that's used willingly for purposes we think are bad. Yeah. I mean, you know, Indonesia has a long history of this sort of abuse, right? But more under the dictator period. I just looked at his name on the sheet too, and it would be Priyandita. Yeah.

would be the pronunciation. So I lived in Indonesia as a child when Sahara was still running the joint. And I think my favorite headline from the Jakarta Post was corruption investigator dies after taking a walk. And if I remember it correctly, they had him in the ground the same day as per Muslim custom and

And his family are away. There was no autopsy. I mean, the whole thing was very shady. We've had political assassinations carried out by Indonesia, one famously on a Garuda flight. That's their national airline. So, you know, dirty tricks, assassinations, all sorts of stuff is in Indonesia's history. And while they've made amazing progress in many ways, there's still...

There are still remnants of that political culture, right? And this stuff, yeah, like has a tendency to sort of encourage that type of behavior, I feel like. Yeah, yeah. One example, I'll use his first name, Gatra, talks about was this...

It's a special task force that was meant to tackle serious crimes like, well, online gambling and narcotics trafficking. But it was actually co-opted to basically harass political opponents. Yeah. And there's reports that it was involved in wiretapping and hacking. So it's related to this story. However, I guess the good news is that that command was shut down after the head of the command murdered one of his own officers. Yeah.

And it struck me as just a kind of vignette of how some countries have this kind of, it feels very Wild West to me. And I guess the take home for me was, yes, spyware is important and we should do something about it.

But there's also a bigger picture where we can't just say, look, we've tackled spyware, job's done, democracy's safe. It's got to be integrated into, you know, how do you sort of try and encourage these countries to do better? Now, the Amnesty Report points out that

Indonesian law allows wiretapping with judicial authorization. So that's the good part. The bad part is that there's not as much oversight as you'd like. Yeah. And so... I mean, to be clear, I mean, because there'd be a lot of people listening to this who would have just no even concept of Indonesia. Like it is a functioning democracy where rule of law applies and...

But it's just a little bit rough around the edges, I guess, is how we'd put that. But, you know, you're sort of talking about, well, what do we do about it here? First of all, you know, I think the civil society, you know, digital rights types have done a really good job on this issue over the years. You know, I find myself agreeing with them on most of what they say about all of this. Whereas, you know, when they start in on some of the, you know, Western intelligence agencies and sort of their imagined abuses, I don't know, I don't...

they lose me a little bit there, but I think they've done a wonderful job in all of this lobbying governments and whatnot to take action. But I guess, you know, looking at this, it just seems like

It's all the more important that countries that are in a position to do something about the proliferation of this stuff actually do it. And I think the US deserves some credit here for being quite aggressive in the way that they're going after these types of companies and trying to sanction them and, you know, travel bans and shutting them down and even indictments in some cases. Yeah, yeah, that's right. And one of the key parts of the report is it points out that it's really Singapore and Malaysia that appear to be a nexus. And it seems like when you've got any kind of...

Well, a nexus can also be a choke point. Yeah.

And Singapore seems like the sort of government where maybe you might get some traction on cracking down on this sort of thing. Well, Malaysia too, you'd think. Yeah. Yeah, that's right. So that's the good news. Yeah. So that was a really interesting read, mate. I really, really enjoyed that. Everyone can go to news.risky.biz to subscribe to Tom's newsletter if they haven't already. The other thing that you looked at, and this was something we covered in the main show with Adam Boileau and Lena Lau yesterday, but you've actually gone out and done an interview on this.

So you looked at the idea that the United States is going to introduce some sort of minimum security requirements for hospitals and healthcare organizations.

And you spoke to a CISO about this who is responsible for the security of a bunch of hospitals and clinics and whatnot in the United States, unnamed in this piece, obviously, because talking about this sort of stuff is sticking your head out a little bit. But they had some pretty interesting things to say about the pros and cons of this type of push. Yeah, so the...

regulation we're talking about is contained in a US Department of Health and Human Services budget plan. And there is money to improve cybersecurity for hospitals in the next year. But from 2029 onwards, they're proposing that if hospitals don't meet certain minimum requirements, the payments from the government actually get docked.

by a certain percentage. Now, the size I spoke to, he does pro bono work in small hospitals that basically couldn't afford his expertise. And this was really where he was focused. And he was saying, look, those small hospitals have a snowflake's chance in hell in actually doing anything, meeting those standards, because they're all essentially underwater. So they operate at negative temperatures.

operating margins. So the way they survive is by getting grants from state and local counties and fundraising and stuff like that. So the example he gave is there's a hospital he goes to. It's small, it's rural, 50 beds. They've got two IT personnel that do everything. So IT, security, also managing biomedical devices,

and they haven't made an operating profit since the 1970s yeah and it's it's a rural community there's not um there's just no capacity and they're already underwater and taking away more money is is just not going to work so he made the point that there's a lot of these sorts of

hospitals in this situation and they're either rural or they're in sort of dense urban areas ironically um and they just don't have the capacity to to do much now so yeah if the thinking is well you need to do all of this security stuff or we're gonna not give you grants anymore and well then bye-bye hospital bye-bye clinic right yeah yeah and he pointed out that there's

Medium and larger hospitals are in a very different situation. So if you want to do this sort of thing, he didn't actually strongly argue against it for large hospitals. He was saying you need to means test it. You need to carve out for the smaller ones. Yeah, that makes sense.

He thought the way to go was to try and encourage managed service providers for those sorts of hospitals to... Was he encouraging them to do it pro bono? No, no, not necessarily. I think he was just encouraging the spread of effective safe managed service providers across that swathe of hospitals would be a better way for the government to try and get traction and improve cyber security. Now, he also said that those hospitals...

are so resource poor that even though if they had a ransomware attack, it would be bad, it's not as if every device is networked and connected

He thought they would struggle through. Whereas in a large hospital, they've got the resources to network and connect everything. Everything's integrated, yeah. I mean, the point he made is like if there were a ransomware attack, they'd just grab their laptop from home, get on the guest Wi-Fi and then log in through the web to the medical records or whatever and they'd find a way to keep going. But I think that's an interesting idea and maybe that might help because I know there's been a lot of pushback against the White House over this. And, you know, perhaps if they were to...

as you say, sort of means test this and make it only apply to medium to large hospitals, it would, you know, it would get, it would still get the pushback, but it wouldn't be justified, right? Yeah. And I mean, the whole thing made me think that the health sector is just huge. And so one of the articles references Ann Neuberger, who's the Deputy National Security Advisor for Cyber, saying that, you know, some of the healthcare sector pushback is unjustified.

And, like, you look at Change Healthcare and they're making literally billions of dollars. Yeah, somehow they can't afford MFA, right? Yeah, that's right. But at the same time, there's this, like, parts of the US healthcare sector that are really, you know, in difficulty. And so it's this massive, well, it's an entire sector, right? Yeah.

It really requires a lot of nuance. And even the... I referenced an American Hospital Association statement that pushed back against these exact regulations...

And when I read that statement, it was not persuasive at all. So it's even if you take hospitals as a group, they can't come together to come up with a common statement because none of them want that regulation. But the reason that that regulation is nonsensical only applies to like a small subset of hospitals. And so I thought that was a really interesting dynamic about lobbying and

how even though you can be in a lobby group, your message can get lost because the whole group doesn't agree with necessarily. Well, I mean, you know, the US healthcare system is sort of infamously conservative

fractured and weird. Right. So that's, uh, that's not so surprising. You know, I have a feeling that if it were a, you know, a similar regulation were to, uh, to land here, um, yeah, it would be easier for the private healthcare system in Australia to, to lobby because it's just not as, I mean, obviously we're a much smaller country than the United States, but the system seems a lot simpler as well. Yeah. Yeah. Yeah. I mean, another point, the, um,

the size I made is that there's profit, non-for-profit. He kind of said, you know, well, if you're a for-profit healthcare, well, you know, you took your chances. So take your lumps. Yeah, that's it. That's it. All right, Tom Uren, thank you so much for joining me to walk me through this week's Seriously Risky Business newsletter. Fantastic chat. Great work as always this week. And we'll do it again next week. Thanks a lot, Patrick.