The Privacy BlogPrivacy, Security, Cryptography, and Anonymity

CAT | National Security

Video: Hacker war drives San Francisco cloning RFID passports – Engadget

The law of unintended consequences strikes again. In an attempt to improve national security, the U.S. Government has been pushing hard for the widespread adoption of RFID tags in passports around the world. They are already in U.S. passports. The problem is that they are easily scanned from a distance (as shown in the video), and can be cloned. If the RFID chip in the passport is trusted by the authorities, then the security situation is actually worse, not better. Getting real passport information from someone used to be hard. It generally involved actually stealing the passport. With the scanner, one could produce large numbers of clones while simply standing around the airport with the antenna in ones roller luggage (staying out side of security).

The long range readable RFID tags also make possible all kinds of other tracking and identification. The video talks about correlating personal information from RFID enabled credit cards with the passport number to produce even better fakes.

Distribution of such devices around a city would provide much better and more accurate and automated tracking of a population than cameras with their resolution, and facial recognition issues.

Before the Gunfire, Cyberattacks – I held off a while before blogging about this to see a bit of the analysis come in after the initial flush of opinion. It seems clear that a cyber attack of some kind did take place against Georgia. It also seems clear that it was Russian in origin. It further seems clear that it was timed to coincide with the Russian land assault. It is an interesting characteristic of cyber warfare that it is almost impossible to determine if this was actually government controlled, directed, sponsored, or simply a independent sympathetic effort. It is hard to rule out a scenario like support from patriotic cyber criminal organizations. There is at least some evidence that such a scenario played at least some part in the attack. Because Georgia is such a minimally wired country, the actual impact of the attacks was negligible. I would assume there are few significant connections between Georgia and the rest of the Internet. If so, they should have been able to unplug from the rest of the net while deciding how to react. A country like the US or a nation in Europe or much of Asia would be much harder pressed  to disconnect because of the tremendous diversity of international interconnections. Such countries are also much more vulnerable because they rely on the Internet for many critical functions. Additionally, enormous economic damage would result from such an attack.

No tags

Bruce Schneier’s Security Matters: The Myth of the ‘Transparent Society’This is a nice little article arguing against the idea of Brin’s Transparent Society as a solution to the privacy problem. I suspect David Brin would object to the characterization of his work as presenting it as a panacea, but many do so argue.Bruce argues that the relative power disparity makes for un-equal results in the two direction of observation. From my perspective, the idea of enabling the public to watch the government surveillance apparatus is completely unrealistic. It would enable our enemies (and as a nation the US does have real enemies) to reverse engineer and avoid our surveillance. The best one can realistically hope for is very rigorous oversight (which has also seemed unrealistic of late).At the same time the spread of cameras, facial recognition, RFID, etc., is rapidly increasing the level of surveillance of the general population. The only place where observation and recording by the people seems to be really effective is in issues of corruption or abuse of power. Rodney King being an obvious (and ambiguous) example. 

No tags

What Our Top Spy Doesn’t Get: Security and Privacy Aren’t OppositesWow, I don’t know how I missed this one back last month! I wish I had written this essay. The key point is that privacy is not the antithesis of security. Most of the privacy invading “security” solutions we see are what I call “placebo security” and Bruce calls “security theatre” . Things like the “don’t fly list” which appears to catch orders of magnitude more innocents than terrorists, and the national ID card when all the terrorists had legally issued valid ID already.In fact, many measures seriously damage security, like putting personal information in the clear on drivers licenses, including Social Security Numbers in many cases! It is an axiom of security that valuable information will leak and people with access will abuse that access. The more control a government demands, the more  oversight is required. That was my real problem with warrantless wiretapping. Not the wiretapping, but the warrantless. Surveillance of anyone at any time for any reason is the hallmark of a police state. The key is independent oversight. The debate on how that should be done must be open an honest.The security vs. privacy debate seems to me to be built on dishonest assumptions. It tends to be rhetoric and political point scoring on both sides with little discussion of whether the proposed solutions or changes actually improve security, what the real trade off is, and whether that trade is worth while.We are currently being asked to sacrifice enormous amounts of privacy and freedom to confront a threat that is miniscule compared to smoking or drunk driving, threats about which few would make such arguments. 

No tags

Here is another article I picked up on the Qui Custodes blog of David Kaufman: Washington City Paper: Cover Story: Desk Job.This article describes a woman, without any special training, who was able to gain access to “secure” government buildings and steal money right from the desks and purses of the employees. Obviously this could have been documents and information if she had been involved with foreign intelligence. Her methods were simple. She was spotted frequently, but very few people were willing to confront her about her actions, choosing to avoid conflict. The moral here is: security is about everyone following up on everything that seems out of place or unusual. Better metal detectors, or bigger guns at the front door won’t do it. Security comes from the alert minds of everyone on the inside of the building being willing to ask direct questions.

No tags

Rogue Nodes Turn Tor Anonymizer Into Eavesdropper’s Paradise

In a follow up to this post I wrote a few weeks ago, we now understand how the 1000 government email accounts were compromised. It turns out that he did it using TOR.

I have said for a long time that I am amazed that any one operates TOR servers other than government people and criminal/terrorist people. As the operator of a TOR server, you have access to the clear text of the data flowing through your server when you are the exit node (about 1/3 of the traffic typically). While the TOR documentation is clear about this vulnerability, it really understates it, and does not address what you should do about communicating with public services that do not provide an option to do end to end encryption of the information.

As a user of TOR, you are trusting the operators of the servers not to monitor your information. Dan Egerstad’s attack was simply to violate that trust. He actively monitored all of the traffic through his 5 TOR servers. He ran multiple servers to increase the amount of data he could collect. He identified the government accounts by searching the captured data for simple strings that would indicate the message was an email being sent or received in the clear, then further searching for key words that would indicate is was government or military related.

Many other TOR servers could currently be searching for financial, medical, trade secret, or other information.

With any privacy service, you need to trust the operators of that service. The theory was that you would not need to trust the operators of the TOR network. The reality is that, in real world use, you do have to trust them, but you typically know very little about them. There is almost no hurdle to establishing a new TOR server. Just about anyone with access to a server can set it up as a TOR server. You must assume that many of those people will not have your best interests at heart.

My personal approach is to work with people with a long track-record of trustworthy behavior. Anonymizer has been providing services for almost 12 years. I personally have been operating privacy services since 1992. In that time I have protected millions of people and billions of web pages and emails. Our track record for integrity is long and unblemished. I think that is the kind of basis one should use for deciding who to trust.

No tags

Hacks hit embassy, government e-mail accounts worldwide

Usernames and passwords for more than 100 e-mail
accounts at embassies and governments worldwide have been posted online.
Using the information, anyone can access the accounts that have been

I am not sure how much needs to be said about this. In general email security is very lax. People often forget just how much information lives in their email accounts. Especially when using Exchange or IMAP type email, all of your old email archives will be compromised if your account is breached. When you consider all of the file attachments most of us get every day, there is probably little sensitive information any of us handle that is not contained in those email archives.

No tags

Germany wants to spy on suspects via Web

Germany is proposing to use trojan horse software to enable surveillance of target computers. I have to wonder how effective this will actually be. They are talking about distributing it in an apparently official email from a government email address.

  1. Now that the bad guys know this, it seems likely that they will take more care with the attachments from the government.
  2. Anti-virus / anti-malware programs should be able to identify and block this software
  3. If the anti-virus software makers are convinced to leave a hole for this software, it will be a huge back door for other hackers to use to deploy their trojan horse software.

In general this seems like a high risk operation for the Germans. I suspect that it will be used rarely and very selectively.

No tags

Cyberterrorism: By Whatever Name, It’s On The Increase — Security — InformationWeek

Yet more evidence of the use of the Internet as a part of modern asymmetric warfare. From recruiting and fundraising, to direct attacks on IT infrastructure, the Internet is now a key tool for both sides of the conflicts.

No tags

CIO – China Makes Viruses for Cyberwar First-Strike

We really have moved on from the idea of the hacker portrayed in the movie “war games”. A young boy working out of his bedroom. These days it is a very professional operation, run by organized criminals, or governments in this case.

Because of the anti-censorship work we do Anonymizer has already been on the receiving end of numerous attacks out of China that appear to be government sponsored and initiated.

The Internet is now absolutely part of every nation’s critical infrastructure. Cyber war provides a relatively bloodless form of attack that can do massive economic damage and potentially leave little evidence of who launched the attack. It is also a powerful leveler. Using standard hacking methods like bot nets even a tiny country or terrorist organization could inflict damage completely out of proportion to its resources.

No tags

<< Latest posts