STE WILLIAMS

"You can’t have your privacy violated if you don’t know your privacy is violated"

House Intelligence Committee Chairman Mike Rogers suggested during a hearing at the US National Security Agency (NSA) on Tuesday that it’s impossible to have your privacy violated if you don’t know that your privacy is being violated.

The Republican Congressman was interrogating American University College of Law professor Stephen Vladeck over his concerns about NSA surveillance programs.

Rogers put his argument this way:

Maybe the fact that we haven’t had any complaints come forward with any specificity arguing that their privacy has been violated clearly indicates – in 10 years – clearly indicates that something must be doing right. Somebody must be doing something exactly right.

Vladeck replied with this question:

But who would be complaining?

Which is when Rogers laid out his “if I peek into the windows at the sorority house and they don’t find out, the police can’t arrest me, right?” rationale. (Hat tip to Mediaite.com commenter Tenth Justice.)
.
To wit:

Somebody whose privacy was violated. You can’t have your privacy violated if you don’t know your privacy is violated, right?

So does the logic here apply elsewhere then? What about, say, hijacking webcams?

If your victim isn’t aware that they’ve been leered at and photographed/videotaped while undressing, and you haven’t gotten around to sextorting them yet, no crime was committed, right?

Furthermore, I would ask, if a tree falls in the forest and nobody hears it, a) has it made a sound, and b) does the NSA have their people on it to pick up on advances in coniferous intelligence operations?

Video courtesy of Breaking News 24×7.

Image of listening ear courtesy of Shutterstock.

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/5stAbvZu6kY/

Anonymous threatens Singapore with hacking attacks, calls for November 5 protest… perhaps

An anonymous person, claiming to be Anonymous, recently fired off a hacking threat against Singapore’s financial systems.

The threat was detailed in a video posted on YouTube, apparently under a real user’s name, and came with a full transcript – a wordy one, if the truth be told – detailing what was planned and why it should be taken seriously.

The video has now been removed, as you’d probably expect if a compromised account had been used:

As I didn’t save the transcript when it was available (the internet has a Murphy’s Law way of retaining things you would rather remove, and vice versa, doesn’t it just?), I shall have to go from memory here:

Anonymous here … Warning to Singapore about censoring the internet … Stop it or we’ll attack your financial systems to pay you back … You think you’ll keep us out? Ha! … Also, wear clothes in [redacted] colours on the Fifth of November to show solidarity, and change your Facebook profile picture to a giraffe! [*] … We never forget, and the rest of our motto.

Of course, anyone can claim to be “Anonymous,” and many have done so.

And there’s often some sort of action proposed under the Anonymous banner for 05 November.

Anonymous uses an image of Guy Fawkes on its mask logo. Fawkes was caught underneath the parliament buildings in England, along with a huge stash of gunpowder with which he and his co-conspirators apparently planned to blow the government to smithereens, back on 05 November 1605.

That’s the connection. (“Remember, remember, the Fifth of November. Gunpowder, treason and plot!”)

We’ve already been asked, “Should this threat be taken seriously?”

Well, hackers under the guise of Anonymous have managed some admittedly fairly modest cyberattacks in the past, including:

So, if you’re not secure against this sort of modest attack, you probably don’t stand much chance against more determined cybercriminals – attackers who don’t usually announce their attentions in advance with a YouTube video.

What that means is that if computer security is worth doing, it is worth doing well, with or without the posturings of unknown proponents of so-called hacktivism.

In short: I don’t see any need to do anything differently because of this latest, short-lived Anonymous video, unless you weren’t taking computer security seriously beforehand.

So perhaps Singaporeans should treat this video not as a threat, but simply as a handy reminder – coming as it does on the very last day of Cyber Security Awareness Month! – that computer security matters.

If you haven’t done them yet, why not DO THESE 3?

That’s our advice by which anyone, anywhere, can do their bit to help everyone, everywhere.

* I made up the bit about the giraffe picture. That’s another story altogether, caused by a hoax about booby-trapped JPEG images of giraffes. (I don’t know why giraffes and not, say, Gambian pouched rats.)

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/Oj9cxrl4mKo/

Contactless payments

Credit card and NFC image courtesy of ShutterstockYour mission, should you choose to accept it, is to intercept contactless payment data at distances of up to 90cm using a backpack, shopping trolley, and a small antenna.

Mission: Impossible?

Apparently not, according to a paper published by the Institute of Engineering and Technology on Tuesday.

University of Surrey researcher, Thomas P Diakos, created an inexpensive receiver, small enough to fit into a backpack, using the above items along with other off-the-shelf electronics. Using this equipment he was able to eavesdrop on cards at distances of 20 – 90 centimetres, maintaining good reception at up to 45cm – despite the fact that one of the main security features of contactless cards is a requirement not to transfer payment data in excess of 10cm from a reader.

Lead academic supervisor Dr Johann Briffa said:

The results we found have an impact on how much we can rely on physical proximity as a security feature. The intended short range of the channel is no defence against a determined eavesdropper.

Contactless payments, utilising Near Field Communication (NFC) technology, are becoming increasingly popular in many parts of the world.

They allow consumers to make low-value purchases (up to £20 in the UK, for example) merely by holding their card near to a reader.

By eliminating the need for a PIN number to be entered, such a payment method allows for extremely quick purchases, something that those with hectic lifestyles undoubtedly appreciate.

There are, however, some security concerns about contactless payments, with ‘skimming‘ being an obvious mode of attack.

In April a survey showed that 45% of the respondents were either totally against the introduction of NFC or, at the least, unsure about using it as a payment method.

Of those who did not want the technology to be introduced, 59% cited security concerns. Such results may have been influenced by a Channel 4 report in March which showed a standard mobile phone could be easily adapted to acquire a limited data set by simply coming into close proximity with a bank card.

Even with this small amount of data – the cardholder’s name, the long card number and expiry date – a criminal could still make fraudulent purchases from some companies, though a UK Cards Association spokesman did tell Naked Security that:

There are already additional layers of security in place to prevent the use of a card number and expiry date, such as PIN and the card security code (the three-digit number found on the back of cards), which cannot be harvested electronically. The vast majority of online retailers require the card security code, along with the cardholder’s address, and all have robust security checks in place to protect both their business and their customers from fraud.

Fraud related to contactless card payments appears to be small in comparison to their non-contact counterparts though. The UK Cards Association said that at the end of 2012 the levels of fraud on contactless cards were negligible at just £13,700. This compares with non-contactless losses of £55m.

The association also highlighted how cardholders are protected should the worst happen:

In the case of any fraud using a contactless card, consumers are protected against loss – they will not be liable for any fraudulent use.

The trade association for the card payments industry in the UK also played down the University of Surrey’s findings, saying that:

Instances of fraud on contactless cards are extremely rare. Although the sort of contactless card reader built by the University of Surrey might be able to interrogate a card, any data obtained would be limited to the card number and expiry date that can be seen on the front of the card. A fraudster would find it very difficult to make a fraudulent transaction using this information – and it certainly could not be used to make a cloned card.

Meanwhile, those at the University of Surrey are set to continue their work, saying that future experiments will look into how ‘wave-and-go’ cards can be cracked and how the uncovered data could be used by criminals.

Image of credit card courtesy of Shutterstock.

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/MFj9Phz39lA/

Lavabit, Silent Circle form Dark Mail Alliance to destroy email snooping

Supercharge your infrastructure

Two firms at the sharp end of privacy have joined forces to build an email system that provides end-to-end encryption that will hopefully prove impossible for service providers to eavesdrop and crack – even if forced to do so.

“As founding partners of the Dark Mail Alliance, both Silent Circle and Lavabit will work to bring other members into the alliance, assist them in implementing the new protocol and work jointly to proliferate the world’s first end-to-end encrypted Email 3.0 across email software developers and service providers globally,” the pair said in a statement.


“Our goal is to open source the protocol and architecture and help others implement this new technology to address the privacy concerns over surveillance and back door threats of any kind.”

Both firms have had a lot of experience in the field. Lavabit was the encrypted email service used by NSA whistleblower Edward Snowden, and the outfit shut down in August rather than “become complicit in crimes against the American people,” as founder Ladar Levinson said at the time.

Silent Circle was set up by members of the PGP encryption team (including Phil Zimmerman and Jon Callas) and two former Navy SEALs to provide secure voice, text, and email services – although the email part of that was shut down shortly after launch in the wake of Lavabit being confronted by US g-men.

The Dark Mail Alliance team described today’s system of email as “fundamentally broken from a privacy perspective,” and will work with other firms to get software and legal protocols in place for a more secure service.

Presumably this will mean that the service can’t be set up in the US due to laws such as the Patriot Act that give the government the right to access data services while not allowing the companies involved to alert their customers. Silent Circle already does this by basing its servers in Canada and Amsterdam.

The announcement of the alliance was made at Wednesday’s Inbox Love conference in Mountain View, California, and more details will be forthcoming shortly. No doubt the NSA and other spook nerve centers will be watching developments closely. ®

Free Regcast : Microsoft Cloud OS

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2013/10/31/lavabit_and_silent_circle_create_dark_mail_alliance_to_stop_snoops/

Give young infosec boffins more cash or BAD THINGS will happen – RSA boff

Supercharge your infrastructure

RSA Europe 2013 Declining support for young science and technology researchers from the US government could hurt technology innovation in the long term, a top computer scientist has warned.

Robert Griffin, chief security architect at information security biz RSA, said complaints about funding featured in all three pairs of Nobel Prize acceptance speeches this year.


Funding is not too much of a problem for established researchers but for “younger researchers there’s pressure to publish early or quickly,” said Griffin. Government funding for academic research has been cut because of tough economic conditions – but, said Griffin, this is a short-sighted approach because it will hurt researchers over the long term.

Zurich-based Griffin, who has given lectures at MIT and is heavily involved in the EU’s Smart Grid project, said that industry needs to engage in the research community. Yet other sources of support are also needed because research breakthroughs can take years to filter down into front-line products.

For example, the RSA algorithm was the result of work by three young researchers – Ron Rivest, Adi Shamir, and Len Adleman – in 1976. RSA Security was formed six years later in 1984.

During the US edition of the RSA Conference, Shamir said that cryptography is “becoming less important” because of state-sponsored malware. The godfather of encryption warned the security industry to prepare for a ‘post-crypto world‘.

Griffin, who is also co-chair of the OASIS Key Management Interoperability Protocol (KMIP) technical committee, was more upbeat and optimistic. While he stressed the need for continuous review of code, and highlighted the danger potentially posed by prime factorisation methods and other code-breaking techniques, he added that there’s still an “opportunity for breakthroughs” in cryptography protocols and schemes.

At a more strategic level, game theory offers a possible means to get ahead of attackers – or, at least, to develop better techniques that can thwart or frustrate hacking attacks, according to Griffin.

Such strategies might include changing crypto keys at a frequency rapid enough to make brute force attacks unviable, as explained in more depth in a paper on the application of game theory to security problems co-authored by Griffin and Ron Rivest.

Griffin added that using security analytics and other techniques, such as the application of the DevOps method, offers a combined approach for improving security defences. ®

Free Regcast : Microsoft Cloud OS

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2013/10/31/research_investment_us_academia/

Facebook tests sinister CURSOR-TRACKING in hunt for more ad bucks

Supercharge your infrastructure

Facebook is reportedly looking at new methods of data mining that would silently track a user’s actions on the free content ad network.

According to the Wall Street Journal, the Mark Zuckerberg-run company is experimenting with technology that would monitor cursor movements on the site to track how individual users respond to ads – from which Facebook makes the lion’s share of its revenue.


Menlo Park’s chief analytics Doozer Ken Rudin told the newspaper that such a system could help Facebook do a better job of targeted advertising, which in turn would satisfy the company’s investors and its real customers: not the users, but admen.

Facebook, which slurps personal and behavioural information about its users, is currently playing around with the tech to test how workable it would be and also to consider whether it would help the firm develop its products.

The new data collected by Facebook could be stored in a data analytics warehouse, Rudin said. He added that the details the system could slurp might include looking at how long a cursor hovers over a specific ad.

“I can’t promise that it will roll out,” he added. “We probably will know in a couple of months.”

Facebook does not reveal details on the huge amount of user data it holds, but Rudin did reveal to the WSJ that its data analytics warehouse – where data is stored specifically for ad targeting – had grown 4,000 times since 2009. Its current collection on its modified Hadoop distributed file system stands at 300PB, apparently. ®

Free Regcast : Microsoft Cloud OS

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2013/10/31/facebook_testing_cursor_tracking_for_more_ad_bucks/

Infosec bod reports ONGOING ATTACK at RSA securo-confab

Supercharge your infrastructure

RSA Europe 2013 Problems logging into VPN networks left delegates even more twitchy than normal at the RSA Conference Europe this week.

The conference, staged in London, for the previous six years, has moved to Amsterdam and the massive RAI Conference venue this year. The venue also stages the Cropworld conference, which attracted a group of around 200 protesters against Monsanto.


One security specialist and penetration tester noticed problems at the both the conference venue and hotel that he tentatively blamed on someone running a man in the middle attack. SSL connections were also affected.

El Reg sought a second opinion on the matter from an independent security expert who said this was a symptom of the proxy service in play.

MWR was far from the only delegate to notice problems logging into VPNs. So what was going on? Was it the NSA (again)? Was it a crypto-anarchist wing of the anti-Monsanto hippies?

We relayed concerns abut the Wi-Fi to the efficient PR team at the conference, who asked techies at the venue to look into the matter. A preliminary investigation found that “old certificates” might be behind the reported glitches.

Soon after, we were told the problem had been pinned down to a misconfigured network device. “It’s a non-issue,” a RSA staffer told us. ®

Free Regcast : Microsoft Cloud OS

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2013/10/31/rsa_show_diary/

From Russia with Code: Edward Snowden gets job on website helldesk

Supercharge your infrastructure

NSA whistleblower Edward Snowden has reportedly bagged a job in Russia after fleeing to the former superpower after leaking details of indiscriminate wiretapping being carried out by the US National Security Agency.

Snowden’s lawyer, Anatoly Kucherena, declined to say which major website’s support team Snowden would be working for, according to the Voice of Russia. But he did say that the job starts in November.


In August, 30-year-old Snowden – who is wanted by the US government over espionage charges – was granted temporary asylum in Russia.

This week, a photograph emerged on Russia’s Life News that appeared to show Snowden taking in the tourist sights in Moscow during a boat ride down the city’s river. However, his lawyer has refused to disclose the exact location of where the blabbermouth is now living. ®

Free Regcast : Microsoft Cloud OS

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2013/10/31/whistleblower_edward_snowden_gets_web_job_russia/

Silent Circle, Lavabit Team Up On New Secure Email Protocol

As the drumbeat of NSA revelations hit a new high yesterday with revelations that the agency can collect data moving across Google and Yahoo’s data centers around the world, two companies that recently shuttered their encrypted email services due to NSA surveillance concerns announced that they are now teaming up to create a next-generation, open source end-to-end encrypted email protocol.

Silent Circle and Lavabit said they have launched Dark Mail, which will recruit other members to help develop a new encrypted email protocol for software developers and email service providers to adopt. The announcement was not in direct response to yesterday’s latest report by The Washington Post based on NSA documents obtained by former NSA contractor Edward Snowden.

The goal of the Dark Mail Alliance is to “bring the world a unique end-to-end encrypted protocol and architecture that is the ‘next-generation’ of private and secure email,” the companies said in an announcement on Silent Circle’s website. “What we call Email ‘3.0.’ is an urgent replacement for today’s decades old email protocols (‘1.0’) and mail that is encrypted but still relies on vulnerable protocols leaking metadata (‘2.0’) … Our goal is to open source the protocol and architecture and help others implement this new technology to address the privacy concerns over surveillance and back door threats of any kind.”

Silent Circle and Lavabit both separately had shuttered their encrypted email services this summer in the wake of initial reports of NSA’s widespread surveillance programs that extended into spying on U.S. citizens’ traffic.

Jon Callas, CTO at Silent Circle, said his firm had to scrap its Silent Mail service because email was now “fundamentally broken from a privacy perspective.”

“This is an unfortunate example of the chilling effect the current surveillance environment is having on innovative communications companies,” he said in the company’s August announcement of its plans to drop the service.

Have a comment on this story? Please click “Add Your Comment” below. If you’d like to contact Dark Reading’s editors directly, send us a message.

Article source: http://www.darkreading.com/privacy/silent-circle-lavabit-team-up-on-new-sec/240163416

Has Microsoft just PROVED why you should upgrade from XP?

Microsoft just published its January-to-June 2013 Security Intelligence Report (SIR).

(Yes, I was surprised at the timing, too, since we’re already two thirds of the way through the next reporting period. But there you are, and here it is [PDF].)

I will dutifully declare that I have still to finish reading the report in full.

At 160 pages, even if some of them are blank, or contain corporate boilerplate, I just haven’t got through it yet.

But I have read one of Microsoft’s recent blog postings about the report, highlighting the part in which rates of malware infection and encounter are compared across the four flavours of client-side Windows: XP, Vista, 7 and 8.

The results seem to tell a pretty clear visual story about why you should get rid of Windows XP as soon as you can:

→ The numbers on the left and right sides can’t directly be compared because they’ve been scaled differently for readability. The infection rate shows computers cleaned up out of every thousand on which Microsoft’s Malicious Software Removal Tool (MSRT) was used. The encounter rate shows computers on which malware was detected – and almost certainly prevented from infecting – out of every hundred protected by a Microsoft virus blocker.

The obvious conclusion from the above is that your chance of being exposed to malware, and thus potentially infected if you were unprotected, is similar on all versions of Windows.

Windows 8 users, at first glance, appear to enjoy a slight advantage in exposure rate, with 12/100 computers measured to be actively under attack, against 16/100 or more for the other flavours of Windows.

The SIR doesn’t offer an explanation, but we can always speculate:

  • Perhaps more recent versions of Internet Explorer are more likely to prevent you browsing to potentially infectious websites in the first place, thus reducing exposure?
  • Perhaps Windows 8 has stronger internal safeguards against exploits, thus stopping some attacks before they get as far as provoking an anti-virus warning?
  • Perhaps some Windows 8 users made the switch for security reasons, and are therefore less likely to put themselves in harm’s way?

Likewise, Windows 7 seems to be at a very slight disadvantage, with 19% of computers visibly attacked, against 16% with XP and Vista.

That might not be a statistically significant difference (nor might the apparent advantage of Windows 8, of course), or it might be a simple side-effect of that fact that Windows 7 is the most prevalent version of Windows.

The most common platform, you can argue, is more likely to be singled out by malware writers who don’t want to go to the trouble of building a multi-version exploit.

But the statistical significance of the left-hand numbers seems, at least on the surface, to be undeniable.

When users went to the trouble of looking for malware, presumably because they thought they had slipped up and got infected, they were 5.7 times more likely to find some on XP than on Windows 8.

In short, the apparent conclusion is that XP is more than five times as permeable to malware than Windows 8.

Therefore, you can argue, XP’s imminent – and, after 12 years, not exactly unexpected or untimely – Goodbye, Farewell and Amen moment should be applauded, and moving on to a more recent operating system will bring clear and immediate security benefits.

On the other hand, you can keep putting these numbers through the wringer and argue that they don’t prove much of anything at all.

For example, the MSRT only deals with a small subset of malware out there – it’s always been something of a stopgap measure for the most commonly-known malware families.

In other words, you might choose to explain the lower apparent infection rates on Windows 8 merely as a sign that the MSRT tends to miss more malware on Windows 8, being biased as a side-effect of history to detecting malware that only works on XP.

You can argue that, because the MSRT quite explicitly isn’t a broad-spectrum anti-virus, the figures on the left don’t denote infection rates at all, but are nothing more than a measure of the effectiveness of MSRT by Windows version.

The truth, I guess, is somewhere between the two.

While XP may not be an ecosytem that is 5.7 times more dangerous than Windows 8, I think it is reasonable to accept that Microsoft’s data supports the claim that you are at much greater risk if you keep on using it.

If you need any more evidence, I suggest you take a look at our recent article series Anatomy of an exploit – inside the CVE-2013-3893 Internet Explorer zero-day.

There, we show the sort of tricks needed to pull off a drive-by exploit against Internet Explorer 9 on Windows 7, which involves working around not only Data Execution Prevention (DEP), but also Address Space Layout Randomisation (ASLR).

Without ASLR, DEP offers only a very mild extra resistance to attack – and XP doesn’t have ASLR.

That alone is probably reason enough to move before next April’s end-of-updates deadline.

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/IppOnh3qVnU/