JiscMail Logo
Email discussion lists for the UK Education and Research communities

Help for CYBER-SOCIETY-LIVE Archives


CYBER-SOCIETY-LIVE Archives

CYBER-SOCIETY-LIVE Archives


CYBER-SOCIETY-LIVE@JISCMAIL.AC.UK


View:

Message:

[

First

|

Previous

|

Next

|

Last

]

By Topic:

[

First

|

Previous

|

Next

|

Last

]

By Author:

[

First

|

Previous

|

Next

|

Last

]

Font:

Proportional Font

LISTSERV Archives

LISTSERV Archives

CYBER-SOCIETY-LIVE Home

CYBER-SOCIETY-LIVE Home

CYBER-SOCIETY-LIVE  2003

CYBER-SOCIETY-LIVE 2003

Options

Subscribe or Unsubscribe

Subscribe or Unsubscribe

Log In

Log In

Get Password

Get Password

Subject:

[CSL]: CRYPTO-GRAM, June 15, 2003

From:

J Armitage <[log in to unmask]>

Reply-To:

Interdisciplinary academic study of Cyber Society <[log in to unmask]>

Date:

Mon, 16 Jun 2003 08:22:42 +0100

Content-Type:

text/plain

Parts/Attachments:

Parts/Attachments

text/plain (789 lines)

From: Bruce Schneier [mailto:[log in to unmask]]
Sent: 15 June 2003 11:16
To: [log in to unmask]
Subject: CRYPTO-GRAM, June 15, 2003


                  CRYPTO-GRAM

                 June 15, 2003

               by Bruce Schneier
                Founder and CTO
       Counterpane Internet Security, Inc.
            [log in to unmask]
          <http://www.counterpane.com>


A free monthly newsletter providing summaries, analyses, insights, and
commentaries on computer security and cryptography.

Back issues are available at
<http://www.counterpane.com/crypto-gram.html>.  To subscribe, visit
<http://www.counterpane.com/crypto-gram.html> or send a blank message
to [log in to unmask]

Copyright (c) 2003 by Counterpane Internet Security, Inc.


** *** ***** ******* *********** *************

In this issue:
      The Risks of Cyber-Terrorism
      Crypto-Gram Reprints
      Self-Destructing DVDs
      The Doghouse: BSB Utilities
      Attacking Virtual Machines with Memory Errors
      News
      Counterpane News
      Security Notes from All Over: Tasers and Security Audits
      Expired Domains, E-Mail Addresses, and Passwords
      Teaching Viruses
      Comments from Readers


** *** ***** ******* *********** *************

          The Risks of Cyberterrorism



The threat of cyberterrorism is causing much alarm these days.  We have
been told to expect attacks since 9/11; that cyberterrorists would try
to cripple our power system, disable air traffic control and emergency
services, open dams, or disrupt banking and communications.  But so
far, nothing's happened.  Even during the war in Iraq, which was
supposed to increase the risk dramatically, nothing happened.  The
impending cyberwar was a big dud.  Don't congratulate our vigilant
security, though; the alarm was caused by a misunderstanding of both
the attackers and the attacks.

These attacks are very difficult to execute.  The software systems
controlling our nation's infrastructure are filled with
vulnerabilities, but they're generally not the kinds of vulnerabilities
that cause catastrophic disruptions.  The systems are designed to limit
the damage that occurs from errors and accidents.  They have manual
overrides.  These systems have been proven to work; they've experienced
disruptions caused by accident and natural disaster.  We've been
through blackouts, telephone switch failures, and disruptions of air
traffic control computers.  In 1999, a software bug knocked out a
nationwide paging system for a day.  The results might be annoying, and
engineers might spend days or weeks scrambling, but the effect on the
general population has been minimal.

The worry is that a terrorist would cause a problem more serious than a
natural disaster, but this kind of thing is surprisingly hard to
do.  Worms and viruses have caused all sorts of network disruptions,
but it happened by accident.  In January 2003, the SQL Slammer worm
disrupted 13,000 ATMs on the Bank of America's network.  But before it
happened, you couldn't have found a security expert who understood that
those systems were dependent on that vulnerability.  We simply don't
understand the interactions well enough to predict which kinds of
attacks could cause catastrophic results, and terrorist organizations
don't have that sort of knowledge either -- even if they tried to hire
experts.

The closest example we have of this kind of thing comes from Australia
in 2000.  Vitek Boden broke into the computer network of a sewage
treatment plant along Australia's Sunshine Coast.  Over the course of
two months, he leaked hundreds of thousands of gallons of putrid sludge
into nearby rivers and parks.  Among the results were black creek
water, dead marine life, and a stench so unbearable that residents
complained.  This is the only known case of someone hacking a digital
control system with the intent of causing environmental harm.

Despite our predilection for calling anything "terrorism," these
attacks are not.  We know what terrorism is.  It's someone blowing
himself up in a crowded restaurant, or flying an airplane into a
skyscraper.  It's not infecting computers with viruses, forcing air
traffic controllers to route planes manually, or shutting down a pager
network for a day.  That causes annoyance and irritation, not terror.

This is a difficult message for some, because these days anyone who
causes widespread damage is being given the label "terrorist."  But
imagine for a minute the leadership of al Qaeda sitting in a cave
somewhere, plotting the next move in their jihad against the United
States.  One of the leaders jumps up and exclaims: "I have an
idea!  We'll disable their e-mail...."  Conventional terrorism --
driving a truckful of explosives into a nuclear power plant, for
example -- is still easier and much more effective.

There are lots of hackers in the world -- kids, mostly -- who like to
play at politics and dress their own antics in the trappings of
terrorism.  They hack computers belonging to some other country
(generally not government computers) and display a political
message.  We've often seen this kind of thing when two countries
squabble: China vs. Taiwan, India vs. Pakistan, England vs. Ireland,
U.S. vs. China (during the 2001 crisis over the U.S. spy plane that
crashed in Chinese territory), the U.S. and Israel vs. various Arab
countries.  It's the equivalent of soccer hooligans taking out national
frustrations on another country's fans at a game.  It's base and
despicable, and it causes real damage, but it's cyberhooliganism, not
cyberterrorism.

There are several organizations that track attacks over the
Internet.  Over the last six months, less than 1% of all attacks
originated from countries on the U.S. government's Cyber Terrorist
Watch List, while 35% originated from inside the United
States.  Computer security is still important.  People overplay the
risks of cyberterrorism, but they underplay the risks of
cybercrime.  Fraud and espionage are serious problems.  Luckily, the
same countermeasures aimed at cyberterrorists will also prevent hackers
and criminals.  If organizations secure their computer networks for the
wrong reasons, it will still be the right thing to do.


** *** ***** ******* *********** *************

             Crypto-Gram Reprints



Crypto-Gram is currently in its sixth year of publication.  Back issues
cover a variety of security-related topics, and can all be found on
<http://www.counterpane.com/crypto-gram.html>.  These are a selection
of articles that appeared in this calendar month in other years.

Fixing Intelligence Failures:
<http://www.counterpane.com/crypto-gram-0206.html#1>

Honeypots and the Honeynet Project
<http://www.counterpane.com/crypto-gram-0106.html#1>

Microsoft SOAP:
<http://www.counterpane.com/crypto-gram-0006.html#SOAP>

The Data Encryption Standard (DES):
<http://www.counterpane.com/crypto-gram-0006.html#DES>

The internationalization of cryptography policy:
<http://www.counterpane.com/crypto-gram-9906.html#policy>
and products:
<http://www.counterpane.com/crypto-gram-9906.html#products>

The new breeds of viruses, worms, and other malware:
<http://www.counterpane.com/crypto-gram-9906.html#viruses>

Timing attacks, power analysis, and other "side-channel" attacks
against cryptosystems:
<http://www.counterpane.com/crypto-gram-9806.html#side>


** *** ***** ******* *********** *************

             Self-Destructing DVDs



Disney is launching a pilot DVD-rental program that uses
self-destructing DVDs.  The idea is that the DVD has a coating that
oxidizes after a few days, rendering the DVD unreadable.

I think this is a very clever security countermeasure.  The threat is
regular consumers.  Disney wants to be able to rent DVDs to them at a
price-point lower than their sale price.  By making a DVD that only
lasts a few days after being taken out of the package, Disney has
solved the problem of needing an infrastructure to process DVD returns.

Of course this doesn't solve the problem of making illegal copies of
the DVD, but that's not the problem that Disney is trying to
solve.  Self-destructing DVDs are a clever solution for a specific
security problem, and if it works well it's likely to be a cheap and
effective one.  (Compare this to Circuit City's superficially similar
DIVX format, which also had expiring DVDs, but required a phone line
and special player.)

<http://story.news.yahoo.com/news?tmpl=story&u=/nm/20030516/tc_nm/media_
disney_dvds_dc> or <http://tinyurl.com/byb6>


** *** ***** ******* *********** *************

          The Doghouse: BSB Utilities



I got this as spam, no less.  It's your typical
one-time-pad-that's-really-a-stream-cipher proprietary
algorithm.  You've got your infinitely long key.  You've got your
claims of more security than anything else on the market.  You've got
your weird "independent evaluation" by experts who seem to have no
actual expertise in cryptography.

But this is my favorite quote off the Web site: "One of the primary
means of testing the solidness of a form of encryption is to test the
randomness of the data it creates."  Haven't these people ever heard of
cryptanalysis?

<http://www.bsbutil.com>


** *** ***** ******* *********** *************

    Attacking Virtual Machines with Memory Errors



This is a clever side-channel attack.  An attacker can use memory
errors to attack a virtual machine.  Here's how it works:

First, he loads two Java applets into the target system's memory.  The
first applet is large, and consists only of pointers to the second
applet.  The second applet is the attack code, and can do whatever the
attacker wants.  The trick is to cause a random memory error
occur.  The researchers used a light bulb to heat the target system,
but you can imagine the same sort of result from a microwave oven,
static electricity, or a host of other environmental factors.  It turns
out that a random error is likely to cause the system to run the attack
code.  If, for example, the first applet fills up 60% of the target
system's memory, then a random error (a bit flip) will cause the
execution to pass to the pointer and then to the attack code more than
70% of the time.

The attacker needs physical access to the machine being attacked, so
its main uses are in breaking smart cards and other devices that
attempt to remain secure against the person in possession of it.  There
are lots of such devices that allow the owner to run any program on it
he wants, and maintains security by internal separation of
programs.  This attack demonstrates that internal separation isn't as
good as people might think.

Now that the attack is known, it can easily be prevented.  Simple
measures like parity checking or error-correcting codes can defeat this
technique.  But you can be sure there are other attacks like this.  In
general, there is no way to secure secrets inside a device from someone
who has physical possession of the device.

News article:
<http://news.com.com/2100-1009_3-1001406.html>
Paper:
<http://www.cs.princeton.edu/~sudhakar/papers/memerr.pdf>

<http://www.counterpane.com/smart-card-threats.html>


** *** ***** ******* *********** *************

                      News



Very interesting article on the arrest of three Russian hackers.  This
isn't a technical article, but speaks to socioeconomic conditions and
motivations of these criminals, as well as the competence and
effectiveness of the FBI.
<http://www.washingtonpost.com/wp-dyn/articles/A2619-2003May17.html>
<http://www.washingtonpost.com/wp-dyn/articles/A7774-2003May18.html>
<http://www.washingtonpost.com/wp-dyn/articles/A12984-2003May19.html>

Getting a fake photo ID in New Jersey:
<http://wcbs880.com/njnews/NJ--FakeLicenses-jn/resources_news_html>

Another article on the question of whether or not to apply security
patches:
<http://www.theregister.co.uk/content/55/30605.html>

Good article on how we might preserve privacy in the face of the Total
Information Awareness program:
<http://www.washingtonpost.com/wp-dyn/articles/A25316-2003May7.html>

Essay on the motivations of computer attackers: random attacks versus
targeted attacks:
<http://news.com.com/2010-1071_3-1001016.html>

Video cameras in cell phones are a potential tool to buy
elections.  One of the basic tenets of a good election is that the
ballot is secret.  Someone can offer to buy a vote, but the buyer has
no guarantee that the seller will deliver from the privacy of the
voting booth.  But video cameras in cell phones have the potential to
change that; the buyer can demand proof of a vote bought before he pays.
<http://news.bbc.co.uk/2/hi/technology/3033551.stm>

Insider attack at Coca-Cola:
<http://www.ajc.com/business/content/business/coke/0503/14breakin.html>

Black box recorders in cars, originally intended to determine the cause
of death in an accident, are increasingly being used in court.  People
can be sent to jail, or be held liable, based on the contents.  But
since the system was not designed for use in an adversarial setting, my
guess is that the security surrounding these devices is minimal.
<http://story.news.yahoo.com/news?tmpl=story&u=/usatoday/20030516/ts_usa
today/5165217> or <http://tinyurl.com/bwzm>

Hacking customer privacy in DirecTV:
<http://www.geocities.com/foogert99/>

A new biometric: identifying people by the way they walk.  The first
article claims that the system "has been 80 to 95 percent successful in
identifying people."  Be careful about that number, though, because it
is meaningless without more information about how it was derived.
<http://www.securityfocus.com/news/4909>
<http://www.nandotimes.com/technology/story/892547p-6218025c.html>

Seattle police needed a DNA sample from a suspect.  So they mailed him
a letter, and tricked him into mailing a reply back in an envelope he
licked.  There was enough DNA there to link him to the crime.
<http://www.cnn.com/2003/LAW/05/21/old.murder.ap/index.html>

The Pentagon's Total Information Awareness program has a new name:
Terrorism Information Awareness.
<http://www.msnbc.com/news/916028.asp?0cv=TA00&cp1=1>
<http://news.com.com/2100-1028_3-1008395.html>
<http://www.wired.com/news/privacy/0,1848,58936,00.html>
DARPA's "Report To Congress Regarding the Terrorism Information
Awareness Program":
<http://www.darpa.mil/body/tia/tia_report_page.htm>

The Department of Homeland Security is setting up a cybersecurity
office.  I suspect this is basically a political exercise, but it might
actually result in something positive.
<http://www.washingtonpost.com/wp-dyn/articles/A56254-2003May14.html>
<http://www.fcw.com/fcw/articles/2003/0512/web-cyber-05-14-03.asp>

The problems with some current cyber-insurance policies:
<http://securityfocus.com/columnists/163>

Identity theft insurance offered:
<http://www.forbes.com/2003/05/29/cx_ds_0529simons.html>

Lots of companies are using "security" as an excuse to get around all
sorts of things from government:
<http://online.wsj.com/article_email/0,,SB10541572621041000,00.html>

A reporter created a fake letterhead and used it to order the recipe
for sarin gas, and enough of the four chemicals to make enough to kill
tens of thousands.  There's still the small matter of distribution --
which isn't as easy as it seems -- but it seems that making the stuff
just requires a basic chemist's education and some cheap commercial lab
equipment.
<http://news.bbc.co.uk/1/hi/uk/2948900.stm>

This research on defeating biometric security isn't new, but I don't
remember seeing a translation of the actual article before.  It covers
fingerprint scanners, facial recognition, and iris scanners.
<http://www.heise.de/ct/english/02/11/114/>
<http://www.extremetech.com/article2/0,3973,13919,00.asp>

U.S. airline security is mostly window-dressing.
<http://www.computerworld.com/securitytopics/security/story/0,10801,8142
8,00.html> or <http://tinyurl.com/e8gi>
<http://www.salon.com/news/feature/2003/06/10/missiles/index.html>

Student hacker being tried as an adult.  This, to me, is a measure of
the hysteria today.  Hacking your school's computer is the equivalent
of spray painting your name in the bathroom.  It shouldn't be a felony,
and he shouldn't be tried as an adult.
<http://www.cnn.com/2003/TECH/internet/06/10/school.hacked/index.html>

Good comments on U.S. cybersecurity by former czar Richard Clarke.
<http://www.eweek.com/category2/0,3960,1108625,00.asp>

The manual "Keeping Your Jewish Institution Safe," published by the
Anti-Defamation League, is actually a pretty good anti-terrorism and
security manual.
<http://www.adl.org/security/safe.pdf>

I'm sure glad the Idaho police department's wireless network is "using
a hard-to-crack proprietary encryption protocol."
<http://www.computerworld.com/mobiletopics/mobile/story/0,10801,80849,00
.html> or <http://tinyurl.com/e8gm>

Cyber criminals are a bigger worry than cyber terrorists.  No, it
wasn't me saying this...but it could have been.
<http://www.computerweekly.com/articles/article.asp?liArticleID=122331>

CryptoGram product.  I have no idea if this is any good, and some of
the marketing claims made me wince.  But for the record, I have nothing
to do with this French company.
<http://www.cryptogram-fr.com/english/>

Fear causes irrational security decisions (see above).
<http://www.globetechnology.com/servlet/story/RTGAM.20030605.gtwkapi/BNS
tory/Front/> or <http://tinyurl.com/e8gp>

Vulnerability Disclosure plan (draft) from the industry group called
the "Organization for Internet Safety."
<http://www.oisafety.org/process.html>
News articles:
<http://www.securityfocus.com/news/5458>
<http://zdnet.com.com/2102-1105_2-1013423.html?tag=printthis>

The U.S. Department of Homeland Security now has a National Cyber
Security Division, which will incorporate the Critical Infrastructure
Assurance Office (CIAO), the National Infrastructure Protection Center
(NIPC), the Federal Computer Incident Response Center (FedCIRC) and the
National Communications System.  No word yet on a person to run this thing.
<http://www.washingtonpost.com/ac2/wp-dyn/A24147-2003Jun6>
<http://www.gcn.com/vol1_no1/daily-updates/22360-1.html>
<http://www.govexec.com/dailyfed/0603/060603td1.htm>
<http://www.securityfocus.com/news/5544>


** *** ***** ******* *********** *************

                Counterpane News



Counterpane has a new VP of Worldwide Sales, and a new VP of Strategy
and Development.
<http://www.counterpane.com./pr-hs.html>

Security Q&A with Schneier for Washington Technology magazine:
<http://www.washingtontechnology.com/news/17_24/last-byte/20324-1.html>


** *** ***** ******* *********** *************

     Security Notes from All Over: Tasers and Security Audits



A difficult problems in law enforcement is forensics: proving the
police officers acted properly.  Many cases hinge on
my-word-against-his, and sometimes untrustworthy policemen might be
trusted when they shouldn't be.  One solution is to add auditing
features directly into the weapon:

"The weapon [taser] is fully trackable.  A computer chip date-stamps
every time the trigger is pulled.  The cartridges have serial numbers
and when fired, they release confetti with the serial numbers on
them.  Investigators at a scene involving several officers can
determine who fired and how many times."

<http://www.azcentral.com/specials/special21/articles/0513tasers.html>


** *** ***** ******* *********** *************

   Expired Domains, E-Mail Addresses, and Passwords



A very common feature of password-protected Web sites is the ability to
request that the password be e-mailed to you.  The idea is simple:
people forget their passwords and need to be reminded of them.  It's a
reasonable security assumption that the e-mail address of the person is
secure, so it is reasonable to e-mail the password to them.  (You can
argue about the wisdom of e-mailing the password unencrypted, but I
don't think eavesdropping is the attack we're worried about here.)

Here's a clever attack to exploit this feature.  Step 1: Buy an expired
domain.  Step 2: Watch all the spam come in, and figure out what e-mail
accounts were active for that domain's previous owner.  Step 3: Go to
an account-based site -- eBay, Amazon, etc. -- and request that the
password be sent to those accounts.  If the people with those accounts
didn't bother to change their e-mail address when the domain expired,
you can collect their passwords.

Someone tried that with an expired domain and eBay accounts, and found
that -- if he wanted to -- he could have collected a few
passwords.  Moral: when an e-mail address deactivates, everything
associated with that address should be deactivated as well.

<http://www.auctionbytes.com/cab/abn/y03/m05/i15/s01>


** *** ***** ******* *********** *************

               Teaching Viruses



The University of Calgary is offering a course on virus writing, and
many are up in arms about it.  Wired has published an article on the
SQL Slammer worm, including source code, and recriminations ensue.

Get real here.  If we have any hope of improving computer security, we
need to teach computer security.  Teaching computer security includes
teaching how attacks work.  It includes teaching how viruses work.  It
includes teaching how worms work.

The bad guys have all sorts of resources to learn how to write
viruses.  SQL Slammer source code has been available on the
Internet.  Neither of these two actions will help the bad guys.  But
they probably will help the good guys.

Worms, viruses, exploits, hacking code...they're not infectious
diseases.  We need to look at them as educational tools, and not things
to keep secret.

University of Calgary's Virus course:
<http://pages.cpsc.ucalgary.ca/~aycock/599.48>
<http://www.ucalgary.ca/news/may03/virus.html>

Press coverage:
<http://zdnet.com.com/2100-1105_2-1009411.html>
<http://www.zdnet.com.au/techcentre/antivirus/news/story/0,2000044973,20
274911,00.htm> or <http://tinyurl.com/e8gt>
<http://www.informationweek.com/story/showArticle.jhtml?articleID=10100515>
<http://www.pcworld.com/news/article/0,aid,110938,00.asp>

Wired's article on the SQL Slammer:
<http://www.wired.com/wired/archive/11.07/slammer.html>


** *** ***** ******* *********** *************

               Comments from Readers



From: Eric Tribou <[log in to unmask]>
Subject: Encryption and Wiretapping

I think you missed the target on your comments regarding encryption and
wiretapping.

First to note is that the report is not exclusive to wiretapping of
phone lines.  Electronic and oral communications are
included.  Encrypting phones may not have been encountered at all.  The
encryption that was encountered could easily (and more likely) have
been the use of PGP or some other such method of encrypting e-mail.  It
could also refer to encounters with encrypted Voice over IP
sessions.  Both of those can be based on open systems.

Second point is that how, exactly, the plaintext is recovered is not
mentioned at all.  Using an encrypted phone line is good and all, but
if a bug has been planted in the room in which one side of this
conversation  is taking place then there's little need to worry about
decrypting the data going over the phone line.  The same holds true for
VoIP sessions and encrypted e-mail; in the case of the latter, a key
logger could be used.

So while your point about encrypting telephone devices, and the greater
point about closed security systems, is certainly correct, I don't
believe it should take focus here.  Instead I think it's worth
discussing how data is (or is not) secured on either end of the
communications line and not how it is secured during transmission.



From: Arrigo Triulzi <[log in to unmask]>
Subject: Encryption and Wiretapping

I am just wondering if you are reading too much into the wiretapping
report:

|1) Encryption of phone communications is very uncommon.  Sixteen cases
|   of encryption out of 1,358 wiretaps is a little more than one
|   percent.  Almost no suspected criminals use voice encryption.
|
|2) Encryption of phone conversations isn't very effective.  Every time
|   law enforcement encountered encryption, they were able to bypass
|   it.  I assume that local law enforcement agencies don't have the
|   means to brute-force DES keys (for example).  My guess is that the
|   voice encryption was relatively easy to bypass.

What about these people being on GSM phones?  GSM phones are encrypted,
using A4 (in theory).  It is also true that to wiretap a GSM phone you
don't really have to break A4, you simply tap the base stations.

By applying the above to the report it could well be that the
"encryption was encountered in 16 wiretaps" simply means "they had GSM
phones, we didn't have to worry about encryption 'cos we went and
listened to their conversations at the base stations or gateway
switches between the mobile operator and the fixed line operator/other
mobile operator."

This is how they wiretap mobile phones in Europe...

Of course it doesn't make the argument that people are selling snake
oil for phone encryption wrong at all, it simply completes the picture
and points out the need to understand where encryption ends in a
conversation...



From: Anonymous
Subject: Over-assumptions in "Encryption and Wiretapping"

The court's report about encryption and wiretapping was interesting,
but not necessarily factual.  As you pointed out, it is unlikely that
local police organizations could brute-force DES keys.  Given that some
of the conversations were encrypted but none of that "prevented law
enforcement officials from obtaining the plain text of communications
intercepted," you assumed that the officials were able to break the
crypto systems.

Other possible explanations include:

- The reports of encryption were erroneous.  This could be due to the
reporting officials misunderstanding what "encrypted" means, or
purposely lying to make themselves look good.

- The reports that the encryption didn't prevent them from obtaining
the plaintext were erroneous.  It is easy to believe that a police
officer would lie about this, particularly if they arrested the person
on trumped-up charges but wanted it to look like they had evidence.

To me, both of these are much more plausible than assuming that local
police departments (or even the feds) are smart enough to circumvent an
encryption system.



From: "Israel, Howard M (Howard)" <[log in to unmask]>
Subject: Encryption and Wiretapping

I think that you have made some assumptions, that are critical to the
conclusion that you have drawn.  Briefly, the quoted text did not
specifically indicate that the encryption was actually broken by law
enforcement.  Maybe: 1) law enforcement brought a legal action (e.g.,
subpoena) to the providers of the technology to get the keys?, 2) law
enforcement had multiple taps that captured to conversation anyway
(e.g., the phone conversation that was encrypted took place in a car,
and the encrypted voice was over the phone, but the car also had a bug
in it? 3) maybe the plaintext was obtained from a recording device of
an informant who was present during the conversation? 4) maybe the
encrypted conversation wasn't actually germane to the case, thus not
necessary for prosecution?

Those are only a few hypothesis.  Thus, I think that your conclusions
regarding openness are not justified.




From: Mike Schiraldi <[log in to unmask]>
Subject: Unique e-mail addresses and Spam

I set up an address of the form flowers@foo when I used the services of
1-800-Flowers, and a year or so later I suddenly started receiving a
torrent of pornographic spam at this address.  The customer service
agent assured me that they do not share their address list with anyone,
and I actually believe them.  I'm certain that a DBA or even a temp
worker ran a quick SQL query, saved the results to disk, and sold it
all to spammers.  So even if you trust a company to behave honorably as
a whole, you should still assume that any e-mail address you give them
could easily become public knowledge.



From: "Aram Compeau" <[log in to unmask]>
Subject: Unique E-mail Addresses and Spam

Isn't this just an analog of selecting hard-to-guess passwords? A
slightly better schema is to use <optional name>_counterpane_<dateTime
when subscribing>@machine.domain.  This also overcomes the problem that
if you wish to retire <[log in to unmask]> but you still want to
subscribe, you must provide another e-mail.  Under the new schema, you
can retire <[log in to unmask]> and generate
<[log in to unmask]>.  Of course, there are many
variations on the hard-to-guess suffix.  As long as you use something
like it, framing should be a non-issue for mistakes and casual malice.



From: "Brent J. Nordquist" <[log in to unmask]>
Subject: Countermeasures Against Employee Theft

On Wed, May 14, 2003 at 11:57:49PM -0500, Bruce Schneier wrote:

 > A common security practice is to put a sign on the
 > register that says: "Your purchase free if I fail to give a
 > receipt."  What that sign does is give the customer an interest in
 > paying attention to whether or not she gets a receipt and immediately
 > reporting an employee who doesn't give her one (by demanding her
 > purchase free).  It enlists her as a security agent to defend against
 > employee theft.  The customer has the capability to perform this
 > security function, and the sign gives her the incentive.

A related scenario I've seen is the danger of the employee telling the
customer "That will be $7.73" when it's only $6.73, and pocketing an
extra $1.  I've thus seen (at the Taco Bell drive-through and other
places) a conspicuous LED display with the price, and a warning at the
bottom "Please call 1-800-XXX-XXXX if you are asked to pay a different
amount than that shown here."



From: [log in to unmask]
Subject: Security at Ballparks

While I was studying at university, I needed extra income to pay my
way, so in desperation I took a job working in football stadium
security!  I even attended an official training course with the
Football Stewards Association.  The issue of bottles was a significant
problem in UK football and field sporting events.  The classic attack
was to take a fizzy drink bottle into the stadium and once it was empty
to re-fill it with bodily fluids.  Then the bottle would be hurled at
either a static player or the opposing crowd.  If the victim was lucky
it would just hit the body, but the unlucky victim would get it in the
head and the bottle would break releasing its contents.

Cans have not been much of a threat, although in UK stadiums there are
issues over alcohol which have been addressed.  The main can issue I
can see would be the problem of constructing a sharp offensive weapon
from the aluminum can.

As Mr Bellovin stated, it doesn't matter if you deal with the issue of
larger projectile weapons; the smaller implements are always
available.  There has long been an issue in UK sport with some coins
being used -- an especial favorite is the UK 50 pence coin, which is
not circular but multi-sided, and previously was much
heavier.  Although recently, with the introduction of the heavy #2
coin, generous thugs have found its weight and aerodynamics very useful.

One aspect of stadium violence that I found the most enlightening
during my time was that a lot of inter-club "supporter" violence is
coordinated.  There are groups of "fans" who enjoy the violence and
they arrange when and where to meet for a "ruck."  I worked at a modern
stadium where there were very few incidents of in-stadium violence due
to skilled crowd control and a flexible high-coverage camera system.

Out of the stadium has often been the biggest problem and this modern
stadium uses their technology to assist the police by highlighting
those in the crowd who are seen organizing with their mobile
phones.  Coordinated intelligence gathering between civilian security
and police is highly important to maintain a decent level of safety.



From: "Robert P. Goldman" <[log in to unmask]>
Subject: Security at Ballparks

Seeing those e-mails on this subject reminded me of something I
couldn't resist pointing out:  the same security restriction is used in
New Orleans, except for the streets.  You can drink alcoholic bevvies
in public, but they have to be in a plastic cup, so you can't hurt
anyone with them....


** *** ***** ******* *********** *************


CRYPTO-GRAM is a free monthly newsletter providing summaries, analyses,
insights, and commentaries on computer security and cryptography.  Back
issues are available on <http://www.counterpane.com/crypto-gram.html>.

To subscribe, visit <http://www.counterpane.com/crypto-gram.html> or
send a blank message to [log in to unmask]  To
unsubscribe, visit <http://www.counterpane.com/unsubform.html>.

Please feel free to forward CRYPTO-GRAM to colleagues and friends who
will find it valuable.  Permission is granted to reprint CRYPTO-GRAM,
as long as it is reprinted in its entirety.

CRYPTO-GRAM is written by Bruce Schneier.  Schneier is founder and CTO
of Counterpane Internet Security Inc., the author of "Secrets and Lies"
and "Applied Cryptography," and an inventor of the Blowfish, Twofish,
and Yarrow algorithms.  He is a member of the Advisory Board of the
Electronic Privacy Information Center (EPIC).  He is a frequent writer
and lecturer on computer security and cryptography.

Counterpane Internet Security, Inc. is the world leader in Managed
Security Monitoring.  Counterpane's expert security analysts protect
networks for Fortune 1000 companies world-wide.

<http://www.counterpane.com/>

Copyright (c) 2003 by Counterpane Internet Security, Inc.

************************************************************************************
Distributed through Cyber-Society-Live [CSL]: CSL is a moderated discussion
list made up of people who are interested in the interdisciplinary academic
study of Cyber Society in all its manifestations.To join the list please visit:
http://www.jiscmail.ac.uk/lists/cyber-society-live.html
*************************************************************************************

Top of Message | Previous Page | Permalink

JiscMail Tools


RSS Feeds and Sharing


Advanced Options


Archives

April 2024
March 2024
February 2024
January 2024
December 2023
November 2023
October 2023
September 2023
August 2023
July 2023
June 2023
May 2023
April 2023
March 2023
February 2023
January 2023
December 2022
November 2022
October 2022
September 2022
August 2022
June 2022
May 2022
March 2022
February 2022
October 2021
July 2021
June 2021
April 2021
March 2021
February 2021
January 2021
December 2020
November 2020
October 2020
September 2020
July 2020
June 2020
May 2020
April 2020
February 2020
January 2020
December 2019
November 2019
October 2019
September 2019
August 2019
July 2019
June 2019
May 2019
March 2019
February 2019
January 2019
December 2018
November 2018
October 2018
September 2018
August 2018
July 2018
June 2018
May 2018
April 2018
March 2018
February 2018
January 2018
December 2017
November 2017
October 2017
September 2017
August 2017
July 2017
June 2017
May 2017
April 2017
March 2017
January 2017
December 2016
November 2016
October 2016
September 2016
August 2016
June 2016
May 2016
April 2016
March 2016
February 2016
January 2016
December 2015
November 2015
October 2015
September 2015
August 2015
July 2015
June 2015
May 2015
April 2015
March 2015
February 2015
January 2015
December 2014
November 2014
October 2014
September 2014
August 2014
June 2014
May 2014
April 2014
March 2014
February 2014
January 2014
December 2013
November 2013
October 2013
September 2013
August 2013
July 2013
June 2013
May 2013
April 2013
March 2013
February 2013
January 2013
December 2012
November 2012
October 2012
September 2012
August 2012
July 2012
June 2012
May 2012
April 2012
March 2012
February 2012
January 2012
December 2011
November 2011
October 2011
September 2011
July 2011
June 2011
May 2011
April 2011
March 2011
February 2011
January 2011
December 2010
November 2010
October 2010
September 2010
August 2010
July 2010
June 2010
May 2010
April 2010
March 2010
February 2010
January 2010
December 2009
November 2009
October 2009
September 2009
July 2009
June 2009
May 2009
April 2009
March 2009
February 2009
January 2009
December 2008
November 2008
October 2008
September 2008
June 2008
May 2008
April 2008
March 2008
February 2008
January 2008
December 2007
November 2007
October 2007
September 2007
June 2007
May 2007
April 2007
March 2007
February 2007
January 2007
2006
2005
2004
2003
2002
2001
2000


JiscMail is a Jisc service.

View our service policies at https://www.jiscmail.ac.uk/policyandsecurity/ and Jisc's privacy policy at https://www.jisc.ac.uk/website/privacy-notice

For help and support help@jisc.ac.uk

Secured by F-Secure Anti-Virus CataList Email List Search Powered by the LISTSERV Email List Manager