AT2k Design BBS Message Area
Casually read the BBS message area using an easy to use interface. Messages are categorized exactly like they are on the BBS. You may post new messages or reply to existing messages! You are not logged in. Login here for full access privileges. |
Previous Message | Next Message | Back to Computer Support/Help/Discussion... <-- <--- | Return to Home Page |
|
||||||
From | To | Subject | Date/Time | |||
Sean Rima | All | CRYPTO-GRAM, November 15, 2024 Part 1 |
November 15, 2024 4:13 PM * |
|||
Crypto-Gram November 15, 2024 by Bruce Schneier Fellow and Lecturer, Harvard Kennedy School schneier@schneier.com https://www.schneier.com A free monthly newsletter providing summaries, analyses, insights, and commentaries on security: computer and otherwise. For back issues, or to subscribe, visit Crypto-Gram's web page. Read this issue on the web These same essays and news items appear in the Schneier on Security blog, along with a lively and intelligent comment section. An RSS feed is available. ** *** ***** ******* *********** ************* In this issue: If these links don't work in your email client, try reading this issue of Crypto-Gram on the web. More Details on Israel Sabotaging Hezbollah Pagers and Walkie-Talkies Cheating at Conkers Justice Department Indicts Tech CEO for Falsifying Security Certifications AI and the SEC Whistleblower Program No, the Chinese Have Not Broken Modern Encryption Systems with a Quantum Computer Are Automatic License Plate Scanners Constitutional? Watermark for LLM-Generated Text Criminals Are Blowing up ATMs in Germany Law Enforcement Deanonymizes Tor Users Simson Garfinkel on Spooky Cryptographic Action at a Distance Tracking World Leaders Using Strava Roger Grimes on Prioritizing Cybersecurity Advice Sophos Versus the Chinese Hackers AIs Discovering Vulnerabilities IoT Devices in Password-Spraying Botnet Subverting LLM Coders Prompt Injection Defenses Against LLM Cyberattacks AI Industry is Trying to Subvert the Definition of ΓÇ£Open Source AIΓÇ¥ Criminals Exploiting FBI Emergency Data Requests Mapping License Plate Scanners in the US New iOS Security Feature Makes It Harder for Police to Unlock Seized Phones ** *** ***** ******* *********** ************* More Details on Israel Sabotaging Hezbollah Pagers and Walkie-Talkies [2024.10.15] The Washington Post has a long and detailed story about the operation thatΓÇÖs well worth reading (alternate version here). The sales pitch came from a marketing official trusted by Hezbollah with links to Apollo. The marketing official, a woman whose identity and nationality officials declined to reveal, was a former Middle East sales representative for the Taiwanese firm who had established her own company and acquired a license to sell a line of pagers that bore the Apollo brand. Sometime in 2023, she offered Hezbollah a deal on one of the products her firm sold: the rugged and reliable AR924. ΓÇ£She was the one in touch with Hezbollah, and explained to them why the bigger pager with the larger battery was better than the original model,ΓÇ¥ said an Israeli official briefed on details of the operation. One of the main selling points about the AR924 was that it was ΓÇ£possible to charge with a cable. And the batteries were longer lasting,ΓÇ¥ the official said. As it turned out, the actual production of the devices was outsourced and the marketing official had no knowledge of the operation and was unaware that the pagers were physically assembled in Israel under Mossad oversight, officials said. MossadΓÇÖs pagers, each weighing less than three ounces, included a unique feature: a battery pack that concealed a tiny amount of a powerful explosive, according to the officials familiar with the plot. In a feat of engineering, the bomb component was so carefully hidden as to be virtually undetectable, even if the device was taken apart, the officials said. Israeli officials believe that Hezbollah did disassemble some of the pagers and may have even X-rayed them. Also invisible was MossadΓÇÖs remote access to the devices. An electronic signal from the intelligence service could trigger the explosion of thousands of the devices at once. But, to ensure maximum damage, the blast could also be triggered by a special two-step procedure required for viewing secure messages that had been encrypted. ΓÇ£You had to push two buttons to read the message,ΓÇ¥ an official said. In practice, that meant using both hands. Also read Bunnie HuangΓÇÖs essay on what it means to live in a world where people can turn IoT devices into bombs. His conclusion: Not all things that could exist should exist, and some ideas are better left unimplemented. Technology alone has no ethics: the difference between a patch and an exploit is the method in which a technology is disclosed. Exploding batteries have probably been conceived of and tested by spy agencies around the world, but never deployed en masse because while it may achieve a tactical win, it is too easy for weaker adversaries to copy the idea and justify its re-deployment in an asymmetric and devastating retaliation. However, now that IΓÇÖve seen it executed, I am left with the terrifying realization that not only is it feasible, itΓÇÖs relatively easy for any modestly-funded entity to implement. Not just our allies can do this -- a wide cast of adversaries have this capability in their reach, from nation-states to cartels and gangs, to shady copycat battery factories just looking for a big payday (if chemical suppliers can moonlight in illicit drugs, what stops battery factories from dealing in bespoke munitions?). Bottom line is: we should approach the public policy debate around this assuming that someday, we could be victims of exploding batteries, too. Turning everyday objects into fragmentation grenades should be a crime, as it blurs the line between civilian and military technologies. I fear that if we do not universally and swiftly condemn the practice of turning everyday gadgets into bombs, we risk legitimizing a military technology that can literally bring the front line of every conflict into your pocket, purse or home. ** *** ***** ******* *********** ************* Cheating at Conkers [2024.10.16] The menΓÇÖs world conkers champion is accused of cheating with a steel chestnut. ** *** ***** ******* *********** ************* Justice Department Indicts Tech CEO for Falsifying Security Certifications --- * Origin: High Portable Tosser at my node (618:500/14.1) |
||||||
|
Previous Message | Next Message | Back to Computer Support/Help/Discussion... <-- <--- | Return to Home Page |
Execution Time: 0.0164 seconds If you experience any problems with this website or need help, contact the webmaster. VADV-PHP Copyright © 2002-2024 Steve Winn, Aspect Technologies. All Rights Reserved. Virtual Advanced Copyright © 1995-1997 Roland De Graaf. |