This is worth it, if only for the The 3rd Annual Nigerian EMail Conference 
url. 
 
Wesley Parish 
 
----- Forwarded message from Bruce Schneier <[EMAIL PROTECTED]> ----- 
Date: Sat, 15 Apr 2006 01:14:09 -0500 
From: Bruce Schneier <[EMAIL PROTECTED]> 
Reply-To: Bruce Schneier <[EMAIL PROTECTED]> 
Subject: CRYPTO-GRAM, April 15, 2006 
To: "[EMAIL PROTECTED]" 
<[EMAIL PROTECTED]> 
 
CRYPTO-GRAM 
 
 April 15, 2006 
 
 by Bruce Schneier 
 Founder and CTO 
 Counterpane Internet Security, Inc. 
 [EMAIL PROTECTED] 
 http://www.schneier.com 
 http://www.counterpane.com 
 
 
A free monthly newsletter providing summaries, analyses, insights, and  
commentaries on security: computer and otherwise. 
 
For back issues, or to subscribe, visit  
<http://www.schneier.com/crypto-gram.html>. 
 
You can read this issue on the web at  
<http://www.schneier.com/crypto-gram-0604.html>. These same essays  
appear in the "Schneier on Security" blog:  
<http://www.schneier.com/blog>. An RSS feed is available. 
 
 
** *** ***** ******* *********** ************* 
 
In this issue: 
 Movie-Plot Threat Contest 
 Airport Passenger Screening 
 80 Cameras for 2,400 People 
 Crypto-Gram Reprints 
 VOIP Encryption 
 Security through Begging 
 DHS Privacy and Integrity Report 
 News 
 KittenAuth 
 Terrorism Risks of Google Earth 
 New Kind of Door Lock 
 Counterpane News 
 Evading Copyright Through XOR 
 iJacking 
 Security Screening for New York Helicopters 
 Comments from Readers 
 
 
** *** ***** ******* *********** ************* 
 
 Movie-Plot Threat Contest 
 
 
 
NOTE: If you have a blog, please spread the word. 
 
For a while now, I have been writing about our penchant for "movie-plot  
threats": terrorist fears based on very specific attack  
scenarios. Terrorists with crop dusters, terrorists exploding baby  
carriages in subways, terrorists filling school buses with explosives  
-- these are all movie-plot threats. They're good for scaring people,  
but it's just silly to build national security policy around them. 
 
But if we're going to worry about unlikely attacks, why can't they be  
exciting and innovative ones? If Americans are going to be scared,  
shouldn't they be scared of things that are really scary? "Blowing up  
the Super Bowl" is a movie plot to be sure, but it's not a very good  
movie. Let's kick this up a notch. 
 
It is in this spirit I announce the (possibly First) Movie-Plot Threat  
Contest. Entrants are invited to submit the most unlikely, yet still  
plausible, terrorist attack scenarios they can come up with. 
 
Your goal: cause terror. Make the American people notice. Inflict  
lasting damage on the U.S. economy. Change the political landscape, or  
the culture. The more grandiose the goal, the better. 
 
Assume an attacker profile on the order of 9/11: 20 to 30 unskilled  
people, and about $500,000 with which to buy skills, equipment, etc. 
 
Post your movie plots here on this blog. 
 
Judging will be by me, swayed by popular acclaim in the blog comments  
section. The prize will be an autographed copy of Beyond Fear. And if  
I can swing it, a phone call with a real live movie producer. 
 
Entries close at the end of the month -- April 30. 
 
This is not an April Fool's joke, although it's in the spirit of the  
season. The purpose of this contest is absurd humor, but I hope it  
also makes a point. Terrorism is a real threat, but we're not any  
safer through security measures that require us to correctly guess what  
the terrorists are going to do next. 
 
Good luck. 
 
Post your entries, and read the others, here: 
http://www.schneier.com/blog/archives/2006/04/announcing_movi.html 
 
Movie-plot threats: 
http://www.schneier.com/essay-087.html 
 
http://www.time.com/time/nation/article/0,8599,175951,00.html 
http://www.schneier.com/blog/archives/2005/10/exploding_baby.html 
http://www.schneier.com/blog/archives/2006/02/school_bus_driv.html 
http://www.imdb.com/title/tt0075765 
 
There are hundreds of ideas here: 
http://cockeyed.com/citizen/terror/plans/terrorwatch.html 
 
 
** *** ***** ******* *********** ************* 
 
 Airport Passenger Screening 
 
 
 
It seems like every time someone tests airport security, airport  
security fails. In tests between November 2001 and February 2002,  
screeners missed 70 percent of knives, 30 percent of guns, and 60  
percent of (fake) bombs. And recently, testers were able to smuggle  
bomb-making parts through airport security in 21 of 21 attempts. It  
makes you wonder why we're all putting our laptops in a separate bin  
and taking off our shoes. (Although we should all be glad that Richard  
Reid wasn't the "underwear bomber.") 
 
The failure to detect bomb-making parts is easier to understand. Break  
up something into small enough parts, and it's going to slip past the  
screeners pretty easily. The explosive material won't show up on the  
metal detector, and the associated electronics can look benign when  
disassembled. This isn't even a new problem. It's widely believed that  
the Chechen women who blew up the two Russian planes in August 2004  
probably smuggled their bombs aboard the planes in pieces. 
 
But guns and knives? That surprises most people. 
 
Airport screeners have a difficult job, primarily because the human  
brain isn't naturally adapted to the task. We're wired for visual  
pattern matching, and are great at picking out something we know to  
look for -- for example, a lion in a sea of tall grass. 
 
But we're much less adept at detecting random exceptions in uniform  
data. Faced with an endless stream of identical objects, the brain  
quickly concludes that everything is identical and there's no point in  
paying attention. By the time the exception comes around, the brain  
simply doesn't notice it. This psychological phenomenon isn't just a  
problem in airport screening: It's been identified in inspections of  
all kinds, and is why casinos move their dealers around so often. The  
tasks are simply mind-numbing. 
 
To make matters worse, the smuggler can try to exploit the system. He  
can position the weapons in his baggage just so. He can try to disguise  
them by adding other metal items to distract the screeners. He can  
disassemble bomb parts so they look nothing like bombs. Against a bored  
screener, he has the upper hand. 
 
And, as has been pointed out again and again in essays on the  
ludicrousness of post-9/11 airport security, improvised weapons are a  
huge problem. A rock, a battery for a laptop, a belt, the extension  
handle off a wheeled suitcase, fishing line, the bare hands of someone  
who knows karate...the list goes on and on. 
 
Technology can help. X-ray machines already randomly insert "test" bags  
into the stream -- keeping screeners more alert. Computer-enhanced  
displays are making it easier for screeners to find contraband items in  
luggage, and eventually the computers will be able to do most of the  
work. It makes sense: Computers excel at boring repetitive tasks. They  
should do the quick sort, and let the screeners deal with the exceptions. 
 
Sure, there'll be a lot of false alarms, and some bad things will still  
get through. But it's better than the alternative. 
 
And it's likely good enough. Remember the point of passenger screening.  
We're not trying to catch the clever, organized, well-funded  
terrorists. We're trying to catch the amateurs and the incompetent.  
We're trying to catch the unstable. We're trying to catch the copycats.  
These are all legitimate threats, and we're smart to defend against  
them. Against the professionals, we're just trying to add enough  
uncertainty into the system that they'll choose other targets instead. 
 
The terrorists' goals have nothing to do with airplanes; their goals  
are to cause terror. Blowing up an airplane is just a particular attack  
designed to achieve that goal. Airplanes deserve some additional  
security because they have catastrophic failure properties: If there's  
even a small explosion, everyone on the plane dies. But there's a  
diminishing return on investments in airplane security. If the  
terrorists switch targets from airplanes to shopping malls, we haven't  
really solved the problem. 
 
What that means is that a basic cursory screening is good enough. If I  
were investing in security, I would fund significant research into  
computer-assisted screening equipment for both checked and carry-on  
bags, but wouldn't spend a lot of money on invasive screening  
procedures and secondary screening. I would much rather have  
well-trained security personnel wandering around the airport, both in  
and out of uniform, looking for suspicious actions. 
 
When I travel in Europe, I never have to take my laptop out of its case  
or my shoes off my feet. Those governments have had far more experience  
with terrorism than the U.S. government, and they know when passenger  
screening has reached the point of diminishing returns. (They also  
implemented checked-baggage security measures decades before the United  
States did -- again recognizing the real threat.) 
 
And if I were investing in security, I would invest in intelligence and  
investigation. The best time to combat terrorism is before the  
terrorist tries to get on an airplane. The best countermeasures have  
value regardless of the nature of the terrorist plot or the particular  
terrorist target. 
 
In some ways, if we're relying on airport screeners to prevent  
terrorism, it's already too late. After all, we can't keep weapons out  
of prisons. How can we ever hope to keep them out of airports? 
 
http://archives.cnn.com/2002/US/03/25/airport.security/ 
http://www.msnbc.msn.com/id/11863165/ 
http://www.msnbc.msn.com/id/11878391/ 
 
A version of this essay originally appeared on Wired.com. 
http://www.wired.com/news/columns/0,70470-0.html 
 
 
** *** ***** ******* *********** ************* 
 
 80 Cameras for 2,400 People 
 
 
 
The remote town of Dillingham, Alaska is probably the most watched town  
in the country. There are 80 surveillance cameras for the 2,400  
people, which translates to one camera for every 30 people. 
 
The cameras were bought, I assume, because the town couldn't think of  
anything else to do with the $202,000 Homeland Security grant they  
received. (One of the problems of giving this money out based on  
political agenda, rather than by where the actual threats are.) 
 
But they got the money, and they spent it. And now they have to  
justify the expense. Here's the movie-plot threat the Dillingham  
Police Chief uses to explain why the expense was worthwhile: 
 
"'Russia is about 800 miles that way,' he says, arm extending right. 
 
"'Seattle is about 1,200 miles back that way.' He points behind him. 
 
"'So if I have the math right, we're closer to Russia than we are to  
Seattle.' 
 
"Now imagine, he says: What if the bad guys, whoever they are, manage  
to obtain a nuclear device in Russia, where some weapons are believed  
to be poorly guarded. They put the device in a container and then hire  
organized criminals, 'maybe Mafiosi,' to arrange a tramp steamer to  
pick it up. The steamer drops off the container at the Dillingham  
harbor, complete with forged paperwork to ship it to Seattle. The  
container is picked up by a barge. 
 
"'Ten days later,' the chief says, 'the barge pulls into the Port of  
Seattle.' 
 
"Thompson pauses for effect. 
 
"'Phoooom," he says, his hands blooming like a flower." 
 
The first problem with the movie plot is that it's just plain  
silly. But the second problem, which you might have to look back to  
notice, is that those 80 cameras will do nothing to stop his imagined  
attack. 
 
We are all security consumers. We spend money, and we expect security  
in return. This expenditure was a waste of money, and as a U.S.  
taxpayer, I am pissed that I'm getting such a lousy deal. 
 
http://www.latimes.com/news/nationworld/nation/la-na-secure28mar28,0,275  
8659,full.story or http://tinyurl.com/ocfan 
 
 
** *** ***** ******* *********** ************* 
 
 Crypto-Gram Reprints 
 
 
 
Crypto-Gram is currently in its ninth year of publication. Back issues  
cover a variety of security-related topics, and can all be found on  
<http://www.schneier.com/crypto-gram-back.html>. These are a selection  
of articles that appeared in this calendar month in other years. 
 
Mitigating Identity Theft: 
http://www.schneier.com/crypto-gram-0504.html#2 
 
Hacking the Papal Election: 
http://www.schneier.com/crypto-gram-0504.html#8 
 
National ID Cards: 
http://www.schneier.com/crypto-gram-0404.html#1 
 
Stealing an Election: 
http://www.schneier.com/crypto-gram-0404.html#4 
 
Automated Denial-of-Service Attacks Using the U.S. Post Office: 
http://www.schneier.com/crypto-gram-0304.html#1 
 
National Crime Information Center (NCIC) Database Accuracy: 
http://www.schneier.com/crypto-gram-0304.html#7 
 
How to Think About Security: 
http://www.schneier.com/crypto-gram-0204.html#1 
 
Is 1028 Bits Enough? 
http://www.schneier.com/crypto-gram-0204.html#3 
 
Liability and Security 
http://www.schneier.com/crypto-gram-0204.html#6 
 
Natural Advantages of Defense: What Military History Can Teach Network  
Security, Part 1 
http://www.schneier.com/crypto-gram-0104.html#1 
 
UCITA: 
http://www.schneier.com/crypto-gram-0004.html#ucita 
 
Cryptography: The Importance of Not Being Different: 
http://www.schneier.com/crypto-gram-9904.html#different 
 
Threats Against Smart Cards: 
http://www.schneier.com/crypto-gram-9904.html#smartcards 
 
Attacking Certificates with Computer Viruses: 
http://www.schneier.com/crypto-gram-9904.html#certificates 
 
 
** *** ***** ******* *********** ************* 
 
 VOIP Encryption 
 
 
 
There are basically four ways to eavesdrop on a telephone call. 
 
One, you can listen in on another phone extension. This is the method  
preferred by siblings everywhere. If you have the right access, it's  
the easiest. While it doesn't work for cell phones, cordless phones are  
vulnerable to a variant of this attack: A radio receiver set to the  
right frequency can act as another extension. 
 
Two, you can attach some eavesdropping equipment to the wire with a  
pair of alligator clips. It takes some expertise, but you can do it  
anywhere along the phone line's path -- even outside the home. This  
used to be the way the police eavesdropped on your phone line. These  
days it's probably most often used by criminals. This method doesn't  
work for cell phones, either. 
 
Three, you can eavesdrop at the telephone switch. Modern phone  
equipment includes the ability for someone to listen in this way.  
Currently, this is the preferred police method. It works for both land  
lines and cell phones. You need the right access, but if you can get  
it, this is probably the most comfortable way to eavesdrop on a  
particular person. 
 
Four, you can tap the main trunk lines, eavesdrop on the microwave or  
satellite phone links, etc. It's hard to eavesdrop on one particular  
person this way, but it's easy to listen in on a large chunk of  
telephone calls. This is the sort of big-budget surveillance that  
organizations like the National Security Agency do best. They've even  
been known to use submarines to tap undersea phone cables. 
 
That's basically the entire threat model for traditional phone calls.  
And when most people think about IP telephony -- voice over internet  
protocol, or VOIP -- that's the threat model they probably have in  
their heads. 
 
Unfortunately, phone calls from your computer are fundamentally  
different from phone calls from your telephone. Internet telephony's  
threat model is much closer to the threat model for IP-networked  
computers than the threat model for telephony. 
 
And we already know the threat model for IP. Data packets can be  
eavesdropped on *anywhere* along the transmission path. Data packets  
can be intercepted in the corporate network, by the internet service  
provider and along the backbone. They can be eavesdropped on by the  
people or organizations that own those computers, and they can be  
eavesdropped on by anyone who has successfully hacked into those  
computers. They can be vacuumed up by nosy hackers, criminals,  
competitors and governments. 
 
It's comparable to threat No. 3 above, but with the scope vastly expanded. 
 
My greatest worry is the criminal attacks. We already have seen how  
clever criminals have become over the past several years at stealing  
account information and personal data. I can imagine them eavesdropping  
on attorneys, looking for information with which to blackmail people. I  
can imagine them eavesdropping on bankers, looking for inside  
information with which to make stock purchases. I can imagine them  
stealing account information, hijacking telephone calls, committing  
identity theft. On the business side, I can see them engaging in  
industrial espionage and stealing trade secrets. In short, I can  
imagine them doing all the things they could never have done with the  
traditional telephone network. 
 
This is why encryption for VOIP is so important. VOIP calls are  
vulnerable to a variety of threats that traditional telephone calls are  
not. Encryption is one of the essential security technologies for  
computer data, and it will go a long way toward securing VOIP. 
 
The last time this sort of thing came up, the U.S. government tried to  
sell us something called "key escrow." Basically, the government likes  
the idea of everyone using encryption, as long as it has a copy of the  
key. This is an amazingly insecure idea for a number of reasons, mostly  
boiling down to the fact that when you provide a means of access into a  
security system, you greatly weaken its security. 
 
A recent case in Greece demonstrated that perfectly: Criminals used a  
cell-phone eavesdropping mechanism already in place, designed for the  
police to listen in on phone calls. Had the call system been designed  
to be secure in the first place, there never would have been a backdoor  
for the criminals to exploit. 
 
Fortunately, there are many VOIP-encryption products available. Skype  
has built-in encryption. Phil Zimmermann is releasing Zfone, an  
easy-to-use open-source product. There's even a VOIP Security Alliance. 
 
Encryption for IP telephony is important, but it's not a panacea.  
Basically, it takes care of threats No. 2 through No. 4, but not threat  
No. 1. Unfortunately, that's the biggest threat: eavesdropping at the  
end points. No amount of IP telephony encryption can prevent a Trojan  
or worm on your computer -- or just a hacker who managed to get access  
to your machine -- from eavesdropping on your phone calls, just as no  
amount of SSL or e-mail encryption can prevent a Trojan on your  
computer from eavesdropping -- or even modifying -- your data. 
 
So, as always, it boils down to this: We need secure computers and  
secure operating systems even more than we need secure transmission. 
 
Why key escrow is a bad idea: 
http://www.schneier.com/paper-key-escrow.html 
 
Greek wiretapping story: 
http://www.schneier.com/blog/archives/2006/02/phone_tapping_i.html 
 
Zfone: 
http://www.philzimmermann.com/EN/zfone/index.html 
http://www.wired.com/news/technology/0,70524-0.html 
 
VOIP Security Alliance: 
http://www.voipsa.org/ 
 
This essay originally appeared on Wired.com. 
http://www.wired.com/news/columns/1,70591-0.html 
 
 
** *** ***** ******* *********** ************* 
 
 Security through Begging 
 
 
 
 From TechDirt: "Last summer, the surprising news came out that  
Japanese nuclear secrets leaked out, after a contractor was allowed to  
connect his personal virus-infested computer to the network at a  
nuclear power plant. The contractor had a file sharing app on his  
laptop as well, and suddenly nuclear secrets were available to plenty  
of kids just trying to download the latest hit single. It's only taken  
about nine months for the government to come up with its suggestion on  
how to prevent future leaks of this nature: begging all Japanese  
citizens not to use file sharing systems -- so that the next time this  
happens, there won't be anyone on the network to download such documents." 
 
Even if their begging works, it solves the wrong problem. Sad. 
 
Article: 
http://techdirt.com/articles/20060316/0052241.shtml 
 
Original article: 
http://www.techdirt.com/articles/20050623/0251255.shtml 
 
Government suggestion: 
http://mdn.mainichi-msn.co.jp/national/news/20060315p2a00m0na017000c.htm  
l or http://tinyurl.com/pejx2 
 
Another article: 
http://www.latimes.com/news/nationworld/world/la-fg-computer21mar21,0,51  
59274.story or http://tinyurl.com/fmvlb 
 
 
** *** ***** ******* *********** ************* 
 
 DHS Privacy and Integrity Report 
 
 
 
Last year, the Department of Homeland Security finally got around to  
appointing its DHS Data Privacy and Integrity Advisory Committee. It  
was mostly made up of industry insiders instead of anyone with any real  
privacy experience. (Lance Hoffman from George Washington University  
was the most notable exception.) 
 
And now, we have something from that committee. On March 7th they  
published their Framework for Privacy Analysis of Programs,  
Technologies, and Applications. 
 
It's surprisingly good. 
 
I like that it is a series of questions a program manager has to  
answer: about the legal basis for the program, its efficacy against the  
threat, and its effects on privacy. I am particularly pleased that  
their questions on pages 3-4 are very similar to the "five steps" I  
wrote about in Beyond Fear. I am thrilled that the document takes a  
"trade-off" approach; the last question asks: "Should the program  
proceed? Do the benefits of the program...justify the costs to privacy  
interests....?" 
 
I think this is a good starting place for any technology or program  
with respect to security and privacy. And I hope the DHS actually  
follows the recommendations in this report. 
 
Committee: 
http://www.dhs.gov/dhspublic/interapp/editorial/editorial_0512.xml 
http://www.dhs.gov/dhspublic/interapp/editorial/editorial_0598.xml 
 
Framework for Privacy Analysis of Programs, Technologies, and Applications 
http://www.privacilla.org/releases/DHS_Privacy_Framework.pdf 
 
My five steps: 
http://www.schneier.com/crypto-gram-0204.html#1 
 
 
** *** ***** ******* *********** ************* 
 
 News 
 
 
 
Of course RFID chips can carry viruses. They're just little computers. 
http://arstechnica.com/news.ars/post/20060315-6386.html 
I thought the attack vector was interesting: a Trojan RFID attacks the  
central database, rather than attacking other RFID chips  
directly. Metaphorically, it's a lot closer to biological viruses,  
because it actually requires the more powerful host to be subverted,  
and there's no way an infected tag can propagate directly to another  
tag. The coverage is more than a tad sensationalist, though. 
http://www.computerworld.com/mobiletopics/mobile/story/0,10801,109560,00  
.html or http://tinyurl.com/mwz88 
 
Movie theaters want to jam cell phones. 
http://www.mobiletracker.net/archives/2006/03/15/movie-theater-jamming 
http://www.csmonitor.com/2006/0324/p11s01-almo.html 
 
Massive surveillance in an online gaming world. 
http://terranova.blogs.com/terra_nova/2006/03/confessions_of_.html 
 
Yossi Oren and Adi Shamir have written a paper describing a power  
attack against RFID tags. This is great work by Yossi Oren and Adi  
Shamir. From the abstract: "Power Analysis of RFID Tags: Compared to  
standard power analysis attacks, this attack is unique in that it  
requires no physical contact with the device under attack. While the  
specific attack described here requires the attacker to actually  
transmit data to the tag under attack, the power analysis part itself  
requires only a receive antenna. This means that a variant of this  
attack can be devised such that the attacker is completely passive  
while it is acquiring the data, making the attack very hard to  
detect." My prediction of the industry's response: downplay the  
results and pretend it's not a problem. 
http://www.wisdom.weizmann.ac.il/%7Eyossio/rfid/ 
 
The 3rd Annual Nigerian E-mail Conference. Funny. 
http://j-walk.com/other/conf/index.htm 
 
The chairman of Qantas was stopped at airport security. She had  
airplane blueprints. Oh, and she was a woman -- which cast immediate  
suspicion on her story. 
http://www.aero-news.net/Community/DiscussTopic.cfm?TopicID=2648&Refresh=1 
 
Really good article by a reporter who has been covering improvised  
explosive devices in Iraq: 
http://www.defensetech.org/archives/002238.html 
 
There are some deliberately fake 300, 600, and 1000 euro notes being  
made in Germany as an advertisement. They're being passed as real: 
http://www.ananova.com/news/story/sm_1760580.html 
This is why security is so hard: people. 
 
Really interesting article by Robert X. Cringely on the lack of federal  
funding for security technologies. I think his analysis is dead on. 
http://www.pbs.org/cringely/pulpit/pulpit20060309.html 
 
Australian bank fraud: I really wish this article had more details  
about the crime. Basically, a criminal ring used an authentication  
failure with fax transmissions to steal (unsuccessfully, as it turned  
out) $150 million Australian dollars. 
http://www.smh.com.au/articles/2006/03/17/1142582520870.html 
 
Rare outbreak of security common sense in London. They're rejecting  
passenger screening in their subways. 
http://www.kablenet.com/kd.nsf/Frontpage/85C58F53F411521180257132005EF49  
F?OpenDocument or http://tinyurl.com/nrmpr 
 
Who needs terrorists? We can cause terror all by ourselves. 
http://www.postgazette.com/pg/06081/674773.stm 
The story is about a huge security overreaction because some worker in  
a downtown building was using a pellet gun to scare pigeons. 
 
"Terrorist with Nuke" movie plot. It sounds like this New Scientist  
writer is trying to write a novel. 
http://archinect.com/news/article.php?id=35501_0_24_15_M 
 
Enigma? I don't know what this is, but it sure looks a lot like an  
Enigma. And it's beautiful. 
http://www.tatjavanvark.nl/tvv1/pht10.html 
 
A couple -- living together, I assume -- and engaged to be married  
shared a computer. He used Firefox to visit a bunch of dating sites,  
being smart enough not to have the browser save his password. But  
Firefox did save the names of the sites it was told never to save the  
password for. She happened to stumble on this list. The details are  
left to the imagination, but they broke up. 
https://bugzilla.mozilla.org/show_bug.cgi?id=330884 
Most interesting bug report I've ever read. 
 
Creative Home Engineering can make secret doors and hidden passageways  
for your home. "Pull a favorite book from your library shelf and watch  
a cabinet section recess to reveal a hidden passageway. Twist a  
candlestick and your fireplace rotates, granting access to a hidden  
room." Who cares about the security properties? I want one. 
http://www.hiddenpassageway.com/ 
 
Encryption using quasars: 
http://www.theinquirer.net/?article=30553 
http://www.schneier.com/blog/archives/2006/03/quasar_encrypti.html 
 
A hacker working for al Qaeda, called Irhabi 007, has been  
captured. Assuming the British authorities are to be believed, he  
definitely was a terrorist. And he used the Internet, both as a  
communication tool and to break into networks. But this does not make  
him a cyberterrorist. 
http://www.washingtonpost.com/wp-dyn/content/article/2006/03/25/AR200603  
2500020.html or http://tinyurl.com/rtlda 
http://it.slashdot.org/article.pl?sid=06/03/26/0530206 
 
The police used profiles on MySpace to identify six suspects in a  
rape/robbery. 
http://www.cnn.com/2006/US/03/25/my.space.ap/index.html 
 
Chameleon weapons: you can't detect them, because they look normal: 
http://www.defensetech.org/archives/002265.html 
 
An Economic Analysis of Airport Security Screening. The authors use  
game theory to investigate the optimal screening policy, in a scenario  
when there are different social groups (separated by felons, race,  
religion, etc.) with different preferences for crime and/or terrorism. 
http://www.econ.upenn.edu/~persico/research/Papers/airportaea11.pdf 
 
Cubicle Farms are a Terrorism Risk 
The British security service MI5 is warning business leaders that their  
offices are probably badly designed against terrorist bombs. The  
common modern office consists of large rooms without internal walls,  
which puts employees at greater risk in the event of terrorist bombs. 
http://news.scotsman.com/index.cfm?id=419082006 
 
I don't know if this "Internet Hash Project" is an April Fool's Day  
joke, but it's funny all the same. 
http://www.nethash.org/ 
 
Last month the Government Accounting Office released three new reports  
on homeland security. 
"Cargo Container Inspections: Preliminary Observations on the Status of  
Efforts to Improve the Automated Targeting System." 
http://www.gao.gov/cgi-bin/getrpt?GAO-06-591T 
Highlights: http://www.gao.gov/highlights/d06591thigh.pdf 
"Homeland Security: The Status of Strategic Planning in the National  
Capital Region." 
http://www.gao.gov/cgi-bin/getrpt?GAO-06-559T 
Highlights: http://www.gao.gov/highlights/d06559thigh.pdf 
"Homeland Security: Progress Continues, but Challenges Remain on  
Department's Management of Information Technology." 
http://www.gao.gov/cgi-bin/getrpt?GAO-06-598T 
Highlights: http://www.gao.gov/highlights/d06598thigh.pdf 
 
It's a really clever idea: bolts and latches that fasten and unfasten  
in response to remote computer commands. But the security comment is  
funny: "But everything is locked down with codes, and the radio signals  
are scrambled, so this is fully secured against hackers." Clearly this  
guy knows nothing about computer security. 
http://www.chicagotribune.com/business/chi-0603300225mar30,1,7805363.sto  
ry or http://tinyurl.com/rtoxc 
http://it.slashdot.org/article.pl?sid=06/04/03/0624225 
 
Interesting paper on phishing, and why it works. 
http://www.deas.harvard.edu/~rachna/papers/why_phishing_works.pdf 
 
Undercover investigators were able to smuggle radioactive materials  
into the U.S. It set off alarms at border checkpoints, but the  
smugglers had forged import licenses from the Nuclear Regulatory  
Commission, based on an image of the real document they found on the  
Internet. Unfortunately, the border agents had no way to confirm the  
validity of import licenses. I've written about this problem before,  
and it's one I think will get worse in the future. Verification  
systems are often the weakest link of authentication. Improving  
authentication tokens won't improve security unless the verification  
systems improve as well. 
http://www-tech.mit.edu/V125/N1/long4_1.1w.html 
http://www.schneier.com/blog/archives/2006/01/forged_credenti.html 
 
Security applications of time-reversed acoustics. I simply don't have  
the science to evaluate this. 
http://www.physorg.com/news12093.html 
 
Iowa lawmakers are proposing "I'm Not the Criminal You're Looking For"  
card, for victims of identity theft. I think it's a great idea, and it  
reminds me of something I wrote about in Beyond Fear: "In Singapore,  
some names are so common that the police issue  
He's-not-the-guy-we're-looking-for documents exonerating innocent  
people with the same names as wanted criminals." It's not perfect. Of  
course it will be forged; all documents are forged. This is a still  
good idea, even though it's not perfect. 
http://news.com.com/Iowa+proposes+ID+theft+passport/2100-7348_3-6052308.  
html or http://tinyurl.com/qq8dj 
 
Good information from EPIC on the security of tax data in the IRS. 
http://www.epic.org/privacy/surveillance/spotlight/0306/ 
 
A man in the UK was detained for singing along with a Clash  
song. Basically, his taxi driver turned him in. 
http://today.reuters.co.uk/news/newsArticle.aspx?type=entertainmentNews&;  
storyID=2006-04-05T134826Z_01_L05785309_RTRUKOC_0_UK-CLASH.xml or  
http://tinyurl.com/e6nr6 
http://news.bbc.co.uk/1/hi/england/4879918.stm 
I was in New York earlier this month, and I saw a sign at the entrance  
to the Midtown Tunnel that said: "See something? Say something." The  
problem with a nation of amateur spies is that it results in these  
sorts of results. "I know he's a terrorist because he's dressing funny  
and he always has white wires hanging out of his pocket." "They all  
talk in a funny language and their cooking smells bad." Amateur spies  
perform amateur spying. If everybody does it, the false alarms will  
overwhelm the police. 
 
You've all heard of the "No Fly List." Did you know that there's a  
"No-Buy List" as well? 
http://www.washingtonpost.com/wp-dyn/content/article/2006/04/08/AR200604  
0800157.html or http://tinyurl.com/ofz2y 
The list: 
http://www.ustreas.gov/offices/enforcement/ofac/sdn/t11sdn.pdf 
 
Last week the San Francisco Chronicle broke the story that Air Force  
One's defenses were exposed on a public Internet site: 
http://www.sfgate.com/cgi-bin/article.cgi?f=/c/a/2006/04/08/MNGESI5U6C1.  
DTL&hw=Air+Force+One&sn=002&sc=217 or http://tinyurl.com/pbro5 
http://www.sfgate.com/cgi-bin/article.cgi?file=/c/a/2006/04/11/MNGK3I7A6  
41.DTL or http://tinyurl.com/r46g7 
Despite all the breathless reporting, turns out this is no big deal: 
http://www.defensetech.org/archives/002315.html 
The Air Force removed the document, but I'm not sure it didn't do more  
harm than good. 
Another news report: 
http://www.upi.com/NewsTrack/view.php?StoryID=20060411-013024-5870r 
Several conservative blogs criticized the Chronicle for publishing  
this, because it gives the terrorists more information. I think they  
should be criticized for publishing this, because there's no story here. 
Much of the document is here. 
http://cryptome.org/af1-rescue.htm 
 
Stolen military goods are being sold in the markets in Afghanistan,  
including hard drives filled with classified data. 
http://www.latimes.com/news/nationworld/world/la-fg-disks10apr10,0,58549  
05,full.story or http://tinyurl.com/nhzgz 
http://www.npr.org/templates/story/story.php?storyId=5338506 
 
What if your vendor won't sell you a security upgrade? Good article: 
http://www.networkworld.com/columnists/2006/041006snyder.html 
 
Really nice social engineering example. Watch an escaped convict  
convince a police officer he's not that guy. Note his repeated efforts  
to ensure that if he's stopped again, he can rely on the cop to vouch  
for him. 
http://www.salon.com/ent/video_dog/media/2006/04/10/escaped_murderer/ind  
ex.html or http://tinyurl.com/nv6u2 
 
Intersting technical details about NSA's warrantless surveillance, and  
AT&T's help: 
http://www.wired.com/news/technology/1,70619-0.html 
http://dailykos.com/storyonly/2006/4/8/14724/28476/ 
http://amygdalagf.blogspot.com/2006/04/hepting-vs.html 
 
 
** *** ***** ******* *********** ************* 
 
 KittenAuth 
 
 
 
You've all seen CAPTCHAs. Those are those distorted pictures of  
letters and numbers you sometimes see on web forms. The idea is that  
it's hard for computers to identify the characters, but easy for people  
to do. The goal of CAPTCHAs is to authenticate that there's a person  
sitting in front of the computer. 
 
KittenAuth works with images. The system shows you nine pictures of  
cute little animals, and the person authenticates himself by clicking  
on the three kittens. A computer clicking at random has only a 1 in 84  
chance of guessing correctly. 
 
Of course you could increase the security by adding more images or  
requiring the person to choose more images. Another worry -- which I  
didn't see mentioned -- is that the computer could brute-force a static  
database. If there are only a small fixed number of actual kittens,  
the computer could be told -- by a person -- that they're  
kittens. Then, the computer would know that whenever it sees that  
image it's a kitten. 
 
Still, it's an interesting idea that warrants more research. 
 
KittenAuth: 
http://www.thepcspy.com/articles/security/the_cutest_humantest_kittenaut  
h or http://tinyurl.com/o2585 
 
CAPTCHAs: 
http://en.wikipedia.org/wiki/Captcha 
 
 
** *** ***** ******* *********** ************* 
 
 Terrorism Risks of Google Earth 
 
 
 
Sometimes I wonder about "security experts." Here's one who thinks  
Google Earth is a terrorism risk because it allows people to learn the  
GPS coordinates of soccer stadiums. 
 
Basically, Klaus Dieter Matschke is worried because Google Earth  
provides the location of buildings within 20 meters, whereas before  
coordinates had an error range of one kilometer. He's worried that  
this information will provide terrorists with the exact target  
coordinates for missile attacks. 
 
I have no idea how anyone could print this drivel. Anyone can attend a  
football game with a GPS receiver in his pocket and get the coordinates  
down to one meter. Or buy a map. 
 
Google Earth is not the problem; the problem is the availability of  
short-range missiles on the black market. 
 
http://www.heise.de/newsticker/meldung/71784 
 
English blog entry on the topic: 
http://www.ministryofpropaganda.co.uk/2006propaganda/20060409-googleeart  
h.shtml or http://tinyurl.com/lpay3 
 
 
** *** ***** ******* *********** ************* 
 
 New Kind of Door Lock 
 
 
 
There's a new kind of door lock from the Israeli company E-Lock. It  
responds to sound. Instead of carrying a key, you carry a small device  
that makes a series of quick knocking sounds. Just touching it to the  
door causes the door to open; there's no keyhole. The device, called a  
"KnocKey," has a keypad and can be programmed to require a PIN before  
operation -- for even greater security. 
 
Clever idea, but there's the usual security hyperbole: "Since there is  
no keyhole or contact point on the door, this unique mechanism offers a  
significantly higher level of security than existing technology." 
 
More accurate would be to say that the security vulnerabilities are  
different from existing technology. We know a lot about the  
vulnerabilities of conventional locks, but we know very little about  
the security of this system. But don't confuse this lack of knowledge  
with increased security. 
 
http://www.elock.co.il/tech-english.asp 
 
 
** *** ***** ******* *********** ************* 
 
 Counterpane News 
 
 
 
Bruce Schneier is speaking at the Symposium on Business Information  
Security, on April 21 in Minneapolis: 
https://www.minneapolis.edu/sobis/files_pdf/SoBIS2006-Flyer.pdf 
 
  
Bruce Schneier is speaking at CardTech/SecureTech, on May 3rd, in San  
Francisco. 
http://www.ctst.com/conferences/CTST06/ 
 
Bruce Schneier and Toby Weir-Jones spoke at the InfoWorld Webcast  
entitled Managed Compliance Reporting: Best Practices to Streamline  
Device Management & Demonstrate Compliance. Rebroadcast is available. 
http://w.on24.com/r.htm?e=21082&s=1&k=9A69DBFE212400FB9B547D40A596F856&p  
artnerref=CIS1 or http://tinyurl.com/lzxab 
 
Counterpane is hiring. Among other things, we're looking for a  
database and systems analyst, a senior Java software engineer, and a  
SOC intelligence officer. 
http://www.counterpane.com/jobs.html 
 
 
** *** ***** ******* *********** ************* 
 
 Evading Copyright Through XOR 
 
 
 
Monolith is an open-source program that can XOR two files together to  
create a third file, and -- of course -- can XOR that third file with  
one of the original two to create the other original file. 
 
The website wonders about the copyright implications of all of  
this: "Things get interesting when you apply Monolith to copyrighted  
files. For example, munging two copyrighted files will produce a  
completely new file that, in most cases, contains no information from  
either file. In other words, the resulting Mono file is not "owned" by  
the original copyright holders (if owned at all, it would be owned by  
the person who did the munging). Given that the Mono file can be  
combined with either of the original, copyrighted files to reconstruct  
the other copyrighted file, this lack of Mono ownership may be seem  
hard to believe." 
 
The website then postulates this as a mechanism to get around copyright  
law: 
 
"What does this mean? This means that Mono files can be freely  
distributed. 
 
"So what? Mono files are useless without their corresponding Basis  
files, right? And the Basis files are copyrighted too, so they cannot  
be freely distributed, right? There is one more twist to this idea.  
What happens when we use Basis files that are freely distributable? For  
example, we could use a Basis file that is in the public domain or one  
that is licensed for free distribution. Now we are getting somewhere. 
 
"None of the aforementioned properties of Mono files change when we use  
freely distributable Basis files, since the same arguments hold. Mono  
files are still not copyrighted by the people who hold the copyrights  
over the corresponding Element files. Now we can freely distribute Mono  
files and Basis files. 
 
"Interesting? Not really. But what you can do with these files, in the  
privacy of your own home, might be interesting, depending on your  
proclivities. For example, you can use the Mono files and the Basis  
files to reconstruct the Element files." 
 
Clever, but it won't hold up in court. In general, technical hair  
splitting is not an effective way to get around the law. My guess is  
that anyone who distributes that third file -- they call it a "Mono"  
file -- along with instructions on how to recover the copyrighted file  
is going to be found guilty of copyright violation. 
 
The correct way to solve this problem is through law, not technology. 
 
http://monolith.sourceforge.net/ 
 
 
** *** ***** ******* *********** ************* 
 
 iJacking 
 
 
 
It's called iJacking: grabbing laptops out of their owners' hands and  
then run away. There seems to be a wave of this type of crime at  
Internet cafes in San Francisco. 
 
It's obvious why these thefts are occurring. Laptops are valuable,  
easy to steal, and easy to fence. If we want to "solve" this problem,  
we need to modify at least one of those characteristics. Some Internet  
cafes are providing locking cables for their patrons, in an attempt to  
make them harder to steal. But that will only mean that the muggers  
will follow their victims out of the cafes. Laptops will become less  
valuable over time, but that really isn't a good solution. The only  
thing left is to make them harder to fence. 
 
This isn't an easy problem. There are a bunch of companies that make  
solutions that help people recover stolen laptops. There are programs  
that "phone home" if a laptop is stolen. There are programs that hide  
a serial number on the hard drive somewhere. There are non-removable  
tags users can affix to their computers with ID information. But until  
this kind of thing becomes common, the crimes will continue. 
 
Reminds me of the problem of bicycle thefts. 
 
http://www.sfbg.com/40/25/news_ijacked.html 
 
 
** *** ***** ******* *********** ************* 
 
 Security Screening for New York Helicopters 
 
 
 
There's a helicopter shuttle that runs from Lower Manhattan to Kennedy  
Airport. It's basically a luxury item: for $139 you can avoid the  
drive to the airport. But, of course, security screeners are required  
for passengers, and that's causing some concern: 
 
"At the request of U.S. Helicopter's executives, the federal  
Transportation Security Administration set up a checkpoint, with X-ray  
and bomb-detection machines, to screen passengers and their luggage at  
the heliport. 
 
"The security agency is spending $560,000 this year to operate the  
checkpoint with a staff of eight screeners and is considering adding a  
checkpoint at the heliport at the east end of 34th Street. The agency's  
involvement has drawn criticism from some elected officials. 
 
"'The bottom line here is that there are not enough screeners to go  
around, ' said Senator Charles E. Schumer, Democrat of New York. 'The  
fact that we are taking screeners that are needed at airports to  
satisfy a luxury market on the government's dime is a problem. '" 
 
This is not a security problem; it's an economics problem. And it's a  
good illustration of the concept of "externalities." An externality is  
an effect of a decision not borne by the decision-maker. In this  
example, U.S. Helicopter made a business decision to offer this service  
at a certain price. And customers will make a decision about whether  
or not the service is worth the money. But there is more to the cost  
than the $139. The cost of that checkpoint is an externality to both  
U.S. Helicopter and its customers, because the $560,000 spent on the  
security checkpoint is paid for by taxpayers. Taxpayers are  
effectively subsidizing the true cost of the helicopter trip. 
 
The only way to solve this is for the government to bill the airline  
passengers for the cost of security screening. It wouldn't be much per  
ticket, maybe $15. And it would be much less at major airports,  
because the economies of scale are so much greater. 
 
The article even points out that customers would gladly pay the extra  
$15 because of another externality: the people who decide whether or  
not to take the helicopter trip are not the people actually paying for it. 
 
"Bobby Weiss, a self-employed stock trader and real estate broker who  
was U.S. Helicopter's first paying customer yesterday, said he would  
pay $300 for a round trip to Kennedy, and he expected most corporate  
executives would, too. 
 
"'It's $300, but so what? It goes on the expense account, ' said Mr.  
Weiss, adding that he had no qualms about the diversion of federal  
resources to smooth the path of highfliers. 'Maybe a richer guy may  
save a little time at the expense of a poorer guy who spends a little  
more time in line. '" 
 
What Mr. Weiss is saying is that the costs -- both the direct cost and  
the cost of the security checkpoint -- are externalities to him, so he  
really doesn't care. Exactly. 
 
http://www.nytimes.com/2006/02/06/nyregion/06chopper.html?ex=1296882000&;  
en=1e835454a0fea1c9&ei=5088&partner=rssnyt&emc=rss or  
http://tinyurl.com/lebvf 
 
 
** *** ***** ******* *********** ************* 
 
 Comments from Readers 
 
 
 
There are hundreds of comments -- many of them interesting -- on these  
topics on my blog. Search for the story you want to comment on, and  
join in. 
 
http://www.schneier.com/blog 
 
 
** *** ***** ******* *********** ************* 
 
CRYPTO-GRAM is a free monthly newsletter providing summaries, analyses,  
insights, and commentaries on security: computer and otherwise. You  
can subscribe, unsubscribe, or change your address on the Web at  
<http://www.schneier.com/crypto-gram.html>. Back issues are also  
available at that URL. 
 
Comments on CRYPTO-GRAM should be sent to  
[EMAIL PROTECTED] Permission to print comments is assumed  
unless otherwise stated. Comments may be edited for length and clarity. 
 
Please feel free to forward CRYPTO-GRAM to colleagues and friends who  
will find it valuable. Permission is granted to reprint CRYPTO-GRAM,  
as long as it is reprinted in its entirety. 
 
CRYPTO-GRAM is written by Bruce Schneier. Schneier is the author of  
the best sellers "Beyond Fear," "Secrets and Lies," and "Applied  
Cryptography," and an inventor of the Blowfish and Twofish  
algorithms. He is founder and CTO of Counterpane Internet Security  
Inc., and is a member of the Advisory Board of the Electronic Privacy  
Information Center (EPIC). He is a frequent writer and lecturer on  
security topics. See <http://www.schneier.com>. 
 
Counterpane is the world's leading protector of networked information -  
the inventor of outsourced security monitoring and the foremost  
authority on effective mitigation of emerging IT threats. Counterpane  
protects networks for Fortune 1000 companies and governments  
world-wide. See <http://www.counterpane.com>. 
 
Crypto-Gram is a personal newsletter. Opinions expressed are not  
necessarily those of Counterpane Internet Security, Inc. 
 
Copyright (c) 2006 by Bruce Schneier. 
  
----- End forwarded message ----- 
 
 
 
"Sharpened hands are happy hands. 
"Brim the tinfall with mirthful bands"  
- A Deepness in the Sky, Vernor Vinge 
 
"I me.  Shape middled me.  I would come out into hot!"  
I from the spicy that day was overcasked mockingly - it's a symbol of the  
other horizon. - emacs : meta x dissociated-press 

Reply via email to