Safety Announcement: Protecting Against Garage Door Break-Ins

Garage Door

Today we’re going to put out some important information about the inherent dangers of automatic garage door openers and how easily they can be bypassed. We hope that everyone takes this information to heart and spends just a few seconds to protect themselves and their property.

So what is the inherent danger? All automatic garage door openers legally require a safety release mechanism that is controlled by a grab handle. This is put into place so that if your automatic garage door opener is malfunctioning or traps someone beneath the door you can manually release and move it.

How Thieves Enter

This safety release mechanism can be tripped from outside your garage door with nothing more than a coat hanger. By disengaging the safety release on your door, a thief can simply lift the door and gain access to your home.

While hopefully most of you lock the door from your garage to your house, most aren’t built solid or have a deadbolt. Even still, once a thief has access to your garage they have plenty of time to lower your garage door and bypass the lock without being seen. This can be done with picks, or using the tools that most of us have in the garage against us.

As you can see in the video below, it’s very easy to defeat an automatic garage door opener and break into a garage, especially when you have garage door windows that enable the thief to see exactly what they’re doing. Even without windows the task is fairly easy and can be done just on feel and the fact that thieves know the mid-point of your garage is where the release cord is located.

Methods to Protect Yourself

A few simple methods that can be used to protect yourself against this type of break-in take no more than a few minutes and are something hopefully everyone reading this will do tonight if you’ve not done so already.

The method we recommend is using a zip-tie (or two), to lock the disengaging arm on the automatic opener. While this will prevent the bypass technique employed by thieves, the safety pull handle can still be yanked hard to break the zip ties in an emergency.

Demonstration

You’ll also notice the other method is to completely wire the arm closed, but you loose the safety feature of the door and in our opinion it’s much better to have this option available in an emergency situation.

Please share this article with your friends and family to warn them of the danger in leaving their garage door unprotected!

Posted in Physical Security | Tagged , , , , , , | 63 Comments

How to Make a Fast Rope Eye Splice

2 of 3 in the series Make a Fast Rope

Today on our Knot of the Week, we’re going to continue our Fast Rope construction with a demonstration of a 4-Strand Eye Splice.

On a previous KOTW we’ve shown how to create a 3-Strand Eye Splice, and while this may appear similar these are two very different techniques.

The Eye Splice is the strongest and safest method of terminating a Fast Rope (4-Strand Round Braid). It develops approximately 85% of the breaking strength of the line, which as we’ve mentioned is right around 28,000+ lbf (pound force) or 129 Kn (kilonewtons) with the 4 pairs of 7/16″ Blue Water Assaultline Static Rope used in construction.

An Eye Splice also enables the rope to be girth hitched onto a beam to climb. Traditionally in Military Fast Ropes, the eye splice is used to attach to the davits found on some helicopters.

Eye Splice Guidelines

Fast-Rope-Eye-Splice-04

According to MIL-F-44422, Mil-Spec construction for fast ropes, “The main rope shall have an eye splice on one end with a minimum of 4 inches and a maximum of 6 inches inside length. The eye splice shall be made using a minimum of three full tucks and two half tucks.”

Let’s break this down and tie it into our discussion on how to create the Eye Splice on a Fast Rope. First off, what they mean by inside length is the distance spanned across the inside of the eye. Ours actually sits right at 4″ relaxed and 6″ pulled open.

Tucks refer to the amount of times each strand pair tucks under the pair to its right or left. We state in the video below that the optimal amount of tucks is 4 full tucks and 2 half tucks, but we actually ran out of room on our Fast Rope and did the 3/2 minimum that the Mil-Spec construction requires.

Construction

Fast-Rope-Eye-Splice-02

The first thing you’ll need to understand when creating a 4-Strand Eye Splice, is the difference between right-laid strands and left-laid strands. While we go into this in the video, a quick glance at the image to the right should clear up the difference for you. The strands coming from the right down to the left are right-laid strands and the strands coming from the left down to the right are left-laid strands.

Understanding this difference is important when you bend the rope around to create the eye. Your working end should be to the right of your standing part and the same-laid strands should match up before securing your created eye with a string or whatever method you choose.

Again we’ll defer to the video, because it’s a lot easier to comprehend the instruction while watching than it is reading about it. The video is one of our ones, but an important one, especially considering you could potentially be trusting this Eye Splice to support your weight many feet up in the air.

One tip that we didn’t enforce enough in the video is to securely wrap your paired working ends, all four of them, tightly with tape. The tape should also come to a point as much as possible so it can be worked into the tucks better. This can be a somewhat frustrating experience, but stick with because the end result gives you a great feeling of accomplishment.

Next KOTW

Fast-Rope-Eye-Splice-03

In our next KOTW we’ll be showing you how to terminate the free end of the Fast Rope by searing and whipping to properly secure it, be sure to check back for the completion of how to make your own Fast Rope for Climbing!

Remember that when hanging your Fast Rope for climbing to ensure you have a proper girth hitch around a secure object like in the photo to the right.

Building a Fast Rope for Climbing: Part 1, 4-Strand Round Braid

Building a Fast Rope for Climbing: Part 3, Whipping and Fusing

Posted in Climbing, Knots, Splices | Tagged , , , , , , , , | 17 Comments

Revision Eyewear YouTube Video Response Contest

We have some very exciting news to share with you guys today! To mark our recent milestone of 2,500 YouTube subscribers, we’ve teamed up with Revision Eyewear to bring you an awesome contest!

What we’re doing for the contest, is asking for a video response to our YouTube video you’ll find below. Of course you’ll need to first be a subscriber to our YouTube Channel, but your subscription and time is going to be well worth your effort.

Revision has generously put together three different prize packages worth more than $330 for us to give away to the best entries in three different categories. Most creative, funniest and most in need. Continue reading

Posted in ITS Information | Tagged , , , | 4 Comments

Data Leaks: How My Car Betrays Me

1 of 4 in the series Data Leaks

In my first article here at ITS, Social Networks and Your Digital Identity, the subject was identity theft.

One way to mitigate that risk is to carefully consider your privacy settings at social networking sites. Last week I presented the DefCon/Black Hat roundup, announcing a four-part series that inspects how ordinary things we take for granted encroach on our perception of privacy, much more so than opt-in social networking sites.

Today we’ll get into the first article in the data leaks series, how my car betrays me.

Data Leaks

I intentionally chose the term data leaks to describe the series over the phrase invasion of privacy. A data leak is like a faucet that is slowly dripping. At first blush, it doesn’t look like much, but over time it can add up to a significant volume. For our purposes, data leaks differ from an invasion of privacy because data leaks are preventable; they are passive, not active.

For example, you consciously choose to use a WiFi access point, and you consciously choose what data you wish to send over it by launching web sites, using email and IM, etc. An invasion of privacy is much more explicit, active, and intentional. The Great Firewall of China is a great example of an invasion of privacy, where Chinese citizens have no choice but to be monitored and censored by their government.

In a recent CNet article entitled Did we pronounce privacy dead this week?, Caroline McCarthy asks some provocative questions: does privacy exist anymore, and if so, do we even know what privacy is? I consciously chose to overlook the academic banter about what constitutes privacy in this series, lending yet another reason for my choice of the terminology data leaks. Frankly, I neither want to facilitate unnecessary alarm with this series, nor do I want to discourage people from embracing technological advances that increase the standard of living. After all, few would argue that the Internet and the web haven’t helped advance global communications.

The average citizen likely surrenders more privacy to employers than to the government. Employers routinely disclose that while at the office employees should have no expectation of privacy. Yet, how many of us regularly check personal email accounts at work, place an order at Amazon.com, or use the company phone to call home before leaving the office? More employers today require drug screening and access to our credit report than ever before. After all, it is their phone, their computer, their property–their rules. It is a sacrifice most make in lifelong pursuit of the greenback. Again, these aren’t the types of issues that this series is concerned with.

Toll Roads

The demise of local and state revenues in the US has led to the rampant adoption of red light traffic cams and an increase in toll road construction. Generally, the intentions of these municipalities are pure, and the funds are used for much needed infrastructure management. Last year, Fox reported that there are over 5,244 miles of toll roads in the US, and drivers can expect more miles in the future. These local and state governments are not using the data to track the movement of the average citizen. What about hackers?

What is the data retention policy for these toll road authorities? I decided to look into three of the biggest toll way authorities, the North Texas Tollway Authority, Harris County Toll Road Authority, and Sun Pass, Florida’s toll way authority. I contacted the North Texas Tollway Authority and was verbally informed that they have a two-year statute to collect tolls. Harris County provides their customers with access to 18 months of history online. Why don’t these authorities openly disclose their data retention policies?

Black Market Data

Make no mistake about it; the black market pays a premium for personally identifiable information, sold by the megabyte. Even something that seems as innocuous as toll road records have value to a data mining hacker. The law firm of Pinsent Masons cited a 2007 Symantec report on the underground data economy: bank account data sells for up to $400 per account, passwords range between $1 and $350, and a one megabyte collection of email addresses costs between $2 and $4. Don’t be naive, hackers are collecting and selling daily routine data in addition to the more popular personally identifiable information.

Why is the data kept around for so long? Unfortunately it’s a tangled web–no pun intended. Most people link a credit card to their toll tags, and most municipalities accept credit cards as payment for tickets and fines. The credit card companies offer the consumer an extended period of time to dispute a charge on their bill. Therefore, entities like toll road authorities are forced to maintain toll road activity records much longer than what is actually needed. Realistically, there is no reason to keep the data around for more than a couple of months, but that just isn’t a legal option.

Reaffirmation

A hacker could easily establish someone’s daily routine by accessing red light cam networks, toll road databases, etc., gaining insight into when someone leaves home, when they leave work, etc. Let’s not even contemplate the ramification of a hacker accessing alarm monitoring company databases! If a hacker managed to gain real-time access to these systems, they could know someone’s every vehicular move–“He forgot to set his house alarm, he just got on the toll road at the Center Street on-ramp, and his refrigerator says it needs service.” Unrealistic? Hardly.

The Black Hat and DefCon conferences that ran during the last week of July in Las Vegas only reaffirmed what most probably suspect–the ability of a modestly trained hacker to gain access to such systems is too easy. For example, I heard first-hand reports from two separate conference attendees that the elevator system at the Riviera was hacked. Each told me that the elevator would stop in between floors and that a voice would come from the emergency communications speaker telling the riders to do something as trivial as hop on your left foot in order for the elevator to resume.

Las Vegas casinos are assuredly that wired, and someone found a hole in the system to have some fun.

Tire Pressure Monitoring System

So what does this have to do with automobiles? Well, once again the best intentions of government have led to unforeseen data leaks. Remember the whole Firestone Tire/Ford Explorer fiasco from earlier in the decade? The US government passed the TREAD Act, mandating that new vehicles include tire pressure monitoring systems to advise drivers that their tires are not correctly inflated. European countries have similar laws. On the surface, it seems like an innocuous law, but dig deeper and you suddenly realize that yet another data leak has been created for the criminal digital elite looking to collect, categorize, and exploit personally identifiable information.

A tire pressure monitoring system (TPMS) is built into the valve stem, and vehicles generally integrate the system by collecting a short RF signal from each mounted tire, and perhaps the spare as well. If you’ve ever paired a Bluetooth headset with your cell phone, you can appreciate how the tires are paired with a vehicle. Unfortunately, the pairing of the TPMS with a vehicle requires specialized tools and software generally not accessible to the consumer. Most vehicles support 8 or 10 unique TPMS IDs in order to facilitate summer and winter tires without having to run back to the dealer to re-pair the tires.

These TPMS systems include a small watch-like battery designed to live between 7 and 10 years. Typically, they only transmit once per minute, or as frequently as every 5 seconds when the tire pressure is low. So what kind of data is included in these transmissions? Pressure level, battery level, and in some higher-end models information about the make, model, and tire position (e.g. passenger front) on the car. Finally, and here’s the kicker, every one of them include an unencrypted 32 to 108-bit globally unique identification number, depending on the make and model of TPMS.

A 32-bit number yields 4.29 billion unique combinations! Consider that there are 5 tires on the car, and suddenly we have a unique way to identify a vehicle remotely without looking at a VIN, checking a license plate, or even visually identifying the vehicle.

Exploits

Mike Metzger of Flexible Creations presented DefCon attendees with several DIY exploits. The first exploit discussed sending spoofed messages to confuse the car’s monitoring system–trick a driver into believing that they need to pull over because they have a flat tire. The second exploit was much more aligned with establishing an individual’s daily routine. “Near a stoplight, setup a sensor with a good antenna to grab the IDs/Formats of TPM sensors nearby.” Also described in the presentation, “Setup a network of receivers tied to loggers at given locations and track interesting vehicles going nearby.”

This first scenario is disconcerting–it’s late, remote road, single female driver, believes her right rear tire just went flat, feels compelled to pull over, “good Samaritan” a half-mile back stops to help, etc. The second exploit can lead to nefarious behavior as well. If someone manages to fingerprint a vehicle at work or home, they could easily setup discrete and inexpensive checkpoints to track that vehicle’s movement.

What can you do?

ITS is about being prepared and remaining vigilant. The idea behind this series is not to stir paranoia, but to educate. Prior to DefCon 18, I never thought about how much data could be gleaned from my vehicle when simply driving around. So what can be done about these vehicular data leaks?

In the spirit of the definition presented earlier, one consciously chooses to drive on a toll road. Likewise, one (sub)consciously interprets the yellow light to mean speed up, often running the red light and getting photographed in the process. Finally, with respect to TPMS, Firestone states that the Tread Act requires most vehicles made in 2006-07, and ALL made thereafter to be TPMS equipped. One consciously chooses to buy a brand new vehicle.

Let me preface this next statement–by no means am I advocating the disablement of a vehicle safety system. However, there is a subtle difference between equipped and enabled. Only 18 states and the District of Columbia have a periodic vehicle safety inspection program. According to the Texas Department of Public Safety vehicle inspection checklist, TPMS is not an inspected item, so if they are disabled the vehicle can still be driven legally, at least in Texas.

I certainly had no idea that my tires could give away my movements to someone actively looking to gather such details. Manufacturers will hopefully come to the realization that they only need about 16-bits to statistically ensure low odds that one car would inadvertently interpret another car’s TPMS transmission.

Closing

The lesson here is that hackers looking to make a buck by assembling a data package of personally identifiable information aren’t going to stop with a bank account or social security number. The more detailed of a profile they can create, the more valuable the data package is on the black market. Avoiding toll roads and buying a vehicle built in 1980 may not be an option, but at least now you have a better understanding of the data leaking from your daily commute.

Next week the series gets more technical, discussing just how fundamentally broken WiFi is… hope you weren’t reading this article over a Wifi connection!

Posted in Privacy | Tagged , , , , , , , | 14 Comments

Pimps n’ Mercs Giveaway Winners Announced

That’s right, we said “winners.” Due to an overwhelming response from all our readers out there, Pimps n’ Mercs has decided to give out two identical prize packages!

Thank you to everyone for your participation, and especially to Pimps n’ Mercs for their support and generosity!

As always, random.org was used to draw the winners for this contest. Continue reading

Posted in ITS Information | Tagged , | 1 Comment

Custom Discreet Messenger Bag from Zulu Nylon Gear

Before SHOT Show this year, I decided it was time to invest in a better messenger bag then what I’d been using for the last few years. Unfortunately, while I looked high and low for something being currently produced that fit what I needed and wanted in a bag, I came up empty.

I’ve been a huge fan of what Joel at Zulu Nylon Gear has been doing since I first met him through ITS back when we first started the site. In fact, I think we were the first site to review his Mega Admin Pouch back in the day (which was a Wednesday by the way) and I’ve always liked what he’s done.

While searching for a messenger bag, I noticed his Photobucket account had all the custom bags he’d made and saw a lot of awesome! I contacted him right away and asked if he’d be interested in creating a custom messenger bag for me using many of the features I saw on the bags he’d made, along with a few ideas of my own.

What came out of the project was a bag design that was exactly what I was looking for, an unobtrusive messenger bag that’s capable of fitting into any role needed.

UPDATE: This bag is now branded as the ITS Tactical Discreet Messenger Bag and available exclusively in the ITS Tactical Store!! Continue reading

Posted in Gear | Tagged , , , , , | 18 Comments

Want to Save Some Money on Ammo?

Check out our newest sponsor, Lucky Gunner! We’re all stoked to have them aboard and can’t wait to share the new benefits they’ve hooked our members up with!

Lucky Gunner is an online ammo company that prides itself on having great prices and only showing products that are in stock ready to ship to your door that same day or the next business day. They don’t tease you with products that they don’t have in stock and won’t take days or weeks to get it out the door.

We’re also announcing today that we’re going to give all of our sponsors their own boards in our ITS Forum, starting with Lucky Gunner. It will take us a bit of time to get everything online, but you’ll now be able to communicate directly with our sponsors in our growing forum of nearly 2,500 members!

Lucky Gunner will be offering up some great things to come in our Forum, so stay tuned. So what’s the big announcement? Continue reading

Posted in ITS Information | Tagged , , , , , | 1 Comment

NWU? AOR? What’s the Deal with the New Navy Uniforms?

NWU_Type2_Type3There’s been a big buzz in the last few days about the newest Camouflage patterns available to the Navy and the Special Warfare Community. You may or may not be familiar with NWU (Navy Working Uniform) Type 1, 2 or 3, but we’ll attempt to clear that up and update everyone on what’s happening.

The latest news kicked off with an August 10th announcement of NWU II and III conformance testing on a Website dedicated to official NWU information and news. The Navy has gone above and beyond to get the information out concerning the new uniforms, but some things are still strange.

Our friend Eric at Soldier Systems ran an article yesterday announcing the news on the conformance testing that was subsequently picked up by Christian at Kit Up!. Christian was able to extract some interesting answers out of the Navy, which we’ll get into below.

NWU? AOR?

Before we get into the news, here’s some background on the patterns to clear up any misconceptions.

If you know much about the ACU (Army Combat Uniform) you’ll know that the pattern, which doesn’t blend in with anything other than a couch, is known as UCP (Universal Camouflage Pattern) not ACU. This is similar to the NWU II and III, where the pattern is known as AOR (Area of Responsibility) 1 and 2 respectively.

AOR1 is the Desert variant pattern used in the NWU II that to the untrained eye looks similar to Marine Corps Desert MARPAT. It’s a little harder to mistake AOR2, the woodland pattern (non-desert) used in NWU III, for Woodland MARPAT.

I’ve called and confirmed with the NAVFAC NWU Program Manager that the NWU II and III patterns used are in fact AOR1 and AOR2, patterns which have been in development for many years now by Naval Special Warfare. The only difference in the patterns used in the NWU II and III is the inclusion of the ACE (Anchor, Constution and Eagle), much like MARPAT features the EGA (Eagle Globe and Anchor).

NWU I is the welcome uniform change that the Navy recently instituted to replace those hated utilities/dungarees! I burned mine when I left the service… Was that out loud? While NWU I is part of the seabag issue, Type II and III are “tactical uniforms for expeditionary Sailors.”

Hopefully the photo on the right will give you a good understanding of what the patterns truly look like and how much different AOR1 is from Desert MARPAT. Some pattern images used in the compilation on the right via OC Tactical.

Conformance Testing

The full details of the conformance testing can be read in the NAVADMIN here. It breaks down like this. The entire conformance testing, which will last for six weeks, is ONLY for the Type III. While the testing is only for Type III, it will be to evaluate which version of BOTH the Type II and Type III will be issued.

There are currently two different configurations for the uniforms, version 1 and 2. These versions incorporate different design features such as pocket size, pocket flap design, rank placement and trouser waist adjustment.

Blouse

The differences here in the Blouse are very slight, version one has smaller shoulder pockets than chest pockets and rectangular pocket flaps on all the aforementioned pockets. Version 2 has the same size shoulder and chest pockets, but all pocket flaps have a slight taper.

Trousers

Version 1 of the trousers have belt loops and a button fly with no elastic. Like version 1 of the blouse, the trousers have rectangular pocket flaps. The thigh pocket is also vertical on version 1, as opposed to version two which has the thigh pocket canted.

Version 2 has the previously mentioned thigh pocket cant, an elastic waistband with the same belt loops and button fly on version 1. Like version 2 of the blouse, all pocket flaps have a slight taper.

Issue

The Type III uniforms will be issued 15o Sailors, representing NSW, Seabees (Naval Construction Force) and EOD. Testing will be conducted in the vicinities of Norfolk, San Diego and Tampa. Type III will replace the existing woodland camouflage in CONUS and as prescribed by commanders OCONUS.

Fielding of the new Type II and Type III uniforms is expected to start in the summer of 2011.

Type II

MCPON-Type-II-NWU

So now that we’ve cleared up the Type III issue, let’s move into Type II. NWU Type II will ONLY be worn by Naval Special Warfare Operators and the Sailors who support them. The 3-color desert camouflage uniform is not going away. Sailors not authorized to wear the NWU Type II will continue to wear the current tricolor desert camouflage utility uniform in desert environments when issued by authorized command.

Remember, the conformance testing is primarily for finding out which “version” works the best, and that will be produced in both NWU II and III. Christian from Kit Up! mentions that an “official” version has already been named, and that it’s what the MCPON (Master Chief Petty Officer of the Navy) is wearing in the photo to the right.

I’m not sure if Christian has some insider information, but the photos of the MCPON may just be with what he prefers to wear. Christian goes on in the article to say that he believes that when this is all over Type III will be issued in version 1 and NSW will continue to buy their uniforms from Beyond and Crye in AOR1 and 2.

AOR1_Camouflage

This is probably true, but there’s more to it than that. Naval Special Warfare still has to have a set of Type II cammies to show their face in when deployed, and they sure aren’t going to walk around in Crye Combat Uniforms. So in the end I personally feel certain that whatever version is chosen for the Type II and III will be issued to NSW as well.

Operationally they won’t wear it, but it will be worn in place of the current Woodland and Desert uniforms. Also, the KitUp article mentions that even EOD will continue to wear the tricolor desert uniforms, but I believe that they’ll be issued the Type II as well. They’re just as much a part of Naval Special Warfare and work side by side with SEALs. They’ll be wearing Type II.

I do agree with Christian that it’s a bit ridiculous to have spent 80 million on uniform development to only issue Type II to a few thousand in Naval Special Warfare, but I’m willing to bet a substantive part of that development money was spent when DevGru was originally developing new combat uniforms for just themselves.

Keep up to date with what’s happening in NWU development with their Website or Facebook page.

Posted in Camouflage | Tagged , , , , , , , , , , , , , | 43 Comments

Black Hat USA 2010 and DEF CON 18 Wrap Up

Black Hat USA 2010 and DEF CON 18 took place last week in Las Vegas. In order to really appreciate the magnitude of each conference proceedings, it is important to understand where each conference focuses its attention.

Black Hat is a security conference largely addressing all things computer and communications security. It is where industry comes together, describes attack vectors, and openly talks about malware, hackers, and threats to innocent systems and privacy. Black Hat is big business, both expensive to attend and sponsored by big name companies such as IBM and Adobe. If Black Hat were personified as a female actor, it is probably most analogous to an Angelina Jolie. Mostly prim and proper, strong reputation, easily discussed in polite conversation.

In sharp contrast is DEF CON, a conference in its 18th year. This year’s theme: 18 and barely legal. If that doesn’t set the tone for this conference, consider that DEF CON would be best personified as Lindsey Lohan- often drifting into illegal situations. DEF CON is an all-cash conference, no attendance records by design. It is where electronics and software gurus–hackers in proper parlance, meet for 3 days to discuss–and demonstrate–the unthinkable.

Highlights

The highlight of the entire week had to come from DEF CON. For approximately 20 minutes, the presenter “legally” became an AT&T cellular tower, hijacking all the cell phones that use the GSM cellular network. Lawyers were on hand, as were the local media, to witness the presentation entitled Practical Cellphone Spying, by Chris Paget.

The synopsis of the hour-long presentation is this: HAM operators are permitted access to portions of the 900MHz spectrum, so long as they announce their call sign on a regular basis and transmit at less than 100 watts. A portion of this spectrum overlaps with the GSM frequencies used here in the United States. Chris used a 25 milli-watt transmitter and OpenBTS (http://openbts.sourceforge.net/) to capture AT&T handsets, using a VOIP solution as a backhaul. Members of the audience were encouraged to make phone calls during the session. Randomly by design, some were connected through the VOIP backhaul, calls recorded in the process, while others were met with a devilish recording advising them that their call couldn’t be completed, and done in a way one would expect from a DEF CON presentation. Total investment with gear purchased from eBay: no more than $2000.

Most disconcerting to some was that during this presentation 911 services were not available to the GSM phones linked to Chris’ tower. The humorous understatement of the moment: if you burst into flames from the antenna radiation, be sure to find someone with a Verizon (CDMA) phone to dial 911 on your behalf.

Digital Security

The range of digital security discussions across both conferences was daunting. From instructions on how to hack millions of routers, devices that make the Internet a reality, to intricate instructions on how to jackpot ATM machines, my mind consistently wandered toward the same question at the end of virtually every session I attended: have the digital technologies that we’ve come to rely on forsaken us?

Black Hat brought in the biggest names, including Deputy Secretary Jane Holl Lute from the US Department of Homeland Security, and Gen (Ret.) Michael Hayden, former director of both the CIA and the NSA. Both speakers delivered more provocative questions than answers, asking the audience to consider how society has become enamored with technologic advances, ignoring the security ramifications that follow widespread adoption.

Nothing is Truly Secure

The Black Hat opening day keynote emcee succinctly stated the problem: nothing we have built is truly secure. Think about it this way–email, web browsers, digital hardware, including wireless access points, routers and firewalls, and even today’s mega-smart cell phones–none of them is truly secure. Nothing engineered to date is truly secure.   Why?!? Is security that hard to design? Why is encryption so often easily skirted with simple man-in-the-middle attacks? Does the rate at which we innovate preclude us from building secure systems? Are innovators so obsessed with innovation that security is an afterthought, if a thought at all? Or, is security simply beyond the grasp of human engineering? After all, security especially in recent years has been given an elevated status by the media.

What are the ramifications of our inability to build secure systems? The ramifications are disturbing. We often speak about the notion of privacy, but spend 8 consecutive days with hackers at these conferences and one can’t help but reach the conclusion that privacy is already a thing of the past.

Data Leaks Series Planned

Over the next several weeks, we’re going to embark on a journey here at ITS that takes a deep, critical look at the data leaks in your life. These are data leaks that you probably didn’t even know existed. We are going to look at how your car tire valve stems (not tread marks) can give away your daily routine, how WiFi as we know it is fundamentally broken and unsafe, how your computer or cell phone can easily be compromised by a determined hacker armed with an openly available rootkit, and how big business wants to force intrusive location based services (LBS) upon you in the name of profit margins.

The conclusion of the series is likely obvious to most–if you want true privacy, move to the backcountry and unplug everything that has a transistor in it. If that’s not an option, and if you want to better mitigate the digital risks imposed on life from technology, stayed tuned…

Posted in Security | Tagged , , , , , , , | 5 Comments

This Message Will Self-Destruct…

There’s an interesting Website we stumbled upon the other day that provides a secure, auto-deleted messaging service.

So what exactly does that mean? This Message Will Self-Destruct offers the ability to send an encrypted email-like message to another person either with or without a password. As a reassurance that your message is secure, it’s never stored with TMWSD, just hashed using a heavy-duty hashing utility called bcrypt. The optional password salts the encryption key for even more security.

In addition, whenever the intended recipient reads your message (with or without the password you may have given them) the encrypted message is deleted forever.

Try it out for yourself, but just remember that if you forget the password, not even TMWSD can recover your message!

Posted in Security | Tagged , , , , | 20 Comments