source: dhs.gov (contributed by FAN Steve Jones)

We’ve all walked through a metal detector at the airport, hoping we didn’t forget anything in our pockets that will set off the alarm. When security personnel can’t immediately identify what is triggering the alarm, the process is halted for a pat down. Though this slows the screening process significantly for people waiting in line and can be an uncomfortable experience for the individual being screened, it is an essential element of keeping all travelers safe.

xTo improve airport security, both for screeners and for those being screened, the Department of Homeland Security (DHS) Science and Technology Directorate (S&T) continually invests in research and development (R&D) to build solutions for the future. S&T’s Screening at Speed Program partners with government, academia, and industry to increase security effectiveness at the airport from curb to gate, while dramatically reducing screening wait times and improving the passenger experience

image - china tech

 

China’s AI Deployment in Africa Poses Risks to Security and Sovereignty

source: aspistrategist.com

The competition to dominate Africa’s artificial intelligence and critical infrastructure markets is geopolitical and Beijing is racing for the lead. During the past 20 years, China has been rapidly building its communications infrastructure and advancing data-surveillance capabilities globally, and has taken a strong interest in spearheading development of Africa’s technology markets. President Xi Jinping’s Belt and Road Initiative has been the primary conduit for China’s expansion on the continent.

When the BRI was first introduced in 2013, many African leaders shared Xi’s view that inadequate infrastructure was the greatest barrier to economic development. So far, 40 out of 54 African countries have signed BRI agreements.

Continue reading “China’s AI Deployment in Africa Poses Risks to Security and Sovereignty”

source: securityweek.com

Researchers Abuse Apple’s Find My Network for Data Upload

Security researchers have discovered a way to leverage Apple’s Find My’s Offline Finding network to upload data from devices, even those that do not have a Wi-Fi or mobile network connection.

Using Bluetooth Low Energy, the data is being sent to nearby Apple devices that do connect to the Internet, and then sent to Apple’s servers, from where it can be retrieved at a later date.

The technique could be used to avoid the costs and power usage associated with mobile Internet, or to exfiltrate data from Faraday-shielded sites visited by iPhone users, researchers with Positive Security, a Berlin-based security consulting firm.

Continue reading “Researchers Abuse Apple’s Find My Network for Data Upload”

 

source:  nytimes.com

A Guantánamo detainee is seeking information from two former government contractors in connection with a Polish criminal inquiry into a facility there.

The Supreme Court on Monday agreed to decide whether the government can block a detainee at Guantánamo Bay from obtaining information from two former C.I.A. contractors involved in torturing him on the ground that it would expose state secrets.

The detainee, known as Abu Zubaydah, sought to subpoena the contractors, James E. Mitchell and Bruce Jessen, in connection with a Polish criminal investigation. The inquiry was prompted by a determination by the European Court of Human Rights that Mr. Zubaydah had been tortured in 2002 and 2003 at so-called black sites operated by the C.I.A., including one in Poland.

Continue reading “Supreme Court to Rule on Whether C.I.A…”

source: wired.com

Faces of the Riot used open source software to detect, extract, and deduplicate every face from the 827 videos taken from the insurrection on January 6.

WHEN HACKERS EXPLOITED a bug in Parler to download all of the right-wing social media platform’s contents last week, they were surprised to find that many of the pictures and videos contained geolocation metadata revealing exactly how many of the site’s users had taken part in the invasion of the US Capitol building just days before. But the videos uploaded to Parler also contain an equally sensitive bounty of data sitting in plain sight: thousands of images of unmasked faces, many of whom participated in the Capitol riot. Now one website has done the work of cataloging and publishing every one of those faces in a single, easy-to-browse lineup.

Late last week, a website called Faces of the Riot appeared online, showing nothing but a vast grid of more than 6,000 images of faces, each one tagged only with a string of characters associated with the Parler video in which it appeared. The site’s creator tells WIRED that he used simple open source machine learning and facial recognition software to detect, extract, and deduplicate every face from the 827 videos that were posted to Parler from inside and outside the Capitol building on January 6, the day when radicalized Trump supporters stormed the building in a riot that resulted in five people’s deaths. The creator of Faces of the Riot says his goal is to allow anyone to easily sort through the faces pulled from those videos to identify someone they may know or recognize who took part in the mob, or even to reference the collected faces against FBI wanted posters and send a tip to law enforcement if they spot someone. Continue reading “This Site Published Every Face From Parler’s Capitol Riot Videos”

The Biggest Security Threats to the US Are the Hardest to Define

source: wired.com

In a Senate briefing, the heads of the major intelligence agencies warned the public about dangers that offer no easy solutions.

 

IT’S BEEN TWO years since the heads of the top US intelligence agencies last came to Congress for an update on global threats; they skipped 2020 amid tensions with former president Donald Trump. In the Biden administration, though, the public hearing was back on Wednesday. Their message: With sprawling crises like the Covid-19 pandemic and climate change, the gravest threats to US national security have ballooned into complicated and interconnected specters that the intelligence community can only warn about.

In a public hearing before the Senate intelligence committee, and a corresponding report released on Tuesday, directors of the Office of the Director of National Intelligence, National Security Agency, Defense Intelligence Agency, CIA, and FBI laid out their agencies’ assessments. They highlighted cybersecurity and offensive hacking as a major topic in light of the SolarWinds attacks, which they firmly attributed to Russia. They also pointed to technological innovation, particularly advances from China, that threaten to undermine the security of US infrastructure. 

 

Continue reading “The Biggest Security Threats to the US Are the Hardest to Define”

Roughly 200 million people using Microsoft services already have made the jump past passwords

Microsoft Promises to Ease the Pains of Going Passwordless

source: cnet.com

Microsoft is updating its widely used cloud computing technology to make it easier for millions of us to dump our passwords.

The tech giant is making passwordless login a standard feature for Azure Active Directory, a cloud-based service customers can use to handle their employees’ login chores, the company said at its Ignite conference on Tuesday. The three-day conference, held online this year because of the COVID-19 pandemic, is geared for IT and other tech staff who use Microsoft’s products. Continue reading “Microsoft Promises to Ease the Pains of Going Passwordless”

 

A Look Into the Pricing of Stolen Identities For Sale on Dark Web

source:  securitymagazine.com

 

After a data breach, much of that stolen personal and sometimes highly personally identifiable information (PII) is sold on markets residing within the dark web. But, how much does the sale of stolen information work, exactly, and how much money are criminals making from stolen data?

Comparitech researchers analyzedlistings across 40+ dark web marketplaces gathering data on how much stolen identities, credit cards and hacked PayPal accounts are worth to cybercriminals. 

Here are some key findings:

  1. Americans have the cheapest “fullz” (full credentials e.g. SSN, name, DOB etc), averaging $8 per record. Japan and the UAE have the most expensive identities at an average of $25. Not all fullz are the same. While SSN, name, and DOB are all fairly standard in fullz, other information can be included or excluded and thereby change the price. Fullz that come with a driver’s license number, bank account statement, or utility bill will be worth more than those without, for example. Some fullz even include photos or scans of identification cards, such as a passport or driver’s license.
  2. Prices for stolen credit cards range widely from $0.11 to $986. Hacked PayPal accounts range from $5 to $1,767.
  3. The median credit limit on a stolen credit card is 24 times the price of the card.
  4. The median account balance of a hacked PayPal account is 32 times the price on the dark web.

Credit cards, Paypal accounts, and fullz are the most popular types of stolen information traded on the dark web, but they’re far from the only data worth stealing, says Comparitech. Other types of stolen information usually for sale are: passports, driver’s licenses, frequent flyer miles, streaming accounts, dating profiles, social media accounts, bank accounts, and debit cards.

This data – most often stolen through phishing, credential stuffing, data breaches, and card skimmers – is bought and sold on dark web marketplaces. Here’s a few tips for avoiding those attacks, from Comparitech researchers: 

  • There’s not much an end user can do about data breaches except to register fewer accounts and minimize your digital footprint.
  • Keep an eye out for card skimmers at points of sale, particularly unmanned ones such as those at gas stations.
  • Learn how to spot and avoid phishing emails and other messages.
  • Credential stuffing can be avoided by using strong, unique passwords on all of your accounts.

For the full blog, please visit https://www.comparitech.com/blog/vpn-privacy/dark-web-prices/

Upcoming S&T Guidance Will Improve Critical Infrastructure Resilience

source:  dhs.gov (contributed by Artemus FAN, Alicia Jones


It is easy to understand the importance of our “critical infrastructure,” such as telecommunications, energy, transportation, and emergency services, but what’s often overlooked are the underlying technologies that enable them. One such technology is Position, Navigation, and Timing (PNT) services, a national critical function powering many of the critical infrastructure sectors that enable modern society.

PNT is primarily provided through the Global Positioning System (GPS) and other Global Navigation Satellite Systems (GNSS). PNT is not just used for navigation, though. It also provides precision timing information that enables critical functions within telecommunication networks and the power grid. However, these PNT services are susceptible to interference such as GPS jamming and spoofing, which pose a risk to critical infrastructure. What was once an emerging risk is quickly becoming a pressing issue, with industry reporting a growing trend in the past two years of prominent PNT disruption events around the world. As the technological barriers to conducting these activities continue to fall, it becomes even more important to ensure our critical infrastructure is resilient to PNT disruptions.

Continue reading “Upcoming S&T Guidance Will Improve Critical Infrastructure Resilience”

source: kottke.org (contributed by FAN Steve Jones)

 

Researchers have demonstrated that they can make a working 3D-printed copy of a key just by listening to how the key sounds when inserted into a lock. And you don’t need a fancy mic — a smartphone or smart doorbell will do nicely if you can get it close enough to the lock.

The next time you unlock your front door, it might be worth trying to insert your key as quietly as possible; researchers have discovered that the sound of your key being inserted into the lock gives attackers all they need to make a working copy of your front door key.It sounds unlikely, but security researchers say they have proven that the series of audible, metallic clicks made as a key penetrates a lock can now be deciphered by signal processing software to reveal the precise shape of the sequence of ridges on the key’s shaft. Knowing this (the actual cut of your key), a working copy of it can then be three-dimensionally (3D) printed.  The next time you unlock your front door, it might be worth trying to insert your key as quietly as possible; researchers have discovered that the sound of your key being inserted into the lock gives attackers all they need to make a working copy of your front door key.

It sounds unlikely, but security researchers say they have proven that the series of audible, metallic clicks made as a key penetrates a lock can now be deciphered by signal processing software to reveal the precise shape of the sequence of ridges on the key’s shaft. Knowing this (the actual cut of your key), a working copy of it can then be three-dimensionally (3D) printed.

How Soundarya Ramesh and her team accomplished this is a fascinating read.

 

Continue reading “Researchers Can Duplicate Keys from the Sounds They Make in Locks”