BGP, the Border Gateway Protocol, has a flaw that was discovered in 2008 that allows attackers to reroute your data without you knowing about it. In fact, someone’s been using it to send traffic to Belarus and Iceland before sending it on to its original destination. It has to be assumed that it’s being copied and then used for has to be assumed as less than innocent purposes.
As part of my Information Security training, the architecture of TCP/IP and the OSI model were covered. They introduced TCP/IP (the basis of the Internet) as optimized for access, not security. Never has that been more apparent than now, with what the NSA has done with the Internet backbone via their QUANTUM program.
You may not have realized that every 3G/LTE phone runs a second operating system specifically for mobile communications. This RTOS (Real-time Operating System) is specific to the chipset running the phone and radio and for the most part has not been reviewed for security. Researchers have identified potential attacks against these subsystems but nothing widespread is known to exist at the moment.
Although it is Halloween, this story is definitely not fiction. Security consultant Dragos Ruiu was working in his lab a few years ago when his freshly updated MacBook spontaneously updated its BIOS and rebooted. It was infected by what he calls “badBIOS” and it’s capable of attacking both Macs and PCs.
Although it’s not yet fully understood, it appears to travel via USB storage devices and may even be able to infect machines that have never seen a USB drive via an ability to use high-frequency transmissions passed between computer speakers and microphones to bridge airgaps. This is a capability that had been demonstrated in controlled conditions but until now had never been seen outside a lab.
Until this is fully understood and measures available to combat it, it’s probably a good idea to never plug a USB drive or memory stick into your machine that’s not yours. Though to be honest, that’s always a good idea.
[Update 11/12/2013] More reason to doubt this story, or at least some of it.
[Update 11/6/2013] It appears other researchers are having trouble duplicating Ruiu’s findings. Stay tuned folks, this is far from over.
In addition to detaining Glenn Greenwald’s partner David Miranda for 9 hours for no apparent reason (other than intimidation), it’s been revealed that the UK government destroyed hard drives at the Guardian in an attempt to eliminate the potential for releasing Snowden’s information. The information is backed up, of course, but the implications for journalists are staggering.
Worldwide, it’s become obvious that government is at war with those it claims to represent. Worse, we’re losing that war and we’re vastly outgunned. Our only weapon, a free press, is almost gone. I don’t know what to do.
If you’ve been paying attention to the news, you know that Lavabit, the encrypted mail service used by Edward Snowden has shut itself down with the CEO issuing a dire warning about the use of email services. Now Groklaw, a web site that helped explain complicated technology-related legal cases, has also shut down. Citing the Lavabit shutdown and concerns over email security, site owner Pamela Jones (~pj) made the decision in order to best protect her sources, without which the site can’t operate.
This is sad news in more ways that I can possibly relate.
If I tell you that the NSA has broken privacy rules, you might not believe me. But if I tell you the numbers came from an NSA internal audit you might change your mind.