How To Secure Your Wireless Communications

by David Fisher <mailto:davidfisherenterpri...@gmail.com> 

 


 

        

 

 

Cryptography 101

Without diving into all sorts of arcane, geekified minutae regarding
computer communications and cryptographic algorithms, let's first add some
background. Cryptography's goal is to protect messages (information) for as
long as the information has exploitative value. In other words, if I have
information that is useless a week from now (say the fact that I'm throwing
a surprise birthday party for my friend), then it doesn't matter if the
message gets compromised after that date. If, on the other hand, I'm
involved in a hostile takeover of a company, then it may have value for
years; then, I would want to protect that information for years.
Cryptography's goal is not necessarily never to be compromised. Yes, the
mathematicians may be able to theoretically do this, but for general,
everyday use, that is not what is necessary to protect yourself.

Symmetric Cryptography

Symmetric cryptographic algorithms are the choice of governments (and
others) worldwide who have the ability to share private keys through some
sort of distribution method. Symmetric algorithms are extremely fast because
they don't have to negotiate the exchange of keys. In addition, they are
extremely secure as the actual keys are never available on a communication
circuit, whether that is a wireless circuit, radio or a fixed land line. In
this type of encryption, both parties MUST have the same key loaded into
their encryption/decryption device or software. As is readily apparent, this
system quickly becomes clumsy as the number of communicating parties
increases, as all of them have to have the same key loaded at the same time.
In addition, the distribution of the keys in a secure manner also becomes
extremely problematic and cumbersome (you wouldn't want to call up your
buddy on an unsecure line and say 'hey buddy, the new symmetric key is
XYZ123? as it could be compromised; this is how asymmetric, public key
cryptographic algorithms came into being.

Asymmetric Cryptography

In the previous section we discussed symmetric cryptography which is great
where two or more people know and trust each other and can exchange the keys
in a secure manner, perhaps by meeting at the airport or pub and agreeing on
a new password, then destroying any evidence of it. However, there's a big
glaring hole: how do people who don't know each other personally exchange
keys without the keys becoming compromised? In addition, how does one ensure
that if a key is shared once, that it doesn't get promulgated everywhere and
all of your communications become compromised? This is where public key
cryptography comes in. Public key cryptography is known as an asymmetric
algorithm because the two parties communicating do not share a common key.
Instead,?? if I want to receive encrypted communications (whether a
sensitive email, an encrypted web session with Amazon, or whatever), I can
publish a public key that anybody can get and they use that to encrypt my
message. However, in addition to the public key, I also possess a private
key that only I know. I use this private key to actually decrypt the
incoming message. Because these two keys are related in a unique combination
and only I have the private key, nobody can decrypt communications encrypted
with my public key unless they've extracted the private key out of me.

Key Length, Complexity and Randomness

The key to good key (password) strength is length, randomness and
complexity.

Length, of course, is how many characters long is it. The longer the
password, the exponentially harder it becomes to break it. For instance, a
four digit PIN number, like on your ATM card, has only 10,000 possible
combinations (10 possible digits raised to the 4th power, or 10x10x10x10).
Your cell phone could try all 10,000 combinations in less than five seconds,
my home workstation would take less than a second to crack your PIN number
if I had a card reader attached to it and your card inserted. However, note
here that the security is in the fact that I need to possess your actual
card (or make a copy of the data with a skimming device
<http://www.lowtechcombat.com/2010/02/atm-card-skimmers-exposed.html> .
Note, because it is so easy to brute force test every PIN number, the need
to record your PIN number with the skimming device, like the article
implies, is not true). Now think if you just added one digit to your PIN,
now I have to try 100,000, for six, 1,000,000 etc. However, even trying
100,000,000 combinations is trivial for modern day laptops and desktops. So,
next, we have to toss in complexity.

Complexity refers to how many different characters are available in the
key/password/PIN. As I showed above, using only four digits, like on an ATM
card, severely limits the security because it is not nearly complex enough.
If your PIN is restricted to just numeric digits, as demonstrated above,
there are only 10,000 possible combinations. Now let's say that you can have
both letters and numbers. In the English alphabet, that gives us 26 letters
and 10 numbers, for a total of 36 different possible characters. Doing the
math on 36^4 (36x36x36x36) combinations, we now have 1,679,616 combinations
to plow through, still relatively easy, but certainly a bigger problem. Now
let's say that we can have both upper and lower case and 10 numbers, so now
we have 62^4 or 14,776,336 combinations. Finally, if we add in all of the
punctuation marks found on my keyboard, I have 92^4 or 71,639,296
combinations to try. And that is just with a four character key! To put it
in perspective for you, if you use just a minimum key length of ten
characters and you use a complex password that contains upper and lower
case, punctuation and digits, the possible combinations are 92^10 or
43,438,845,422,363,200,000! So you can see that complexity really adds to
the security of your passwords.

Finally, the part everyone forgets about, is randomness. The above
theoretical maximum combinations are of no use if you use combinations of
words that are in a dictionary (in any language) or follow some sort of
keyboard pattern. If the person who is attacking your encryption (password
or key) knows anything about you, any personal information will help him or
her break your key quickly. That is why security people harp on not using
the names of family, friends, pets, birthdays, anniversaries, etc. It is
better to have a 10-12 digit, truly random, password or key and never change
it unless it is compromised, than to be constantly changing your password
using some predictable pattern that uses words out of a dictionary or
personal information. Now that we have some background in the basic
cryptography going on, let's turn to the practicals of how to secure your
wireless communications.

Securing Your Wireless Computer Network

Here are the steps to securing your wireless network:

1.      Choose and implement the strongest encryption algorithms and
protocols that your router supports, upgrading if necessary. 
2.      Change your network name (SSID) and make sure that your router does
not advertise the network name. 
3.      If your router has the option, reduce the broadcast power setting so
that the signal does not work outside of the physical space you need it to
(your house, or possibly your house and backyard). Be especially careful
that your network is not able to be used from the street in front of your
residence. 

Choosing your Encryption Protocols

There are three generally available encryption algorithms in use with
wireless routers or access points. For home networks these are WEP, WPA and
WPA-II. 

Wired Equivalent Protocol (WEP)

WEP is deprecated (not used) anymore. If your wireless router uses this
protocol and has no other, you should upgrade to one running at least WPA.
This is because the authentication method used is extremely susceptible to
compromise, especially if you are using Shared Key authentication, which is
a symmetric algorithm. Wait a minute, you are saying, I thought you said
that symmetric algorithms were probably safer because only I (and the router
that I configured) would know what key is being used to encrypt the data?
This would normally be the case, however, let's check out how it actually
works.

In Shared Key authentication, the WEP key is used for authentication. A
four-way challenge-response handshake is used:

*       The client station sends an authentication request across to the
wireless network device. 
*       The router sends back a clear-text challenge. 
*       The client encrypts the challenge using the configured WEP key, and
sends it back in another authentication request. 
*       The router decrypts the material, and compares it with the
clear-text it had sent. If it matches what was sent, then it grants access
to the wireless network and the router and the client continue using the
shared, symmetric key. 

Do you see the problem here? If I'm Johnny hacker hanging out with my
laptop, all I have to do is start listening into your network and capturing
packets looking for an authentication request. Because the encryption
algorithm is publicly known, and I have a clear-text message, all I have to
do is start capturing packets and trying different keys until I get the
clear-text message to match the encrypted response. ?

Depending on the amount of network traffic a successful key recovery can
take as little as one minute. If an insufficient number of packets are being
sent, I can always add packets on the network, stimulating reply packets to
aid in finding the key. WEP is easily compromised by just a basic
hacker/cracker with a laptop and freely available software such as
aircrack-ng <http://www.aircrack-ng.org/> .

WPA and WPA II

The Wi-Fi Alliance developed WPA (Wi-Fi Protected Access) in 2003 to address
WEP's weaknesses. Improvements included TKIP Temporal Key Integrity
Protocol), which changes the encryption key for each data transmission,
unlike with what we saw in WEP. WPA is theoretically breakable, but can be
secure on a practical level. With a strong password (as described above in
my password discussion: make sure you have complexity and randomness and 21
characters or more) a WPA network can withstand an attack for years. With
this type of setup, by the time someone gets around to breaking the key on
that one packet of information, then the information should be useless to
whomever was seeking it because its value has expired.

In 2004 WPA II (WPA2) came out and switched to using AES (Advanced
Encryption Standard) instead of TKIP. AES is a stronger protocol than TKIP
and should be used if possible. algorithms are vulnerable, as any algorithm
is, to a brute force attack. Thus, your password/key should be as long as
possible and not shared with any non-trusted persons or entities. Given the
choice between WPA and WAP II, WPA II should be your first choice.

Turning off Network Advertising/Broadcasting

The next step is to stop advertising your network. Although this step helps,
it is not going to stop a serious hacker (or government) snoop, but it will
slow down the hackers that are out "wardriving" looking for targets of
opportunity. This is a three part step. First, login to your wireless router
and (using the documentation for your device) disable broadcasting of the
SSID (network name). Secondly, while you are in there, you will also want to
change the network name; if you don't, then anybody who's seen a packet
before (like your pesky neighbor that's been freeloading for the past few
years) will still be able to connect to it as they will have the SSID. I
recommend using a random string of characters for the network name, just
like you used for the password for maximum protection; this is because any
would be hacker will now have two highly random and complex things to try
and figure out. Lastly, you will have to go back and reconfigure your
wireless devices that attach to the network to use the new SSID name and
password.

Tune Broadcast Power and Router Location

Finally, you'll want to reduce the broadcast power and work at shifting the
physical location of your device so that it cannot be accessed or seen from
the street in front of your house or, if you have one, the alley in back.
These devices are really two-radios with an omnidirectional antenna, meaning
that they broadcast in a sphere outwards from where the antenna is located.
What I recommend is placing the device somewhere near the middle of your
location, then setting the broadcast power at its lowest setting. Now, take
you laptop or other wireless device and step out on the front porch. Can you
still use the network? If not, you might want to up the power setting one
notch. Once you can use it on the front and back porch/deck area, carry the
device out to the street. Can you still access the network? If so, you might
want to adjust the power down so you can't. Keep playing with the location
and power setting until you can use the network where you need it, without
it being usuable from the public access points (aka roads and alleys) around
your home.

Cell Phones, iPads and Other Wireless Devices

Issues with GPS

If your cell phone or other wireless device has a navigation feature, then
it probably has GPS (actually, GPS + some nifty software to triangulate off
of cell towers). I recommend that you turn off the GPS chip in your phone by
default, only turning it on when needed for navigation. There are several
reasons for this: first, if you have a social network you access from the
device, it will geo-tag where you are when making updates.embarrasing if the
boss figures out you were really at Club Wild instead of at the doc's
office. Secondly, any picture you take, with the GPS chip on, gets
geo-tagged with its location. If you decided to "drop off the grid" but
upload some photos to Flikr
<http://davidfisherenterprisesllc.com/www.flickr.com/>  or PhotoBucket
<http://davidfisherenterprisesllc.com/www.photobucket.com> , then those
photos have 'metadata' (i.e. data about the photo) embedded into the photo
which is accessible to someone via google maps. Enterprising criminals can
then figure out, just by the photos, where your home is, where you like to
have lunch, where family members live/are, etc. Not good.

Remote Activation

All cell phones have the ability to remotely turn them on, even if they
appear to be powered off. They can also be turned into remote listening
devices without the pesky nuisance of installing a bug. The cell phone will
not appear to be powered on if it has been remotely turned on. Ditto for
being able to turn on the GPS feature and figure out where you are at. The
only way to circumvent this is to remove the battery and SIM card from the
phone. Removing the battery provides better protection than removing the
SIM.

Wrapping Up

One can take steps to protect their wireless personas. While one can really
dive down a rabbit hole ala Enemy of the State
<http://www.amazon.com/gp/product/6305428115?ie=UTF8&tag=lewrockwell&linkCod
e=xm2&camp=1789&creativeASIN=6305428115> , that's not necessary to provide
yourself some serious protection. Highlights are: don't advertise your
wireless home network, use WPA II, use strong passwords and turn off your
GPS features and remove batteries from phones (sorry iPhone users, android
phones win here) when not in use.

April 28, 2011

David Fisher [send him mail <mailto:davidfisherenterpri...@gmail.com> ]
blogs at David Fisher Enterprises LLC <http://davidfisherenterprisesllc.com>
.

 



[Non-text portions of this message have been removed]



------------------------------------

--------------------------
Want to discuss this topic?  Head on over to our discussion list, 
discuss-os...@yahoogroups.com.
--------------------------
Brooks Isoldi, editor
biso...@intellnet.org

http://www.intellnet.org

  Post message: osint@yahoogroups.com
  Subscribe:    osint-subscr...@yahoogroups.com
  Unsubscribe:  osint-unsubscr...@yahoogroups.com


*** FAIR USE NOTICE. This message contains copyrighted material whose use has 
not been specifically authorized by the copyright owner. OSINT, as a part of 
The Intelligence Network, is making it available without profit to OSINT 
YahooGroups members who have expressed a prior interest in receiving the 
included information in their efforts to advance the understanding of 
intelligence and law enforcement organizations, their activities, methods, 
techniques, human rights, civil liberties, social justice and other 
intelligence related issues, for non-profit research and educational purposes 
only. We believe that this constitutes a 'fair use' of the copyrighted material 
as provided for in section 107 of the U.S. Copyright Law. If you wish to use 
this copyrighted material for purposes of your own that go beyond 'fair use,' 
you must obtain permission from the copyright owner.
For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtmlYahoo! Groups Links

<*> To visit your group on the web, go to:
    http://groups.yahoo.com/group/osint/

<*> Your email settings:
    Individual Email | Traditional

<*> To change settings online go to:
    http://groups.yahoo.com/group/osint/join
    (Yahoo! ID required)

<*> To change settings via email:
    osint-dig...@yahoogroups.com 
    osint-fullfeatu...@yahoogroups.com

<*> To unsubscribe from this group, send an email to:
    osint-unsubscr...@yahoogroups.com

<*> Your use of Yahoo! Groups is subject to:
    http://docs.yahoo.com/info/terms/

Reply via email to