[wearables] mobile phone exploits: bluejacking and remote monitoring
--- begin forwarded text Date: Wed, 21 Apr 2004 01:28:11 -0400 (EDT) From: Thad E. Starner [EMAIL PROTECTED] To: [EMAIL PROTECTED] Subject: [wearables] mobile phone exploits: bluejacking and remote monitoring Sender: [EMAIL PROTECTED] Folks- I'm getting interview requests on the (lack-of) privacy aspects on mobile phones and need some help formalizing my ideas. I've included an article on bluejacking (exploiting bluetooth to extract info from mobile phones) below, but what I'm really interested in is methods to turn on the microphone on a mobile phone without the owner's awareness. Has anyone done this or heard of an exploit to do this yet? I can see three methods off-hand: 1) Bluejacking the phone, sending over a Java app, turning on the mic, and either a) sending the audio over bluetooth b) actually calling back the cracker's phone directly (either immediately or in a time-delayed fashion) c) storing the audio on the owner's phone and then uploading the data at a later time (with PDA cell phones with 4G flash cards, you could store a full year's worth of speech) 2) Having a Java (J2ME) trojan horse app on a website that, when the owner clicks on it, does variants of 1 3) The service provider remote downloads software updates that do the same thing as #1. (Does anyone have specific knowledge of service providers uploading software updates remotely) a) because the service provider is being forced to do so by a government agency (e.g. in the US based on a subpoena using the FBI wiretap law, for example) b) because the service provider is actually a cracker who got the appropriate software update codes c) because the service provider just thinks this is a good idea for some reason (I can put together some pretty paranoid scenarios for this, but nothing that is really compelling yet) (Note with some of these scenarios, the phone could actually look off because almost all phones use soft switches instead of actually disconnecting the power) Other things I'm interested in are 1) When the mobile phone is off, exciting the phone at the carrier frequency, looking at the back scatter, characterizing the specific characteristics of the phone, and then using these as a unique signature that I can use the phone like a passive RFID. I have a pretty good source that says this is actually being done now, but I can't use this info publicly. Anyone have a source I can quote or point to? 2) Using clusters of phones as phased array microphones. Sumit Basu did a phased array microphone based on mics in clothing where the topology was changing. Does anyone know if the math works well enough to do this on a room full of cell phones in people's pockets? Thad Bluetooth May Put You At Risk of Getting 'Snarfed' By JEREMY WAGSTAFF Staff Reporter of THE WALL STREET JOURNAL April 15, 2004; Page D3 If you spot someone tailgating you on the road or standing next to you wearing a backpack, then watch out: You may have been snarfed. All the data on your cellphone, including addresses, calendars, whom you called and who called you, may now be in that person's computer. Many cellphones use Bluetooth technology, which allows them to communicate wirelessly with other Bluetooth-equipped devices -- computers, personal-digital assistants and other cellphones. This means you don't need a cable, for example, to synchronize the address books on your laptop and your cellphone. It is convenient, but that makes it possible for someone to steal your data, or even hijack your cellphone for their own purposes. Last year, London security consultant AL Digital spotted flaws in the way some Bluetooth cellphones swapped data with one another -- flaws that could be used to gain unauthorized access to everything stored on that phone without the user ever knowing. AL Digital's Adam Laurie, who discovered the problem, shared his findings with cellphone makers and with the public (leaving out the detail that might allow ne'er-do-wells to copy his experiments at street level). He termed the trick Bluesnarfing. Not a lot has happened since then. Nokia Corp., the market leader in the cellphone industry, acknowledges the flaw but says in an e-mail response to questions that it is not aware of any attacks against Bluetooth-enabled phones. Sony Ericsson, a joint venture of Telefon AB L.M. Ericsson and Sony Corp., didn't reply to an e-mail. Even those highlighting the danger say they haven't heard of specific attacks. Still, these attacks -- also known as Bluejacking -- nevertheless are possible. Mr. Laurie cites a scenario in which paparazzi could steal celebrity data. He says he was able, with permission, to snarf from a friend's phone details of her company's shops, door codes and safe combinations. There's any number of angles you can look at, and they are all bad as far as I can see, he
Test our Internet pharmacy, buy Víagra and other meds.
No visit to the doctor needed - Safe and easy. I don't like emails.was of organization religious statement that he - repeatedly assurance religions, adding participant consequences Barisan ask is raising W. to enshrined practicing 2001 private that ensure coming Bushs on was
Security Companies: Shadow Soldiers in Iraq
http://www.nytimes.com/2004/04/19/international/middleeast/19SECU.html?th=pagewanted=printposition= The New York Times April 19, 2004 Security Companies: Shadow Soldiers in Iraq By DAVID BARSTOW his article was reported by David Barstow, James Glanz, Richard A. Oppel Jr. and Kate Zernike and was written by Mr. Barstow. They have come from all corners of the world. Former Navy Seal commandos from North Carolina. Gurkas from Nepal. Soldiers from South Africa's old apartheid government. They have come by the thousands, drawn to the dozens of private security companies that have set up shop in Baghdad. The most prized were plucked from the world's elite special forces units. Others may have been recruited from the local SWAT team. But they are there, racing about Iraq in armored cars, many outfitted with the latest in high-end combat weapons. Some security companies have formed their own Quick Reaction Forces, and their own intelligence units that produce daily intelligence briefs with grid maps of hot zones. One company has its own helicopters, and several have even forged diplomatic alliances with local clans. Far more than in any other conflict in United States history, the Pentagon is relying on private security companies to perform crucial jobs once entrusted to the military. In addition to guarding innumerable reconstruction projects, private companies are being asked to provide security for the chief of the Coalition Provisional Authority, L. Paul Bremer III, and other senior officials; to escort supply convoys through hostile territory; and to defend key locations, including 15 regional authority headquarters and even the Green Zone in downtown Baghdad, the center of American power in Iraq. With every week of insurgency in a war zone with no front, these companies are becoming more deeply enmeshed in combat, in some cases all but obliterating distinctions between professional troops and private commandos. Company executives see a clear boundary between their defensive roles as protectors and the offensive operations of the military. But more and more, they give the appearance of private, for-profit militias - by several estimates, a force of roughly 20,000 on top of an American military presence of 130,000. I refer to them as our silent partner in this struggle, Senator John W. Warner, the Virginia Republican and Armed Services Committee chairman, said in an interview. The price of this partnership is soaring. By some recent government estimates, security costs could claim up to 25 percent of the $18 billion budgeted for reconstruction, a huge and mostly unanticipated expense that could delay or force the cancellation of billions of dollars worth of projects to rebuild schools, water treatment plants, electric lines and oil refineries. In Washington, defense experts and some leading Democrats are raising alarms over security companies' growing role in Iraq. Security in a hostile fire area is a classic military mission, Senator Jack Reed of Rhode Island, a member of the Armed Service committee, wrote last week in a letter to Defense Secretary Donald H. Rumsfeld signed by 12 other Democratic senators. Delegating this mission to private contractors raises serious questions. The extent and strategic importance of the alliance between the Pentagon and the private security industry has been all the more visible with each surge of violence. In recent weeks, commandos from private security companies fought to defend coalition authority employees and buildings from major assaults in Kut and Najaf, two cities south of Baghdad. To the north, in Mosul, a third security company repelled a direct assault on its headquarters. In the most publicized attack, four private security contractors were killed in an ambush of a supply convoy in Fallujah. The Bush administration's growing dependence on private security companies is partly by design. Determined to transform the military into a leaner but more lethal fighting force, Mr. Rumsfeld has pushed aggressively to outsource tasks not deemed essential to war-making. But many Pentagon and authority officials now concede that the companies' expanding role is also a result of the administration's misplaced optimism about how Iraqis would greet American reconstruction efforts. The authority initially estimated that security costs would eat up about 10 percent of the $18 billion in reconstruction money approved by Congress, said Capt. Bruce A. Cole of the Navy, a spokesman for the authority's program management office. But after months of sabotage and insurgency, some officials now say a much higher percentage will go to security companies that unblushingly charge $500 to $1,500 a day for their most skilled operators. I believe that it was expected that coalition forces would provide adequate internal security and thus obviate the need for contractors to hire their own security, said Stuart W. Bowen Jr., the new inspector general of the authority. But
Test our Internet pharmacy, buy Víagra and other meds.
No visit to the doctor needed - Safe and easy. I don't like emails.government of rapidly currently clearly, report, Chinese will that 7, decree can best could "We is for human religious believe. country. Group granted one a dissenting practice of the U.S.
Medical Clinic Ownership: Great Stock Alternative
A GREAT ALTERNATIVE TO TODAYS STOCK MARKET EARN investment income as part owner! Medical Imaging Clinic This technology has been featured on: OPRAH , GOOD MORNING AMERICA, LARRY KING LIVE and USA TODAYand many more. GEs Electron Beam Tomography is a cutting-edge diagnostic technology capable of providing a crystal-ball-like look into your medical future. The dramatic capabilities of this spectacular technology should provide an extraordinary investment opportunity for those establishing state-of-the-art outpatient clinics, in order to provide the EBT body scan procedures to health conscious Americans. EBT scans are now covered by most health insurance companies and HMOs, causing an explosion in usership and exceptionally high demand for this procedure. Access Our Site To receive your free video and full prospectus Projected 10-year return of %916 IRA and 401k eligible
Special Invitation to a Fantastic Free Offer for a Unique Wambamboo Experience!
Dear Friend We would like to take this opportunity to invite you to register with a fantastic new dating site for the Chinese/Asian community which can be found at www.wambamboo.com As a promotional offer, all users will receive a Platinum membership free of charge! Our site features a number of sophisticated and fun features such as profile matching, message service, instant chat, personal agony aunt, discussion forum, events and photo/video/audio capabilities. You can use the site for networking, making new friends or even finding your perfect partner, the choice is entirely up to you! We look forward to welcoming you as a member. Kind regards The Wambamboo Team www.wambamboo.com Matching the hearts of Asia
Re: voting
David Jablon wrote: [...] Where is the privacy problem with Chaum receipts when Ed and others still have the freedom to refuse theirs or throw them away? At 11:43 AM 4/16/04 -0700, Ed Gerck wrote: The privacy, coercion, intimidation, vote selling and election integrity problems begin with giving away a receipt that is linkable to a ballot. These problems begin elsewhere. Whether a receipt would add any new problem depends on further analysis. It is not relevant to the security problem whether a voter may destroy his receipt, so that some receipts may disappear. What is relevant is that voters may HAVE to keep their receipt or... suffer retaliation... not get paid... lose their jobs... not get a promotion... etc. Also relevant is that voters may WANT to keep their receipts, for the same reasons. These are all relevant issues, and the system needs to be considered as a whole. The threat of coercion is present regardless of whether there's a system-provided receipt, linkable, anonymous, or none. For example, I might be told that after I vote I'll come face-to-face with a thug around the corner, who will ask who I voted for, and who has a knack for spotting liars. Or I may be told there's a secret camera in the booth. Or I may think I'm at risk in simply showing up to vote, due to my public party affiliation records, physical appearance, etc. These issues must be addressed, and these concerns show that the integrity of receipt validation must be ensured to at least the same degree as the integrity of vote casting. But *absolute* voter privacy seems like an unobtainable goal, and it should not be used to trump other important goals, like accountability. -- David
Real-world quantum cryptography
http://www.quantenkryptographie.at/ Click on the News: April 21 link, which goes to http://www.quantenkryptographie.at/rathaus_press.html World Premiere: Bank Transfer via Quantum Cryptography Based on Entangled Photons Press conference and demonstration of the ground-breaking experiment: 21 April 2004, 11:30, Vienna City Hall Steinsaal
Quality and cheap meds here, Cypherpunks
Well well well!Concentration is the ability to think about absolutely nothing when it is absolutely necessary.It is well-known what a middleman is: he is a man who bamboozles one party and plunders the other. Cypherpunks, meds without perscription only here http://speedings.ermndbs.com/g73/index.php?id=g73 undulations Ambition is the germ from which all growth of nobleness proceeds.Six feet of earth make all men equal.It's just a job. Grass grows, birds fly, waves pound the sand. I beat people up.Wine is a treacherous friend who you must always be on guard for.
Re: Real-world quantum cryptography
On Wed, 2004-04-21 at 21:49, Steve Furlong wrote: http://www.quantenkryptographie.at/ Gah. That's what I get for trying to do a Hettinga -- he beats me to it. OK, Bob, you got me this time. grin
Test our Internet pharmacy, buy Víagra and other meds.
No visit to the doctor needed - Safe and easy. I don't like emails.foods study, increased tone in did that U.S. supposedly U.S. and for uphold and agreement: than was equal or Group's and conduct and a the and Week State asked now
Re: voting
David Jablon wrote: [...] Where is the privacy problem with Chaum receipts when Ed and others still have the freedom to refuse theirs or throw them away? At 11:43 AM 4/16/04 -0700, Ed Gerck wrote: The privacy, coercion, intimidation, vote selling and election integrity problems begin with giving away a receipt that is linkable to a ballot. These problems begin elsewhere. Whether a receipt would add any new problem depends on further analysis. It is not relevant to the security problem whether a voter may destroy his receipt, so that some receipts may disappear. What is relevant is that voters may HAVE to keep their receipt or... suffer retaliation... not get paid... lose their jobs... not get a promotion... etc. Also relevant is that voters may WANT to keep their receipts, for the same reasons. These are all relevant issues, and the system needs to be considered as a whole. The threat of coercion is present regardless of whether there's a system-provided receipt, linkable, anonymous, or none. For example, I might be told that after I vote I'll come face-to-face with a thug around the corner, who will ask who I voted for, and who has a knack for spotting liars. Or I may be told there's a secret camera in the booth. Or I may think I'm at risk in simply showing up to vote, due to my public party affiliation records, physical appearance, etc. These issues must be addressed, and these concerns show that the integrity of receipt validation must be ensured to at least the same degree as the integrity of vote casting. But *absolute* voter privacy seems like an unobtainable goal, and it should not be used to trump other important goals, like accountability. -- David
Paying for drinks with wave br of the hand
http://worldnetdaily.com/news/printer-friendly.asp?ARTICLE_ID=38038 WorldNetDaily Wednesday, April 14, 2004 YOUR PAPERS, PLEASE ... Paying for drinks with wave of the hand Club-goers in Spain get implanted chips for ID, payment purposes Posted: April 14, 2004 5:00 p.m. Eastern By Sherrie Gossett Being recognized has never been easier for VIP patrons of the Baja Beach Club in Barcelona, Spain. Like a scene out of a science-fiction movie, all it takes is a syringe-injected microchip implant for the beautiful men and women of the nightclub scene to breeze past a reader that recognizes their identity, credit balance and even automatically opens doors to exclusive areas of the club for them. They can buy drinks and food with a wave of their hand and don't need to worry about losing a credit card or wallet. By simply passing by our reader, the Baja Beach Club will know who you are and what your credit balance is, Conrad K. Chase explains. Chase is director of the Baja Beach Club in Barcelona. From the moment of their implantation they will also have free entry and access to the VIP area, he said. In the popular club, which boasts a dance floor that can accommodate 3,000, streamlined services and convenience matter to Chase's VIP customers. Baja Beach Clubs International is the first firm to employ the VeriPay System, developed by Applied Digital's VeriChip Corporation and announced at an international conference in Paris last year. The company touts this application of the chip implant as an advance over credit cards and smart cards, which, absent biometrics and appropriate safeguard technologies, are subject to theft resulting in identity fraud. Palm Beach-based Applied Digital Solutions (NASDAQ:ADSXD) unveiled the original VeriChip immediately after the 9-11 tragedy. Similar to pet identification chips, the VeriChip is a syringe-injectable radio frequency identification microchip that can be read from a few feet away by either a hand-held scanner or by the implantee walking through a portal scanner. Information can be wirelessly written to the chip, which contains a unique 10-digit identification number. Media seized on the novelty factor of the chip implant, driving it to worldwide headlines in 2001. Last year, Art Kranzley, senior vice president at MasterCard, speculated on possible future electronic payment media: We're certainly looking at designs like key fobs. It could be in a pen or a pair of earrings. Ultimately, it could be embedded in anything ñ someday, maybe even under the skin. Chase calls the chip implant the wave of the future. The nightclub director has been implanted along with stars from the Spanish version of the TV show Big Brother. I know many people who want to be implanted, he said. Actually, almost everybody has piercings, tattoos or silicone. Will the implant only be of use at the Baja? The objective of this technology is to bring an ID system to a global level that will destroy the need to carry ID documents and credit cards, Chase said. During a recent American radio interview, Chase said the CEO of VeriChip, Dr. Keith Bolton, had told him that the company's goal was to market the VeriChip as a global implantable identification system. With only 900 people implanted worldwide, though, the global mandate isn't exactly around the corner, and current applications are extremely limited. Chase added, The VeriChip that we implant at Baja will not only be for the Baja, but is also useful for whatever other enterprise that makes use of this technology. He also alluded to plans for FN Herstal, which manufactures Browning and Smith and Wesson firearms, to develop an implant-firearm system that would make a firearm functional only to the individual implanted with its corresponding microchip. A scanner in the gun would be designed to recognize the owner. Chase's mention of the FN Herstal-Verichip partnership came a full week before it's formal announcement by Applied Digital yesterday. Chase believes all gun owners should be required to have a microchip implanted in their hand to be able to own a gun. While yesterday's Associated Press story on the prototype is primarily from the angle of police usage, WND reported two years ago that from the he outset of the company's acquisition of its Digital Angel implant patent ñ said to be GPS trackable ñ Applied touted the implant as a potential universal method of gun control. Chase also claimed that the VeriChip company had told him that the Italian government was preparing to implant government workers. We are the only company today offering human implantable ID technology, said Scott R. Silverman, chairman and chief executive officer of Applied Digital Solutions. We believe the market opportunity for this technology is substantial, and high-profile successes such as in Spain will serve as catalysts for broader adoption. Since 1999, the Applied Digital Solutions has boasted that it also has a
Re: voting
David Jablon wrote: ... *absolute* voter privacy seems like an unobtainable goal, and it should not be used to trump other important goals, like accountability. But it IS assured today by paper ballots. Nothing less should be accepted in electronic systems, otherwise new, easy and silent fraud modes become possible. Coercion and vote selling are just the most obvious. Ed Gerck