[wearables] mobile phone exploits: bluejacking and remote monitoring

2004-04-21 Thread R. A. Hettinga

--- begin forwarded text


Date: Wed, 21 Apr 2004 01:28:11 -0400 (EDT)
From: Thad E. Starner [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: [wearables] mobile phone exploits:  bluejacking and remote monitoring
Sender: [EMAIL PROTECTED]


Folks-

I'm getting interview requests on the (lack-of) privacy
aspects on mobile phones and need some help formalizing my ideas.
I've included an article on bluejacking (exploiting bluetooth to
extract info from mobile phones) below, but what I'm really interested
in is methods to turn on the microphone on a mobile phone without the
owner's awareness.  Has anyone done this or heard of an exploit to do
this yet?  I can see three methods off-hand:

1)  Bluejacking the phone, sending over a Java app, turning on the
mic, and either
a) sending the audio over bluetooth
b) actually calling back the cracker's phone directly (either
immediately or in a
   time-delayed fashion)
c) storing the audio on the owner's phone and then uploading the
   data at a later time (with PDA cell phones with 4G flash cards,
   you could store a full year's worth of speech)
2)  Having a Java (J2ME) trojan horse app on a website that, when the owner
clicks on it, does variants of 1
3)  The service provider remote downloads software updates that do
the same thing as #1.  (Does anyone have specific knowledge of
service providers uploading software updates remotely)
a) because the service provider is being forced to do so by a
   government agency (e.g. in the US based on a subpoena using the FBI
   wiretap law, for example)
b) because the service provider is actually a cracker who got the
   appropriate software update codes
c) because the service provider just thinks this is a good idea
   for some reason (I can put together some pretty paranoid
   scenarios for this, but nothing that is really compelling yet)
(Note with some of these scenarios, the phone could actually look
off because almost all phones use soft switches instead of
actually disconnecting the  power)

Other things I'm interested in are
1) When the mobile phone is off, exciting the phone at the carrier
frequency, looking at the back scatter, characterizing the specific
characteristics of the phone, and then using these as a unique
signature that I can use the phone like a passive RFID.  I have a
pretty good source that says this is actually being done now, but I
can't use this info publicly.  Anyone have a source I can quote or
point to?
2) Using clusters of phones as phased array microphones.  Sumit Basu
did a phased array microphone based on mics in clothing where the
topology was changing.  Does anyone know if the math works well enough
to do this on a room full of cell phones in people's pockets?

  Thad


Bluetooth May Put You
At Risk of Getting 'Snarfed'

By JEREMY WAGSTAFF
Staff Reporter of THE WALL STREET JOURNAL
April 15, 2004; Page D3

If you spot someone tailgating you on the road or standing next to you
wearing a backpack, then watch out: You may have been snarfed. All the
data on your cellphone, including addresses, calendars, whom you called and
who called you, may now be in that person's computer.

Many cellphones use Bluetooth technology, which allows them to communicate
wirelessly with other Bluetooth-equipped devices -- computers,
personal-digital assistants and other cellphones. This means you don't need
a cable, for example, to synchronize the address books on your laptop and
your cellphone. It is convenient, but that makes it possible for someone to
steal your data, or even hijack your cellphone for their own purposes.

Last year, London security consultant AL Digital spotted flaws in the way
some Bluetooth cellphones swapped data with one another -- flaws that could
be used to gain unauthorized access to everything stored on that phone
without the user ever knowing. AL Digital's Adam Laurie, who discovered the
problem, shared his findings with cellphone makers and with the public
(leaving out the detail that might allow ne'er-do-wells to copy his
experiments at street level). He termed the trick Bluesnarfing.

Not a lot has happened since then. Nokia Corp., the market leader in the
cellphone industry, acknowledges the flaw but says in an e-mail response to
questions that it is not aware of any attacks against Bluetooth-enabled
phones. Sony Ericsson, a joint venture of Telefon AB L.M. Ericsson and Sony
Corp., didn't reply to an e-mail. Even those highlighting the danger say
they haven't heard of specific attacks.

Still, these attacks -- also known as Bluejacking -- nevertheless are
possible. Mr. Laurie cites a scenario in which paparazzi could steal
celebrity data. He says he was able, with permission, to snarf from a
friend's phone details of her company's shops, door codes and safe
combinations. There's any number of angles you can look at, and they are
all bad as far as I can see, he 

Test our Internet pharmacy, buy Víagra and other meds.

2004-04-21 Thread Elijah Malone


No visit to the doctor needed - Safe and easy.

I don't like emails.was of organization religious statement that he - repeatedly assurance
religions, adding participant consequences Barisan ask is raising W. to
enshrined practicing 2001 private that ensure coming Bush’s on was 




Security Companies: Shadow Soldiers in Iraq

2004-04-21 Thread R. A. Hettinga
http://www.nytimes.com/2004/04/19/international/middleeast/19SECU.html?th=pagewanted=printposition=

The New York Times

April 19, 2004

Security Companies: Shadow Soldiers in Iraq
By DAVID BARSTOW

his article was reported by David Barstow, James Glanz, Richard A. Oppel
Jr. and Kate Zernike and was written by Mr. Barstow.

They have come from all corners of the world. Former Navy Seal commandos
from North Carolina. Gurkas from Nepal. Soldiers from South Africa's old
apartheid government. They have come by the thousands, drawn to the dozens
of private security companies that have set up shop in Baghdad. The most
prized were plucked from the world's elite special forces units. Others may
have been recruited from the local SWAT team.

But they are there, racing about Iraq in armored cars, many outfitted with
the latest in high-end combat weapons. Some security companies have formed
their own Quick Reaction Forces, and their own intelligence units that
produce daily intelligence briefs with grid maps of hot zones. One
company has its own helicopters, and several have even forged diplomatic
alliances with local clans.

 Far more than in any other conflict in United States history, the Pentagon
is relying on private security companies to perform crucial jobs once
entrusted to the military. In addition to guarding innumerable
reconstruction projects, private companies are being asked to provide
security for the chief of the Coalition Provisional Authority, L. Paul
Bremer III, and other senior officials; to escort supply convoys through
hostile territory; and to defend key locations, including 15 regional
authority headquarters and even the Green Zone in downtown Baghdad, the
center of American power in Iraq.

 With every week of insurgency in a war zone with no front, these companies
are becoming more deeply enmeshed in combat, in some cases all but
obliterating distinctions between professional troops and private
commandos. Company executives see a clear boundary between their defensive
roles as protectors and the offensive operations of the military. But more
and more, they give the appearance of private, for-profit militias - by
several estimates, a force of roughly 20,000 on top of an American military
presence of 130,000.

 I refer to them as our silent partner in this struggle, Senator John W.
Warner, the Virginia Republican and Armed Services Committee chairman, said
in an interview.

The price of this partnership is soaring. By some recent government
estimates, security costs could claim up to 25 percent of the $18 billion
budgeted for reconstruction, a huge and mostly unanticipated expense that
could delay or force the cancellation of billions of dollars worth of
projects to rebuild schools, water treatment plants, electric lines and oil
refineries.

 In Washington, defense experts and some leading Democrats are raising
alarms over security companies' growing role in Iraq.

 Security in a hostile fire area is a classic military mission, Senator
Jack Reed of Rhode Island, a member of the Armed Service committee, wrote
last week in a letter to Defense Secretary Donald H. Rumsfeld signed by 12
other Democratic senators. Delegating this mission to private contractors
raises serious questions.

 The extent and strategic importance of the alliance between the Pentagon
and the private security industry has been all the more visible with each
surge of violence. In recent weeks, commandos from private security
companies fought to defend coalition authority employees and buildings from
major assaults in Kut and Najaf, two cities south of Baghdad. To the north,
in Mosul, a third security company repelled a direct assault on its
headquarters. In the most publicized attack, four private security
contractors were killed in an ambush of a supply convoy in Fallujah.

The Bush administration's growing dependence on private security companies
is partly by design. Determined to transform the military into a leaner but
more lethal fighting force, Mr. Rumsfeld has pushed aggressively to
outsource tasks not deemed essential to war-making. But many Pentagon and
authority officials now concede that the companies' expanding role is also
a result of the administration's misplaced optimism about how Iraqis would
greet American reconstruction efforts.

The authority initially estimated that security costs would eat up about 10
percent of the $18 billion in reconstruction money approved by Congress,
said Capt. Bruce A. Cole of the Navy, a spokesman for the authority's
program management office.

But after months of sabotage and insurgency, some officials now say a much
higher percentage will go to security companies that unblushingly charge
$500 to $1,500 a day for their most skilled operators.

 I believe that it was expected that coalition forces would provide
adequate internal security and thus obviate the need for contractors to
hire their own security, said Stuart W. Bowen Jr., the new inspector
general of the authority. But 

Test our Internet pharmacy, buy Víagra and other meds.

2004-04-21 Thread Mandy Downey


No visit to the doctor needed - Safe and easy.

I don't like emails.government of rapidly currently clearly, report, Chinese will that 7, decree
can best could "We is for human religious believe. country. Group granted
one a dissenting practice of the U.S. 




Medical Clinic Ownership: Great Stock Alternative

2004-04-21 Thread Medical Clinic Ownership




  

  A
GREAT
  ALTERNATIVE TO TODAY’S STOCK MARKET 
  EARN
  investment income as part owner!




Medical
Imaging
Clinic


  This
technology has been featured on:
  OPRAH , GOOD
MORNING
AMERICA, LARRY KING LIVE and USA TODAYand many more.

GE’s Electron
Beam Tomography is a cutting-edge diagnostic technology capable of
providing
a crystal-ball-like look into your medical future. The dramatic
capabilities
of this spectacular technology should provide an extraordinary investment
opportunity for those establishing state-of-the-art outpatient clinics,
in order to provide the EBT body scan procedures to health conscious
Americans.
EBT scans are now covered by most health insurance companies and HMOs,
causing an explosion in usership and exceptionally high demand for this
procedure.


   Access
Our Site




To receive
your free video and full prospectus


   Projected 10-year
return
of %916


   IRA and 401k
eligible
  











Special Invitation to a Fantastic Free Offer for a Unique Wambamboo Experience!

2004-04-21 Thread Wambamboo Marketing
Dear Friend 

 

We would like to take this opportunity to invite you to register with a fantastic new 
dating site for the Chinese/Asian community which can be found at www.wambamboo.com

 

As a promotional offer, all users will receive a Platinum membership free of charge!  
Our site features a number of sophisticated and fun features such as profile matching, 
message service, instant chat, personal agony aunt, discussion forum, events and 
photo/video/audio capabilities.  

 

You can use the site for networking, making new friends or even finding your perfect 
partner, the choice is entirely up to you!  We look forward to welcoming you as a 
member.

 

Kind regards

 

The Wambamboo Team

 

www.wambamboo.com – Matching the hearts of Asia

 

 

 

 




Re: voting

2004-04-21 Thread David Jablon

David Jablon wrote:
 [...] Where is the privacy problem with
 Chaum receipts when Ed and others still have the freedom to refuse
 theirs or throw them away?

At 11:43 AM 4/16/04 -0700, Ed Gerck wrote:
The privacy, coercion, intimidation, vote selling and election integrity
problems begin with giving away a receipt that is linkable to a ballot. 

These problems begin elsewhere.  Whether a receipt would add any
new problem depends on further analysis.

It is not relevant to the security problem whether a voter may destroy 
his receipt, so that some receipts may disappear. What is relevant is 
that voters may HAVE to keep their receipt or... suffer retaliation...
not get paid... lose their jobs... not get a promotion... etc. Also
relevant is that voters may WANT to keep their receipts, for the same
reasons.

These are all relevant issues, and the system needs to be considered
as a whole.

The threat of coercion is present regardless of whether there's a
system-provided receipt, linkable, anonymous, or none. For example,
I might be told that after I vote I'll come face-to-face with a thug around
the corner, who will ask who I voted for, and who has a knack for
spotting liars. Or I may be told there's a secret camera in the booth.
Or I may think I'm at risk in simply showing up to vote, due to my public
party affiliation records, physical appearance, etc.

These issues must be addressed, and these concerns show that the
integrity of receipt validation must be ensured to at least the same
degree as the integrity of vote casting.  But *absolute* voter privacy
seems like an unobtainable goal, and it should not be used to trump
other important goals, like accountability.

-- David




Real-world quantum cryptography

2004-04-21 Thread Steve Furlong
http://www.quantenkryptographie.at/

Click on the News: April 21 link, which goes to
http://www.quantenkryptographie.at/rathaus_press.html


World Premiere: Bank Transfer via Quantum Cryptography Based on
Entangled Photons
Press conference and demonstration of the ground-breaking experiment:
21 April 2004, 11:30, Vienna City Hall  Steinsaal




Quality and cheap meds here, Cypherpunks

2004-04-21 Thread Scuffed A. Lenses



Well well well!Concentration is the ability to think about absolutely nothing when it is absolutely necessary.It is well-known what a middleman is: he is a man who bamboozles one party and plunders the other.
Cypherpunks, meds without perscription only here
http://speedings.ermndbs.com/g73/index.php?id=g73 undulations
Ambition is the germ from which all growth of nobleness proceeds.Six feet of earth make all men equal.It's just a job. Grass grows, birds fly, waves pound the sand. I beat people up.Wine is a treacherous friend who you must always be on guard for.



Re: Real-world quantum cryptography

2004-04-21 Thread Steve Furlong
On Wed, 2004-04-21 at 21:49, Steve Furlong wrote:
 http://www.quantenkryptographie.at/

Gah. That's what I get for trying to do a Hettinga -- he beats me to it.
OK, Bob, you got me this time. grin




Test our Internet pharmacy, buy Víagra and other meds.

2004-04-21 Thread Elwood C. Polk


No visit to the doctor needed - Safe and easy.

I don't like emails.foods study, increased tone in did that U.S. supposedly U.S. and for uphold
and agreement: than was equal or Group's and conduct and a the and Week
State asked now 




Re: voting

2004-04-21 Thread David Jablon

David Jablon wrote:
 [...] Where is the privacy problem with
 Chaum receipts when Ed and others still have the freedom to refuse
 theirs or throw them away?

At 11:43 AM 4/16/04 -0700, Ed Gerck wrote:
The privacy, coercion, intimidation, vote selling and election integrity
problems begin with giving away a receipt that is linkable to a ballot. 

These problems begin elsewhere.  Whether a receipt would add any
new problem depends on further analysis.

It is not relevant to the security problem whether a voter may destroy 
his receipt, so that some receipts may disappear. What is relevant is 
that voters may HAVE to keep their receipt or... suffer retaliation...
not get paid... lose their jobs... not get a promotion... etc. Also
relevant is that voters may WANT to keep their receipts, for the same
reasons.

These are all relevant issues, and the system needs to be considered
as a whole.

The threat of coercion is present regardless of whether there's a
system-provided receipt, linkable, anonymous, or none. For example,
I might be told that after I vote I'll come face-to-face with a thug around
the corner, who will ask who I voted for, and who has a knack for
spotting liars. Or I may be told there's a secret camera in the booth.
Or I may think I'm at risk in simply showing up to vote, due to my public
party affiliation records, physical appearance, etc.

These issues must be addressed, and these concerns show that the
integrity of receipt validation must be ensured to at least the same
degree as the integrity of vote casting.  But *absolute* voter privacy
seems like an unobtainable goal, and it should not be used to trump
other important goals, like accountability.

-- David




Paying for drinks with wave br of the hand

2004-04-21 Thread R. A. Hettinga
http://worldnetdaily.com/news/printer-friendly.asp?ARTICLE_ID=38038

WorldNetDaily

Wednesday, April 14, 2004

YOUR PAPERS, PLEASE ...
Paying for drinks with wave
 of the hand
Club-goers in Spain get implanted chips for ID, payment purposes
Posted: April 14, 2004
5:00 p.m. Eastern



By Sherrie Gossett


 Being recognized has never been easier for VIP patrons of the Baja Beach
Club in Barcelona, Spain.

 Like a scene out of a science-fiction movie, all it takes is a
syringe-injected microchip implant for the beautiful men and women of the
nightclub scene to breeze past a reader that recognizes their identity,
credit balance and even automatically opens doors to exclusive areas of the
club for them.

 They can buy drinks and food with a wave of their hand and don't need to
worry about losing a credit card or wallet.

 By simply passing by our reader, the Baja Beach Club will know who you
are and what your credit balance is, Conrad K. Chase explains. Chase is
director of the Baja Beach Club in Barcelona.

 From the moment of their implantation they will also have free entry and
access to the VIP area, he said.

 In the popular club, which boasts a dance floor that can accommodate
3,000, streamlined services and convenience matter to Chase's VIP customers.

 Baja Beach Clubs International is the first firm to employ the VeriPay
System, developed by Applied Digital's VeriChip Corporation and announced
at an international conference in Paris last year. The company touts this
application of the chip implant as an advance over credit cards and smart
cards, which, absent biometrics and appropriate safeguard technologies, are
subject to theft resulting in identity fraud.

 Palm Beach-based Applied Digital Solutions (NASDAQ:ADSXD) unveiled the
original VeriChip immediately after the 9-11 tragedy. Similar to pet
identification chips, the VeriChip is a syringe-injectable radio frequency
identification microchip that can be read from a few feet away by either a
hand-held scanner or by the implantee walking through a portal scanner.
Information can be wirelessly written to the chip, which contains a unique
10-digit identification number.

 Media seized on the novelty factor of the chip implant, driving it to
worldwide headlines in 2001.

 Last year, Art Kranzley, senior vice president at MasterCard, speculated
on possible future electronic payment media: We're certainly looking at
designs like key fobs. It could be in a pen or a pair of earrings.
Ultimately, it could be embedded in anything ñ someday, maybe even under
the skin.

 Chase calls the chip implant the wave of the future.

 The nightclub director has been implanted along with stars from the
Spanish version of the TV show Big Brother.

 I know many people who want to be implanted, he said. Actually, almost
everybody has piercings, tattoos or silicone.

 Will the implant only be of use at the Baja?

 The objective of this technology is to bring an ID system to a global
level that will destroy the need to carry ID documents and credit cards,
Chase said.

 During a recent American radio interview, Chase said the CEO of VeriChip,
Dr. Keith Bolton, had told him that the company's goal was to market the
VeriChip as a global implantable identification system.

 With only 900 people implanted worldwide, though, the global mandate isn't
exactly around the corner, and current applications are extremely limited.

 Chase added, The VeriChip that we implant at Baja will not only be for
the Baja, but is also useful for whatever other enterprise that makes use
of this technology.

 He also alluded to plans for FN Herstal, which manufactures Browning and
Smith and Wesson firearms, to develop an implant-firearm system that would
make a firearm functional only to the individual implanted with its
corresponding microchip. A scanner in the gun would be designed to
recognize the owner.

 Chase's mention of the FN Herstal-Verichip partnership came a full week
before it's formal announcement by Applied Digital yesterday.

 Chase believes all gun owners should be required to have a microchip
implanted in their hand to be able to own a gun. While yesterday's
Associated Press story on the prototype is primarily from the angle of
police usage, WND reported two years ago that from the he outset of the
company's acquisition of its Digital Angel implant patent ñ said to be
GPS trackable ñ Applied touted the implant as a potential universal method
of gun control.

Chase also claimed that the VeriChip company had told him that the Italian
government was preparing to implant government workers.

 We are the only company today offering human implantable ID technology,
said Scott R. Silverman, chairman and chief executive officer of Applied
Digital Solutions. We believe the market opportunity for this technology
is substantial, and high-profile successes such as in Spain will serve as
catalysts for broader adoption.

 Since 1999, the Applied Digital Solutions has boasted that it also has a

Re: voting

2004-04-21 Thread Ed Gerck


David Jablon wrote:

 ... *absolute* voter privacy
 seems like an unobtainable goal, and it should not be used to trump
 other important goals, like accountability.

But it IS assured today by paper ballots. Nothing less should be
accepted in electronic systems, otherwise new, easy and silent
fraud modes become possible. Coercion and vote selling are just
the most obvious.

Ed Gerck