Create an Account
username: password:
 
  MemeStreams Logo

Twice Filtered

search

noteworthy
Picture of noteworthy
My Blog
My Profile
My Audience
My Sources
Send Me a Message

sponsored links

noteworthy's topics
Arts
  Literature
   Fiction
   Non-Fiction
  Movies
   Documentary
   Drama
   Film Noir
   Sci-Fi/Fantasy Films
   War
  Music
  TV
   TV Documentary
Business
  Tech Industry
  Telecom Industry
  Management
Games
Health and Wellness
Home and Garden
Miscellaneous
  Humor
  MemeStreams
   Using MemeStreams
Current Events
  War on Terrorism
  Elections
  Israeli/Palestinian
Recreation
  Cars and Trucks
  Travel
   Asian Travel
Local Information
  Food
  SF Bay Area Events
Science
  History
  Math
  Nano Tech
  Physics
  Space
Society
  Economics
  Education
  Futurism
  International Relations
  History
  Politics and Law
   Civil Liberties
    Surveillance
   Intellectual Property
  Media
   Blogging
  Military
  Philosophy
Sports
Technology
  Biotechnology
  Computers
   (Computer Security)
    Cryptography
   Human Computer Interaction
   Knowledge Management
  Military Technology
  High Tech Developments

support us

Get MemeStreams Stuff!


 
Current Topic: Computer Security

VeriSign's conflict of interest creates new threat
Topic: Computer Security 7:15 am EST, Jan 25, 2006

There's a big debate going on the US and Canada about who is going to pay for Internet wiretapping.

It won't be long now until the telcos start trying to pass on the cost of wiretapping to the major content providers. It'll be likened to existing security-related overhead expenses, like "loss prevention" at retail outlets. If Barnes and Noble has to pay for private security guards, why shouldn't Amazon have to do the same?

VeriSign's conflict of interest creates new threat


VeriSign NetDiscovery [Lawful] Intercept Service
Topic: Computer Security 7:02 am EST, Jan 25, 2006

"We have the ability to access virtually any packet data network and by using mediation equipment deployed in our network, VeriSign can provide a secure, reliable, cost-efficient solution that enables carriers with GPRS or CDMA 1x technologies to comply with all lawful intercept requirements without impacting network performance."

When I see VeriSign talk about "lawful" intercept, for some reason I am reminded of a particular scene from The Simpsons episode BABF12, "Pygmoelian":

The Simpsons arrive at the Duff Days site. Homer switches off the beer music, to the kids' relief. As soon as they step out of the car, though, a live band plays exactly the same tune.

Near the entrance, a man is dressed as Surly, one of the Seven Duffs.

        [loudly] Drink Duff! [under breath] Responsibly.
        [loudly] Drink Duff! [under breath] Responsibly.

VeriSign NetDiscovery [Lawful] Intercept Service


Redacting with Confidence: How to Safely Publish Sanitized Reports Converted From Word to PDF
Topic: Computer Security 7:12 pm EST, Jan 24, 2006

There are a number of pitfalls for the person attempting to sanitize a Word document for release. This paper describes the issue, and gives a step-by-step description of how to do it with confidence that inappropriate material will not be released.

Redacting with Confidence: How to Safely Publish Sanitized Reports Converted From Word to PDF


Signaling Vulnerabilities in Wiretapping Systems
Topic: Computer Security 9:55 am EST, Nov 30, 2005

In a research paper appearing in the November/December 2005 issue of IEEE Security and Privacy, we analyzed publicly available information and materials to evaluate the reliability of the telephone wiretapping technologies used by US law enforcement agencies. The analysis found vulnerabilities in widely fielded interception technologies that are used for both "pen register" and "full audio" (Title III / FISA) taps. The vulnerabilities allow a party to a wiretapped call to disable content recording and call monitoring and to manipulate the logs of dialed digits and call activity.

In the most serious countermeasures we discovered, a wiretap subject superimposes a continuous low-amplitude "C-tone" audio signal over normal call audio on the monitored line. The tone is misinterpreted by the wiretap system as an "on-hook" signal, which mutes monitored call audio and suspends audio recording. Most loop extender systems, as well as at least some CALEA systems, appear to be vulnerable to this countermeasure.

John Markoff has a story on this today.

Signaling Vulnerabilities in Wiretapping Systems


Sony to Suspend Making Antipiracy CDs
Topic: Computer Security 1:33 pm EST, Nov 12, 2005

Stewart Baker, assistant secretary for policy at DHS, described industry efforts to install hidden files on consumers' computers.

"It's very important to remember that it's your intellectual property, it's not your computer," Baker said at a trade conference on piracy. "And in the pursuit of protection of intellectual property, it's important not to defeat or undermine the security measures that people need to adopt in these days."

Sony to Suspend Making Antipiracy CDs


Optical and Digital Techniques for Information Security
Topic: Computer Security 8:46 am EDT, Aug  8, 2005

This book comprehensively surveys the results of research investigation and technologies used to secure, verify, recognize, track, and authenticate objects and information from theft, counterfeiting, and manipulation by unauthorized persons and agencies. This book will draw on the diverse expertise in optical sciences and engineering, digital image processing, imaging systems, information processing, computer based information systems, sensors, detectors, and biometrics to report innovative technologies applied to information security issues. Optical and Digital Techniques for Information Security is the first book in a series focusing on Advanced Sciences and Technologies for Security Applications. The Advanced Sciences and Technologies for Security Applications series focuses on research monographs in the areas of: -Recognition and identification (including optical imaging, biometrics, authentication, verification, and smart surveillance systems) -Biological and chemical threat detection (including biosensors, aerosols, materials detection and forensics) -Secure information systems (including encryption, and optical and photonic systems).

Optical and Digital Techniques for Information Security


RE: Wired News: Cisco Security Hole a Whopper
Topic: Computer Security 7:56 am EDT, Jul 28, 2005

Rattle wrote:
Wired just posted the best article so far.. Here are some of the highlights:

The Wired News article seems hastily reported and not fact-checked.

Zetter refers to "Internet Security Solutions". A single visit to www.iss.net would have indicated otherwise. This is basic.

Zetter also refers to IOS as "infrastructure operating system". A visit to cisco.com would show that IOS actually stands for Internetworking Operating System.

The "subtle" attacks postulated in the article, such as "reading email" on a router, would dramatically reduce the forwarding capacity of the router. Besides, a router is not responsible for end-to-end data integrity and confidentiality. If your email traffic is properly protected by an application-layer or network-layer tunnel, none of these "subtle" attacks are applicable.

Of course, the present fact of the matter is that a lot of Internet email passes through the core in the clear. But this situation is not Cisco's fault, and their direct responsibility for an implementation flaw in IOS is distorted when it is conflated with the collective inaction of the majority who neglect to implement end-to-end security for mission critical applications.

The SecurityFocus article has less of this hype, but the editor still missed an error at the end of the article, where "Rather then" should be "Rather than". The SearchSecurity article makes the same error. It must be contagious.

I don't know where ComputerWire got the idea that IOS is "supposedly unhackable." Several of their quotes are missing words. (The CRN article is more specific; it reports that IOS was "perceived as impervious to remote execution of arbitrary code from stack and heap overflows." The ComputerWire editors must have decided that description was too complicated for their readers.)

There are also discrepancies in the reporting regarding the size of the presentation. One report calls it a 10-page presentation while another says it was 30 pages long. Perhaps it was 30 slides, printed in 3-up handout mode with room for notes?

RE: Wired News: Cisco Security Hole a Whopper


Hacker Hunters
Topic: Computer Security 6:54 am EDT, Jun  5, 2005

"The wave of the future is getting inside these groups, developing intelligence, and taking them down."

Today's cybercrooks are becoming ever more tightly organized. Like the Mafia, hacker groups have virtual godfathers to map strategy, capos to issue orders, and soldiers to do the dirty work. Their omertà, or vow of silence, is made easier by the anonymity of the Web. And like legit businesses, they're going global. The ShadowCrew allegedly had 4,000 members operating worldwide -- including Americans, Brazilians, Britons, Russians, and Spaniards. "Organized crime has realized what it can do on the street, it can do in cyberspace," says Peter G. Allor, a former Green Beret who heads the intelligence team at Internet Security Systems Inc. in Atlanta.

The bust yielded of ShadowCrew a treasure trove of evidence. "We will be arresting people for months and months and months," says the Secret Service.

Hacker Hunters


IEEE Transactions on Information Forensics and Security
Topic: Computer Security 8:25 pm EDT, Jun  1, 2005

This is a call for papers to be published in a new IEEE Transactions series.

I think there are at least a few MemeStreams regulars who could get published here ...

The aim of the IEEE Transactions on Information Forensics and Security is to provide a unified locus for archival research on the fundamental contributions and the mathematics behind information forensics, information security, surveillance, and systems applications that incorporate these features.

Technical topics within the scope include:
Digital rights management technology, including watermarking and
fingerprinting of images, video, and audio;
Steganography and steganalysis;
Tampering, modification of, and attacks on, original information;
Signal processing for biometrics;
Signal processing for forensic analysis;
Signal modeling and channel modeling for secure content delivery;
Quality metrics and benchmarking;
Technical analysis of system vulnerabilities;
Content identification and secure content delivery;
Information embedding and media annotation;
The interplay of technology with legal and ethical issues.

IEEE Transactions on Information Forensics and Security


Open a Kensington Laptop Lock with a roll of toilet paper.... [WMV]
Topic: Computer Security 11:14 pm EDT, May  9, 2005

This is funny.

Open a Kensington Laptop Lock with a roll of toilet paper.... [WMV]


(Last) Newer << 1 - 2 - 3 - 4 - 5 - 6 - 7 >> Older (First)
 
 
Powered By Industrial Memetics
RSS2.0