Crime View for Google Maps by UK Police

Last summer I mentioned how useful it is to have elevation maps of crime for a neighborhood; it helps residents and visitors easily review safety data to better understand their surroundings.

A site just launched called police.uk is a good alternate view. They use bubble size instead of elevation. You can search crime data for any area on their map.

Here is the area around LSE, also known as WC2A:

Mobiles are compatible and you can enter “current location” to get a sense of police data for where you stand.

It also gives information on a neighborhood team (perhaps bringing back the original idea of a helpful “Bobby”) and how a user can be involved and help the police solve crime.

Will it impact property values? Lead to another study of London’s surveillance camera effectiveness? Change traffic patterns (do you have a low-crime option on your GPS yet)? So many possibilities…

TSA Rules Successfully Challenged: No ID Required, Photos Allowed

The following video from November of 2009 shows the Police and TSA agents continuously tell a passenger to put down his video camera at Albuquerque International Airport. When the passenger asks for clarification the authorities give no explanation but instead surround him and arrest him on the charge of concealing his identity (refusing to give an ID even though he says he has no ID to show them).

The passenger, named Phillip Mocek, commented on Bruce’s blog today that his video was deleted by the authorities. He also was detained and missed his flight but the airline still honored his ticket so he could get home.

I missed my flight. I was arrested around 2:30 p.m. Sunday, then released from jail around 10:00 p.m. Monday.

When I went back to the airport Tuesday to claim my belongings (including my camera, from which all images and video had been deleted; I was later able to recover the video of my arrest) and reschedule my travel partner’s and my travel, I found that the same-day purchase price was something like $500 per person. When I explained that I had missed my flight due to a hold-up at the security checkpoint, the clerk said, “Oh, were you with Gallegos?” (He and I attended a Drug Policy Alliance convention in Albuquerque in representation of Cannabis Defense Coalition, a non-profit activist collective of which we’re part.) I answered affirmatively. The clerk said, “I don’t know what you did yesterday, but you’re my hero. Hold on while I get my manager.” The two returned shortly thereafter, the manager requested my ticket number, she tapped away on her keyboard, and then she printed us two free tickets home to Seattle.

Thanks, SouthWest Airlines ABQ ticket counter staff.

Local prosecutors then tried to convict him on charges (New Mexico v. Phillip Mocek) of concealing his identity, refusing to obey a lawful order, trespassing, and disorderly conduct.

Much more information about the trial (including courtroom photos, a nearly-complete audio archive of the trial, information about donating to my legal defense fund, and more) can be found in the State of New Mexico v. Phillip Mocek FAQ maintained by the Identity Project at http://papersplease.org/wp/mocek

A jury of six has now acquitted him of all charges. The TSA Blog mentions the case and asks for passengers to comply. They seem to miss the entire point of the case, which is that a passenger complied and was not in violation of any law yet missed his flight and was even sent to jail.

VW Beetles Snagged by Safety Rule

A safety test mistake by Volkswagen has forced their dealers to provide old cars to new owners, thus creating a compliance anecdote

…dealers aren’t fixing the VW’s, since there isn’t actually anything to fix. And they aren’t giving affected Beetle owners safer cars that have been crash tested at a higher speed.

Customers will be given cars that were also tested at only 30 miles per hour. The difference: These cars were built before Sept. 1st, when a 30 mph test was OK.

The cars aren’t any different, but they’re “compliant” because the rules were different at the time they were assembled.

Speaking of the letter of regulations, the official release from the NHTSA has a start date but apparently no expiration date. What will owners be given if they show up after all the old models have been sold?

Report Date : January 30, 2011 at 04:00 AM
NHTSA Campaign ID number : 11V031000

Vehicle Make / Model: Model Year(s):
VOLKSWAGEN / NEW BEETLE 2010
VOLKSWAGEN / NEW BEETLE CONVERTIBLE 2010

Manufacturer: VOLKSWAGEN OF AMERICA, INC

Mfr’s Report Date: JAN 21, 2011
NHTSA CAMPAIGN ID Number: 11V031000
N/A
NHTSA Action Number: N/A
Component: SEATS
Potential Number of Units Affected: 27

Summary:
VOLKSWAGEN IS RECALLING CERTAIN MODEL YEAR 2010 NEW BEETLE AND NEW BEETLE CONVERTIBLE MANUFACTURED FROM SEPTEMBER 1, 2010, THROUGH SEPTEMBER 22, 2010, FOR FAILING TO COMPLY WITH THE BARRIER TEST REQUIREMENTS OF FEDERAL MOTOR VEHICLES SAFETY STANDARDS NO. 208, “OCCUPANT CRASH PROTECTION,” THAT WENT INTO EFFECT ON SEPTEMBER 1, 2010.

Consequence:
THE VEHICLES DO NOT MEET WITH REQUIREMENTS THAT WENT INTO EFFECT ON SEPTEMBER 1, 2010, AND THEREFORE MAY NOT OFFER THE PROTECTION ATTENDANT TO THOSE REQUIREMENTS.

Remedy:
DEALERS WILL OFFER TO REPLACE THEIR VEHICLE WITH A COMPARABLE VEHICLE THAT WAS PRODUCED PRIOR TO SEPTEMBER 1, 2010, COMPLIANT WITH FMVSS 208 REQUIREMENTS. THE SAFETY RECALL IS EXPECTED TO BEGIN ON OR BEFORE FEBRUARY 1, 2011. OWNERS MAY CONTACT VOLKSWAGEN AT 1-800-822-8987.

Notes:
OWNERS MAY ALSO CONTACT THE NATIONAL HIGHWAY TRAFFIC SAFETY ADMINISTRATION’S VEHICLE SAFETY HOTLINE AT 1-888-327-4236 (TTY 1-800-424-9153), OR GO TO HTTP://WWW.SAFERCAR.GOV

PCI Council Does Not Ban MD5

The PCI Council seems to suggest in today’s Assessor Update that extensive use of MD5 is a reason not to prohibit its use:

…the PCI DSS and PA-DSS do not explicitly prohibit the use of MD5, acknowledging the prevalence of MD5 as a cryptographic technology in the marketplace. Additionally, it may be possible to mitigate some of the risks associated with MD5 through the implementation of additional cryptographic controls or security measures. For example, the susceptibility of MD5 hashes to rainbow table lookups can potentially be mitigated through the proper use of strong, unique salts.

They then, of course, say it is up to the QSA or PA-QSA to assess the risk with their client.

They could have said they same thing about SSLv2.

Section 4.1 of the PCI DSS, until the end of 2008, was open to interpretation for SSL. However, the Assessor Update Nov08 clarified that use of SSLv2 for protection of sensitive information is prohibited.

…it is imperative that an ASV identify the use of SSL 2.0 to transmit cardholder data as a failure

The difference between the two probably comes down to two factors:

  1. available options
  2. ease of upgrade

SSLv2 was required only by browsers before 1997. Options for SSLv2 therefore have not only been around for a decade, but SSLv3 or later has been the default for applications since at least 2005. Despite possible workarounds, the advocated path was an upgrade.

Upgrading from SSLv2 is a trivial setting on servers. One reason often given by organizations to avoid change is the cost of development but there is none for SSL because a change was required from the start. Clients can automatically negotiate the upgrade. However, there still may be support calls due to error messages or warnings. This has been offset by servers configured to provide instructions or self-help to reduce support requests.

In comparison to SSL, MD5 has many available options (even though less obvious than SSL), so it passes the first criteria. It probably is said to be too difficult/costly to change because it was built into applications without any upgrade path for the hash function. Thus, the Council must really base their decision upon this second issue.

This makes for an interesting dilemma for an Assessor. The PCI Council is stepping away from the risk assessment themselves because they say they are “acknowledging the prevalence” of MD5 rather than any security or safety of the hash function.

I doubt most Assessors would use prevalence alone as a measure, whether or not it is “possible to mitigate some of the risks”. Some of the risks? An Assessor would probably say a more appropriate measure of risk, when asked to approve an increasingly vulnerable control like MD5, is the rise and prevalence of threats.

In 2007 Google was given a simple UI that matched md5 strings to prove a point that collisions were more common than we might have wanted to believe. Attacks up to this time were mostly theoretical.

Cheap and large storage continued to rapidly expand and hold massive rainbow tables for unsalted MD5. Two terabytes for just $100, for example, makes it hard to believe that rainbow tables could be outrun (e.g. expand the range of symbols for a hash) since table sizes simply increase at almost no cost.

In 2008 the theoretical attacks on MD5 became more real. A researcher claimed free MD5 attack software could run at 1.4 billion cycles per second. A race for the fastest MD5 crack engine heated up, using compute speed with simple code to crack hashes using a long salt. Last year saw a number of free attack tools that target salted MD5 and take advantage of ATI and nVidia multi-GPUs.

NVidia 8800gt, % applies to MD5

2 hashes: v0.23 = 302.9M/s, v0.24 = 311.3M/s
500.000 hashes: v0.23 = 295.6M/s, v0.24 = 302.5M/s

NVidia gtx465, % applies to SHA-1

2 hashes: v0.23 = 376.9M/s, v0.24 = 430.3M/s
500.000 hashes: v0.23 = 366.8M/s, v0.24 = 418.3M/s

The author of bcrypt adds some color to the evolution of threats against MD5

It’s important to note that salts are useless for preventing dictionary attacks or brute force attacks. You can use huge salts or many salts or hand-harvested, shade-grown, organic Himalayan pink salt. It doesn’t affect how fast an attacker can try a candidate password, given the hash and the salt from your database.

Salt or no, if you’re using a general-purpose hash function designed for speed you’re well and truly effed.

Thus, while the PCI Council advises Assessors to take a risk-based approach with clients, there in fact seem to be no countermeasures or compensating controls to make MD5 suitable for cardholder data protection. The best path in terms of “implementation of additional cryptographic controls” to meet the intent of PCI compliance is a move to a stronger hash function or to an encryption algorithm (e.g. do not list MD5 as a control that can protect cardholder data).

That is probably why Bruce Schneier put it so succinctly two years ago (December 31, 2008):

I’m not losing a whole lot of sleep because of these attacks. But — come on, people — no one should be using MD5 anymore.

US federal agencies suggested MD5 was not even worth using in 2004.

There are known MD5 collisions and weaknesses, and MD5 is not recognized by FIPS 140-2, Security Requirements for Cryptographic Modules. The NSRL data provides an MD5 to SHA-1 mapping to facilitate the migration away from MD5.

Then they migrated away from SHA-1 last year, because of threats.

[D]ue to advances in technology, NIST plans to phase out of SHA-1 in favor of the larger and stronger hash functions (SHA-224, SHA-256, SHA-384 and SHA-512) by 2010.

Organizations that have not made their hash function easily modified/upgraded will only be in an even more difficult pickle when the Council finds the courage to finally ban MD5, or a specific breach is linked to the hash function. The latest guidance from the PCI Council, however, moves more risk into the hands of the Assessor at the same time it makes it much harder for Assessors to emphasize a prepared fallback position (e.g. SHA-256) for those who claim to be unable to move from MD5.

Prevalence in the marketplace could as easily have given the Council reason to push for change, just like with SSLv2. Instead they seem to call it a reason for pause.

Updated to add: Confusion may come from whether MD5 is allowable within other security processes. A TLS tunnel, for example, can protect MD5 hashes. This is like saying a TLS tunnel can protect ASCII-encoded data, however. Sensitive data (hashed or encoded, etc.) that requires a strong tunnel for its protection is therefore weak on its own; it would be imperative then to identify the use of MD5 to protect cardholder data as a failure.