Category Archives: History

RSA Conference 2018: Fun Telco History in SF

Welcome to SF everyone! As the RSA Conference week begins, which really is a cluster of hundreds of security conferences running simultaneously for over 40,000 people converging from around the world, I sometimes get asked for local curiosities.

As a historian I feel the pull towards the past, and this year is no exception. Here are three fine examples from hundreds of interesting security landmarks in SF.

Chinese Telephone Exchange

During a period of rampant xenophobia in America, as European immigrants were committing acts of mass murder (e.g. Deep Creek, Rock Springs) against Asian immigrants, a Chinese switchboard in 1887 came to life in SF (just before the Scott Act). By 1901 it moved into a 3-tier building at 743 Washington Street. Here’s a little context for how and why the Chinese Telephone Exchange was separated from other telephone services:

Today when you visit Chinatown in SF you may notice free tea tastings are all around. This is a distant reminder of life 100 years ago, even for visitors to the Chinese Telephone Exchange, as a San Francisco Examiner report describes in 1901:

Tea and tobacco are always served to visitors, a compliment of hospitality which no Chinese business transaction is complete

At it’s peak of operation about 40 women memorized the names and switching algorithms for 1,500 lines in five dialects of Chinese, as well as English of course. Rather than use numbers, callers would ask to be connected to a person by name.

The service switched over 13,000 connections per day until it closed in 1949. Initially only men were hired, although after the 1906 earthquake only women were. Any guesses as to why? An Examiner reporter in 1901 again gives context, explaining that men used anti-competitive practices to make women too expensive to hire:

The Chinese telephone company was to put in girl operators when the exchange was refitted, and doubtless it will be done eventually. The company prefers women operators for many reasons, chiefly on account of good temper.

But when the company found that girls would be unobtainable unless they were purchased outright, and that it would be necessary to keep a platoon of armed men to guard them, to say nothing of an official chaperon to look after the proprieties, the idea of girl operators was abandoned.

“They come too high,” remarks the facetious general manager, “but in the next century we’ll be able to afford them, for girls will be cheaper then.”

Pacific Telephone Building

One of the first really tall developments in SF, which towered above the skyline (so tall it was used to fly weather warning flags and lights) for the next 40 years, were the Pacific Telephone offices. At 140 Montgomery Street, PacTel poured $4 million into their flagship office building for 2,000 women to handle the explosive growth of telephone switching services (a far cry from the 40 mentioned above at 743 Washington Street).

By 1928, the year after 140 New Montgomery was completed, the San Francisco Examiner declared “with clay from a hole in the ground in Lincoln, California, the modern city of San Francisco has come.”

It was modeled after a Gottlieb Eliel Saarinen design that lost a Chicago competition, and came to life because of the infamous local architect Timothy Pflueger. Pflueger never went to college yet left us a number of iconic buildings such as Olympic Club, Castro Theater, Alhambra Theater, and perhaps most notably for locals, a series of beautiful cocktail lounges created in the prohibition years.

AT&T Wiretap

Fast-forward to today and there are several windowless tall buildings scattered about the city, filled with automated switched connecting the city’s copper and fiber. One of particular note is 611 Folsom Street, near the latest boom in startups.

Unlike the many years of American history where telco staff would regularly moonlight by working for the police, this building gained attention for a retired member of staff who disclosed his surprise and disgust that President Bush had setup surreptitious multi-gigabit taps on telco peering links.

“What the heck is the NSA doing here?” Mark Klein, a former AT&T technician, said he asked himself.

A year or so later, he stumbled upon documents that, he said, nearly caused him to fall out of his chair. The documents, he said, show that the NSA gained access to massive amounts of e-mail and search and other Internet records of more than a dozen global and regional telecommunications providers. AT&T allowed the agency to hook into its network at a facility in San Francisco and, according to Klein, many of the other telecom companies probably knew nothing about it.

[…]

The job entailed building a “secret room” in an AT&T office 10 blocks away, he said. By coincidence, in October 2003, Klein was transferred to that office and assigned to the Internet room. He asked a technician there about the secret room on the 6th floor, and the technician told him it was connected to the Internet room a floor above. The technician, who was about to retire, handed him some wiring diagrams.

“That was my ‘aha!’ moment,” Klein said. “They’re sending the entire Internet to the secret room.”

[…]

Klein was last in Washington in 1969, to take part in an antiwar protest. Now, he said with a chuckle, he’s here in a gray suit as a lobbyist.

In some sense we’ve come a long way since 1887, tempting us to look at how different things are from technological change, and yet in other ways things haven’t moved very far at all.

US discusses authorizing cyber attacks outside “war zone”

In a nutshell, traditional definitions of war linked to kinetic action and physical space are being framed as overly restrictive given a desire by some to engage in offensive attacks online. The head of NSA is asking whether reducing that link and authorizing cyber attack within a new definition of “war” would affect the “comfort” of those holding responsibility.

“[On offense] the area where I think we still need to get a little more speed and agility — and as Mr. Rapuano indicated it is an area that is currently under review right now — what is the level of comfort in applying those capabilities outside designated areas of hostility,” Rogers asked out loud.

“I don’t believe anyone should grant Cyber Command or Adm. Rogers a blank ticket to do whatever you want, that is not appropriate. The part I am trying to figure out is what is the appropriate balance to ensure the broader set of stakeholders have a voice.”

Rapuano also referenced challenges associated with defining “war” in the context of cyber, which can be borderless due to the interconnected nature of the internet.

“In a domain that is so novel in many respects, and for which we do not have the empirical data and experience associated with military operations per say particularly outside areas of conflict, there are some relatively ambiguous areas around ‘well what constitutes traditional military activities,'” said Rapuano. “This is something that we are looking at within the administration and we’ve had a number of discussions with members and your staffs; so that’s an area we’re looking at to understand the trades and implications of changing the current definition.”

While I enjoy people characterizing the cyber domain as novel and border-less, let’s not kid ourselves too much. The Internet has far more borders and controls established, let alone a capability to deploy more at speed, given they are primarily software based. I can deploy over 40,000 new domains with high walls in 24 hours and there’s simply no way to leverage borders as effectively in a physical world.

Even more to the point I can distribute keys to access in such a way that it spans authorities and bureaucratically slows any attempts to break in, thus raising a far stronger multi-jurisdictional border to entry than any physical crossing.

We do ourselves no favors pretending technology is always weaker, disallowing for the prospect of a shift to stronger boundaries of less cost, and forgetting that Internet engineering is not so much truly novel as a revision of prior attempts in history (e.g. evolution of transit systems).

My recent talk at AppSecCali for example points out how barbed wire combined with repeating rifles established borders faster and more effectively than the far more “physical” barriers that came before. Now imagine someone in the 1800s calling a giant field with barbed wire border-less because it was harder for them to see in the same context as a river or mountain…

Holding Facebook Executives Responsible for Crimes

Interesting write-up on Vox about the political science of Facebook, and how it has been designed to avoid governance and accountability:

…Zuckerberg claims that precisely because he’s not responsible to shareholders, he is able instead to answer his higher responsibility to “the community.”

And he’s very clear, as he says in interview after interview and hearing after hearing, that he takes this responsibility very seriously and is very sorry for having violated it. Just as he’s been sorry ever since he was a first-year college student. But he’s never actually been held responsible.

I touched on this in my RSA presentation about driverless cars several years ago. My take was the Facebook management is a regression of many centuries (pre-Magna Carta). Their primitive risk control concepts, and executive team opposition to modern governance, puts us all on a path of global catastrophe from automation systems, akin to the Cuban Missile Crisis.

I called it “Dar-Win or Lose: The Anthropology of Security Evolution

It is not one of my most watched videos, that’s for certain.

It seems like talks over the years where I frame code as poetry, with AI security failures like an ugly performance, I garner far more attention. If the language all programmers know best is profanity, who will teach their machines manners?

Meanwhile, my references to human behavior science to describe machine learning security, such as this one about anthropology, fly below radar (pun intended).

Supply Chain Accountability: Will There Be a Cyber Toyota War?

Back in 2015 there was some serious consideration of why Toyota were so often used by terrorist groups that the US considered their enemy. Here’s some manufacturers-gonna’-manufacture rationalization:

All of this is to show that any sort of dark alliance between Toyota and the Islamic State is completely specious. The Toyota happens to be the vehicle with the greatest utility; the color of the pickup truck is driven by Asian tastes and the fact that desert heat dictates that white cars are simply more comfortable than black ones; and that Toyota trucks are driven by ISIS is dictated more by the sheer numbers produced and a reputation for quality than some nefarious plot by a well-respected Japanese automaker to supply a terroristic organization.

Simply put: It’s practically guaranteed that any paramilitary force in the Middle East will standardize on white Toyota pickup trucks.

It’s not an unreasonable argument to make (although dark colors and other brands do happen, like the Ford Mark-1).

My main quibble with that article about Toyota is it says nothing about Chad. If you’re going to talk about war trucks, you have to at least make mention of the US role with Toyota pickups sent into battle January 2, 1987:

…no one would have ever guessed that the Toyota pickup truck would come to play an important role in warfare history. This is the little-known story of how an army comprising 400 Toyota pickups outgunned, outsmarted, and outmaneuvered a superior force equipped with tanks and aircraft.

[…]

In the brutal engagement with 1,200 Libyan soldiers and 400 members of the Democratic Revolutionary Council militia, the Chadian army and its Toyota pickups made mincemeat of the Libyan stronghold in Fada. At the end of the day, the Libyan armored brigade in Fada had lost 784 soldiers, 92 T-55 battle tanks, and 33 BMP-1 infantry fighting vehicles.

Chadian losses, on the other hand, were minimal: 18 soldiers and 3 Toyota pickup trucks. January 3 and 4 saw the Libyan Air Force try to annihilate the Chadian soldiers and their trucks, but all bombing attempts failed thanks to the outstanding mobility of the Toyota Hilux.

Ok so let’s be frank. It is preposterous to say no one would have ever guessed superior technology would come to play an important role in warfare history. That is literally what happens in every major conflict. Warriors don’t ignore advantages. So there’s a very good argument against that perspective up top, which is that Toyota have for many decades been supplying exactly the technology desired in warfare, and watching the global purchases turn into military purposes.

“Don’t worry about morality or transport my tyrannical friend Habre, we’re flying Toyotas in tonight on a C-130 so you can commit crimes against humanity”.

Whether Toyota can or should stop product flow somewhere along the route is another story. Consider for example that their pickup trucks get assembled in San Antonio, Texas and Baja California, Mexico. Hyundai converted into VBIED were said to have been the result of a local manufacturing plant simply overrun by military forces. The difficulty controlling Toyota’s supply chain is further demonstrated by American companies who lately have been boasting of re-directing Toyota machines straight into warfare:

Battelle, an applied sciences and technology company based in Columbus, Ohio has put out a video explaining how it turns ordinary vehicles into extraordinary ones. According to the company, it’s been creating what it calls “non-standard commercial vehicles” since 2004. Battelle sources Toyota HiLux pickup trucks and Land Cruiser sport utility vehicles, as well as Ford Ranger pickups as a baseline to create their “non-standard” vehicles.

Non-standard sounds far better than dark alliance or nefarious plot, I have to admit.

Ultimately, though, it comes backs to Toyota being on top of its total supply chain and helping investigate use cases of their supply that violates law or its values.

On the one hand releasing product into the wild (e.g. right to repair) creates freedom from corporate control, on the other hand corporations have duty to reduce harms that result from their creations.

Balance between those two ends is best, as history tells us it’s never going to be perfect on either end of the spectrum.

Shred the gnar, dude.

See also: “[Recipient of President Reagan’s product shipments] sentenced to life for war crimes

“As a country committed to the respect for human rights and the pursuit of justice, this is also an opportunity for the United States to reflect on, and learn from, our own connection with past events in Chad,” [Secretary of State Kerry] said, apparently referring to U.S. support for Habre in the 1980s to help assuage the influence of Libya’s Moammar Gadhafi.