GPS Spoofing

The old attack vector was just to block GPS signals, but the BBC News says Sat-nav systems are under increasing threat from more sophisticated attacks.

“You can now buy a low-cost simulator and link it to Google Earth, put on a route and it will simulate that route to the timing that you specify,” said Professor Last.

“A GPS receiver overcome by it will behave as if you’re travelling along that route.”

We have relied for too long on open communication. This is yet another case for authentication between devices.

Of course I must say that even with 100% assurance my GPS device is connected to an authentic signal I would still be concerned about bogus directions. Just the other day Google maps tried to send me to a city center when I asked for an airport, and my GPS suggested I turn left in the middle of a bridge. Aside from all that, however, authentication definitely needs to be factored into the future of navigation systems.

School Surveillance Brings Suit

ComputerWorld reports that a Federal judge orders Pa. schools to stop laptop spying

Last week, Michael and Holly Robbins of Penn Valley, Pa., on behalf of their son Blake, sued Lower Merion, accusing it of spying on students and students’ families using the iSight webcams in the MacBook laptops issued to each high school student in the district.

According to the original complaint, Blake Robbins was accused by a Harriton High School assistant principal of “improper behavior in his home” and shown a photograph taken by his laptop as evidence. In an appearance on network television last Saturday, Robbins said he was accused by the assistant principal of selling drugs and taking pills, but he claimed the pictures taken by his computer’s camera showed him eating candy.

I am genuinely surprised an American school official would think there is any justification in this kind of home spying. Are they familiar with the Constitution? This seems to be an example of a government official using technology to enter a child’s bedroom without invitation/warrant, as mentioned by the ACLU legal director in the article. Then again there might be a clue to this mentality in the story regarding Apple’s purge of “objectionable” applications from their store.

“I’m now worried the eco-system is run by puritans and is not fair to all players,” developer Jon Atherton said on its website.

Issues have come up before with regard to webcams, usually related to office environments and instant messenger software. The simple and obvious solution in those situations from a product perspective was for a manufacturer to include a manual shutter, similar to a lens cap. A user can slide the cover down to ensure a webcam view is disabled. The after-market alternative is a piece of paper taped over the lens, or something fancier, but you get the idea. The more complicated answer is to educate the educators on constitutional rights and freedom from unlawful surveillance that are still in effect no matter what the technology.

Cyber ShockWave Day

Today a simulated cyber attack response exercise is being held in Washington D.C. The Bipartisan Policy Center is hosting:

The participants, whose mission is to advise the president and mount a response to the attack, will not know the scenario in advance. They will react to the threat in real time, as intelligence and news reports drive the simulation, shedding light on how the difficult split-second decisions must be made to respond to an unfolding and often unseen threat.

The Bipartisan Policy Center press release is peppered with traditional terms like “unprecedented” and “real-world”, “often unseen threat” and “real dangers”. There is no mention of the Chinese or international collaboration but that has to be one of the main issues on everyone’s mind. I wonder, for example, if anyone bothered to invite international participants. Why? James Fallows in the Atlantic Monthly did a nice job explaining how national security models are facing a transition from typical “bipartisan” efforts to one that is open and collaborative:

While trying to build bridges to the military, McConnell and others recommend that the U.S. work with China on international efforts to secure data networks, comparable to the Chinese role in dealing with the world financial crisis. “You could have the model of the International Civil Aviation Organization,” James Lewis said, “a body that can reduce risks for everyone by imposing common standards. It’s moving from the Wild West to the rule of law.” Why would the Chinese government want to join such an effort? McConnell’s answer was that an ever-richer China will soon have as clear a stake in secure data networks as it did in safe air travel.

An alternative to this kind of closer cooperation could be to improve the quality of education dramatically in the US including teaching computer skills and Mandarin to a high percentage of graduates, as well as the language of every other threat. The British have tried this latter model, which I am told is why the School of Oriental and African Studies (SOAS) came to exist. Perhaps compared to solving the problem of quality education, cooperation on information security seems far simpler.

Fallows warns in his article that America might have a tough time with the concept of “cooperation” given the cultural view of how to deal with “tough-guy, real-world problems”. However, the interconnected nature of Internet risk makes it almost impossible to use a bi-lateral attack/defense paradigm. This has been known since at least the first “Smurf” attacks. Multi-lateral and shared approaches have become the norm in hi-tech response centers but it will take time for established leaders in government to warm up to the idea of greater openness as a strategic advantage in national security.

Cheese Fraud

An article by the Times Online explains a recent crackdown by authorities on cheese fraud in Italy:

[Luca Zaia, the Agriculture Minister] said there was no health risk, adding “It is not a question of food security so much as of respect for the rules of production”. However he had taken “urgent action” by placing the mozzarella consortium under “special administration” for three months while a committee of police and ministry inspectors investigated.

He said he had acted “because the situation was deteriorating. Over the past two years my zero-tolerance policy has led to the discovery of many causes of food fraud. In November, checks in major supermarkets in Italy found that 25 per cent of the cheese sold as buffalo mozzarella was fake because it contained 30 per cent cow milk.”

Great example of how compliance depends on governance. It is a good thing he has no jurisdiction over the US cheese market or almost the entire mozzarella supply would be abruptly halted. I have tried without much success to find a consistent source buffalo mozzarella in America.

This case is notably different from a security risk that is also mentioned in the article.

Two years ago sales of mozzarella fell after buffalo milk was found to be contaminated with high levels of dioxin from rotting piles of uncollected rubbish in the Naples area. Sixty-six buffalo herds were quarantined and over 100 farmers and dairy producers were investigated for alleged “fraud and food poisoning”. In April last year inspectors found that some buffalo in the Caserta area near Naples had been given somatropine, a human growth hormone, although officials said this did not pose a health risk.

Thus compliance also depends to a large degree on consumer awareness and interests. Governance is meant to be a representation of demand, so risk definition becomes one of the first steps to creating rules for compliance. Risk from dioxins, for example, is much easier to quantify and campaign against than the risk from lack of authenticity. Who is harmed when cheese is fake? Many Americans, in fact, are likely to turn a blind eye to imitation — mozzarella made from cow milk in California or cheddar from cows in Wisconsin. Risks related to the authenticity of cheese may be far less valued than appearance and price — cheap imitations (“generics”) thus build a strong following when no one close to home is hurt by the practice. Only when authenticity issues hurt a domestic source or more immediate health issues appear do calls for governance come forward.

…food for thought the next time you take a bite of mozzarella.