Category Archives: Security

Social Media Protocol for Evidence of War Crimes

Berkeley Law announced the first global protocol has been set to aid in using social media for war crime investigations.

Launched in 2016, the center’s Investigations Lab is the first university-based open source investigations unit to discover and verify human rights violations and potential war crimes — with over 75 students who collectively speak 30 languages contributing verified information to international NGOs, news organizations, and legal partners. As the lab’s prominence and role helping human rights lawyers collect and analyze information from social media grew, more questions flowed in from organizations worldwide.

“We couldn’t answer most of them, including specifics about how user-generated content should be collected and stored to ensure its utility in future legal proceedings,” [HRC Executive Director Alexa] Koenig says. “We realized we weren’t alone in struggling to make sense of this relatively new field of practice and that we needed to meet the moment.”

Nazi Enigma Machine Discovered on Seabed

Recently I wrote about an Enigma encryption machine that showed up in a pigsty. The argument back then surely was nobody would find it.

Now we can add a new twist to the list of places thought safe for disposal: an Enigma was found in the Baltic sea.

“A colleague swam up and said: there’s a net there with an old typewriter in it,” Florian Huber, the lead diver, told the DPA news agency.

The team quickly realised they had stumbled across an historic artefact and alerted the authorities.

Dr Ulf Ickerodt, the head of the state archaeological office in Schleswig-Holstein, said the machine would be restored by experts at the state’s archaeology museum.

The delicate process, including a thorough desalination process after seven decades in the Baltic seabed, “will take about a year”, he said.

After that, the machine will go on display at the museum.

Dr Jann Witt, a historian from the German Naval Association, told DPA he believed the machine, which has three rotors, was thrown overboard from a German warship in the final days of the war.

As an aside, in WWI the Germans tried to throw their codebook overboard and it was almost immediately recovered.

One of her four copies of the Signalbuch der Kasierlichen Marine (SKM), the German navy codebook, was burnt and two thrown overboard. However, the Russians recovered the latter two from the sea and the fourth from the captain’s safe.

One would think they’d know better by WWII, although to be fair the Enigma sank and a codebook floated.

Actually, as another aside, when the Germans in WWI put their secrets in something that would sink it also was recovered.

The British obtained the third German naval codebook, the Verkehrsbuch (VB), when a trawler caught a lead-lined chest on 30 November. It had been thrown overboard by a German destroyer sunk on 17 October.

And as a general reminder, it was the Polish mathematicians who intercepted and systematically cracked the Nazi encryption machines before WWII started, not the British.

The Polish work was disbelieved by the British until Germany invaded Poland and all the dynamics changed. Details of cracking the machines had to be necessarily dumped by the fleeing Polish (via France) onto the ungrateful and arrogant British intelligence operations.

Germany’s Anti-Semitic Phonetic Alphabet

Interesting development in Germany to restore phonetics that were erased by the Nazis

Before the Nazi dictatorship some Jewish names were used in the phonetic alphabet – such as “D for David”, “N for Nathan” and “Z for Zacharias”.

But the Nazis replaced these with Dora, North Pole and Zeppelin, and their use has since continued with most Germans unaware of their anti-Semitic origin.

Experts are working on new terms, to be put to the public and adopted in 2022.

Have You Discovered Yet the 414s?

Discover magazine has just published a review of the 1980s phenom known as the 414s (Milwaukee area code, adopted by teenage hackers)

While the 414s’ antics didn’t spark a nuclear conflict, they did ignite a national conversation on computer security…

The youngest of the 414s on the cover of Newsweek, September 5, 1983

They get called pioneers, which I suppose is reasonable when compared to those today who habitually forget the 1980s, although frankly Discover magazine ignores the 1970s pioneers.

Anyway this kind of reporting helps give better context to papers like “The WarGames Scenario:’ Regulating Teenagers and Teenaged Technology (1980-1984)“, which in 2008 made boastful claims like this one:

WarGames (1983),the first mass-consumed,visual representation of the internet,served as both a vehicle and framework for America’s earliest discussion of the internet.

I made a similar case about movies being a vehicle for the discussion of tech risks in my 2011 presentation on Stuxnet (Dr. Stuxlove), although there I referenced movies from 1968.

In other words I still would argue the earliest true discussion of Internet risks was in the 1970s. If you can get into the 414 story, you might be interested to know who came before them.