Category Archives: Security

This Day in History 1944: the 584th Squadron of the 394th Bomb Group

An American “Martin Marauder” in the 584th Squadron of the 394th Bomb Group — the “Bridge Busters” — was shot down over France on this day in 1944 during mission #148.

Captain Harper and his crew were flying in the lead position of the second box of the formation bombing Neuweid, Germany when their B26 received a direct hit from anti aircraft fire, burst into flames and crashed. No parachutes were observed by other crews, but Sgt Howard Mote was later reported as a POW, the rest of the crew were killed.

    Captain Lawrence P. Harper – Zachary Taylor National Cemetery
    1/Lt William Andrews – Zachary Taylor National Cemetery
    1/Lt Paul Stephens – Arlington National Cemetery
    1/Lt James Harrison – American Cemetery in the Netherlands
    2/Lt Kenneth Wolf – Zachary Taylor National Cemetery
    T/Sgt James Kelly,Jr. – Zachary Taylor National Cemetery
    S/Sgt Stuart Ottenheimer (second from right above – born August 7, 1922) – Zachary Taylor National Cemetery (Section E Plot 169-170)
    Sgt Ralph Pagano – Zachary Taylor National Cemetery

394th Bomb Group Insignia

Some interesting B-26 footage can be seen in this collection of propaganda films called Martin Marauder in Action

The B-26 had a very high rate of accidents in takeoff and landing until crews were trained better and (perhaps more importantly) an aspect ratio design was modified on its wings/rudder.

The following United States War Office Official Training Film 1-3301 How to Fly the B-26 Airplane was for pilots who had to fly what unofficially became known as the “Widowmaker”. Note that the lead character says

Life Begins With a Checklist…and it May End if You Don’t Use It

Fuzz and the NeXT Computer

For some reason I have been hearing a lot of reminiscing lately about the NeXT Computer. Perhaps it is the unfortunate passing of Steve Jobs at an early age that has led people to have fond memories of his various projects and companies.

Two things stand out in my mind when I think of NeXT.

First, my college chemistry department had a lab of them but they were rarely used. For those who owned their own Amiga, far more powerful and capable computers, there was no comparison. BeOS (also started by an ex-Apple executive, Jean-Louis Gassee) was a better comparison to the Amiga due to more advanced multi-media that has become the hallmark of Apple. It lost out to NeXT in an acquisition decision by Apple and then seemed to disappear, but I digress.

The donated NeXT Slabs sat in the lab, more aesthetically pleasing than everything else, much like Apple products are today, but that did not make them popular. They were fine as network terminals but the physical looks of a terminal back then did not compensate enough to draw anyone to them.

NeXT Slab

And that’s a good segue to the second thing I remember. The fuzz analysis done by Barton Miller roasted the security of NeXT Computer.

Here’s a slide from his presentation called Fuzz Revisited in 1995, a follow-up to a 1990 fuzzing test, that shows up to 43% of utilities crashed on commercial UNIX.

43% is actually the NeXT. Ouch, now that’s what I call fuzzy memories. The other flavors you see listed in the slide above averaged about half as many security failures.

Search, Social Engineering and the 4th Amendment

LawOfficer.com has an interesting review of United States v. Harrison and when/how social engineering is acceptable to gain entry to private space.

Importantly, the prosecution conceded that just as it would be a violation of the Fourth Amendment for an officer to induce consent by pointing a gun at a suspect, it would also violate the Fourth Amendment if an ATF agent induced consent by falsely claiming that someone had planted a bomb in Harrison’s apartment. Yet, the district court found that this is the precise effect of the agents’ misrepresentation.

The agents’ conduct left Harrison with two options: (1) either deny consent to search and take the risk that a bomb had been planted in the residence, or (2) consent to the search. Consent under these circumstances wasn’t free of impermissible coercion, and Harrison’s consent was therefore involuntary. As such, the court of appeals affirmed the suppression of the firearm and ammunition.

Lying and social engineering tactics have been protected by the courts in the past. Officers may lie about their identity and claim they have more knowledge, evidence or insights than they really do in an investigation as explained in a FLETC law enforcement training brief.

Officers often use deception during the course of their investigations. Hoping to entice a confession from a suspect, an officer may legally, but falsely, tell a suspect that his fingerprints were found at a crime scene, that his criminal acts were recorded by a concealed video camera, or that a co-criminal has confessed and implicated him. An undercover officer, by design, is engaged in a pattern and practice of deception.

This case illustrates that lies go too far when they involve risk of death or injury to a suspect (e.g. bomb threats or pointing a gun). They are unacceptable because high severity threats make consent to a search involuntary, which violates the Fourth Amendment.

The case is also interesting because it is not clear whether the suspect who answered the door was authorized to give consent to the space searched. The story calls it his apartment but the case detail is slightly different.

When Harrison was reluctant, the agents assured him he could give permission to search even though it was his girlfriend’s apartment…

The courts usually support an officer who asks for consent to search from anyone who has control over the property (a key, name on a lease, no one else is present, no one else objects, or is legally authorized). More to the point, with regard to cloud environments, in a co-tenant situation there needs to be evidence of control (e.g. a locked door and a unique key) to prevent the search of shared infrastructure/space becoming a search of individual/private space.

EAST Report 3: ATM Cash Trapping

The European ATM Security Team (EAST) has published their third report of the year. Their data shows the skimming losses continue to shift to areas without chip. They also point to a rise in devices used to block the cash dispenser.

The trend of the majority of skimming related losses occurring outside of EMV liability shift areas continues; from January to September 2011 such losses were reported in 47 countries outside of the Single Euro Payments Area (SEPA) and in 12 countries within SEPA. The USA remains the top location for such losses.

Cash trapping incidents were reported by nine countries and this type of attack is increasing in most of them. This reflects a continuance of the trend reported in EAST’s most recent European ATM Crime Report (covering January to June 2011)

The report also indicates a rise in gas-based explosions. While the new cash trapping attacks are said to be easily defeated by retrofitting or upgrading the ATMs, there was no mention of guidance to defeat explosive attacks.