How To Compete With NSA By Hacking a Verizon Network Extender 56
New submitter Anita Hunt (lissnup) writes "This snooping hack-in-a-backpack could become a hot Summer accessory, since Reuters reported that 'researchers at iSec hacked into a Verizon network extender, which anyone can buy online, and turned it into a cell phone tower (video interview) small enough to fit inside a backpack capable of capturing and intercepting all calls, text messages and data sent by mobile devices within range.'"
I have one of these things (Score:2)
Power to the people (Score:4, Insightful)
Re:Power to the people (Score:5, Interesting)
Not a subversion at all. Perhaps you're forgetting that congresspeople are ordinary people, as are judges.
"You wouldn't want us to leak to the press that affair you've been having, would you, Senator? Then I trust you'll do better at ensuring the NSA is not spying on your own citizens."
"You wouldn't want us to leak to the press that you took a bribe from the Monsanto corporation, would you? Then I trust you'll rule that we have standing to sue the federal government over the PRISM program."
And so on. Not saying that two wrongs make a right, but enough rights do make a left.
Re: (Score:2)
I'm fairly certain that anyone taking a bribe from Monsanto isn't going to have that conversation over a cellular telephone.
Re:Power to the people (Score:4, Interesting)
You'd be surprised. I once caught someone embezzling from the company we worked over discussing it via IM with their accomplice, full confession via IM, ON THEIR WORK COMPUTER. Pawned.
After a few years in corporate security it would not shock me in the slightest. People get sloppy.
Even professionals. See the Opsec talk summary here: https://www.blackhat.com/us-13/briefings.html#Cole [blackhat.com]
Min
Re: (Score:2)
Yup just like how no governor of a state would in his right mind talk about selling a senators seat to the highest bidder.
Ask Illinois about that.
Re: (Score:2)
Re: (Score:2)
Actually yes.
if you know of a NSA or Govt operation going on, get an operative to place a unit near them and start intercepting their cellphone traffic so you can spy on the guys spying.
Now imagine making hundreds of these things all placed at specific locations but with a backend system that lets you enable or disable at will. Now you have a cellular snoopnet covering a very wide area.
Encryption? What Encryption? (Score:2)
Why would you need to sync your phone to the station to get it to work, let's just send unencrypted communication all over the place.
Re:Encryption? What Encryption? (Score:5, Interesting)
Why would you need to sync your phone to the station to get it to work, let's just send unencrypted communication all over the place.
We should be careful in just encouraging encrypted communication, because the usual interpretations of this provide no security at all, and were rejected back in the ARPAnet days of the 1960s by the security advisers.
The usual interpretation of "encrypted communication", of course, is the frequent suggestion that "the Internet" itself should do encryption. This is especially suggested by people who've figured out that the average user doesn't stand much of a chance of doing it right, with modern comm software.
But having "the Internet" do the encryption actually means that the encryption is done by your comm supplier, i.e. your ISP or phone company. What this means is that your comm supplier is the one who also does the decryption, so they have complete access to everything. The recent stories about the close ties between government security agencies and the comm companies show that this would be no security at all.
What was decided back in the 1960s, and what anyone with a basic understanding of security will agree with, is that the low-level comm stuff shouldn't be burdened with any security measures. They are simply a waste of cpu time, since they make your messages accessible to the people who run the low-level comm stuff. The low-level stuff should therefore be tasked simply with getting the bits across as fast as possible. To qualify as secure, any encryption must be handled by the two end-points in a conversation.
Note that this doesn't mean that the (human) end users need to be the ones doing the encryption. What it means is that the encryption software must be running on the piece of hardware that they're using, not by anything further away in the connection.
Of course, then you have the next problem, of preventing spy software from being installed on the hardware at either end. But that's a different issue.
The primary understanding is that we should insist that "encrypted communication" be done only end-to-end. Anything else inherently makes your info available to whoever owns the hardware that's running the encryption software. (And it makes the whole comm system run slower, since encryption software does use cpu time, and if it's not in the end systems, it's 100% a waste of that cpu time.)
The major use-level issue is whether we can create encryption software that runs in the users' gadgets, and which the users can actually use correctly, and which won't be compromised by builtin backdoors such as keyloggers that were installed by the comm companies.
Re:Encryption? What Encryption? (Score:4, Insightful)
Actually, there would be quite a bit of security against non-governmental attackers and those working for foreign governments.
And while it is the governmental ones that scare us for having a potential for abuse, it is those others that have done actual damage to millions of computers and hurt millions of people already — through spamming, identity theft, and spying.
I, for one, would've been glad to be rid of those, even if Uncle Sam's fishing expeditions remain a threat.
Re: (Score:2)
It would be no security because noone vampire taps a fiber line. If youre going to intercept info, you do it at the ISP level, no matter who you are.
Re: (Score:2)
Re: (Score:2)
> no one vampire taps a fiber line
sure about that?
Re: (Score:2)
And while it is the governmental ones that scare us for having a potential for abuse, it is those others that have done actual damage to millions of computers and hurt millions of people already — through spamming, identity theft, and spying.
How the hell is encryption going to help with spamming or identity theft?
Re: (Score:2)
Re: Encryption? What Encryption? (Score:2)
What this means is that your comm supplier is the one who also does the decryption, so they have complete access to everything.
Re: (Score:2)
I'm not sure, the "scenario" is sufficiently well-defined in this conversation to make too many conclusions. I was simply responding to an assertion, that, due to an ISP-government collusion, there is no point in ISP-based security. My response was, that there are many other dangers on the Internet — besides government's snooping. And that while government's is a potential threat, certain other threats have already caused m
Re: (Score:2)
I'm not sure, the "scenario" is sufficiently well-defined in this conversation to make too many conclusions. I was simply responding to an assertion, that, due to an ISP-government collusion, there is no point in ISP-based security.
That is enough of a scenario to make certain statements about the security provided though. By definition ISP-based encryption only protects traffic on the wire; it cannot protect the computers at the end points.
Re: (Score:2)
We can argue about could-should-woulda, but my main point remains — snooping by the American government is hardly the only danger to today's Internet-users and reducing the other threats would've been good, even if this one remained...
Re: (Score:2)
How about reliable DNS? That, if it were in place from the beginning, would've prevented an entire family of attacks...
DNS spoofing requires low latency, which effectively requires that the attacker be on the same local network as his target. ISP-level encryption can't protect against that.
We can argue about could-should-woulda, but my main point remains — snooping by the American government is hardly the only danger to today's Internet-users and reducing the other threats would've been good, even if this one remained...
And my point remains that very few threats can be reduced by ISP-level encryption. I'm sure the govt would be campaigning hard for it if it were such a panacea.
Re: (Score:2, Interesting)
Not necessarily. You could just have the initial key exchange built into the initial handshake, e.g. like this:
The SYN packet contains the public key certificate of the client.
The SYN/ACK packet contains the public key certificate of the server, and a hash of the client's certificate signed with the server's private key.
The final ACK packet contains a hash of the certi
Buttinsky (Score:5, Funny)
Re: (Score:3)
Re: (Score:3, Informative)
Re: (Score:2)
Re:Femtocells insecure? (Score:4, Informative)
They actually run Linux.
And:
"Verizon Wireless released a Linux software update in March that prevents its network extenders from being compromised in the manner reported by Ritter and DePerry, according to company spokesman David Samberg."
http://www.voanews.com/content/reu-researchers-hack-verizon-device/1701880.html [voanews.com]
Re: (Score:1)
1. Duh. Of course it runs linux. What else would it run? Linux sure as fuck can be an embedded OS, and it's damn popular. Doesn't mean it's secure. Most (probably all) embedded linux implementations in consumer hardware are insecure. All implementations are insecure if not designed properly. It's not a problem specific to linux.
2. I doubt the patch will keep the devices un-jailbroke for long.
Re: (Score:2)
vxWorks, QNX... any number of much smaller, true real time OSes that are a far better fit for such tasks. Of course, they aren't free and the people who know how to program for them aren't cheap.
Re: (Score:1)
Crappy consumer devices running an embedded OS easy to hack? You don't say! These things are a gold mine. They contain all the certificates and authority to act as a "tower" and are as hackable and available as any consumer device
No phone or smartphone is designed around the idea that the cell network can be "hostile" so they trust these things implicitly. Time to build a backpack rouge cell and go wandering around where "interesting" people hang out.
I'm sure the "interesting" people will have a healthy glow when you're through with them.
Secure Communications (Score:2)
Re: (Score:3)
Redphone (https://whispersystems.org/) does this for free, but unfortunately, it uses data, and only works on Android.
Right, intercept unwitting people's phone calls (Score:2)