Security quotes of the week
[Posted May 17, 2017 by jake]
Within a few hours of mooring up and opening his laptop, Campbell Murray
had taken complete control of a nearby multimillion-dollar superyacht.
He could easily have sailed it – and its super rich owner – off into the
sunset. "We had control of the satellite communications," said Murray, an
IT specialist. "We had control of the telephone system, the Wi-Fi, the
navigation … And we could wipe the data to erase any evidence of what we
had done."
The ease with which ocean-going oligarchs or other billionaires can be
hijacked on the high seas was revealed at a superyacht conference held in a
private members club in central London this week.
—
Rupert
Neate in
The Guardian
This is the fundamental tension at the heart of the Internet, and
information-based technology in general. The unempowered are more efficient
at leveraging new technology, while the powerful have more raw power to
leverage. These two trends lead to a battle between the quick and the
strong: the quick who can make use of new power faster, and the strong who
can make use of that same power more effectively.
This battle is playing out today in many different areas of information
technology. You can see it in the security vs. surveillance battles between
criminals and the FBI, or dissidents and the Chinese government. You can
see it in the battles between content pirates and various media
organizations. You can see it where social-media giants and
Internet-commerce giants battle against new upstarts. You can see it in
politics, where the newer Internet-aware organizations fight with the
older, more established, political organizations. You can even see it in
warfare, where a small cadre of military can keep a country under perpetual
bombardment -- using drones -- with no risk to the attackers.
—
Bruce
Schneier
The radio signals emitted by a commercial Wi-Fi router can act as a kind of
radar, providing images of the transmitter’s environment, according to new
experiments. Two researchers in Germany borrowed techniques from the field
of holography to demonstrate Wi-Fi imaging. They found that the technique
could potentially allow users to peer through walls and could provide
images 10 times per second.
—
Philip Ball in
Physics
So our fourth takeaway is that although the details matter, so do the
economics of security. When something unexpected happens, you should not
just get your head down and look at the code, but look up and observe
people’s agendas. Politicians duck and weave; NHS [UK National Health
Service] managers blame the system
rather than step up to the plate; the NHS as a whole turns every incident
into a plea for more money; the spooks want to avoid responsibility for the
abuse of their stolen cyberweaponz, but still big up the threat and get
more influence for a part of their agency that’s presented as solely
defensive. And we academics? Hey, we just want the students to pay
attention to what we’re teaching them.
—
Ross Anderson