Tag Archive for: thinks

Air Force Must Change the Way It Thinks to Win New Age of Information Wars – Air Force Magazine

Air Force Must Change the Way It Thinks to Win New Age of Information Wars  Air Force Magazine
“cyber warfare news” – read more

U.S. Commission Explains Why It Thinks Insurance Is Failing Cybersecurity – Insurance Journal

U.S. Commission Explains Why It Thinks Insurance Is Failing Cybersecurity  Insurance Journal
“cyber warfare news” – read more

The Ultimate Bad Take: Bloomberg’s Leonid Bershidsky Thinks A WhatsApp Vulnerability Proves End To End Encryption Is Useless

Bloomberg has really been on a roll lately with getting security stories hellishly wrong. Last fall it was its big story claiming that there was a supply chain hack that resulted in hacked SupermMicro chips being used by Amazon and Apple. That story has been almost entirely debunked, though Bloomberg still has not retracted the original. Then, just a few weeks ago, it flubbed another story, claiming that the presence (years ago) of telnet in some Huawei equipment was a nefarious backdoor, rather than a now obsolete but previously fairly common setup for lots of equipment for remote diagnostics and access.

The latest is an opinion piece, rather than reporting, but it’s still really bad. Following yesterday’s big revelation that a big security vulnerability was discovered in WhatsApp, opinion columnist Leonid Bersidsky declared it as evidence that end-to-end encryption is pointless. This is, to put it mildly, a really, really bad take. The whole article is a confused jumble of mostly nonsense, mixed with stuff that was already widely known and irrelevant:

The discovery that hackers could snoop on WhatsApp should alert users of supposedly secure messaging apps to an uncomfortable truth: “End-to-end encryption” sounds nice — but if anyone can get into your phone’s operating system, they will be able to read your messages without having to decrypt them.

Um. Duh? The whole point of end-to-end encryption is that it protects messages in transit and not at rest. That’s the whole “end-to-end” bit. At the ends it’s decrypted. You can also encrypt content on a device — this is what the FBI is so annoyed about regarding Apple’s iPhone encryption — but to argue that end-to-end encryption is pointless because it doesn’t do what it’s not supposed to do in the first place is crazy.

It gets worse:

“End-to-end encryption” is a marketing device used by companies such as Facebook to lull consumers wary about cyber-surveillance into a false sense of security.

It is true that some people confuse “end-to-end encryption” with perfect security, which it is not. But it is simply wrong (laughably so) to say that it’s merely a “marketing device.” In actuality, end-to-end encryption is a hugely important part of what keeps your data protected when you communicate online. It provides real security for the conditions it’s designed to provide security for — and not other conditions, such as the one the hack takes advantage of.

Bershidsky complaining about on-device malware reading your WhatsApp messages as being evidence that end-to-end encryption is pointless is like arguing that you should never wear seatbelts because they won’t protect you if you drive off a cliff. Seatbelts protect you in lots of common scenarios, but might not protect you in extreme scenarios like driving off a cliff. And end-to-end encryption protects you in lots of messaging scenarios, but won’t protect you if someone can install something directly on your device.

The tug of war between tech firms touting end-to-end encryption as a way to avoid government snooping and state agencies protesting its use is a smokescreen. Government and private hackers are working feverishly on new methods to deploy malware with operating system-wide privileges.

It’s not a “smokescreen.” It’s dealing with one type of attack. It’s bizarre to suggest that end-to-end encryption is useless because there are some advanced ways that people can get around it, ignoring all the other ways that it helps protect most people. End-to-end encryption does much more to protect tons of people, and saying that we can ignore it just because it doesn’t stop all attacks is really dangerous.

Bloomberg should be ashamed to be publishing such dangerous nonsense. It is the equivalent of anti-vax nonsense, telling people not to protect themselves.

Permalink | Comments | Email This Story

Techdirt.

US Intelligence thinks Russia may have microwaved US embassies in Cuba, China

Article intro image

Enlarge / The US flag flies outside the US Embassy on October 14, 2017 in Havana, Cuba. US intelligence agencies now suspect Russia is responsible for what appear to have been directed microwave attacks on US embassy personnel in Havana and in China. (credit: Gary Hershorn /GettyImages)

The effects of microwave radiation on humans have long been the focus of weapons research in the US and elsewhere. At some frequencies, microwaves can be used to cause great discomfort—including a burning sensation—without causing long-term effects. But in others, microwaves can penetrate deeper into the body and cause symptoms that include auditory hallucinations induced directly in the brain. Evidence now suggests that strange symptoms experienced by US embassy staff in Havana and China may have been the result of attacks with a microwave—and Russian agents are now the most likely suspects behind the attacks.

Last March, the Journal of the American Medical Association published details of examinations of 21 of the victims of the mysterious symptoms, finding they had “sustained injury to widespread brain networks without an associated history of head trauma.” Earlier this month, the head of the team that conducted the study told The New York Times that microwaves were the most likely cause of the brain injuries. The Times’ William Broad reported that a number of experts have now connected the symptoms experienced by the victims with the Frey effect, also known as the microwave auditory effect (MAE)—in which microwaves induce the sensation of sounds (or even speech) inside a person’s head.

That effect, first described by American neuroscientist Allan Frey in 1961, has been the focus of repeated research by the Soviet Union, the Russian Federation, and the US. US Navy-funded research in 2003 and 2004 by WaveBand—a company later acquired by Sierra Nevada—looked into the use of MAE as a crowd control weapon called MEDUSA (Mob Excess Deterrent Using Silent Audio):

Read 5 remaining paragraphs | Comments

Biz & IT – Ars Technica