Blackberry PIN security

One popular feature of Research In Motion’s BlackBerry communication devices is PIN messaging – a communication protocol involving fewer steps and servers than email.

Interestingly, the Communication Security Establishment (Canada’s codebreakers) has guidance online about the security of BlackBerries in general and PIN messages specifically. They draw particular attention to the very limited protection generated by the encryption system used for PIN messages:

PIN-to-PIN is not suitable for exchanging sensitive messages. Although PIN-to-PIN messages are encrypted using Triple-DES, the key used is a global cryptographic “key” that is common to every BlackBerry device all over the world. This means any BlackBerry device can potentially decrypt all PIN-to-PIN messages sent by any other BlackBerry device, if the messages can be intercepted and the destination PIN spoofed. Further, unfriendly third parties who know the key could potentially use it to decrypt messages captured over the air. Note that the “BlackBerry Solution Security Technical Overview” document published by RIM specifically advises users to “consider PIN messages as scrambled, not encrypted”.

The document identifies other vulnerabilities, such as the potential bypassing of spam filtering and the risk that a BlackBerry that has been passed along to a new user will receive a sensitive PIN not intended for them.

The document goes on to say: “Due to the aforementioned security issues, GC departments should refrain from using PIN-to-PIN messaging and the disabling of his functionality”.

While that is probably good advice, I doubt many departments will be sacrificing this popular feature. That is probably welcome news for anyone who is intercepting these messages. As mentioned before, British Embassies and High Commissions have been conducting signals intelligence interception against friendly countries since the second world war. No doubt, other embassies in Ottawa are actively monitoring traffic between BlackBerries.

The same may well be true for more sophisticated private companies, hoping to get some inside information on upcoming policies and regulations.

Intelligence claims

There have been a few passages from Richard Aldrich’s GCHQ: The Uncensored Story Of Britain’s Most Secret Intelligence Agency that have struck me as especially worthy of discussion, so far.

Spying as a stabilizer

Discussing the 1960s, Aldrich argues that improved intelligence from signals intelligence (SIGINT) and satellite sources “made the international system more stable” and “contributed to a collective calming of nerves”:

Indeed, during the 1960s the penetration of the NATO registries by Eastern Bloc spies was so complete that the Warsaw Pact had no choice but to conclude that the intentions of Western countries were genuinely defensive and benign.

Previously, we discussed some of the major problems with spies. In this book, Aldrich brings up a partial counterpoint. Countries tend to consider secretly intercepted communications to be a highly credible source of information. If a country tells you it is planning to do Thing X for Reason Y, there are all sorts of reasons why they could be deceiving you. If you secretly overhear the same plan within their internal discussions, you have more reason to think that it will go forward and that the reasons behind it are genuine.

Revolutionaries and symbolic violence

Discussing the actions of the Turkish People’s Liberation Army (TPLA) and Turkish People’s Liberation Front (TPLF) during the 1970s, Aldrich says:

Both consisted of middle-class intellectuals who regarded themselves as a revolutionary vanguard. Like many revolutionary leaders, they suffered from a ‘Che Guevara complex’, believing that symbolic acts of violence could trigger a wider social revolution. Che Guevara had come to grief in 1967 during a futile attempt to stir the revolutionary consciousness of Bolivia, and was captured and shot by a police team, advised by the CIA. Turkey’s would-be revolutionaries would soon suffer a similar fate.

The TPLA and TPLF figure into Aldrich’s story because of their targeting of intelligence facilities: initially accidentally, and later intentionally.

How far ahead are the spooks?

The codebreaking success of the Allies against the Germans and Japanese during the second world war was kept secret until the 1970s. Most of the documents about codebreaking being declassified now extend up to the 1970s. Because of such secrecy, it is impossible to know what technologies and capabilities organizations like America’s NSA, Britain’s CGHQ, and Canada’s CSE have today.

Describing the early 1970s, Aldrich explains how the microwave relays used by the telephone system beam signals into space accidentally, because of the curvature of the Earth. Forty years ago, the United States was already using satellites to intercept that spillover. Furthermore, they were already using computers to scan for keywords in phone, fax, and telex messages.

As early as 1969, the British and Americans had a system in place somewhat akin to what Google Alerts do today: tell it what keywords you are interested in, and it can pull related content out from the torrent of daily traffic. You can’t help but wonder what they are able to do now: whether the increased volume of communication has overwhelmed their capability to do such filtering effectively, or whether advances in secret techniques and technologies mean that they have even more potent methods for intercepting and processing the world’s commercial, diplomatic, and interpersonal communication.

Penetrating the secrecy

Aldrich also describes the investigative journalism of people like Duncan Campbell and James Bamford – people who used open sources to reveal the true function of GCHQ for the first time. Aldrich claims that their actions “confirmed a fundamental truth: that there are no secrets, only lazy researchers”.

Some recent journalistic undertakings – such as the excellent ‘Top Secret America’ – do lend credence to that view.

Netflix streaming in Canada

I used to be a subscriber to Zip.ca, a DVD by mail service. I decided to give it up for a trio of reasons:

  • Since I couldn’t really choose the order in which I received films, I often got ones I wasn’t in the mood to see
  • The service was fairly expensive
  • I received a number of scratched and unplayable discs

Now, I am trying the new video streaming service offered in Canada by Netflix.

By far the biggest problem is selection. There are some fairly obscure television shows like Blackadder and League of Gentlemen, but no Simpsons, Seinfeld, Arrested Development, Sopranos, 24, Mythbusters, etc. The same goes for movies. I start searching for high quality films I have been meaning to see, and rarely find what I am looking for. With the Netflix streaming service, you watch what is available rather than what you want. Some of what is available is certainly decent – such as the first three seasons of Mad Men – but it definitely doesn’t have the same scope of options as the iTunes store or Zip.ca.

That said, Netflix streaming is quite cheap. It only costs $8 a month, which probably explains how popular it has become:

According to Sandvine, a network management company that studies Internet traffic patterns, 10 percent of Canadian Internet users visited Netflix.com in the week after the service launched. And they weren’t just visiting—they were signing up and watching a lot of movies. Netflix videos quickly came to dominate broadband lines across Canada, with Netflix subscribers’ bandwidth usage doubling that of YouTube users. At peak hours (around 9 p.m.) the service accounted for more than 90 percent of the traffic on one Canadian broadband network.

My sense is that Netflix streaming is really competing with free streaming sites. Against them, it has a number of advantages. The interface is fairly good, and it is unlikely to be laden with malware. There aren’t heaps of broken links to be dealt with. Also, there are no daily time limits for use.

Given how much bandwidth Netflix is eating up, it seems likely that there will be an outcry from internet service providers (including those rendered more powerful by a recent CRTC decision). Netflix itself will likely face pressure to pay ISPs, while users are likely to find themselves hit with extra charges for bandwidth usage.

Sorting v. teaching in universities

Young people around the world spend tens of thousands of dollars and years of their lives getting university degrees. Partly, that is justified by the unique experience of being a university student. At the same time, it is argued that university confers lifelong benefits. I can think of three major ways in which that could happen:

  • Students learn about the things they are actually studying, whether that’s ancient Greek drama or engineering
  • Students learn skills in the process of studying, such as time management and interpersonal skills
  • Universities sort people: separating those who can handle the kind of competition they foster from those who cannot

While I think universities push the first argument hardest, it is the second and third that are most plausible. Most people only have a small amount of time to devote to sizing up a stranger. That is especially true of anybody who might hire you. What a university degree conveys in a small amount of space is that you have the skills required to get through that process. Rather than actually invest the time and effort to evaluate your capabilities, the person evaluating you can accept this information ‘as read’.

Perhaps one practical message to derive from this hypothesizing is that there are two sorts of university degrees that can be pursued. There is the minority subset where the actual information you learn is the most valuable thing. This includes fields like engineering, medicine, and accounting. Then there are those in which ‘soft skills’ and the sorting process are the principal value, at least from the perspective of employers.

Free Sophos for Mac

Despite what some people seem to think, Macs are vulnerable to malware. Apple even built limited antivirus capabilities into Snow Leopard.

At the moment, Sophos Antivirus is giving away their Apple version. It could be useful for avoiding the (relatively few) bits of malicious Mac software. Also, for avoiding passing along infected attachments to friends.

Spying between friends

Richard Alrich’s GCHQ: The Uncensored Story of Britain’s Most Secret Intelligence Agency describes a number of instances of longstanding allies conducting espionage against one another, including signals intelligence (SIGINT). Aldrich describes how the ‘Echelon’ system run by British and U.S. intelligence was used to “read the traffic of their minor allies, including France and West Germany”. This system is now estimated to process five billion intercepts per day, probably filtering them for suspicious words and phrases. Aldrich talks about how, after the second world war, Britain’s codebreakers were “doing extensive work on Britain’s European allies, regarding them as either insecure or untrustworthy, or both”.

Of course, more awkward allies have been a higher priority for codebreaking and other forms of covert activity. During the interwar period, Russian ciphers were the the “core business” of Britain’s codebreakers, and apparently work on them didn’t stop despite their subsequent alliance. The Soviets were also spying on the allies, though with more of an emphasis on human intelligence (HUMINT). For example, John Cairncross worked at GCHQ’s predecessor – Bletchley Park – and warned the KGB of the impending German armoured offensive at Kursk, one of the decisive battles of the war. He also saw some of Britain’s early thinking on atomic weapons while working at the Cabinet Office, while his fellow Russian spy Klaus Fuchs was virtually able to provide the blueprints of the devices built at Los Alamos. The Soviet Union achieved other notable HUMINT successes throughout the Cold War, such as the John Walker espionage within the navy. Surely, there are other examples that are still secret.

Allied SIGINT against Soviet targets continued after 1945, as GCHQ and others started to intercept messages between Moscow and the capitals of new client states.

The most subtle reference to inter-allied spying comes from a passage on the Diplomatic Wireless Service, developed in 1944 and 1945. Aldrich describes how the DWS was primarily a system of military SIGINT collection stations, but that it also “doubled as a secret monitoring service working from within British Embassies and High Commissions”. High Commissions are only located in Commonwealth countries, on whom Britain is presumably still spying. They seem to be returning the favour, as demonstrated by another anecdote from the book, in which Prime Minister Tony Blair discovered his hotel room in India to be laced with listening devices that would have had to be drilled out of the walls to disable.

Adios BlogLines

For years now, I have been using BlogLines to keep track of hundreds of RSS feeds: posts on tech and climate blogs, comments on my own sites, updates on the sites of friends who update very rarely, etc.

Unfortunately, BlogLines is being shut down on Monday. This is one of the few times when a genuinely valuable internet service has faded away. There are plenty I have outgrown (Hotmail comes to mind) or that were never very useful (Google Wave). Napster was a tragic loss, and now this.

So, thanks a bunch BlogLines. I will be shipping all my subscriptions over to the clunkier interface of Google Reader.

The right way to do electronic voting

On Monday, Ottawa held its municipal elections. The physical process of voting achieved the major benefit of electronic voting, while retaining the security associated with paper ballots. This is the right way to handle things.

Each voter was given a piece of paper with lists of candidates for the three positions under contest. The voter selected candidates and filled in small circles beside their names with a pen – a process that should be familiar to anyone who attended high school in recent decades. The paper was then put into a sleeve to cover up the selections before being drawn through a scanner and into a storage box.

Because the scanners allowed quick tabulation of results, the outcome of the election could be known quickly. Because all the paper ballots were retained, there was little danger of an error or manipulation of the voting machines leading to an incorrect result.

I don’t know whether any auditing was done, but it would be a good idea. A certain portion of all the scanners and ballot boxes could be selected at random, with the ballots hand-counted and the tally compared with the electronic one. If significant disparities appeared, a manual recount of the whole election could then be conducted.

The only limitation I can see in the system, compared with all-electronic voting approaches, is that it cannot easily be tailored to help people with disabilities, such as very poor vision. That being said, it seems pretty straightforward for a volunteer to assist people in such situations.

The ‘Firesheep’ attack against Facebook

Facebook uses browser cookies to identify who you are. These are transmitted unencrypted across wireless networks. As such, it is easy for someone to listen in, copy the cookies, and then use them to impersonate you. Firesheep is a Firefox plugin that automates this process.

Sharing a wireless connection with a bunch of flatmates? Any of them can easily access all your Facebook information or impersonate you. Same goes for people in coffee shops, libraries, on vehicles with WiFi, and so on.

Bruce Schneier brought the attack to my attention and also suggests a good countermeasure: forcing Facebook to use encrypted HTTPS connections using other plugins.

Of course, HTTPS is vulnerable to man-in-the-middle attacks, but that is probably beyond the scope of what some random Facebook hacker would attempt. That being said, what I said before about Facebook and privacy holds true – you are best off only putting things on the site that you are happy for everybody in the world to see. That applies as much to private messages between users and ‘private’ photo albums as it does to status updates broadcase to one and all.