Blown To Bits

Phishing by Phone

April 20th, 2008 by Hal Abelson
Doctors cheapest clonidine price treat ovarian cancer using a combination of surgery to remove azor without prescription the cancer tissue and chemotherapy. The body digests starch by advair prescription metabolizing it into glucose, which passes into the bloodstream and sale viagra get circulates the body. They may recommend ways to ease your estradiol side effects symptoms and determine whether you should keep using Breztri Aerosphere. order cheap viagra online "They contend that this makes it harder to find pleasure buy cheap atenolol online usa in everyday activities and causes a lack of motivation." However, buy generic griseofulvin this may be more expensive than buying essential oils and buy cheap kenalog some people may not prefer artificial fragrances over essential oils. amikacin no prescription Inadequate hygiene practices or the use of unclean equipment during order discount viagra a foot massage can introduce bacteria to the feet, which buy clomid without prescription can lead to infections. It should be noted that the vibramycin malaysia measure used in this study is not yet commercially available clonidine for sale and has been used only in experimental conditions and not yet.

 

 

As everyone keeps telling us over and over, we should never send sensitive information to an email address, or enter it into a web page, unless we’re confident we know where it’s going. Tricking people with bogus network addresses is called phishing. It’s an online fraud that goes back to the pre-Web days of America On Line, but its prevalence has skyrocketed over past decade because it’s so easy to accomplish with today’s web browsers. A text link you see on a web page might read ‚Äúwww.bankofamerica.com,‚Äù but if you were to examine the program code, you’d see that it’s not Bank of America’s web site you visit when you click on the link, but some other site, perhaps located in Eastern Europe, which looks just like the Bank of America site. Enter your account number and password, and they are dutifully stashed away as loot for identity thieves.

It’s a well-known trick, and even people who should know better get fooled all the time. For the past several several months, a large fraction of the MIT community has been receiving email messages from ‚Äúthe MIT network administrators‚Äù telling them that their MIT email accounts are about to expire and they need to re-register by emailing their password to an address shown in the message. You’d think MIT people wouldn’t fall for this, but it happens. The real MIT network administrators watch for email outgoing to the bogus address and contact the hapless victims, a group that’s included a few faculty members in the past month.

More...

When everything is bits, frauds easily cross from one domain to another. In a variant of phishing known as vishing (‚Äúvoice phishing‚Äù) the perpetrator uses bogus caller ID information to trick victims into thinking they are being called by a bank, mimics the bank’s automated answering system, and asks for credit card information to be entered by touch tone. Spoofing the caller ID information ‚Äì making a fake phone number appear on recipient’s caller ID display ‚Äì is simple thanks to Voice over IP and the open Internet architecture that lets anyone create phone applications. There’s phone software widely available that includes spoofing as a ‚Äúfeature,‚Äù and even services like www.spoofcard.com that will sell you an account from which you can make spoofed phone calls: merely type in the called ID number you’d like your recipient to see, and call.

Just today, I encountered a variant of this trick I hadn’t seen before ‚Äì a cross-domain phishing hoax (phvishing ?) that almost fooled me. It came in the guise of an official looking email from Bank of America informing me that I needed to call them ‚Äúregarding recent activity on your account.‚Äù The email included the usual strong warnings against replying by sending account information by email. No bogus phishing links on this web page: all the links really did go to the BofA web site. But phoning the 800 number reached an official sounding automated answering system that asked me to punch in my account number, expiration date, and credit card validation code. It then told me that my card information had ‚Äúalready been registered‚Äù and everything was OK. Luckily, the email spoof was poorly done, and a close look at the return address showed that the mail was bogus, so I knew enough not to enter my real credit card data. It turns out that this hoax has been around since at least 2006; I just hadn’t encountered it before.

I doubt that I would have been fooled for an instant had this been a pure email hoax or a pure phone hoax, but the combination of the two was something I hadn’t expected. We all know to be cautious about internet messaging, but fewer of us feel are as suspicious about phone numbers, especially when we’re the ones doing the calling, as with the phony Bank of America number. The root of this difference in attitude is that the Internet (as described in Blown to Bits) has grown up as an open architecture, while the phone system has not. As the communication systems converge, they produce hybrids to which our instincts and attitudes are not attuned. Where this will end up, we don’t know. But of this we can be certain: digital convergence will continue, and so will human fraud.

 

 

Were you at the Wu-Tang concert?

April 19th, 2008 by Ken Ledeen

I was cutting through Harvard Yard yesterday evening on my way to the

Law School to hear Jonathan Zittrain speak about his new book when I ran into some of the loudest music I had ever heard. Wu-Tang Clan was performing on the steps of Memorial Church as part of Yardfest – a free concert for undergraduates.  Since my kids are in their mid thirties, Wu-Tang was not part of my musical experience.  They did, however, draw a big crowd.

Now when I was in school, a crowd this big would almost certainly have been for one of two things: a demonstration against the war in

Vietnam, or a demonstration in support of civil rights.  It was the sixties and those were the things that dominated campus life.  Either would have drawn a crowd, and, it’s highly likely that a couple of folks from the FBI with cameras would be there as well. J. Edgar Hoover liked to know who was attending those sorts of things.

There were no FBI folks at Wu-Tang yesterday.  That wasn’t because who attends a rap concert doesn’t matter to the FBI, it’s because pretty much everyone there had a cell phone in their pocket, and that’s all it takes to place you somewhere with decent accuracy.

Did you go to the Obama rally last October?   We can always ask Verizon.

All the technology is in place to do just that.  The phone company has to know where you are to route calls to you, and bits are so cheap these days that there’s no reason to throw them away, no reason not to keep the position history around.

I’m not saying that it’s all happening now, just that it can.  There is, however, plenty of evidence.  Consider Google maps for mobile’s ability to show where you are. (http://www.google.com/mobile/gmm/mylocation/index.html).  No need even for GPS.  And if Google can get this information in real time, who else can? This is one more example of intended consequences of technologies, one more example of the good side / dark side of bits.  If you want to be able to ask your Google to find the nearest Chinese restaurant, then the capability to track your location must exist. And if it exists, we can save it. And if we can save it ….you get the picture.

Phishing for Military Secrets, and Zittrain’s Book

April 16th, 2008 by Harry Lewis

Business Week has a story that is scary and maybe reassuring at the same time. Perhaps it will be reassuring to people who have opened an email or clicked on an attachment against their better judgment that people who handle sensitive military secrets are tempted to do the same.

The spam and phishing attacks I receive are pretty lame, like this one I got today:

Dear HARVARD.EDU Subscriber,

To verify your HARVARD.EDU account, you must reply to this email immediately and enter your password here (*********)

Failure to do this will immediately render your email address deactivated from our database.

…

Thank you for using HARVARD.EDU !

THE HARVARD.EDU TEAM

The reply-to address is a mysterious gmail account, but if that weren’t bad enough, the thank-you from HARVARD.EDU is a dead giveaway. The ones that Booz Allen received were of much higher quality. They appeared to come from a real person in the office of the Secretary of the  Air Force, an individual with responsibility for sales of aircraft to foreign governments. And that is what the body of the email was about. But it was malware–wired to install software in the recipient’s computer that would log keystrokes and screenshots and send them to … China. We report  in Blown to Bits that after the major communications trunks to the Chinese mainland were severed by an earthquake, the volume of spam reaching the US dipped for a few days.

Costly as spam may be, the problem the Business Week article reports is potentially more serious. Effective breaches of the security of military and intelligence computer systems endanger U.S. security, and also undermine public confidence in the Internet itself.So the government is responding. According to the story, “By June all government agencies must cut the number of communication channels, or ports, through which their networks connect to the Internet from more than 4,000 to fewer than 100. On Apr. 8, Homeland Security Dept. Secretary Michael Chertoff called the President’s order a cyber security ‘Manhattan Project.’”

This is what Jonathan Zittrain is worried about, in his new book, The Future of the Internet–And How to Stop It–that the wide open Internet with which we are familiar will prove to be more trouble than it is worth, and we will, for our own good, opt for a safer network to which Chinese spies, and probably also American teenagers, cannot get connected.   The Boston area launch of Zittrain’s book will be at Langdell Hall at Harvard at 6pm this Friday, April 18. It’s a great book and should be a great event!

Freedom of Texting

April 11th, 2008 by Harry Lewis

If you use your phone to talk about how bad your phone company is, could the phone company cut off your service?

The answer, believe it or not, seems to be, “It depends.” If you are merely talking on the phone, then no, the phone company has to let you do it. But if you are texting, the answer seems to be yes, your service could legally be terminated.

The reason this gets tricky even to explain is that there really is no such thing as a phone company any more. Verizon, which absorbed my old land line company, sells video services. Comcast, which used to be my cable TV company, now provides my residential “land line” service.

“Common carrier” laws have applied in the past to railroads (they couldn’t pick and choose among passengers; anyone with the money to buy a ticket is equally entitled to a seat) and to telephones (so phone companies couldn’t pick and choose their customers on political grounds, for example). As discussed in Blown to Bits, Verizon denied Naral Pro-Choice America the opportunity to create a text messaging group on the basis that it might be used for ‘controversial’ messages. It backed down on the case but not on its legal right to discriminate as it chose.

The FCC is now accepting comments on how text messaging should be treated in the code, like telephoning, where the service provider can’t control what the customers say, or like broadcasting, where the people who own the antenna get editorial control over what gets said. If you think this is a ridiculous no-brainer, you’re mistaken. It’s a real battle and the FCC needs to hear from as many people as possible.

The easiest thing to do is to go to the webform on the Public Knowledge site and to fill it out. PK also has a great deal more information about the issue. There is only a short window of opportunity; please act!

The Underground Bits Economy

April 10th, 2008 by Hal Abelson

One sign of a maturing industry is the development of aftermarkets. First there were cars, then there were used car dealers. And first there were bits, and then there were … used bits dealers? Some used bits transactions are legit, if possibly annoying. You give Sam’s Health Foods your email address so Sam can confirm your order for organic bean sprouts, and the next thing you know, you are receiving emails from Mary’s Gardening Tools. Sam decided to share his email address files with Mary, and Mary thinks that bean-sprout-eaters are more likely than other people to be gardeners. Of course, this is the kind of “sharing” that puts a few bucks in Sam’s pocket.

Other used bits dealers are like the people who steal catalytic converters and fancy headlamps from late-model cars and then sell them on the black market. There is a robust underground economy in bank account numbers, credit card numbers, eBay accounts, and even full identities. According to Symantec Global Internet Security Threat Report (downloadable free here), the going rate for bank account numbers is $10-$1000, while credit card numbers are $0.40-$20.00 each (but are usually sold in bulk). Bank account numbers cost more, because getting money from a bank account is quicker and, if properly done, leaves fewer fingerprints than converting a credit card number to cash. Identities go for $1-$15, but EU identities cost more than US identities, perhaps because of rising demand.

It’s a fascinating report. Symantec is in the security business, but many of the trends and recommendations are of general interest, unrelated to Symantec’s products. For example, the robust market in bank account and credit card numbers has made services like Paypal increasingly popular. Such electronic payment systems are guaranteed against misuse and they do not require revealing any financial information to the online store.

Is your front yard private?

April 6th, 2008 by Harry Lewis

If you use Google Maps to get directions to where I live, you can get what Google calls a Street View, a clear picture of my house. You can’t see in my windows, but you can see my run-down car parked in the driveway. Were it not for the fact that the setting sun caused glare in the camera lens, you could read my license plate. The Google filming crew plainly did me a favor by coming by on a day when the lawn happened to have been cut. The place doesn’t usually look that nice.

Try typing in your own address. Street View covers only a few cities, so your place may not be Street Viewable. Yet.

In the book, we say that things that have always been public are now VERY public. Google isn’t showing the world anything it hasn’t always been possible to see from the street. It is, as they say, a Street View. It’s just that everybody in Tajikistan with an Internet connection can now see the same things that people driving down my street have always been able to see. The Boston Globe reports that a couple living in a Pittsburgh suburb is suing Google to stop this invasion of privacy. Maybe they have a stronger case than you or I would have. They say the driveway from which the photos must have been taken is labeled “Private Road,” so Google’s truck should not have been on it. Or maybe their privacy case is not so strong. The county real estate web site also has a photo of their house, and lots of others, which anyone can view.

We mean two things by our title, Blown to Bits. First, that vast quantities of information have been digitized and spread suddenly to everyone, thanks to the wonders of modern electronics, such as digital cameras and the Internet. And second, that our understanding of familiar concepts, such as privacy, have taken a jolt as a result. There is no consensus on how old laws and conventions apply, or how they need to change.

Like it or not, the digital explosion has consequences that are being worked out right now. The way the world will work in the future is being determined by decisions being taken right now.

Welcome

April 4th, 2008 by tim

Welcome to the Blown to Bits blog.

This book is filled with stories, some historical, and many contemporary¬†- from Tanya Rider who disappeared, and was located because her cell phone (like all cell phones) had constantly reported its location until its battery died – to the amazing story of Hedy Lamarr.¬† If you have read the book, you likely see things differently, recognizing that much of what we see around us is now tied to bits, inextricably linked to the digital explosion.

Each of the stories we tell eludicates some aspect of the impact of the digital explosion on our lives,  an aspect of the difficulty that laws and regulations have keeping up with the exponential growth in capacity and complexity of information technologies, an aspect of the transformation of society, an aspect of new perspectives on our lives.  Each of these stories raises as many issues as it answers.

We are living in the midst of the digital explosion.  Like heat from the sun, it continues.

In this blog we will comment often on the changes around us, on contemporary events that, beneath the surface, are “bits” stories.  Mostly, though, we invite your participation.