• About
  • Advertise
  • Contact
Saturday, October 18, 2025
No Result
View All Result
NEWSLETTER
iotillinois
  • Home
  • Internet of Things
  • Security
  • WAN
  • Cloud Computing
  • Data Centers
  • Mobile
  • Networking
  • Software
  • Home
  • Internet of Things
  • Security
  • WAN
  • Cloud Computing
  • Data Centers
  • Mobile
  • Networking
  • Software
No Result
View All Result
iotillinois
No Result
View All Result
Home Uncategorized

“Hang’em all…..”

in Uncategorized
0
SHARES
1
VIEWS
Share on FacebookShare on Twitter

Last weekend, a federal judge issued an injunction blocking some MIT students from explaining to a Defcon audience how to hack the RFID-based fare card system used by the Massachusetts Bay Transportation System (MBTA).

In one account, one student said he was now “afraid.”

Good.

Judging from what I’ve read, that seems to be the minority view.

My colleague Adam Gaffin pointed out the MIT students included a lengthy list of all the ways you can hack the system without any equipment at all, apparently not even a jimmy: walking through unattended fare gates; unprotected and even unlocked network switch rooms; and so on.

NW Columnist Scott Bradner, with Olympian assurance, explained that the MBTA understood neither publicity nor security. Suing the hackers just called more attention to the problem, he says. And “The MBTA defaulted to the common but dumb idea that if security flaws are hidden they will not be exploited. This never works in the long run….”

Actually, the MBTA defaulted to the not-so-dumb-idea that if you make available detailed information about how to exploit a hidden security flaw, in this case including source code posted on one student’s Website but later removed, it sure makes it a lot easier for the exploiters. In a touch of unintended hilarity, the MIT hackers originally included a Powerpoint slide that warned “THIS IS VERY ILLEGAL! So the following material is for educational use only.” Right.

In a nice touch, the MBTA’s suit quoted from the “MITnet Rules of Use” which warn students against messing with the integrity of the system by, among other things, “attempting to capture or crack passwords or encryption….”

The Electronic Frontier Foundation, the cyber-ACLU, found yet another reason to harp about how publicly revealing ways to violate computer security is not only a Public Service but a constitutionally protected Public Service. “We believe that this is a protected speech activity. When you discuss security issues, if you are telling the truth, that is something that should be protected,” according to an EFF staff attorney. I guess that means if the MIT hackers stood up at Defcon and said “the MBTA system is hackproof” then EFF would be demanding that authorities prosecute the hell out of them.

The MBTA, like every government agency, by definition deserves humiliation, since that is the only sure and certain method of quality improvement in the public sector. Unlocked network switching rooms? Heads should roll. Except, being a state civil service agency, even in the utterly unlikely chance that were to happen, the MBTA would have to keep the headless corpse in place and pay it disability.

Most of the “physical hacks” such as sneaking past a dozing MBTA employee are by definition individual acts. But the original text of the MIT hackers promised “free subway rides for life” — the prospect of fraud on a grand scale.

But how likely is that? Some security folks argue the risk is minimal: as far as we know, it hasn’t been done despite the fact the Mifare Classic vulnerabilities were exposed a year ago. But the recent federal indictments against a ring of hackers, charging them with subverting network security at 9 major US retailers show something else: how a small, highly motivated group of people exploited network vulnerabilities, compromised the online identity of hundreds of thousands of consumers, and looted millions. Their scheme only began to unravel when they tried attacking an as-yet unnamed retailer who had crafted a security system that actually worked.

There’s an appealing simplicity in the smug conviction of dumb (MBTA), dumber (the judge), and dumbest (NXP,the RFID card maker). A Slashdotter wondered whether “Dutch openness” (a Dutch court recently refused to block researchers from disclosing Mifare Classic bugs) or “Soviet-style secrecy” (MIT students snatched from the campus at midnight by men in fedoras and dark overcoats, whisked away in a black Mariah to a cellar in Dorchester) would ultimately prevail at Defcon.

But security and publicity, like life, are never that simple. I haven’t looked in detail at the specific legal arguements advanced in the MBTA’s suit, or by the Electronic Frontier Foundation. But UCLA law prof Eugene Volokh has some preliminary thoughts on his blog, identifying two key issues: is such speech consitutionally protected, and even if not, can it be restricted? He also notes that the MBTA argued in its filing that the students obtained the information they were going to disclose illegally, in violation of the Computer Fraud and Abuse Act. “So this is a pretty complex legal question…,” he concludes. No kidding.

It’s certainly true that as a result of the MBTA’s court suit, a lot more people than otherwise now know that the MBTA fare system can be hacked.

But they also know one more thing: do it, and you face legal action.

Works for me.

Join the Network World communities on Facebook and LinkedIn to comment on topics that are top of mind.

Copyright © 2008 IDG Communications, Inc.

Download Premium WordPress Themes Free
Premium WordPress Themes Download
Premium WordPress Themes Download
Free Download WordPress Themes
udemy paid course free download
download lava firmware
Premium WordPress Themes Download
udemy course download free
Tags: "Hang'em all....."
Next Post

EFF to appeal court order halting subway hacker talk

Recommended

Cisco/SJSU: We Can’t Hear You

Connected IoT is about to become cognitive IoT

Connected IoT is about to become cognitive IoT

Facebook Twitter Youtube RSS

Newsletter

Subscribe our Newsletter for latest updates.

Loading

Category

  • AI
  • Careers
  • Cloud Computing
  • Connected Cars
  • Connected Vehicles
  • Data & Analytics
  • Data Center
  • Data Centers
  • Databases
  • Development
  • Enterprise
  • Hardware
  • Healthcare
  • IIoT
  • Infrastructure
  • Internet of Things
  • IoT
  • IT Leadership
  • Manufacturing
  • Mobile
  • Networking
  • Oil & Gas
  • Open Source
  • Security
  • Smart Cities
  • Smart Homes
  • Software
  • Software Development
  • Standards
  • Technology Industry
  • Uncategorized
  • Unified Communications
  • Virtualization
  • WAN
  • Wearables

About Us

Advance IOT information site of Illinois USA

© 2024 iotillinois.com.

No Result
View All Result
  • Home
  • Internet of Things
  • Security
  • WAN
  • IoT
  • Cloud Computing
  • Data Centers
  • Mobile
  • Networking
  • Software

© 2024 iotillinois.com.

Login to your account below

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In