From: NeilG on
On 6/19/2010 11:10 PM, JC Dill wrote:
<snip>
>
> They don't have to be experts. They only have to ask the question - is
> this the most secure way to setup my system?
>
> jc
>

JC,

As a (now-retired) tech partner at a law firm, I was the
person who had to ask that question to our computer
consultant for a firm of twenty people. I also had to deal
daily with computer problems of my less computer-literate
partners and staff, so I feel qualified to comment on your
opinion. You presume too much about the average user, and
particularly the average older user. (By older, I mean over
about age 35, before computers were available in most
elementary schools.) Many users expect their computers to
work the way their TVs work: turn them on, and turn the
channel to the program they want. They don't know enough to
ask your question, much less answer it. It's not the ISPs'
fault that many people don't bother to learn everything
there is to know about computers; it's just human nature.

The problem is not only with the ISPs, but also the
equipment manufacturers. Both of them have historically
understated security risks, to sell more services and
equipment by avoiding scaring away consumers.

I know that my solution is not popular among tech people,
who are notoriously libertarian. However, IMHO, one good
role for the FCC would be to standardize security UIs and
protocols (including updating procedures) so that it would
be easier for consumers to keep up with their security
needs. (I am not against an industry committee coming up
with, and maintaining, the standards, but there should be
standards.) Of course, that would not stop a determined
hacker, but it would reduce the likelihood of wardriving and
of what Google did.


Neil
From: Jeff Liebermann on
On Sun, 20 Jun 2010 10:10:12 -0700, NeilG <nmg1217(a)teranews.com>
wrote:

>Many users expect their computers to
>work the way their TVs work: turn them on, and turn the
>channel to the program they want.

True. Perception is everything. Users expect things to be secure out
of the box and without any (or much) effort on their part. A worst
case example are the commodity wireless routers, which if installed
using the default configuration, are as insecure as one could possible
be. The default passwords are well know. There's no encryption
enabled. The SSID is not unique.

Yet, the same product has security inscribed on the package,
documentation, and advertising literature multiple times and in
multiple places. Looking at the packaging and literature, one would
assume that it's secure based solely on the number of security related
buzzwords that encrust the packaging and literature. No so, but (to
my knowledge) the concept of vendor liability for security breaches on
consumer electronics has not been tested in court.

Email security is similar. The perception is that email is secure
because nobody knows the users password. Never mind that some systems
still send the POP3 and FTP passwords unencrypted. Never mind that
the password may be secure, but the contents are easily sniffable.

>They don't know enough to
>ask your question, much less answer it.

They do after a security breach. Few people take security seriously
until after it fails.

>However, IMHO, one good
>role for the FCC would be to standardize security UIs and
>protocols (including updating procedures) so that it would
>be easier for consumers to keep up with their security
>needs. (I am not against an industry committee coming up
>with, and maintaining, the standards, but there should be
>standards.) Of course, that would not stop a determined
>hacker, but it would reduce the likelihood of wardriving and
>of what Google did.

The FCC does not specify the details of transmission standards. It
merely specifies that there should be encryption, security, or some
protocol. The details of these are produced by industry standards
organizations (NIST, EIA, IEEE, APCO, etc) and adopted by
manufacturers to be compliant with the FCC guidelines. For example,
FCC Part 15 does not specify anything about wi-fi encryption except
that it's allowed. The IEEE wrote 802.11(a-z) specifications. The
Wi-Fi forum provides certification.

I'm not sure which organization would be the proper standards
manufacturer. Since the IEEE inscribed most of the industry standards
now running the internet, methinks such a security protocol should be
well within their area of expertise. All the FCC needs to do is
demand that all public data network transmissions be encrypted.

--
Jeff Liebermann jeffl(a)cruzio.com
150 Felker St #D http://www.LearnByDestroying.com
Santa Cruz CA 95060 http://802.11junk.com
Skype: JeffLiebermann AE6KS 831-336-2558
From: Jeff Liebermann on
On Sat, 19 Jun 2010 08:22:43 -0700, JC Dill <jcdill.lists(a)gmail.com>
wrote:

>Malcolm Hoar wrote:
>> In article <ec4o165c3s0ac1n3u4ifmv5unffkholfuf(a)4ax.com>, John Navas <jncl1(a)navasgroup.com> wrote:
>>
>>> "However, we can already state that [...] Google did indeed record
>>> e-mail access passwords [and] extracts of the content of email
>>> messages."
>>
>> That's not good but if folks are using cleartext passwords
>> over a wireless connection, they really shouldn't have a
>> "reasonable expectation of privacy".
>
>Not just using cleartext passwords over wifi, using cleartext passwords
>over UNPROTECTED wifi. (If they had any protection on their wifi, then
>Google wouldn't have connected or recorded anything.) In that case they
>absolutely have no expectation of privacy. It's like shouting your
>password to your friend across the street.
>jc

Not all parts of wi-fi transmissions are encrypted. The headers,
source and destination MAC addresses, system management packets,
control packets, and some broadcast packets are not encrypted. One
could easily map a network by simply collecting the source and
destination MAC addresses. I have not seen anything from Google
indicating exactly what data they were collecting, but my guess(tm) is
that it was MAC addresses, SSID names, and possibly sniffing
broadcasts to determine the type of connectivity. They were
apparently only logging uncrypted data, but from the vague wording,
could include payload data. From the unencrypted data, they'll get a
user count, network map, equipment type, and a good guess as to the
backhaul type. If that data was NOT encrypted, they would get IP
addresses, payload type, service number, and RIP broadcasts, which
would reveal considerably more information about the system and its
topology.


--
Jeff Liebermann jeffl(a)cruzio.com
150 Felker St #D http://www.LearnByDestroying.com
Santa Cruz CA 95060 http://802.11junk.com
Skype: JeffLiebermann AE6KS 831-336-2558
From: John Navas on
"30 states may join probe of Google Wi-Fi snoop"
'As many questions as answers'

As many as 30 states may investigate Google for surreptitiously sniffing
traffic traveling over open Wi-Fi networks over a three-year span,
Connecticut's top law-enforcement official said on Monday.

Connecticut Attorney General Richard Blumenthal said his office will
lead the multi-state investigation into the unauthorized data collection
by Google Street View cars. A �significant number of states� are
expected to participate, according to a press release issued by his
office that claimed representatives from more than 30 states joined a
recent telephone conference call to discuss the probe.

�While we hope Google will continue to cooperate, its response so far
raises as many questions as it answers,� Blumenthal said in the release.
�The company must provide a complete and comprehensive explanation of
how this unauthorized data collection happened, why the information was
kept if collection was inadvertent and what action will prevent a
recurrence.�

MORE:
<http://www.theregister.co.uk/2010/06/21/google_wifi_snoop_inquiries/>
From: Nemesis on
On Sat, 19 Jun 2010 01:44:26 +0000, Malcolm Hoar wrote:

>>"However, we can already state that [...] Google did indeed record
>>e-mail access passwords [and] extracts of the content of email
>>messages."
>
> That's not good but if folks are using cleartext passwords over a
> wireless connection, they really shouldn't have a "reasonable
> expectation of privacy".
>
> If I were one of those "victims" I'd be more worried about the other
> folks who may have recorded that info (and not very worried about
> Google). But, of course, Google represents a much more attractive target
> for those seeking financial reward for their own stupidity.
I sleep with a twelve bore and a 9mm. Nobody's going to accuse me
of stupidity when I get a break-in.
PS ... on my tenth wife. I TELL them to whisper "it's me" when
they go to the bathroom, but in the end they always forget ....

BTW, you don't need to collect the emails and passwords to map MAC
addresses for the NSA.
Airodump with the write option set to csv collects the mac, no
content at all. They'll have to think of a better excuse.
[]'s