Skip to content

Archive for

29
May

Weaponizing code: America’s quest to control the exploit market


Generic Java code

When the US Bureau of Industry and Security published how it plans to implement the sections on hacking technologies in a global weapons trade pact called the Wassenaar Arrangement (WA) last week, it ignited an online firestorm of meltdowns, freakouts, and vicious infighting within the most respected circles of hacking and computer security. That’s because the new rules change the classification of intrusion software and Internet Protocol (IP) network communications surveillance — setting in motion a legal machine that might see penetration-testing tools, exploits and zero-days criminalized.

Some suggest the new classifications also seem designed to give the US a market advantage over the buying, selling, import and export of certain tools used in cyberwar — a currently black market, in which the US government is already the biggest player.

Code as a weapon

dont kill with the destroy...

When controversy began to erupt this week about government intent to outlaw zero-day sales, BIS Director Randy Wheeler didn’t make anything better when she confirmed to Threatpost that the rumors were true. She explained that the development, testing, evaluating and productizing of exploits, zero-days and intrusion software would now be controlled — considered illegal to export without a permit — but, confusingly, added that the same illegal status would not apply to vulnerability research.

“Vulnerability research is not controlled, nor would the technology related to choosing, finding, targeting, studying and testing a vulnerability be controlled,” she said.

Her statement, albeit unintentionally, gave weight to what information security professionals are saying in increasing volume — that the government may literally not understand what it’s talking about.

Sergey Bratus, the chief security advisor for the Institute for Security, Technology, and Society, and research associate professor in the Computer Science Department at Dartmouth College, explains the problem simply. “Exploits are proofs of vulnerabilities,” he says. “Without a working program — an exploit — I and my colleagues cannot claim that the security vulnerabilities we write about actually exist, no more than a physicist can claim that a physical phenomenon exists without successful experiments.”

Information security experts say this puts a swath of hacking (security research) into a legal gray area.

Bratus told Engadget, “Wassenaar’s attempts to regulate are based on poor definitions such as ‘intrusion software’ and on jargon such as ‘zero-days’ and ‘rootkits’ (in recent BIS’ proposed rules). WA’s ‘intrusion software’ concept is deeply flawed. It does not correspond to any distinct category of software technically, and, I suspect, legally. ‘Rootkits‘ and ‘zero-day exploits‘ are jargon terms, still without standard textbook definitions, and meaningless outside the context of professional discussion. For example, antivirus vendors use instrumentation that in other contexts would be called ‘rootkits,’ despite the technologies being the same.

He warned, “As written, Wassenaar controls apply to basic building blocks and artifacts of security research. Without offensive research pointing out new threats, cyberdefense will suffer and forever lag behind.”

Information security experts from code slingers to attorneys say this puts a swath of hacking (security research) into a legal gray area, potentially criminalizing hacking, and making certain kinds of code illegal to export without a permit. Many are worried about the impact on companies in the business of legitimate sale of exploits and zero-days to other businesses as bug fixes, and it has the potential to turn some researchers, by default, into “patriot hackers” by forcing them to go down fewer channels to get paid for their research.

These concerns, not surprisingly, are causing freakouts in nearly every corner of the information security sector. Bratus echoed the tweets of many when he told us, “The authors of this regulation may have believed that they were targeting a narrow group of products; as written, their regulation actually targets fundamental security technologies, and the most promising paths of their future development.”

The twentieth Plenary of the Wassenaar Arrangement was held in Vienna on 2 to 3 December 2014

The Wassenaar Arrangement is a global pact among 41 nation-states that oversees export controls on munitions and arms like tanks, missiles and guns. It includes “Dual Use Goods and Technologies,” such as spent nuclear rods and, in a 2013 addition intended to rein in cyberwarfare tools, “intrusion software.” How each nation state interprets and implements the agreement in local laws varies from country to country.

Since then, the US, a Wassenaar member, has been considering how to implement the change in its Export Administration Regulations (EAR) consistent with US national security and foreign policy interests. Notes on how the US was going to implement the software section into crime and punishment, a la export controls and permitting, were supposed to be announced in September 2014 (the EU adopted the 2013 changes in October of last year).

Attorney Bryan Cave said that many speculated the delay was because the BIS might have been struggling with Wassenaar’s sweeping definition of “intrusion-detection software.” He added, “But we were wrong.”

Instead, the BIS managed to make things worse.

Cave said, “Many have pointed out this definition would cover programs that permit auto-updating without user intervention, such as, for example, the Chrome browser, which updates itself in the background and circumvents protections normally imposed by the operating system to prevent installation or modification of programs without user intercession.”

He added, “The definition of sandboxing as a protective measure will subject programs that permit rooting or jailbreaking of mobile telephones to export controls.”

The BIS managed to make things worse.

Jon Callas, co-founder of PGP and CTO of global encrypted communications service Silent Circle added, “I think they are doing something that is superficially laudable, trying to control that which we might laughingly call ‘cyberweapons.’ However, part of the problem is that it isn’t clear what they want to do.”

Or perhaps the approach is, quite simply, dated. “At a more basic level is the way that Wassenaar covers dual use,” Callas noted. “Dual-use technology covers things that make sense — spent nuclear fuel rods, advanced jet engines and so on. But it also covers crypto, GPS (it’s a navigation system), high-end video cards (because they’re compute engines) and so on. It made sense, for example, to consider GPS a dual-use item in the 1980s. It doesn’t now that every cellphone has it. Similarly, there was a day when crypto was reasonably dual-use.”

Callas noted wisely, “It is no longer that day. It’s not actually making progress to put anti-malware into the same bin.”

Thought crimes

US China Justice Cyber Espionage

The entire issue is raising troubling questions of enforceability. Last month, the Department of Justice indicted four US companies and five individuals for the illegal export of certain electronics — physical technologies — to Iran. But if BIS extends the DoJ’s beat to criminal prosecution for exporting zero-days and exploits, it might face an uphill battle in the US.

Jason Schultz, associate professor of Clinical Law and director of NYU’s Technology Law and Policy Clinic said this is most likely because “it is hard to prove intent to encourage an attack against a specific target and the information itself is often simply knowledge, and not even code. That said, if cyberwarfare treaties become anything real to deal with, they might give rise to prosecution for mere trading, but it will be tough to prove that an exploit is a weapon just because it works.”

In addition, many believe the fear of possible prosecution will have a chilling effect on the speech of researchers who would ordinarily disclose dangerous problems for the benefit of public safety, employing the information security best practice known as “full disclosure.”

The practice was borne largely out of the necessity that public awareness (disclosure of bugs, zero-days, exploits and vulnerabilities) is often the only thing that forces companies to fix their (known) security problems.

The fear of possible prosecution will have a chilling effect on the speech of researchers.

Bratus is positive this will affect consumers, which is about the last thing we need to hear when there’s seemingly a new data breach spilling our private information out online every day. “Without a lively exchange in the security community, the very people who WA aims to protect will be left without meaningful information about threats to their security, entirely reliant on vendor security and vendor disclosure,” he said. “This will leave them worse off than they are now, and more exposed to attacks and subsequent private data theft.”

Wassenaar is not legally binding, but its controls are implemented by national legislation within its 41 member countries, so enforcement will vary — putting international travel onto the new list of unknown risks for security researchers.

Undermining security with a play for market control

Ostensibly, the idea with Wassenaar’s foray into intrusion and surveillance tech is to rein in both exploit and zero-day sales under dangerous weapons export rules, because they can be used as digital weapons by despotic regimes and criminals alike.

Except, as Callas pointed out, “Wassenaar doesn’t include South Asia (including India, China and Indonesia), most of South America (the only country is Argentina), most of Africa (South Africa is the only country) or West Asia (including Israel, Iran, etc.).”

Where Wassenaar leaves off is where controversy begins around domestic intent, shining an uncomfortable light on the role of the US in the cyberwarfare business and the global exploit market.

Callas explained that the new rules BIS is set to impose indicate a curious sort of overreach by the US. “Wassenaar is often a cover for things that a country wants to do. You’ve seen the things proposed by the US. I’m sure you’ve also seen what is going on in Australia. Wassenaar doesn’t mandate that they do anything, and certainly doesn’t go as far as what they’re proposing, even.”

After the United States, Israel, Britain, Russia, India and Brazil are the biggest exploit buyers and sellers.

The RAND report commissioned by Juniper Networks and released last year, “Markets for Cybercrime Tools and Stolen Data,” explained the black market for exploits and zero-days has changed from a “varied landscape of discrete, ad hoc networks of individuals motivated by ego and notoriety, [and] has now become a burgeoning powerhouse of highly organized groups, often connected with traditional crime groups (e.g., drug cartels, mafias, terrorist cells) and nation-states.”

Rising Inflation And Unemployment Make Venezuela World's Most Miserable Economy

It’s important to note that the biggest transformation to the exploit market (the hacker’s black market) in recent years has been the influx of government money: notably US government money.

According to the Center for Strategic and International Studies in Washington, after the United States, Israel, Britain, Russia, India and Brazil are the biggest exploit buyers and sellers. North Korea is also a stakeholder in the market, as are some Middle Eastern intelligence services.

Indeed, a 2013 report (PDF) by the European Centre for Information Policy and Security noted that, “A request under the Freedom of Information Act led to the release of the NSA’s contract with the French company VUPEN made in September 2012 for a [12-month] subscription to VUPEN Binary Analysis and Exploits Service. This allows NSA the access to software backdoors and zero-day exploits.”

The Economist reported that back in 2013, “Laws to ban the trade in exploits are being mooted. Marietje Schaake, a Dutch member of the European Parliament, is spearheading an effort to pass export-control laws for exploits. It is gathering support, she says, because they can be used as ‘digital weapons’ by despotic regimes. For example, they could be used to monitor traffic on a dissident’s smartphone. However, for a handful of reasons, new laws are unlikely to be effective.”

The Economist concluded, “As an American military-intelligence official points out, governments that buy exploits are ‘building the black market,’ thereby bankrolling dangerous R&D.”

In a perverse twist, the conditions for a government power play on the exploit market have had an unlikely ally: the ACLU’s principal technologist and senior policy analyst.

Inside The South By Southwest (SXSW) Interactive Festival

Chris Soghoian, with the ACLU’s Speech, Privacy and Technology Project, is a longtime vocal opponent of governments buying exploits. Over the past few years, he has publicly campaigned that exploits and zero-days are “digital arms” and that anyone engaging in their sale should be subject to a regulated global market.

Soghoian once famously told Slate, “Just as the engines on an airplane enable the military to deliver a bomb that kills people, so too can a zero-day be used to deliver a cyberweapon that causes physical harm or loss of life.”

Now that the US government appears all too happy to help make this happen, the public backlash within infosec circles against an unapologetic Soghoian is blistering. It has turned into a fight fracturing a culture that typically stands together to protect code as free speech, to fight against government overreach and uphold the free exchange of ideas in security research.

Law blog Lexology notes, “While BIS has proposed a way to implement these new controls, it has acknowledged that the impact of this rule is unknown, and it welcomes comments from exporters on the anticipated impact on their business.” Changes to Wassenaar are currently in the comment period, which closes July 20th.

Either way, if the goal is keeping the technologies of oppression out of the hands of despotic regimes, it’s clear that Wassenaar and its distillation into BIS’ new rules are primed to miss the mark in every way.

Filed under:

Comments

29
May

Path’s social apps get sold to the company behind KakaoTalk


Remember Path, the social network for keeping in touch with your closest friends and family? Unless you live in Indonesia, probably not. And that’s part of the reason why it ended selling its social networking apps to Daum Kakao, the Korean parent company of the messaging app KakaoTalk. Path was founded five years ago with a more intimate and well-designed take on social networking, and it snagged 10 million users in that time. But aside from some initial pickup in tech centers like San Francisco and New York City, most of its growth ended up being in Latin America and Southeast Asia (more than half of its users are based in Indonesia). Specifically, Daum Kakao is picking up the core Path app and Path Talk, a standalone chat app it launched last year. Path the company will live on with its animated GIF app Kong, and it likely has some other projects in the works too.

Filed under: ,

Comments

Source: Path

29
May

Complete Arduino Starter Kit & Course Bundle


Are you a builder? Maybe builder is a bit of an overstatement but if you like to tinker around and dream of owning a workshop where you can lose track of the hours while you piece together some new pet project then you are certainly not alone. Many of us have fond memories of building things with Legos, K’nex, Erector sets or even putting together models. Why should the fun end just because we’ve grown up? If you have a hankering to craft something a bit more sophisticated, our Arduino Starter Kit & Course Bundle is perfect for you!

Arduinos are microcontrollers that make the process of building precision interactive electronics simple and fun. The unit detects its surroundings by analyzing inputs from various built-in sensors and reacts by controlling accessories, lights, motors or just about anything else you can dream up. Now, the power of the Arduino is in your hands with our Complete Arduino Starter Kit & Course Bundle. You’ll get everything you need to begin your own builds including the actual hardware and over 17 hours of expert tutelage. You’ll even learn how to build a high-tech remote-controlled car! This bundle would regularly cost over $500 but AndroidGuys readers can steal this deal for just $75.99 (85% off) and get to creating right away. Just try not to go full Frankenstein on us.

See more at deals.androidguys.com

The post Complete Arduino Starter Kit & Course Bundle appeared first on AndroidGuys.

29
May

Project Brillo: Android for the Internet of Things


Connectivity is king. This is the overall late motif of Google I/O 2015. Google wants to be on your wrist and in your pocket. Google is going to be sitting next to you during your morning commute. It’s no secret that the search giant is trying to infiltrate your living room. What’s the next stop? Google wants Android to all the things; more specifically, Android needs to power the Internet of Things. At this year’s developer conference Google announced Project Brillo, a lightweight, embedded version of its mobile operating system that is designed specifically to handle the Internet of Things.

Brillo is the abstraction that could give us a fully automated home experience. When Google Now was incepted, the engineers in Mountain View wanted to mimic the computer that powered the Star Trek Enterprise. Along with their acquisition of Nest, Brillo looks like it could be the next step in making this kind of scifi tech a reality. Sundar Pinchai spent most of the Brillo segment of the keynote elaborating on Weave, the specific API framework that is meant to standardize all communication between Brillo devices. Look for Brillo to be available via preview this Fall. Weave should be published soon thereafter.

The post Project Brillo: Android for the Internet of Things appeared first on AndroidGuys.

29
May

Cricket adds ZTE Overture 2 with an all-in cost of $50


The AT&T prepaid brand dials up a very affordable Lollipop experience

Cricket Wireless today began offering a new entry-level smartphone, the ZTE Overture 2. Priced at only $50, the handset offers a dirt cheap barrier into Android 5.0 Lollipop.

Specifications for the device are admittedly not going to set the world on fire but it’s hard to argue when you’re getting a no-contract handset at this price.

zte_overture_2_in_hand

Details include a 4.5-inch display, 1.2GHz quad-core processor with 1GB RAM, and 8GB internal storage. There is a microSD expansion card slot however it is limited to 32GB maximum capacity.

In terms of cameras, the ZTE Overture 2 offers a 5-megapixel rear shooter with a VGA quality front-facing selfie cam. Nothing to get excited over, sure, but it’s silly to ask for more at this price.

For a limited time Cricket customers can actually end up with a free ZTE Overture 2. Purchase the phone before July 9 and you can receive a mail-in rebate good for $50.

Cricket Wireless

The post Cricket adds ZTE Overture 2 with an all-in cost of $50 appeared first on AndroidGuys.

29
May

Google taking Wallet in new direction


Via a Google+ post, the Google Wallet team tells that it is building a new Wallet app for Android and iOS.

This app will allow anyone who has a US debit card to send and receive money with no extra charges in a matter of minutes, even if the other person does not have the app. Money can be sent directly to your bank account or it can be used in stores using a Google Wallet card.

Of course, this is just an initial announcement, so the app currently is far from ready. The Wallet team adds that it expects to share more details in the next few months.

The post Google taking Wallet in new direction appeared first on AndroidGuys.

29
May

Google’s Cloud Messaging now sends notifications to iOS devices


Google’s made a massive leap forward in cross-platform messaging at Google I/O that will now allow notifications to be sent to iOS devices as well as Android.

Google’s Cloud Messaging is no longer just for Android devices or your web browser since notifications can be also sent to any iOS device.

The update to the service also introduces topics that can restrict notifications to things that you care about rather than everything. For example, a news app can be restricted to sending just notifications about the world of tech.

Whilst the feature will have to be coded into each and every app to take advantage of it, the enhancements made to Google’s Cloud Messaging is a massive leap in the right direction.

The post Google’s Cloud Messaging now sends notifications to iOS devices appeared first on AndroidGuys.

29
May

Google will standardize fingerprint readers in Android M


Sadly, one area where Apple iOS is severely better than Android at is reading fingerprints.  Apple has pretty much set the standard for all other devices, when it comes to fingerprint readers, as their device is the easiest fingerprint reader to use among smartphones.  There’s no need to swipe down across the iPhone’s fingerprint scanner like Samsung users need to do on their Galaxy devices which leads to much frustration when it does not work.  Even Google’s own Nexus devices do not have fingerprint readers built into their stock devices, a fell two years after the iPhone 5S debuted with the technology.

At Google I/O, they announced that Android will standardize fingerprint ID security across all Android M devices.  This will make it easier for manufacturers to access payment functions using your fingerprint and it will minimize variations across devices using the fingerprint scanner.  Standardizing the fingerprint security should make the technology more relevant on Android – as of right now many flagship devices don’t offer fingerprint readers because it is not baked into the software.

Just because Android is not the first to have the best fingerprint reader does not mean Google doesn’t care about security.  Don’t forget two-factor authentication was brought to Android first.

The post Google will standardize fingerprint readers in Android M appeared first on AndroidGuys.

29
May

HTC: One M9 and M9+ will get Android M, more device announcements coming later


htc one m9 review aa (27 of 34)

Starting with Android Lollipop, we saw a number of OEMs attempt to up their game when it came to pushing out prompt updates. HTC was among the first OEMs to promise fast updates to Android Lollipop, with a commitment to bringing the update out in 90 days or less. While a number of delays kept it from meeting its initial goal, it was still fairly responsive when it came to delivering Android 5.0 Lollipop.

To little surprise, HTC is once again one of the first OEMs to speak up about their Android M plans. Taking to Twitter, HTC has announced that the One M9 and M9+ will both be upgraded to Android M, with more device announcements coming soon. While we can’t say for sure, we’d say it is a pretty safe bet that the One M8 and some of last year’s higher-end Desire devices will also get some M lovin’, but that’s just speculation at this stage.

Honestly, we aren’t surprised by HTC’s news about the M9 or the M9+, as it was pretty obvious. What is more interesting is that HTC didn’t mention the One M8 right away, also it isn’t putting up a deadline for its update this time around. Even back as early as the Android L preview, HTC promised it would be able to get the update out in 90 days or less from the time the final build arrived. Of course, HTC is probably just being cautious here, considering the delays seen by Lollipop. Still, it’s nice to have some sort of timeframe in mind when it comes to major updates.

.rvs_wrapper
width: 350px;

.rvs_wrapper.align_left
float: left;

.rvs_wrapper.align_right
float: right;

.rvs_wrapper.align_center,
.rvs_wrapper.align_none
width: 100%;

.rvs_wrapper.align_center
text-align: center;

.rvs_wrapper.align_center.cbc-latest-videos ul li
float: none;
display: inline-block;
vertical-align: top;

.rvs_wrapper.cbc-latest-videos:not(.align_none) ul li:nth-child(2n+1)
clear: both;

.rvs_title
font-weight: 600 !important;
margin: 0 !important;
font-size: 24px !important;

.rvs_wrapper.align_right .rvs_title
padding-left: 20px;

.rvs_title a
font-family: ‘Roboto Condensed’;
color: #3a3a3a;

.rvs_wrapper.cbc-latest-videos ul
padding-top: 10px;

.rvs_wrapper.align_left.cbc-latest-videos ul li,
.rvs_wrapper.align_none.cbc-latest-videos ul li
padding: 0 15px 0 0;

.rvs_wrapper.align_right.cbc-latest-videos ul li
padding: 0 0 0 15px;
float: right;

.rvs_wrapper.align_center.cbc-latest-videos ul li
padding: 0 7px;

.rvs_wrapper.cbc-latest-videos ul li > a
font-weight: 400;

.rvs_wrapper.cbc-latest-videos ul li > a .yt-thumbnail
margin-bottom: 0;

@media only screen and (max-width : 480px)
.rvs_wrapper
width: 100%;
text-align: center;

body .rvs_wrapper.cbc-latest-videos ul li
padding: 0 7px;
display: inline-block;
float: none;
vertical-align: top;

At least as far as we’ve seen, HTC is the only OEM to formally speak about its plans for M this early in the game. We’ll be sure to update you as soon as we learn more.

29
May

Missed out on Google I/O 2015? Watch the keynote here!


google_cardboard_io15_picture1

Yesterday was an exciting day for everything Android, as Google ran an almost 3-hour keynote at I/O 2015, full of exhilarating announcements, whether it be a new Android version, virtual reality or smart home enhancements. If you missed it and want to catch up on all the excitement, Google recorded the keynote for those back home.

Running two hours and fifty-six minutes long, the keynote is jam packed with Android M, Android Wear, virtual reality, Google Photos, Dozehome automation, and much, much more. Be sure to check it all out below!

Click here to view the embedded video.

Be sure to check out all of our Google I/O 2015 coverage!

Come comment on this article: Missed out on Google I/O 2015? Watch the keynote here!