Famine? War? Superbugs? Superstorms? Political corruption? Unemployment and economic collapse? The police state, jackbooted and torturing? The fact that almost anyone can buy your private information? Scarcely a corporate contract, personal digital appliance, or health provider you can trust? Hospitalization may be more frightening than incarceration. Being faced with reliance on government assistance may be more frightening than both.
Its those kids wearing black that you have to worry about. Of course.
Excerpted from the statement that the Honorable Matthew G. Olsen, Director, National Counterterrorism Center, gave in his hearing before the Senate Committee on Homeland Security and Governmental Affairs on November 14, 2013:
The Homeland Threat Landscape and U.S. Response.
Here's the whole text; pdf link and source appended. Click each to enlarge.
Pdf: right-click below. h/t Cryptome.org.
|Invasion of the Privacy Snatchers II - or, how I never learned to stop worrying and love my cell phone -- a faustian mashup|
Just what you needed -- a secret brain in your cell phone. From which many a covert exploit, no doubt.
from OS News:
Every smartphone or other device with mobile communications capability (e.g. 3G or LTE) actually runs not one, but two operating systems. Aside from the operating system that we as end-users see (Android, iOS, PalmOS), it also runs a small operating system that manages everything related to radio. Since this functionality is highly timing-dependent, a real-time operating system is required.
This operating system is stored in firmware, and runs on the baseband processor. As far as I know, this baseband RTOS is always entirely proprietary. For instance, the RTOS inside Qualcomm baseband processors (in this specific case, the MSM6280) is called AMSS, built upon their own proprietary REX kernel, and is made up of 69 concurrent tasks, handling everything from USB to GPS. It runs on an ARMv5 processor.
With this in mind, security researcher Ralf-Philipp Weinmann of the University of Luxembourg set out to reverse engineer the baseband processor software of both Qualcomm and Infineon, and he easily spotted loads and loads of bugs, scattered all over the place, each and every one of which could lead to exploits - crashing the device, and even allowing the attacker to remotely execute code. Remember: all over the air. One of the exploits he found required nothing more but a 73 byte message to get remote code execution. Over the air.
You can do some crazy things with these exploits. For instance, you can turn on auto-answer, using the Hayes command set. This is a command language for modems designed in 1981, and it still works on modern baseband processors found in smartphones today (!). The auto-answer can be made silent and invisible, too.
While we can sort-of assume that the base stations in cell towers operated by large carriers are "safe", the fact of the matter is that base stations are becoming a lot cheaper, and are being sold on eBay - and there are even open source base station software packages. Such base stations can be used to target phones. Put a compromised base station in a crowded area - or even a financial district or some other sensitive area - and you can remotely turn on microphones, cameras, place rootkits, place calls/send SMS messages to expensive numbers, and so on. Yes, you can even brick phones permanently.
Don't suppose you feel any safer -- hard to feel any less safe.
Be seeing you.
Warning: the following may offend due to its tone and content.
The shooter's name is Paul Ciancia?
CIA 'n CIA?
Is it just me or is that odd? I mean no disrespect to either family or loved ones.
Be seeing you.