Infosecurity.US

Information Security & Occasional Forays Into Adjacent Realms

  • Web Log

Burners, The Tightening

June 02, 2016 by Marc Handelman in All is Information, Communications, Communications Governance, Cryptography, Demise of Privacy, Information Security, Mobile Networks, Mobile Security, Signals

Well wrought thought piece on the use, and misuse, of prepaid cellular telephony hardware, the so-call Burner, and the effort to enforce regulations thereto. Entitled Burner Phones: Will Tightening Restrictions on Prepaid Cell Phones Solve Anything? Certainly today's Must Read post...

June 02, 2016 /Marc Handelman
All is Information, Communications, Communications Governance, Cryptography, Demise of Privacy, Information Security, Mobile Networks, Mobile Security, Signals

Project West Ford →

March 29, 2016 by Marc Handelman in All is Information, Communications, Electrical Engineering, Electronics in Warfare, Signals

Absolutely Astounding... Project West Ford. I'll let the video speak for itself.

March 29, 2016 /Marc Handelman
All is Information, Communications, Electrical Engineering, Electronics in Warfare, Signals

RFID, The Un-Hackable... →

February 10, 2016 by Marc Handelman in All is Information, Information Security, Signals, Hubris

also known as Hubris, Thy Name Is..., via The Engineer

February 10, 2016 /Marc Handelman
All is Information, Information Security, Signals, Hubris

Seven Lines →

August 12, 2015 by Marc Handelman in All is Information, Alternate Attack Analysis, Ancillary Equipment, Information Security, Signals

Another nearly perfect example of why signals (radio frequency electromagnetic communications) are a vital component of multilevel security in the environment you either work in, or are exploited by...

In this fascinating project by Columbia University's Intrusion Detection Lab doctoral student Ang Cui, comes a reminder that embedded componentry can be leveraged to leak the blather contained in silicon; and, astoundingly, all it took was seven lines of code. Absolutely Phenomenal.

August 12, 2015 /Marc Handelman
All is Information, Alternate Attack Analysis, Ancillary Equipment, Information Security, Signals
Image Credit: Ben Caudill (Founder of Rhino Security Labs and Creator of ProxyHam)

Image Credit: Ben Caudill (Founder of Rhino Security Labs and Creator of ProxyHam)

ProxyHam BlackHat Talk Closed Down

July 14, 2015 by Marc Handelman in All is Information, Information Security, Signals

Via CSO Online's Steven Ragan, writing on the *Salted Hash blog, comes interesting news of the cancellation of Seattle's Rhino Security Labs' founder Ben Caudill's ProxyHam presentation, slated for DefCon 23. That is All.

July 14, 2015 /Marc Handelman /Source
All is Information, Information Security, Signals

ISOC Interplanetary Networking SIG Announces May Confab →

April 21, 2015 by Marc Handelman in All is Information, ISOC, ISOC IPNSIG, Signals, Networks, Network Protocols

The InterPlanetary Networking Special Interest Group (IPNSIG) of the Internet Society (ISOC) has announced the organizations' Second Annual IPN Conference in Washington, DC; slated for Monday, May 18, 2015. This time focusing on Delay & Disruption Tolerant Networking (DTN): the Emerging Standard for Space Data Communications.

Speakers include:

  • Vint Cerf (Google VP, co-author of TCP-IP, one of the “fathers of the Internet—and IPN-ISOC board member) will provide an overview of InterPlanetary Networking.
  • The NASA/Boeing team (Brett Willman & Suzanne Davidson) working on DTN aboard the International Space Station
  • The NASA team (David Israel & Donald Cornwell) who concluded the very successful Lunar Laser Communication Demonstration in late 2013 and who are planning the 2017 Laser Relay Communication Demonstration.
  • Scott Burleigh (JPL’s chief DTN architect) will be explaining recent significant enhancements to the ION DTN distribution (the distribution currently in use on ISS).
  • Keith Scott leads the Consultative Consortium for Space Data Systems (CCSDS) DTN working group that is standardizing DTN protocols for use in civilian space missions. He will talk about the Bundle Protocol becoming one of the networking protocols being standardized for space communication as part of the Solar System Internet (the other is IP).
  • Scott Pace is the Director of the Space Policy Institute at George Washington University. He will be speaking about the increasing importance of space policies as more nation states engage and collaborate in space exploration.

While admission is free for all to attend, and breakfast, lunch and an afternoon snack will be provided it is crucial that you register to attend. Physical attendance is limited to 150 people. The event will reportedly be webcast on the Internet Society’s LiveStream Channel and presentations will also be published on YouTube for VOD streaming poste-event. You can register for the event at the IPN's Eventbrite site.

April 21, 2015 /Marc Handelman
All is Information, ISOC, ISOC IPNSIG, Signals, Networks, Network Protocols
The RAM House by PROKOSS + Space Caviar

The RAM House by PROKOSS + Space Caviar

Faraday Home

April 18, 2015 by Marc Handelman in Signals, All is Information, Ancillary Equipment, Communications, Electrical Engineering, Identity Theft

The ulitmate whole-house signal-attenuation device.... Behold, the Faraday Home, perfect for the paranoid amongst us; or those that suffer from idiopathic environmental intolerance attributed to electromagnetic fields (IEI-EMF).

April 18, 2015 /Marc Handelman
Signals, All is Information, Ancillary Equipment, Communications, Electrical Engineering, Identity Theft

Mythos of IPv6, It's Too New to be Attacked... →

February 21, 2015 by Marc Handelman in All is Information, Common Sense, Communications, Compute Infrastructure, Cryptography, Data Security, Encryption, ICANN, IANA, Information Security, Internet Governance, IPSec, Network Security, Network Protocols, Networks, Signals

More IPV6 myths exposed by ISOC's Deploy360 Director Chris Grundemann. This time focusing on the myth that IPv6 is too new to be attacked. Today's MustRead!

February 21, 2015 /Marc Handelman
All is Information, Common Sense, Communications, Compute Infrastructure, Cryptography, Data Security, Encryption, ICANN, IANA, Information Security, Internet Governance, IPSec, Network Security, Network Protocols, Networks, Signals

IPv6 Security Myth: No NAT Means No Security

February 04, 2015 by Marc Handelman in All is Information, Common Sense, Communications, Compute Infrastructure, Cryptography, Data Security, Encryption, ICANN, IANA, Information Security, Internet Governance, IPSec, Network Protocols, Network Security, Networks, Signals

Astoundingly, myths still arise in this epoch of science, strangely so, when dealing with new technologies [Read: new means new in the final two years of the last century as IPv4 was originally codified by the IETF in 1981, with the acceptance of RFC 791] - in this case the vaunted move to IPv6. Now,  arising from the ashes of IPv4 exhaustion hysteria, comes a current popular myth surrounds the utilization NATs in IPv4  and the lack of a counterpart construct in IPv6.

⌘

February 04, 2015 /Marc Handelman
All is Information, Common Sense, Communications, Compute Infrastructure, Cryptography, Data Security, Encryption, ICANN, IANA, Information Security, Internet Governance, IPSec, Network Protocols, Network Security, Networks, Signals

Side Channeled →

January 19, 2015 by Marc Handelman in Information Security, Signals

Interesting signals research (yet already a given in modern, rigorous and protective environments) the notion of side channel analysis of extraneous electro-magentic signals has hit the popular computer media soapbox. This time, via PCWorlds' Jeremy Kirks' story, detailing research at Georgia Institute of Technology. Evidently, the work is ostensibly an effort to block signal emanation from the platforms under scrutiny. There is always room for a commercial application of a dampening field, perhaps another Cone of Silence?

January 19, 2015 /Marc Handelman
Information Security, Signals

Chaînes Bouché →

December 09, 2014 by Marc Handelman in All is Information, IETF, Information Security, Network Security, Signals, Wireless Security

Fascinating blog post at Trustwave SpiderLabs by  Tom Neaves, detailing a deep interest in all things wireless, and in this case 802.11 wireless and covert channel exploitation. Today's Must Read.

December 09, 2014 /Marc Handelman
All is Information, IETF, Information Security, Network Security, Signals, Wireless Security

WIFI, Overheard

November 24, 2014 by Marc Handelman in Oddities, Signals

In a rather bizarre case of superbes capacités auditives or Hyperacusia comes this story via IO9, detailing one man's capability to discern WIFI signals in and about his person. Odd that...

November 24, 2014 /Marc Handelman
Oddities, Signals
  • Newer
  • Older