Monday, August 07, 2006

Lebanon: Galloway wipes the floor with Sky News anchor

FPF: GREAT TV INTERVIEW (MONOLOGUE...). SOMETHING ONE HARDLY EVER SEES:

LEBANON: GALLOWAY WIPES THE FLOOR WITH SKY NEWS ANCHOR

SHE MIGHT AS WELL HAVE PUNCHED HIM IN THE FACE AND HANDED HIM A GUN.

From Sky News*

George Galloway is a fireplug. I am glad we have him on our side. God bless him and keep him safe.

SKY NEWS ANCHOR:

Joining me now is a man who’s not known for sitting on the fence. He passionately opposed the invasion of Iraq and now he feels that Hizbullah is justified in attacking Israel. The Respect MP for Bethnel Green is in our London studio.

A very good evening, uh good morning to you Mr. Galloway. How do you JUSTIFY your support for Hizbullah and its leader Sheik Hassan Nasrallah?

[SHE MIGHT AS WELL HAVE PUNCHED HIM IN THE FACE AND HANDED HIM A GUN.]

GALLOWAY (LAUGHING): WHAT A PREPOSTEROUS WAY TO INTRODUCE AN ITEM AND WHAT A PREPOSTEROUS FIRST QUESTION.

Twenty four years ago, on the day my daughter was born and I’ve just celebrated her 24th birthday, I had to dash to the maternity hospital to see her giving birth from a mass demonstration in London against the Israeli invasion and occupation of Lebanon. Israel has been invading and occupying Lebanon all of my 24yr old daughter’s life.

The Hizbullah are a part of the national resistance who are trying to drive, having successfully driven most Israelis from their land in 2000, Israel from the rest of their land and to get back those thousands of Lebanese prisoners who were kidnapped by Israel under the terms of their illegal occupation of Lebanon.

It’s Israel that’s invading Lebanon. It’s Israel that’s attacking Lebanon. Not Lebanon that’s attacking Israel. You’ve just been carrying a report of 10 Israeli soldiers on the border getting ready to invade Lebanon and you ask us to mourn that operation as if it were some kind of war crime. Israel has invaded Lebanon and has killed thirty times more Lebanese . . .

[she tries to interrupt him “you put your finger on the button didn’t you?”]

. . . than have died in Israel. So, it’s YOU who should be JUSTIFYING the evident bias which is written on EVERY line of your face and is in EVERY nuance of your voice and is loaded in EVERY question that you ask.

WOW!!! AND BELIEVE IT OR NOT – YOU AINT SEEN NOTHING YET. THIS INTERVIEW ENDS WITH A REAL BANG. GALLOWAY CUTS STRAIGHT TO THE CORE.

TO SAY THAT HE WIPED THE FLOOR WITH HER ACTUALLY MINIMIZES THE DAMAGE HE INFLICTED ON THIS WOMAN’S EGO.

BY THE END OF THIS INTERVIEW, SHE WAS EITHER SUICIDAL OR HOMICIDAL.

SERVES HER RIGHT FOR SELLING HER SOUL FOR A PALTRY PRICE.
 
Story in Beirut - Urk.: http://beirut.indymedia.org/ar/2006/08/5172.shtml

Url.: http://www.freespeechwar.com/smf/index.php?topic=2884.0

Homepage: http://www.freespeechwar.com/smf/index.php?topic=2884.0

Indymedia home page Lebanon - Beirut - Url.: http://beirut.indymedia.org/index.shtml

* Hundreds dying in Lebanon as Israel seeks to destroy the country - Media Monitor - Url.: http://usa.mediamonitors.net/content/view/full/33618

* DEFENDING ISRAELI GENOCIDES: Yesha Rabbinical Council: During time of war, enemy has no innocents - The Yesha Rabbinical Council announced in response to an IDF attack in Kfar Qanna that "according to Jewish law, during a time of battle and war, there is no such term as 'innocents' of the enemy." - All of the discussions on Christian morality are weakening the spirit of the army and the nation and are costing us in the blood of our soldiers and civilians," the statement said. (Efrat Weiss) - Url.: http://www.ynetnews.com/articles/0,7340,L-3283720,00.html

* THE US/ISRAELI COLLABORATORS IN 'THE NETHERLANDS' - AS ALL OTHER MEMBERS OF THE 'COALITION OF THE KILLING' - SUPPORT THE US/ISRAELI GENOCIDES AND INHUMANITIES. THEY KEEP SILENT, EVEN WHEN THEY ARE GUILTY OF WAR CRIMES. THEY SILENCE EVERYBODY, WHILE DOING NOTHING TO STOP THE SLAUGHTER. THEY HAVE BLOOD ON THEIR HANDS: AFTER THE NUREMBERG WAR CRIMES TRIBUNALS, NAZI CRIMINALS LIKE THESE WERE HANGED BY THE AMERICANS.

* DEFINITION OF SEMITES: from The Collin’s English Dictionary -1984 - "Semitic: a member of the group of Caucasoid people who speak a Semitic language, including the Jews and Arabs as well as the Ancient Babylonians (Iraqis), the Assyrians (Syria), and the Phoenicians (the Lebanese of today). Semitic: a branch or sub-family of languages that includes Arabic, Aramaic, Hebrew.” - THE PALESTINIANS ARE PURE SEMITES!

* PREPARING THE GENOCIDE FOR 'ERETZ ISRAEL' - 'A Clean Break: Strategy for Securing the Realm' - The new Israeli ''Pentagon Papers'' - Url.: http://tinyurl.com/zksqh

* US/ISRAELI GENOCIDE NEWS: ''MORE TIME TO BOMB'' - ESSENTIAL 6 MINUTE VIDEO - We defy anyone to watch this 6 minute video, entitled MORE TIME TO BOMB, and not be so enraged at the scale of Israel's atrocities in Lebanon and Gaza, that they commit themselves to persuade everyone they know to join the Emergency National Demonstration on SATURDAY 5 AUGUST. - 6 minute video - Url.: http://tinyurl.com/k8mm5

* 'THE ISRAELITE PEOPLE OF THE ENTIRE WORLD DECLARE ECONOMIC AND FINANCIAL WAR ON GERMANY' - 24 March 1933, on the front page of the London Daily Express appeared the main headlines: "Judaea declares war on Germany: Jews of all the world unite" - Url.: http://www.heretical.com/mkilliam/wwii.html -

* March 1933 also was the month this same group in London knew about 'Brethren in the jewish Faith' which were holocausting up to ten million people in Ukraine. Via the Sovjet Union, where they were in power too. In their Sovjet 'Gulag system' around 40 million human beings were killed. The New York Times' Moscow 'correspondent' Walter Duranty even got a Pulitzer prize (same people) for his slander and inhuman silence. - Url.: http://tinyurl.com/eqkgq

* The Dutch author this far has worked abroad more than 4 decades for international media as an independent foreign correspondent, of which 10 years - also during Gulf War I - in the Arab World and the Middle East. Having practical experience of coups and the obscenity of war: seeing worldwide that every bullet and every bomb breeds more terrorism!

* RELATED: BACKGROUND LINKS TO THOSE RESPONSIBLE - If after checking a factual error is found, pls. send an email. - Url.: http://tinyurl.com/fhln9

* IT'S VERY UNLIKELY, but if you indeed would prefer to unsubscribe from the FPF-list: just send an email in return with the word 'unsubscribe'.

* FPF-COPYRIGHT NOTICE - In accordance with Title 17 U. S. C. Section 107 - any copyrighted work in this message is distributed by the Foreign Press Foundation under fair use, without profit or payment, to those who have expressed a prior interest in receiving the information. Url.: http://liimirror.warwick.ac.uk/uscode/17/107.html

FOREIGN PRESS FOUNDATION
Editor: Henk Ruyssenaars
http://tinyurl.com/66dmo
The Netherlands
fpf@chello.nl

-0-







 

 

 

Hackers Clone E-Passports - Homeland Security?

THE CHIP IS NOT IN AND OF ITSELF A SILVER BULLET...

By Kim Zetter

LAS VEGAS - August 3, 2006 - A German computer security consultant has shown that he can clone the electronic passports that the United States and other countries are beginning to distribute this year.

The controversial e-passports contain radio frequency ID, or RFID, chips that the U.S. State Department and others say will help thwart document forgery. But Lukas Grunwald, a security consultant with DN-Systems in Germany and an RFID expert, says the data in the chips is easy to copy.

"THE WHOLE PASSPORT DESIGN IS TOTALLY BRAIN DAMAGED," GRUNWALD SAYS. "FROM MY POINT OF VIEW ALL OF THESE RFID PASSPORTS ARE A HUGE WASTE OF MONEY. THEY'RE NOT INCREASING SECURITY AT ALL."

Grunwald plans to demonstrate the cloning technique Thursday at the Black Hat security conference in Las Vegas.
The United States has led the charge for global e-passports because authorities say the chip, which is digitally signed by the issuing country, will help them distinguish between official documents and forged ones.

THE UNITED STATES PLANS TO BEGIN ISSUING E-PASSPORTS TO U.S. CITIZENS BEGINNING IN OCTOBER. GERMANY HAS ALREADY STARTED ISSUING THE DOCUMENTS.

Although countries have talked about encrypting data that's stored on passport chips, this would require that a complicated infrastructure be built first, so currently the data is not encrypted.

"And of course if you can read the data, you can clone the data and put it in a new tag," Grunwald says.
The cloning news is confirmation for many e-passport critics that RFID chips won't make the documents more secure.

"Either this guy is incredible or this technology is unbelievably stupid," says Gus Hosein, a visiting fellow in information systems at the London School of Economics and Political Science and senior fellow at Privacy International, a U.K.-based group that opposes the use of RFID chips in passports.

"I think it's a combination of the two," Hosein says. "Is this what the best and the brightest of the world could come up with? Or is this what happens when you do policy laundering and you get a bunch of bureaucrats making decisions about technologies they don't understand?"

Grunwald says it took him only two weeks to figure out how to clone the passport chip. Most of that time he spent reading the standards for e-passports that are posted on a website for the International Civil Aviation Organization, a United Nations body that developed the standard. He tested the attack on a new European Union German passport, but the method would work on any country's e-passport, since all of them will be adhering to the same ICAO standard.

IN A DEMONSTRATION FOR WIRED NEWS, Grunwald placed his passport on top of an official passport-inspection RFID reader used for border control. He obtained the reader by ordering it from the maker -- Walluf, Germany-based ACG Identification Technologies -- but says someone could easily make their own for about $200 just by adding an antenna to a standard RFID reader.

He then launched a program that border patrol stations use to read the passports -- called GOLDEN READER TOOL and made by Secunet Security Networks -- and within four seconds, the data from the passport chip appeared on screen in the Golden Reader template.

Grunwald then prepared a sample blank passport page embedded with an RFID tag by placing it on the reader -- which can also act as a writer -- and burning in the ICAO layout, so that the basic structure of the chip matched that of an official passport.

As the final step, he used a program that he and a partner designed two years ago, called RFDUMP, to program the new chip with the copied information.

THE RESULT WAS A BLANK DOCUMENT THAT LOOKS, TO ELECTRONIC PASSPORT READERS, LIKE THE ORIGINAL PASSPORT.

Although he can clone the tag, Grunwald says it's not possible, as far as he can tell, to change data on the chip, such as the name or birth date, without being detected. That's because the passport uses cryptographic hashes to authenticate the data.

When he was done, he went on to clone the same passport data onto an ordinary smartcard -- such as the kind used by corporations for access keys -- after formatting the card's chip to the ICAO standard. He then showed how he could trick a reader into reading the cloned chip instead of a passport chip by placing the smartcard inside the passport between the reader and the passport chip.

BECAUSE THE READER IS DESIGNED TO READ ONLY ONE CHIP AT A TIME, IT READ THE CHIP NEAREST TO IT -- IN THE SMARTCARD -- RATHER THAN THE ONE EMBEDDED IN THE PASSPORT.

The demonstration means a terrorist whose name is on a watch list could carry a passport with his real name and photo printed on the pages, but with an RFID chip that contains different information cloned from someone else's passport. Any border-screening computers that rely on the electronic information -- instead of what's printed on the passport -- would wind up checking the wrong name.

Grunwald acknowledges, however, that such a plot could be easily thwarted by a screener who physically examines the passport to make sure the name and picture printed on it match the data read from the chip.

Machine-readable OCR text printed at the bottom of the passport would also fail to match the RFID data.
Frank Moss, deputy assistant secretary of state for passport services at the State Department, says that designers of the e-passport have long known that the chips can be cloned and that other security safeguards in the passport design -- such as a digital photograph of the passport holder embedded in the data page -- would still prevent someone from using a forged or modified passport to gain entry into the United States and other countries.

"What this person has done is neither unexpected nor really all that remarkable," Moss says. "(T)he chip is not in and of itself a silver bullet.... It's an additional means of verifying that the person who is carrying the passport is the person to whom that passport was issued by the relevant government."

Moss also said that the United States has no plans to use fully automated inspection systems; therefore, a physical inspection of the passport against the data stored on the RFID chip would catch any discrepancies between the two.

THERE ARE OTHER COUNTRIES, however, that are considering taking human inspectors out of the loop. Australia, for one, has talked about using automated passport inspection for selected groups of travelers, Moss says.

In addition to the danger of counterfeiting, Grunwald says that the ability to tamper with e-passports opens up the possibility that someone could write corrupt data to the passport RFID tag that would crash an unprepared inspection system, or even introduce malicious code into the backend border-screening computers. This would work, however, only if the backend system suffers from the kind of built-in software vulnerabilities that have made other systems so receptive to viruses and Trojan-horse attacks.

"I WANT TO SAY TO PEOPLE THAT IF YOU'RE USING RFID PASSPORTS, THEN PLEASE MAKE IT SECURE," GRUNWALD SAYS.

"This is in your own interest and it's also in my interest. If you think about cyberterrorists and nasty, black-hat type of guys, it's a high risk.... From my point of view, it should not be possible to clone the passport at all."

Hosein agrees. "Is this going to be the massive flaw that makes the whole house of cards fall apart? Probably not. But I'm not entirely sure how confident we should feel about these new passports."

Grunwald's technique requires a counterfeiter to have physical possession of the original passport for a time. A forger could not surreptitiously clone a passport in a traveler's pocket or purse because of a built-in privacy feature called Basic Access Control that requires officials to unlock a passport's RFID chip before reading it. The chip can only be unlocked with a unique key derived from the machine-readable data printed on the passport's page.

To produce a clone, Grunwald has to program his copycat chip to answer to the key printed on the new passport.
Alternatively, he can program the clone to dispense with Basic Access Control, which is an optional feature in the specification.

GRUNWALD'S ISN'T THE ONLY RESEARCH ON E-PASSPORT PROBLEMS CIRCULATING AT BLACK HAT.

Kevin Mahaffey and John Hering of Flexilis released a video Wednesday demonstrating that a privacy feature slated for the new passports may not work as designed.

As planned, U.S. e-passports will contain a web of metal fiber embedded in the front cover of the documents to shield them from unauthorized readers. Though Basic Access Control would keep the chip from yielding useful information to attackers, it would still announce its presence to anyone with the right equipment. The government added the shielding after privacy activists expressed worries that a terrorist could simply point a reader at a crowd and identify foreign travelers.

In theory, with metal fibers in the front cover, nobody can sniff out the presence of an e-passport that's closed. But Mahaffey and Hering demonstrated in their video how even if a passport opens only half an inch -- such as it might if placed in a purse or backpack -- it can reveal itself to a reader at least two feet away.

USING A MOCKUP E-PASSPORT MODELED ON THE U.S. DESIGN, THEY SHOWED HOW AN ATTACKER COULD CONNECT A HIDDEN, IMPROVISED BOMB TO A READER SUCH THAT IT TRIGGERS AN EXPLOSION WHEN A PASSPORT-HOLDER COMES WITHIN RANGE.

In addition to cloning passport chips, Grunwald has been able to clone RFID ticket cards used by students at universities to buy cafeteria meals and add money to the balance on the cards.

He and his partners were also able to crash RFID-enabled alarm systems designed to sound when an intruder breaks a window or door to gain entry. Such systems require workers to pass an RFID card over a reader to turn the system on and off. Grunwald found that by manipulating data on the RFID chip he could crash the system, opening the way for a thief to break into the building through a window or door.

And they were able to clone and manipulate RFID tags used in hotel room key cards and corporate access cards and create a master key card to open every room in a hotel, office or other facility. He was able, for example, to clone MIFARE, the most commonly used key-access system, designed by Philips Electronics. To create a master key he simply needed two or three key cards for different rooms to determine the structure of the cards. Of the 10 different types of RFID systems he examined that were being used in hotels, NONE USED ENCRYPTION.

Many of the card systems that did use encryption failed to change the default key that manufacturers program into the access card system before shipping, or they used sample keys that the manufacturer includes in instructions sent with the cards.

Grunwald and his partners created a dictionary database of all the sample keys they found in such literature (much of which they found accidentally published on purchasers' websites) to conduct what's known as a dictionary attack.

When attacking a new access card system, their RFDump program would search the list until it found the key that unlocked a card's encryption.

"I was really surprised we were able to open about 75 percent of all the cards we collected," he says.
 
-0-

Story at Wired News - Url.: http://www.wired.com/news/technology/1,71521-0.html

SEE ALSO

* The RFID Hacking Underground
* Fatal Flaw Weakens RFID Passports
* Lawmaker Rips RFID Passport Plans
* Feds Rethinking RFID Passport
* Passport Chip Criticism Grows
* American Passports to Get Chipped

FPF - RELATED:

* Chertoff's Secret Electronic Control Net - Url.: http://tinyurl.com/jqv4d

* ID cards: a story I thought I'd never write - Url.: http://tinyurl.com/7gszw

* GLOBAL CONTROL SYSTEM: BACKGROUND LINKS TO THOSE RESPONSIBLE - If after checking a factual error is found, pls. send an email. - Url.: http://tinyurl.com/fhln9

* FPF-COPYRIGHT NOTICE - In accordance with Title 17 U. S. C. Section 107 - any copyrighted work in this message is distributed by the Foreign Press Foundation under fair use, without profit or payment, to those who have expressed a prior interest in receiving the information. Url.: http://liimirror.warwick.ac.uk/uscode/17/107.html

FOREIGN PRESS FOUNDATION
Editor: Henk Ruyssenaars
http://tinyurl.com/66dmo
The Netherlands
fpf@chello.nl

-0-