SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Politics : Politics for Pros- moderated -- Ignore unavailable to you. Want to Upgrade?


To: Tom Clarke who wrote (404758)1/17/2011 6:49:52 AM
From: Tom Clarke2 Recommendations  Read Replies (1) | Respond to of 793957
 
EU sends out £4.4m diaries to schools which list Muslim, Chinese and Hindu holidays... but miss out Christmas and Easter

dailymail.co.uk



To: Tom Clarke who wrote (404758)1/17/2011 9:52:40 AM
From: FJB  Respond to of 793957
 
Yes, he really blew it on that one.



To: Tom Clarke who wrote (404758)1/17/2011 9:53:39 AM
From: FJB  Respond to of 793957
 
This would be useful for our intelligence agencies.

----------------------------------------------------------------

Coming soon: A new way to hack into your smartphone
By Robert McMillan
January 17, 2011 07:06 AM ETComments (0)Recommended (1)
IDG News Service - More than three years after the iPhone was first hacked, computer security experts think they've found a whole new way to break into mobile phones -- one that could become a big headache for Apple, or for smartphone makers using Google's Android software.

In a presentation set for next week's Black Hat conference in Washington D.C., University of Luxembourg research associate Ralf-Philipp Weinmann says he plans to demonstrate his new technique on an iPhone and an Android device, showing how they could be converted into clandestine spying systems. "I will demo how to use the auto-answer feature present in most phones to turn the telephone into a remote listening device," he said in an e-mail interview.

Weinmann says he can do this by breaking the phone's "baseband" processor, used to send and receive radio signals as the device communicates on its cellular network. He has found bugs in the way the firmware used in chips sold by Qualcomm and Infineon Technologies processes radio signals on the GSM (Global System for Mobile Communications) networks used by the majority of the world's wireless carriers.

This is a new area of research. Until recently, mobile phone attacks had focused on another part of the phone: the programs and operating systems that runs on the device's CPU. By tricking someone into visiting a malicious Web site, for example, hackers could take advantage of a Web browser bug on the phone and start messing around with the computer's memory.

With baseband hacking, security researchers are looking at a brand new way to get into this memory.

"[It's] like tipping over a rock that no one ever thought would be tipped over," said the Grugq -- a pseudonymous, but well-respected, wireless phone hacker, and one of a handful of people who have done research in this area. "There are a lot of bugs hidden there," he said, "It is just a matter of actively looking for them."

But hacking a smartphone with a baseband attack is very tricky, to say the least. The mobile phone's radio communicates with a cell phone tower. So in Weinmann's attack, he has to first set up a fake cell phone tower and then convince his target phone to connect to it. Only then can he deliver his malicious code. And even then, the malicious code he writes must run on the firmware that's used by obscure radio processors -- something that most hackers know nothing about.

"This is an extremely technical attack," said Don Bailey, a security consultant with Isec Partners. He says that while the work on baseband hacking is very exciting -- and ultimately a big deal for the mobile phone industry -- he doesn't expect any attacks that target the general public to emerge anytime soon.

But the research into this area is just starting to take off, fuelled by new open-source software called OpenBTS that allows virtually anyone to set up their own cellular network radio tower with about US$2,000 worth of computer hardware.

Five years ago device makers didn't have to worry about this type of hacking, because it used to cost tens of thousands of dollars to set up a cellular tower. But OpenBTS has changed all that. "Now it's a completely different game," Bailey said.

It's a risky game too. In the U.S., federal wiretapping laws make it illegal to intercept phone calls over the licensed frequencies used by mobile phones. In August, it took intense last-minute negotiations between lawyers from the Electronic Frontier Foundation and the U.S. Federal Communications Commission before security researcher Chris Paget could demonstrate a very simple tower spoofing technique at the Defcon hacking conference in Las Vegas.

Two months from now another hacker conference, Vancouver's CanSecWest, will invite hackers to break into mobile phones using a low power transmitter. If their baseband attacks work, they can win cash prices. Conference organizer Dragos Ruiu said that Canada's broadcast laws are "more lenient' for researchers who want to set up low-power towers for research purposes.

Still, it remains a touchy subject. "Last year we were worried about falling afoul of regulations," he said."Now we've figured out a nice safe way to do that so that we don't mess up anybody else's cell phones at the conference."

Ruiu expects some interesting results from the contest, called Pwn2Own. "It sounds like the radio parts of the phones are very shaky indeed and pretty vulnerable," he said.



To: Tom Clarke who wrote (404758)1/17/2011 3:07:15 PM
From: SmoothSail2 Recommendations  Read Replies (1) | Respond to of 793957
 
I'm a little surprised at some of Scalia's opinions. This from The Week:

Justice Scalia's 'shocking' stance on sex discrimination
Women's rights advocates are seething after Scalia says the Constitution does not prohibit discrimination against women and gays
posted on January 5, 2011, at 11:48 AM

Justice Scalia says he believes in an "enduring Constitution" in which the document's original meaning does not evolve to meet the current society's norms.

Supreme Court Justice Antonin Scalia touched off a fierce debate over the Constitution this week by saying, in an interview with California Lawyer magazine, that the 14th Amendment does not protect against discrimination based on gender or sexual orientation. Marcia Greenberger, co-president of the National Women's Law Center, called Scalia's stance "shocking," saying it suggests the government could allow discrimination against women and the courts would have no constitutional grounds to stop it. Did Scalia misspeak? (Watch an MSNBC discussion about Scalia's comments)

Scalia is just plain wrong: Justice Scalia should know better, says Alex Pareene in Salon. The 14th Amendment says "equal protection under the laws will be afforded to citizens, not 'straight male citizens,' or whatever distinction Scalia's making here." He's supposed to be the "originalist" who goes by what the Constitution says, so he should interpret it "literally," not twist it to suit his "ultra-conservative Republican" politics.
"Antonin 'Women Don't Have Rights' Scalia will teach Republicans the Constitution"

There is nothing shocking about what Scalia said: Justice Scalia's view is "neither novel nor new," says William Jacobson in Legal Insurrection. "The Constitution does not address discrimination on the basis of sex" — if it did, the Equal Rights Amendment would never have been proposed. As usual, liberals are "dumbing-down" the Constitution to make it mean what they want it to mean.
"More dumbed-down talk about the Constitution from a you-know-who"

Scalia is only half right: The 14th Amendment was actually intended to protect some women, says Jack Balkin in Balkinization. When the amendment was being debated in 1868, supporters figured it wouldn't affect married women, whose identities at the time were legally merged with their husbands'. But lawmakers knew they were extending rights to single women, who weren't covered by existing rules. Scalia needs to brush up on his history.
"Scalia on sex equality"

theweek.com