Monday, September 10, 2007

Bump Cloning – A New Medical Procedure? If You Use Proximity Cards You Had Better Read This!

A young man in Belgium, Jonathan Westhues, has published on his web site details of how to make a "cloner" for proximity cards. This handheld device can be used to secretly copy your access control card from a distance and replay the card for any proximity card reader. The young man generously provided construction details and circuit diagrams for verification of his efforts.

This technique is called "bump cloning" because all that the adversary would have to do is "bump" you in a hallway or elevator to copy your card, even if it remains in your wallet. This would for all intents and purposes make his device a "clone" of your card, useable in any reader in the system!

A most worrying aspect of this device is the target person has no idea his card was "cloned" and therefore would have no reason to report it as being compromised. Additionally, if any mischief was done then the card access system would dutifully report the target's card number was used to access the space.

Wiegand and MiFare proximity card systems are apparently immune to this type of attack.

For further information go to:

CIA – Hands Off Wikipedia!!!

An online tool that claims to reveal the identity of organisations that edit Wikipedia pages has revealed that the CIA was involved in editing entries. (Wikipedia is a free online encyclopaedia that can be created and edited by anyone and is NOT a recommended resource for anybody researching for a university degree!)

Wikipedia Scanner allegedly shows that workers on the agency's computers made edits to the page of Iran's president. It also purportedly shows that the Vatican has edited entries about Sinn Fein leader Gerry Adams.

The tool, developed by a US researcher, trawls a list of 34m edits and matches them to the net address of the editor.

SM1 Delegates Set out on the Road to Masters Degree

Friday, 10th August saw the graduation of the latest Security Management Stage 1 (SM1) course in the UK. The course saw 7 of the 13 total delegates electing to take part in ARC and Middlesex University’s MSc programme. The MSc programme is challenging and comprehensive and these delegates showed that they have the right stuff by their enthusiastic participation and in particular their dedication in chasing a troublesome Tiger…

We wish all delegates well as they begin their journey towards this unique security qualification, look forward to seeing them on the next stage and to supporting them with their assignments and academic study.

Further forthcoming university-accredited courses include:

  • Security Management Stage 3, 24 September - 5 October 2007
  • Security Management Stage 2, 15 - 26 October 2007
  • Security Management Stage 1, 19 - 30 November 2007

Together, Security Management Stages 1, 2 & 3 constitute three of the six modules required for completion of the Masters Degree.

Laser Sensor Provides Depth to Perimeter Protection

Safeguards Technology’s Laser Guard Sensor (LGS™) is an advanced sensor utilizing state of the art technology for the detection of human intruders into a secured area. The LGS is suitable for stationary and rapid deployment applications and can also function as a “forward looking” sensor providing depth to the perimeter security system and pre-alarm alert. Applications include electric / nuclear power plants, harbour and port facilities, correctional facilities, airports, isolated sensitive sites and temporary surveillance needs.

Laser perimeter intrusion detection systems (PIDS) will be one of a number of state-of-the-art PIDS technologies discussed in the new “Specifying Security Technology” Course, to be held in the UK, 18-22 August 2008.

Live Cobra Snake Replaces Security Guards in London

A real-life Egyptian cobra has been hired by London store Harrods to guard a pair of shoes worth $120,000. Presumably Harrods felt that the temptation of the diamond encrusted sandals would be too tempting a target for security guards!!

Security experts have yet to comment on the story………

Security Technology Training

David Cresswell is in Prague during the week 10-14 September, working with Czech partners Orange Group a.s., conducting a course in security technology, focussing particularly on CCTV, electronic access control systems, biometrics, perimeter intrusion detection systems and building intrusion detection systems. The nine delegates attending the programme are drawn from a mix of sectors including government security, security consultancy services, guarding and power generation.

If your job requires you to oversee the implementation of CCTV, access control and intrusion detection systems, a detailed new one-week programme examining how to select, specify and deploy security technology entitled “Specifying Security Technology” will be held in the UK, 18-22 August 2008.

ID Theft - How Easy Is It to Become a Victim?

It seems frighteningly easy for criminals to steal personal details and then open credit accounts, take out mortgage loans, and run up huge debts that victims will have difficulty proving are not theirs.

Listen to personal testimonies and find out how to avoid falling into the trap of giving sensitive information away in the BBC’s Global Crime Report. To access the audio link click here and follow instructions:

http://www.bbc.co.uk/worldservice/programmes/global_crime_report/radioseries/gpradioseries.shtml