Monday, February 23, 2015

Monday 02-23-15


If spies can so can other people and groups

Spies Can Track You Just by Watching Your Phone’s Power Use

Smartphone users might balk at letting a random app like Candy Crush or Shazam track their every move via GPS. But researchers have found that Android phones reveal information about your location to every app on your device through a different, unlikely data leak: the phone’s power consumption.
Researchers at Stanford University and Israel’s defense research group Rafael have created a technique they call PowerSpy, which they say can gather information about an Android phone’s geolocation merely by tracking its power use over time. That data, unlike GPS or Wi-Fi location tracking, is freely available to any installed app without a requirement to ask the user’s permission. That means it could represent a new method of stealthily determining a user’s movements with as much as 90 percent accuracy—though for now the method only really works when trying to differentiate between a certain number of pre-measured routes.
Spies might trick a surveillance target into downloading a specific app that uses the PowerSpy technique, or less malicious app makers could use its location tracking for advertising purposes, says Yan Michalevski, one of the Stanford researchers. “You could install an application like Angry Birds that communicates over the network but doesn’t ask for any location permissions,” says Michalevski.  “It gathers information and sends it back to me to track you in real time, to understand what routes you’ve taken when you drove your car or to know exactly where you are on the route. And it does it all just by reading power consumption.”
PowerSpy takes advantage of the fact that a phone’s cellular transmissions use more power to reach a given cell tower the farther it travels from that tower, or when obstacles like buildings or mountains block its signal. That correlation between battery use and variables like environmental conditions and cell tower distance is strong enough that momentary power drains like a phone conversation or the use of another power-hungry app can be filtered out, Michalevsky says.
One of the machine-learning tricks the researchers used to detect that “noise” is a focus on longer-term trends in the phone’s power use rather than those than last just a few seconds or minutes. “A sufficiently long power measurement (several minutes) enables the learning algorithm to ‘see’ through the noise,” the researchers write. “We show that measuring the phone’s aggregate power consumption over time completely reveals the phone’s location and movement.”
Even so, PowerSpy has a major limitation: It requires that the snooper pre-measure how a phone’s power use behaves as it travels along defined routes. This means you can’t snoop on a place you or a cohort has never been, as you need to have actually walked or driven along the route your subject’s phone takes in order to draw any location conclusions. The Stanford and Israeli researchers collected power data from phones as they drove around California’s Bay Area and the Israeli city of Haifa. Then they compared their dataset with the power consumption of an LG Nexus 4 handset as it repeatedly traveled through one of those routes, using a different, unknown choice of route with each test. They found that among seven possible routes, they could identify the correct one with 90 percent accuracy.
“If you take the same ride a couple of times, you’ll see a very clear signal profile and power profile,” says Michalevsky. “We show that those similarities are enough to recognize among several possible routes that you’re taking this route or that one, that you drove from Uptown to Downtown, for instance, and not from Uptown to Queens.”
Michalevsky says the group hopes to improve its analysis to apply that same level of accuracy to tracking phones through many more possible paths and with a variety of phones—they already believe that a Nexus 5 would work just as well, for instance. The researchers also are working on detecting more precisely where in a known route a phone is at any given time. Currently the precision of that measurement varies from a few meters to hundreds of meters depending upon how long the phone has been traveling.
The researchers have attempted to detect phones’ locations even as they travel routes the snooper has never fully seen before. That extra feat is accomplished by piecing together their measurements of small portions of the routes whose power profiles have already been pre-measured. For a phone with just a few apps like Gmail, a corporate email inbox, and Google Calendar, the researchers were able determine a device’s exact path about two out of three times. For phones with half a dozen additional apps that suck power unpredictably and add noise to the measurements, they could determine a portion of the path about 60 percent of the time, and the exact path just 20 percent of the time.
Even with its relative imprecision and the need for earlier measurements of power use along possible routes, Michalevsky argues that PowerSpy represents a privacy problem that Google hasn’t fully considered. Android makes power consumption data available to all apps for the purpose of debugging. But that means the data easily could have been restricted to developers, nixing any chance for it to become a backdoor method of pinpointing a user’s position.
Google didn’t respond to WIRED’s request for comment.
This isn’t the first time that Michalevsky and his colleagues have used unexpected phone components to determine a user’s sensitive information. Last year the same researchers’ group, led by renowned cryptographer Dan Boneh, found that they could exploit the gyroscopes in a phone as crude microphones. That “gyrophone” trick was able to to pick up digits spoken aloud into the phone, or even to determine the speaker’s gender. “Whenever you grant anyone access to sensors on a device, you’re going to have unintended consequences,” Stanford professor Boneh told WIRED in August when that research was unveiled.
Stanford’s Michalevsky says that PowerSpy is another reminder of the danger of giving untrusted apps access to a sensor that picks up more information than it’s meant to. “We can abuse attack surfaces in unexpected ways,” he says, “to leak information in ways that it’s not supposed to leak.”
Read the full PowerSpy paper below.

http://www.wired.com/2015/02/powerspy-phone-tracking/

DHS: You right wingnuts are worse than ISIS

The Department of Homeland Security has a lot on their hands lately. It seems as if some days they don’t know where to look first when dealing with a variety of threats. Whether it’s al Qaeda, ISIS, Boko Haram or sympathizers for any of a variety of terrorists groups, they are dealing with a dangerous world. But for some reason, CNN reports that the big threat this year is probably… sovereign citizens.
On second thought, maybe that whole defunding the DHS thing isn’t looking that bad.
A new intelligence assessment, circulated by the Department of Homeland Security this month and reviewed by CNN, focuses on the domestic terror threat from right-wing sovereign citizen extremists and comes as the Obama administration holds a White House conference to focus efforts to fight violent extremism.
Some federal and local law enforcement groups view the domestic terror threat from sovereign citizen groups as equal to — and in some cases greater than — the threat from foreign Islamic terror groups, such as ISIS, that garner more public attention.​
The Homeland Security report, produced in coordination with the FBI, counts 24 violent sovereign citizen-related attacks across the U.S. since 2010.
24 attacks in the last five years is 24 too many, as I’m sure we can all agree. But we should also put things in perspective. Islamic terrorists can pull off that many in a week without breaking too much of a sweat. They make no secret of their intentions, but you always have to be on the lookout for who might be helping them on the home front.
But if it’s domestic threats that we’re worrying about, is this really the top trophy to go after? In 2012 (the last year of full records) there were 500 gang killings in Chicago alone. For those of you keeping score at home, unlike the 24 in the last five years racked up by the “sovereign citizens” brigade, that’s more than 28 every three weeks. In New York, youth gangs commit an estimated 40% of the shootings each year, and while the Big Apple has done an admirable job of bringing their murder rate down for several years now, that’s still a lot of lead flying through the air. I could go through the numbers for the other cities, but you get the point.
It goes beyond that, though. We have parades of people marching down the streets calling for the murder of cops. That’s not single point violence… it’s mayhem on a cultural scale which seeks to tear down the fabric of civilization. And if that’s not enough, if you take a tour of the more southwest regions, massively well funded, heavily armed and well organized drug cartels make regular forays into our nation dealing death and destruction on a daily basis. Math may not be my strong suit in terms of placing things in order of importance, but that seems fairly serious.
But… hey. 24 attacks in five years is pretty bad too, so you get right on that.

http://hotair.com/archives/2015/02/21/dhs-you-right-wingnuts-are-worse-than-isis/

No comments:

Post a Comment