4
The Argonne Vulnerability Assessment Team (http://www.ne.anl.gov/capabilities/vat) in the News GPS Spoofing Tara McKelvey, “Aerial Drones May Be Vulnerable to Sabotage Because of GPS”, http://www.thedailybeast.com/articles/2011/12/17/aerialdronesmaybevulnerableto sabotagebecauseofgps.html John Brandon, “Six Rising Threats from CyberCriminals”, http://www.computerworld.com/s/article/9216603/Six_rising_threats_from_cybercriminals Election Security Victoria Collier, “How to Rig an Election”, Harper’s Magazine 325, 3341 (November 2012), http://harpers.org/print/?pid=225772 “How Your Vote Can Be Hacked”, http://money.cnn.com/video/technology/2012/10/31/ts votingmachinehack.cnnmoney/index.html?iid=HP_River Laura Spadanuta, “Machine Politics”, Security Management 56(10) 5057 (September 2012), http://securitymanagement.com/article/machinepolitics0010437?page=0%2C0 "How I Hacked an Electronic Voting Machine", http://www.popsci.com/category/tags/roger johnston RT News live interview, http://www.youtube.com/watch?v=Ksvd7FJtNuU&list=UUczrL2b gYK3l4yDld4XlQ&index=5&feature=plcp Bill Mego, Naperville Sun Times, October 2, 2012, http://napervillesun.suntimes.com/news/15493042418/countingvotesshouldbea transparentprocess.html Etan Trex and Matt Soniak, “How Secure are Electronic Voting Machines?”, Mental Floss 11 (1), January/February 2012, pg 50. Kane Farabaugh, “U.S. Lab Says Electronic Voting Machines Easy to Hack”, http://www.voanews.com/english/news/usa/USLabSaysElectronicVotingMachinesEasy toHack132016698.html David Gewirtz, “The Scary Truth About Voting Machine Hacking Risk”, http://www.zdnet.com/blog/government/thescarytruthaboutvotingmachinehacking riskexclusivevideo/10945

The Argonne Vulnerability Assessment Team in the News

Embed Size (px)

DESCRIPTION

Videos, interviews, and news stories about the Vulnerability Assessment Team (VAT) at Argonne National Laboratory. The VAT discovers and demonstrates easy-to-exploit vulnerabilities in a wide range of physical security devices and systems including locks, tamper-indicating seals, tags, access control systems, biometrics, GPS, nuclear safeguards, and electronic voting machines. The VAT then proposes practical countermeasures.

Citation preview

Page 1: The Argonne Vulnerability Assessment Team in the News

The  Argonne  Vulnerability  Assessment  Team  (http://www.ne.anl.gov/capabilities/vat)  in  the  News      

 GPS  Spoofing    Tara  McKelvey,  “Aerial  Drones  May  Be  Vulnerable  to  Sabotage  Because  of  GPS”,  http://www.thedailybeast.com/articles/2011/12/17/aerial-­‐drones-­‐may-­‐be-­‐vulnerable-­‐to-­‐sabotage-­‐because-­‐of-­‐gps.html    John  Brandon,  “Six  Rising  Threats  from  CyberCriminals”,  http://www.computerworld.com/s/article/9216603/Six_rising_threats_from_cybercriminals        Election  Security    Victoria  Collier,  “How  to  Rig  an  Election”,  Harper’s  Magazine  325,  33-­‐41  (November  2012),  http://harpers.org/print/?pid=225772    “How  Your  Vote  Can  Be  Hacked”,  http://money.cnn.com/video/technology/2012/10/31/ts-­‐voting-­‐machine-­‐hack.cnnmoney/index.html?iid=HP_River    Laura  Spadanuta,  “Machine  Politics”,  Security  Management  56(10)  50-­‐57  (September  2012),  http://securitymanagement.com/article/machine-­‐politics-­‐0010437?page=0%2C0    "How  I  Hacked  an  Electronic  Voting  Machine",  http://www.popsci.com/category/tags/roger-­‐johnston    RT  News  live  interview,  http://www.youtube.com/watch?v=Ksvd7FJtNuU&list=UUczrL-­‐2b-­‐gYK3l4yDld4XlQ&index=5&feature=plcp    Bill  Mego,  Naperville  Sun  Times,  October  2,  2012,  http://napervillesun.suntimes.com/news/15493042-­‐418/counting-­‐votes-­‐should-­‐be-­‐a-­‐transparent-­‐process.html    Etan  Trex  and  Matt  Soniak,  “How  Secure  are  Electronic  Voting  Machines?”,  Mental  Floss  11  (1),  January/February  2012,  pg  50.    Kane  Farabaugh,  “U.S.  Lab  Says  Electronic  Voting  Machines  Easy  to  Hack”,  http://www.voanews.com/english/news/usa/US-­‐Lab-­‐Says-­‐Electronic-­‐Voting-­‐Machines-­‐Easy-­‐to-­‐Hack-­‐132016698.html    David  Gewirtz,  “The  Scary  Truth  About  Voting  Machine  Hacking  Risk”,  http://www.zdnet.com/blog/government/the-­‐scary-­‐truth-­‐about-­‐voting-­‐machine-­‐hacking-­‐risk-­‐exclusive-­‐video/10945    

Page 2: The Argonne Vulnerability Assessment Team in the News

 Salon.com,  “Diebold  voting  machines  can  be  hacked  by  remote  control”,    

                 http://www.salon.com/news/politics/elections/2011/09/27/votinghack    Brad  Friedman,  http://www.bradblog.com/?p=8785  and  http://www.bradblog.com/?p=8790  and  http://www.bradblog.com/?p=8818    Jaikumar  Vijayan,  “Argonne  researchers  'hack'  Diebold  e-­‐voting  system”,      http://www.computerworld.com/s/article/9220356/Argonne_researchers_hack_Diebold_e_vo  ting_system_?taxonomyId=85    Matt  Liebowitz,  “It  only  takes  $26  to  hack  a  voting  machine”,      http://www.msnbc.msn.com/id/44706301/ns/technology_and_science-­‐security/t/it-­‐only-­‐takes-­‐hack-­‐voting-­‐machine/#.ToRzrk-­‐Hqrc  

 Dan  Godin,  “Diebold  e-­‐voting  hack  allows  remote  tampering  $11  microprocessor-­‐in-­‐middle        attack  is  'significant'”,    http://www.theregister.co.uk/2011/09/28/diebold_electronic_vote_tampering/    Joan  Brunwasser,  “Roger  Johnston  on  Election  Security”,  http://www.opednews.com/articles/Argonne-­‐Lab-­‐s-­‐Head-­‐of-­‐Vuln-­‐by-­‐Joan-­‐Brunwasser-­‐110329-­‐968.html    Verified  Voting,  “Roger  Johnston  on  Security  Vulnerabilities  of  Electronic  Voting  (Video)”,  October  15,  2010,  http://blog.verifiedvoting.org/2010/10/15/1131    Roger  Johnston  interviewed  live  on  WTTW  Public  Television’s  “Chicago  Tonight”  program  about  electronic  voting  machine  security,  October  11,  2010,  (Video),  http://www.wttw.com/main.taf?p=42,8,80&pid=BMeOsuVOgSUbQammoGQxMlIX00avS55H    

 

 Physical  Security  Vulnerabilities  &  Vulnerability  Assessments    Phil  Rogers,  “Most  Security  Measures  Easy  to  Breach”,  (Video),  http://www.youtube.com/watch?v=frBBGJqkz9E    Michael  Kassner,  “Getting  Paid  to  Break  Into  Things:    How  Vulnerability  Assessors  Work  at  Argonne  National  Lab”,  http://www.techrepublic.com/blog/security/getting-­‐paid-­‐to-­‐break-­‐into-­‐things-­‐how-­‐vulnerability-­‐assessors-­‐work-­‐at-­‐argonne-­‐national-­‐lab/5072?tag=mantle_skin;content    Boonsri  Dickinson,  “At  Argonne  National  Lab,  Closing  the  Curtains  on  ‘Security  Theater’”,  November  9,  2010,  http://www.smartplanet.com/technology/blog/science-­‐scope/at-­‐argonne-­‐national-­‐lab-­‐closing-­‐the-­‐curtains-­‐on-­‐security-­‐theater/5167/      

Page 3: The Argonne Vulnerability Assessment Team in the News

 Louise  Lerner,  “The  Security  Fallacy:  Seven  Myths  About  Physical  Security”,  October  26,  2010,  http://www.anl.gov/Media_Center/News/2010/news101026.html    RG  Johnston,  “Proving  Voltaire  Right:    Security  Blunders  Dumber  Than  Dog  Snot”,  19th  USENIX  Security  Conference  Keynote  Address,  Washington,  D.C.,  August  11-­‐13,  2010,  http://www.youtube.com/watch?v=51MxGK2q7Wo  or  http://www.usenix.org/media/events/sec10/tech/videos/johnston.mp4    Bill  Brenner,  “Security  blunders  'dumber  than  dog  snot'”,  CSO  Data  Protection,  August  11,  2010,  http://www.csoonline.com/article/603043/security-­‐blunders-­‐dumber-­‐than-­‐dog-­‐snot-­‐    Review  of  the  VAT’s  presentation  at  ShmooCon  2010  in  Washington  DC,  February  5-­‐7,  2010:    http://www.shmoocon.org/presentations-­‐all.html#tamper  Video  of  the  presentation:    http://www.shmoocon.org/presentations-­‐all.html#tamper    Sarah  D.  Scalet,  “Vulnerability  Assessment’s  Big  Picture”,  CSO  Magazine,  June  2007,  pp.  32-­‐36,    http://www.csoonline.com/read/060107/fea_qa.html    “How  Flawed  is  Your  Security  Program?”,  informal  self  assessment  tool,  CSO  Online,  http://www2.csoonline.com/quizzes/security_assessment/index.php      

 

RFIDs    Ashley  Cullins  and  Brian  Warmoth,  “Digital  Privacy:    Are  You  Ever  Alone?”,  http://news.medill.northwestern.edu/chicago/news.aspx?id=187163    Sarah  D.  Scalet,  “The  5  Myths  of  RFID”,  CSO  Online,  May  2007,    http://www.csoonline.com/read/050107/fea_rfid.html          Other  Security  Issues    Eric  Parizo,  “Researcher  Details  Findings  on  Spoofing  GPS,  Malicious  Insiders”,  September  14,  2012,    http://searchsecurity.techtarget.com/video/Researcher-­‐details-­‐findings-­‐on-­‐spoofing-­‐GPS-­‐malicious-­‐insiders    Eric  Parizo,  “Vulnerability  Researcher  on  Layered  Security  Plan  Mistakes”,  September  14,  2012,  http://searchsecurity.techtarget.com/video/Vulnerability-­‐researcher-­‐on-­‐layered-­‐security-­‐plan-­‐mistakes    Kori  Chambers,  “Hackers  Using  TRENDnet  Webcams  to  Spy  on  People”,  February  10,  2012,  http://www.myfoxchicago.com/dpp/news/special_report/webcam-­‐trendnet-­‐camera-­‐hackers-­‐

Page 4: The Argonne Vulnerability Assessment Team in the News

privacy-­‐watching-­‐people-­‐undressing-­‐bedrooms-­‐security-­‐breech-­‐20120209      “Detecting  Sticky  Bombs”,  Homeland  Security  Newswire,  July  30,  2010,  http://homelandsecuritynewswire.com/detecting-­‐sticky-­‐bombs    Michael  Kassner,  “Phishing  Attacks:    Training  Tips  To  Keep  Your  Users  Vigilant”,  http://www.techrepublic.com/blog/security/phishing-­‐attacks-­‐training-­‐tips-­‐to-­‐keep-­‐your-­‐users-­‐vigilant/5402    Roger  Johnston  was  part  of  a  live  panel  discussion  on  the  program  “Chicago  Tonight”  on  WTTW  Public  Television  on  May  5,  2010.    The  topic  was  security  camera  efficacy.  http://www.wttw.com/main.taf?p=42,8,80&player=Chicago-­‐Tonight&pid=uhibkZxM40xVVFBFKo7i0MirNsWJEGXI    Laura  Spadanuta,  “Lessons  for  Layering”,  Security  Management  Podcast,  January,  2010,  http://www.securitymanagement.com/audio    Bill  Zalud,  “Fighting  Monsters  Can  Be  Monstrous”,  Security,  November,  2009,  pg.  114.    Michael  Kassner,  “IT  Security:  Maxims  for  the  Ages”,  September  28,  2009,  http://blogs.techrepublic.com.com/security/?p=2435    Steve  Gibson,  “Security  Maxims”,  Security  Now!  Podcast  #215,  September  24,  2009,  iTunes.com  or  http://www.grc.com/sn/sn-­‐215.htm    “New  Bottle  Cap  Thwarts  Wine  Counterfeiters”,  August  4,  2008,  http://www.physorg.com/news137081078.html  or  http://www.webwire.com/ViewPressRel.asp?aId=71479    “Argonne  Bolsters  Efforts  in  Security  Research”,  Eurekalert.org,  November  28,  2007,  http://www.eurekalert.org/pub_releases/2007-­‐11/dnl-­‐abe112707.php