<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>NetStumbler</title>
	<atom:link href="http://www.netstumbler.com/category/security/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.netstumbler.com</link>
	<description>The award-winning wireless networking tool and the best source for your daily Wi-Fi, WiMAX, 3G and VoIP news.</description>
	<lastBuildDate>Fri, 19 Sep 2014 17:52:12 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.5.1</generator>
		<item>
		<title>Wi-Fi Security &#8211; The Rise and Fall of WPS</title>
		<link>http://www.netstumbler.com/2013/01/18/wi-fi-security-the-rise-and-fall-of-wps/</link>
		<comments>http://www.netstumbler.com/2013/01/18/wi-fi-security-the-rise-and-fall-of-wps/#comments</comments>
		<pubDate>Fri, 18 Jan 2013 18:45:03 +0000</pubDate>
		<dc:creator>Brad Slavin</dc:creator>
				<category><![CDATA[Security]]></category>

		<guid isPermaLink="false">http://www.netstumbler.com/?p=3082</guid>
		<description><![CDATA[Wireless local-area networks which are also referred to as WLANs or Wi-Fi are prevalent these days. They are so popular that they can be found installed in offices, colleges, hotels, cafes, and even homes. There are many Wi-Fi product vendors and service providers, providing different products with different services and features. The main reason behind [...]]]></description>
				<content:encoded><![CDATA[<p>Wireless local-area networks which are also referred to as WLANs or Wi-Fi are prevalent these days. They are so popular that they can be found installed in offices, colleges, hotels, cafes, and even homes. There are many Wi-Fi product vendors and service providers, providing different products with different services and features. The main reason behind them being so popular is the convenience, mobility and ease of implementation they provide compared to the wired network. The end user can easily access the network without the hassle of managing the wires.</p>
<p>Wireless networks are basically based on the Institute of Electrical and Electronics Engineers (IEEE) 802.11 set of standards for WLANs. Following is the list of the IEEE 802.11 network protocol standards.</p>
<h2>Protocols</h2>
<p><center><img class="alignnone size-full wp-image-3086" alt="figure-1" src="http://www.netstumbler.com/wp-content/uploads/figure-1.png" width="650" height="338" /></center></p>
<p style="text-align: center;">802.11 network standards are shown in Figure 1.<br />
<strong style="line-height: 28px;">Figure 1. 802.11 Network Standards (source: http://www.wikipedia.org)</strong></p>
<p>Some years back, wireless networks were only a niche technology used for very specific applications. But nowadays they are everywhere and every now and then we find a new Wi-Fi access point through our smart phones, tablets or laptops – most of which are not even secure.</p>
<p>Most of us have used these access points at some point in time to access the Internet without realizing how much (In)security they provide.</p>
<p>An insecure Wi-Fi network poses a threat not only to the owner but to every user that accesses it. The first line of defense for a Wi-Fi network is encryption, which encrypts the data transmitted between the Wi-Fi enabled device (smart phone, tablet, laptop etc.) and the wireless router. The Wireless Protected Access (WPA) protocol and more recent WPA2 have replaced the older and less-secure practice of Wireless Encryption Protocol (WEP). It is better to go with WPA2 as WEP is relatively easy to crack. Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access 2 (WPA2) are two security protocols and security certification programs developed by the Wi-Fi Alliance to secure wireless computer networks by providing encryption mechanisms. But common users know little about wireless security and are scared by the available options to set up these methods.</p>
<p>Because of this unawareness and implementation issues with these protocols, in 2007 Wi-Fi Alliance came up with Wi-Fi Protected Setup (WPS) which allowed home users to easily add new devices to an already existing Wi-Fi network without entering long passphrases.</p>
<p><span id="more-3082"></span></p>
<p>Wi-Fi Protected Setup (WPS), originally known as Wi-Fi Simple Config, is a computing standard that attempts to allow easy establishment of a secure wireless home network. Almost all major Wi-Fi product vendors (Cisco/Linksys, Netgear, D-Link, Belkin, Buffalo, Technicolor, etc.) have WPS-certified devices. WPS is activated by default on almost all the WPS supporting devices. The main purpose of the standard is on providing usability along with security.</p>
<h2>Usage Methods</h2>
<p>WPS provides four usage modes for adding a new device to an existing network, which are explained below. But first some terminology that will used in the explanation:</p>
<p>Terminology:</p>
<p><strong>Enrollee</strong>: A new device that needs to be added to the network and does not have settings for the wireless network.</p>
<p><strong>Registrar</strong>: One which provides wireless settings to the enrollee.</p>
<p><strong>Access Point (AP)</strong>: One which provides normal wireless network hosting and acts as middleware to pass messages between the enrollee and the registrar.</p>
<p>The four modes provided by WPS can be classified into two groups: In-band and Out-of-band.</p>
<p>This classification is made based upon the channel utilized for the information transfer.</p>
<p><strong>In-Band modes</strong>:</p>
<p>Currently only these two modes are covered by WPS certification.</p>
<p><strong>Push-Button-Connect (PBC)</strong>:</p>
<p>The user merely has to push a button, either an actual or virtual one, on both the Access Point (or a registrar of the network) and the new wireless client device (enrollee). Support of this mode is mandatory for Access Points but optional for connecting devices. Figure 2 shows a Windows 7 machine as an enrollee. PBC on the AP will only be active until authentication has succeeded or timed-out after two minutes (or whatever amount of time the vendor has specified). This option is called wps_pbc in wpa_cli (text-based frontend) which interacts with wpa_supplicant; wpa_supplicant is a WPA Supplicant for Linux, BSD, Mac OS X, and Windows with support for WPA and WPA2.</p>
<p><img class="aligncenter size-full wp-image-3087" alt="figure-2" src="http://www.netstumbler.com/wp-content/uploads/figure-2.png" width="516" height="275" /></p>
<p align="center"><strong>Figure 2. Activated virtual push button (Windows 7: Enrollee)</strong><b><br />
</b><em>Source: http://sviehb.files.wordpress.com/2011/12/viehboeck_wps.pdf</em></p>
<p><strong>PIN Mode</strong>:</p>
<p>In this method a Personal Identification Number (PIN) has to be read from either a label or the display unit on the new wireless device. Figure 3 shows a WPS PIN on the label of a D-Link router. This PIN must then be inputted at the representant of the network (usually AP). Alternately, a PIN on the Access Point may be entered into the new device. This can also be explained on the basis of registrar, as following.</p>
<p><strong>Internal Registrar</strong></p>
<p>The user enters the PIN of the Wi-Fi adapter into the web interface of the AP. This option is called wps_pin in wpa_cli.</p>
<p><strong>External Registrar</strong></p>
<p>The user enters the PIN of the AP into a form on the client device (e.g. computer).</p>
<p>This option is called wps_reg in wpa_cli.</p>
<p>The PIN Method is a mandatory standard method; every Wi-Fi Protected Setup (WPS) certified product needs to support it.</p>
<p><img class="aligncenter size-full wp-image-3088" alt="figure-3" src="http://www.netstumbler.com/wp-content/uploads/figure-3.png" width="455" height="432" /></p>
<p align="center"><strong>Figure 3.WPS PIN on D-Link router</strong><b><br />
</b><em>Source: http://sviehb.files.wordpress.com/2011/12/viehboeck_wps.pdf</em></p>
<p><strong>Out-of-Band modes</strong>:</p>
<p>These two modes are not covered by WPS certification.</p>
<p><strong>Near-Field-Communication (NFC) method</strong>:</p>
<p>In this method the user merely has to bring the new client adjacent to the Access Point to permit a near field communication among the two devices. The NFC method offers strong defense against adding an unintended device to the network. Support of this mode is optional and is not widely deployed.</p>
<p><strong>USB method</strong>:</p>
<p>In this method the user uses a USB drive to transfer data between the new client device and the Access Point of the network. Support of this mode is optional, but denounced.</p>
<h2>Protocol</h2>
<p>Wi-Fi Protected Setup doesn’t enhance security features to devices. It simply makes the existing security features easy to enable and configure. One of the key elements of the WPS protocols is Extensible Authentication Protocol (EAP). EAP is an authentication framework often used in wireless networks and Point-to-Point connections. It provides for the transport and usage of keying material and parameters generated by EAP methods.</p>
<p>The WPS protocol consists as a sequence of EAP message exchanges that are initiated by a user action and relies on an exchange of descriptive information that should precede that user’s action. This descriptive information is transmitted through a new Information Element (i.e., an information component which when combined with other information provides the required information product) that is added to the beacon (periodically send management frame by AP), probe response and optionally to the probe request and association request/response messages.</p>
<p>IEs will hold the possible and the currently installed, configuration methods of the device other than purely informative type-length-values (TLV).</p>
<p>A human trigger is required to initiate the actual session of the protocol after the identification of the device’s capabilities on both the ends. The session consists of 8 messages followed by a message to indicate the protocol is completed (in case of a successful session). The exact stream of messages may change when configuring various kinds of devices (AP or STA).</p>
<p>Until very recently this protocol was used to provide the users with a feature of easy implementation of security on their Wi-Fi networks, but a recently discovered flaw has again put the wireless networks, and hence the users, at risk.</p>
<h2>Security Issue</h2>
<p>In December 2011 a freelance information security researcher <strong>Stefan Viehböck</strong> reported a design and implementation flaw in WPS that makes it vulnerable to a very basic hacking technique: brute-force attacks, feasible to perform against WPS-enabled Wireless networks. It can be simply understood as an attacker trying thousands of combinations in rapid sequence until he/she happens on the correct 8-digit PIN that allows authentication to the device. A successful attack on WPS allows unauthorized user to gain access to the network. The research paper of Viehböck can be found at http://sviehb.files.wordpress.com/2011/12/viehboeck_wps.pdf. This vulnerability was also independently uncovered by <strong>Craig Heffner</strong><b> </b>of Tactical Network Solutions, and involves how the router responds when incorrect PINs are inputted. When a PIN is entered, the router implementing WPS indicates whether the first or second halves of the PIN are correct or not.</p>
<p>&nbsp;</p>
<p>The vulnerability revolves around the acknowledgement messages transmitted between the registrar and enrollee during the validation process of a PIN. The PIN, which is printed on the side label of each WPS-enabled Wi-Fi router, is an 8 digit number. As the last digit is a checksum of the previous digits,<sup><br />
</sup>there are seven unknown digits in each PIN, yielding a total of 10<sup>7</sup> = 10,000,000 possible combinations. The first and second halves of the PIN are separately validated and reported by the registrar when an enrollee tries to gain access through the PIN.</p>
<p>&nbsp;</p>
<p>Now the maximum number of guesses required for PIN recovery is 11,000 (10<sup>4</sup>=10,000 from the first half + 10<sup>3</sup>=1,000 from the second half). This is a drastic reduction of the orders of degreea from the number of PINs that would have to be tested in the absence of the design flaw (i.e. 10<sup>7</sup>=100,000,000). The result of this flaw is the presence of a practical attack which can be finished within hours. The difficulty of exploiting this flaw is that it is dependent on the implementation of WPS by the vendor, as Wi-Fi router manufacturers could guard against this attacks by slowing down or disabling the WPS feature after some failed PIN validation efforts.</p>
<p>Two tools have been developed as proof of concept to demonstrate that the attack is practical. Tactical Network Solutions, the Maryland based firm that released the first tool ‘Reaver’, states that they are aware of the vulnerability since early 2011. Tactical Network Solutions decided to release the tool after the vulnerability was made public. It is also selling a commercial version called ‘Reaver Pro’ with some more features. Reaver is hosted on Google Code at http://code.google.com/p/reaver-wps/. Its authors say that it can recover a router’s plain-text WPA or WPA2 password in 4 to 10 hours, depending on the access point.</p>
<p>The second tool is a PoC brute force tool implemented in Python and is a bit faster than Reaver, but supports less wireless adapters, as stated on the author’s website (http://sviehb.wordpress.com/). This tool can be found at http://dl.dropbox.com/u/22108808/wpscrack.zip.</p>
<p><strong style="line-height: 28px;">Reaver</strong></p>
<p>Reaver, developed by Tactical Network Solutions, runs on Linux. It aims the external registrar functionality mandated by the Wi-Fi Protected Setup requirement. It executes a brute force attack against an access point’s Wi-Fi Protected Setup (WPS) pin number. Once the WPS pin is found, an attacker can recover the WPA PSK and alternately reconfigure the AP’s wireless settings which could lead towards an insecure network. Although Reaver does not support reconfiguring the AP, this can be accomplished with wpa_supplicant once the WPS pin is recovered. Reaver requires the libpcap (packet capture and transmission) and libsqlite3 (database) libraries and can be built and installed by running the command:</p>
<p><code> 1 $ ./configure<br />
2 $ make<br />
3 # make install<br />
</code></p>
<p><code>To remove everything installed/created by Reaver, the following command can be used:<br />
1 # make distclean<br />
</code></p>
<p><code>Once installed the tool can simply be started using the command:<br />
1 # ./reaver<br />
</code></p>
<p><code>The ‘–help’ argument can be used to show all the arguments available within the tool. Figure 4 shows the help list of the Reaver.</code></p>
<p><img class="aligncenter size-full wp-image-3089" alt="figure-4" src="http://www.netstumbler.com/wp-content/uploads/figure-4.png" width="975" height="447" /></p>
<p align="center"><strong>Figure 4. Help list of Reaver </strong></p>
<p align="center"><strong>(Source:</strong> http://www.hack4fun.eu/2012/01/reaver-wps-wpscrack/)</p>
<p>The only requirement it has is a wireless card capable of raw packet injection. To start the process the wireless card must be put on monitor mode. This can be easily done using the airmon-ng tool from the wireless security testing aircrack-ng tool suite as shown below.<br />
<code> 1 # airmon-ng start wlan0</code></p>
<p>The only essential arguments to Reaver are the interface name and the BSSID of the target AP, an example of which is shown below.<br />
<code>1 # reaver -i mon0 -b 00:01:02:03:04:05</code></p>
<p>Sometimes Reaver just tries the same pin over and over again. This might be because WPS is not enabled on the AP. Run the walsh tool (included in the Reaver-1.3 release) to scan for WPS-enabled APs and make sure the target AP is listed.</p>
<p>For extra information output, the verbose option may be provided using the argument ‘–v’. Providing the verbose option twice (-vv) will increase verbosity and display each pin number as it is attempted as shown in Figure 5.</p>
<p><img class="aligncenter size-full wp-image-3090" alt="figure-5" src="http://www.netstumbler.com/wp-content/uploads/figure-5.png" width="650" height="240" /></p>
<p align="center"><strong>Figure 5. Reaver in action </strong></p>
<p align="center"><strong>(Source:</strong> http://www.hack4fun.eu/2012/01/reaver-wps-wpscrack/)</p>
<p>To speed up the attack the delay between pin attempts can be disabled by adding ‘–d 0? on the command line (default delay: 1 second).</p>
<p><code>1 # reaver -i mon0 -b 00:01:02:03:04:05 -vv -d 0</code></p>
<p>Another option that can speed up an attack is ‘–dh-small’. This option tells Reaver to use small Diffie-Hellman secret numbers in order to shrink the computational load on the target AP. In case the attacker does not want to reveal his/her MAC address, Reaver also supports MAC spoofing with the ‘–mac’ option, but it must be ensured that the MAC address of your wireless card’s physical interface (wlan0) must be changed – not the monitor mode interface (usually mon0) – otherwise the attack won’t work<strong style="line-height: 28px;">.</strong><b style="line-height: 28px;"> </b>Reaver keeps on brute forcing the PINs until a successful attempt. It has been stated that some models/vendors/ISPs come pre-configured with a default pin. Some common pins are 12345670, 00005678, 01230000, etc. Reaver attempts known default pins first as a better heuristic. Figure 6 shows a successfully cracked WPS PIN in 32,286 seconds.</p>
<p><img class="aligncenter size-full wp-image-3091" alt="figure-6" src="http://www.netstumbler.com/wp-content/uploads/figure-6.png" width="975" height="113" /></p>
<p align="center"><strong>Figure 6. Successful Recovery </strong></p>
<p align="center"><strong>(Source:</strong>http://www.hack4fun.eu/2012/01/reaver-wps-wpscrack/)</p>
<p>Due to interference or low signal strength Reaver sometimes can’t associate with the AP. It might also be a driver issue.</p>
<p>Below is a list of wireless drivers tested by Reaver:</p>
<p><strong>Supported:</strong></p>
<p>The following wireless drivers have been tested or reported to work successfully with Reaver:</p>
<ul>
<li>ath9k</li>
<li>rtl8187</li>
<li>carl19170</li>
<li>ipw2000</li>
<li>rt2800pci</li>
<li>rt73usb</li>
</ul>
<p><strong>Partially Supported:</strong></p>
<p>The following wireless drivers have had mixed success, and may or may not work depending on your wireless card:</p>
<ul>
<li>ath5k</li>
<li>iwlagn</li>
<li>rtl2800usb</li>
<li>b43</li>
</ul>
<p>Not Supported:</p>
<p>The following wireless drivers/cards have been tested or reported to not work properly with Reaver:</p>
<ul>
<ul>
<li>iwl4965</li>
<li>RT3070L</li>
<li>Netgear WG111v3</li>
</ul>
</ul>
<p>Technically more than one instance of Reaver can be run against an AP, but this approach is flawed as it will only result in a double resource load on AP. Reaver advanced options (using ‘–a’ attribute) can be utilized to speed up the attack.<br />
<strong>Mitigation</strong><br />
End users can disable WPS to prevent an attack, but because of the unawareness most people do not turn it off. Some access points don’t even provide an option to disable WPS.</p>
<p>Vendors can mitigate the flaw by introducing sufficiently long lock down periods (after unsuccessful attempts) to make the attack impractical to implement. This will require a new firmware release. Vendors also need to intensively test the protocols before implementing them on their devices, so that such flaws don’t come up in the future.</p>
<h2>Conclusion</h2>
<p>Today we are all surrounded by many Wi-Fi networks and have used them at some point in time without realizing the issues of the security. The issues discussed in this article are not the only issues related to wireless security, but a recent and major one affecting the privacy of the end users.</p>
<p>As we already know, almost all major router/AP vendors have WPS-certified devices and WPS–PIN (External Registrar) is mandatory for certification, which makes a lot of devices vulnerable to such an attack.</p>
<p>Having a sufficiently long lock-down period (vendor mitigation method) is most likely not a requirement for WPS certification for the device. However it should be a requirement in the new specifications. The vendors need to release new firmware to eliminate the issue. The main argument this issue presents before us is that such other flaws might be already present in other devices/protocols and misused by malicious intruders, hence the only safeguard we need to take is awareness among end users. Also the certifying authorities and the vendors need to thoroughly test the devices/protocols before implementation so that security features ultimately don’t lead towards insecurity.</p>
<p><i>Sudhanshu Chauhan is a security researcher for InfoSec Institute. </i><a href="http://www.infosecinstitute.com"><i>InfoSec Institute</i></a><i> is a security certification company that has trained over 15,000 people including popular CEH and </i><a href="http://www.intenseschool.com/boot_camp/cisco/ccna"><i>CCNA certification courses</i></a><i>.</i></p>
]]></content:encoded>
			<wfw:commentRss>http://www.netstumbler.com/2013/01/18/wi-fi-security-the-rise-and-fall-of-wps/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>How Easy Is it to Write Malware for Android?</title>
		<link>http://www.netstumbler.com/2012/01/16/how-easy-is-it-to-write-malware-for-android/</link>
		<comments>http://www.netstumbler.com/2012/01/16/how-easy-is-it-to-write-malware-for-android/#comments</comments>
		<pubDate>Mon, 16 Jan 2012 20:26:51 +0000</pubDate>
		<dc:creator>Georgia Weidman</dc:creator>
				<category><![CDATA[Android]]></category>
		<category><![CDATA[Security]]></category>

		<guid isPermaLink="false">http://www.netstumbler.com/?p=3062</guid>
		<description><![CDATA[The Android platform is currently the top selling mobile platform in the U.S., and in quarter four of 2010 smartphones began to outsell PC platforms worldwide.  Android was even recently picked up as the choice platform for the U.S. Department of Defense. With the ubiquitousness of Android growing, naturally it and other smartphone platforms will [...]]]></description>
				<content:encoded><![CDATA[<p>The Android platform is currently the <a href="http://www.fiercemobilecontent.com/story/npd-apples-ios-closes-android-q4-sales-surge/2012-01-10">top selling mobile platform in the U.S.</a>, and in quarter four of 2010 <a href="http://www.idc.com/about/viewpressrelease.jsp?containerId=prUS22689111">smartphones began to outsell PC</a> platforms worldwide.  Android was even recently picked up as the <a href="http://www.federalnewsradio.com/?nid=394&amp;sid=2694787">choice platform for the U.S. Department of Defense</a>. With the ubiquitousness of Android growing, naturally it and other smartphone platforms will become prime targets for malware authors. Be it for fun or for profit, stealing your information, sending you spam, and other malicious activity, has been a widespread problem in the computing world for years. It is only natural that as smartphones know even more about their users than traditional PC platforms, and have access to additional features such as text messaging and GPS data, that they will be become juicy targets for high tech criminals.</p>
<p>This past year has seen new developments in Android malware both in the wild and by researchers intent on raising awareness and improving the state of security. The Droid Dream attack against Android in early 2011 made headlines for being the first known malware infection inside of the official Android market.  The malware was packaged with seemingly legitimate applications, but once installed, the apps turned Android phones into drones in a mobile botnet. This attack had been foreshadowed by security researchers when Jon Oberheide uploaded a <a href="http://jon.oberheide.org/files/summercon10-androidhax-jonoberheide.pdf">proof of concept app</a> to the Android market disguised as an inside look at the upcoming Twilight movie.  Though malware analysists and network security experts have been combating botnets for years, smartphones open new avenues of both attack and control, that experts simply don&#8217;t have as much experience analyzing. For example security researchers have created <a href="http://georgiaweidman.com/wordpress/?cat=10">proof of concept smartphone botnet </a>scenarios that use text messaging (SMS) for command and control mechanisms.</p>
<p><span id="more-3062"></span></p>
<p>Putting aside the continually growing sophistication of smartphone based attacks, how easy is it actually to attack Android phones? How much work would be involved to learn how to write an Android app, develop an app that performs malicious activity, and get that app up on the Android market? Is this something that a beginner could feasibly accomplish, or is Android malware solely the realm of hard core criminals with the skills, time, and money to develop cutting edge attack techniques?</p>
<p>I started off by learning a little bit about coding in Android. I have some coding background including in Java, the language from which the Android software development kit was derived. My only previous experience developing for smartphones was writing base operating system level proof of concept malware in C. I had never written a mobile app before. <a href="http://developer.android.com/resources/browser.html?tag=tutorial">Android Developer offers beginning tutorials</a>, which I worked through to get started.  Android prides itself on being easy for developers to pick up and dive into, and that was my experience as well.</p>
<p>My next goal was to write an app that performs malicious activity. Specifically I wanted to steal the smartphones personal identifier (IMEI) and send a text message without giving any indication to the user. As it turns out the Android API has built in capabilities to perform both of those tasks. The only caveat is the user has to be informed at install time that I want access to these clearly potentially dangerous capabilities.  Whenever a user installs an Android app, they are presented with a list of potentially dangerous capabilities the app requests.  An example install screen is shown below:</p>
<p style="text-align: center;"><img class="size-medium wp-image-3063 aligncenter" title="android_installer_georgia" src="http://www.netstumbler.com/wp-content/uploads/android_installer_georgia-247x300.png" alt="" width="247" height="300" /></p>
<p>I then wondered if malware writers need to somehow bypass this permission model  in some way so the dangerous permissions don&#8217;t show up at install. Would having a list of dangerous permissions that would allow an app to steal data and run up fraudulent charges raise a red flag to  average Android users  and deter them from installing an app? I did a search for popular Android apps to take a look at the permissions they request. The general consensus seems to be that the top downloaded Android app of all time is from an obscure company called Facebook. The complete list of permissions the Facebook for Android app requests upon install includes: sending SMS, reading the IMEI, the smartphone&#8217;s GPS information, accessing accounts stored on the phone including their credentials, among a long list of others that can be found <a href="https://market.android.com/details?id=com.facebook.katana">here</a>. As a sometimes proud member of Facebook since it was for college kids only, I often access Facebook from my computer. Facebook seems to work just fine without sending SMS, knowing my location, or having access to my Gmail password.  It appears that being warned about potentially dangerous permissions does nothing to deter users from installing apps to their Androids. To be fair, the Facebook app comes from a legitimate and well known company. Users have less reason to be wary of Facebook than they would the sort of apps seen in the DroidDream attack. That being said, as we saw in the recent detection of spyware in the <a href="http://www.washingtonpost.com/business/economy/feds-probing-carrier-iq/2011/12/14/gIQA9nCEuO_story.html">CarrierIQ service</a>  installed by default on many smartphone platforms, any service or app can be a potential malware source, even if the developer doesn&#8217;t intend for it to be malicious.</p>
<p>Now that I knew I could just use the Android API&#8217;s permission model to make my malicious app, I went about writing it. I thought I would have to search through the Android Development manager to find out the correct code for what I wanted to do. As it turned out, a quick Google search for &#8220;Send SMS Android App&#8221; or &#8220;Access IMEI Android App&#8221; revealed several other curious developers asking for and providing the code snippets I needed.  For example the code to send an SMS transparently to the user is only a two lines long:</p>
<p><code>SmsManager sm = SmsManager.getDefault();<br />
sm.sendTextMessage(number, null, message, null, null);<code></code></code></p>
<p>where number is the phone number to send the SMS to, and message is the message to send.  By requesting the right permissions I was able to quickly and easily build an app that accessed private data and sent it to another phone through SMS. The SMS does not appear in the user&#8217;s sent folder, so users receive no indication that the message has been sent.</p>
<p>My demo app in action video:</p>
<p><iframe src="http://player.vimeo.com/video/35039316?byline=0&amp;portrait=0" frameborder="0" width="400" height="225"></iframe></p>
<p>My last task was to see about getting my proof of concept app to the Android market. Using a Gmail account that didn&#8217;t link back to my real name I was able to sign up, and I used someone else&#8217;s credit card (with permission) to sign up. This leads me to believe it is possible for a malware author to leave no trace of her true identity on an app. I didn&#8217;t actually publish my app to the market, but other researchers have already proven that a malicious app is automatically published to the Android market upon upload.</p>
<p>My conclusions are that for anyone with any development experience it is easy to pick up the Android programming language. Thus any malware authors with experience on PC platforms will be able to make the switch to Android without any trouble. Also, the Android permission system is not working to keep users safe. The average, security unaware user will often simply install an app regardless of permissions. Using the API to call malicious functionality was straightforward given the correct permissions.  Finally, uploading a malicious app to the Android market is trivial.<br />
Read more about <a href="http://about.me/georgiaw">Georgia Weidman</a></p>
]]></content:encoded>
			<wfw:commentRss>http://www.netstumbler.com/2012/01/16/how-easy-is-it-to-write-malware-for-android/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>So you want to be a Security Consultant?</title>
		<link>http://www.netstumbler.com/2011/12/21/so-you-want-to-be-a-security-consultant/</link>
		<comments>http://www.netstumbler.com/2011/12/21/so-you-want-to-be-a-security-consultant/#comments</comments>
		<pubDate>Wed, 21 Dec 2011 20:23:35 +0000</pubDate>
		<dc:creator>Brad Slavin</dc:creator>
				<category><![CDATA[Administration]]></category>
		<category><![CDATA[Security]]></category>

		<guid isPermaLink="false">http://www.netstumbler.com/?p=3050</guid>
		<description><![CDATA[This is my first guest blogging opportunity on Netstumbler.com and I wanted to discuss what I believe is missing in most of the student/consultants I encounter. I would recommend these things for anyone preparing to be a consultant in IT security. So, the first and most important thing to learn in my opinion is TCP/IP. [...]]]></description>
				<content:encoded><![CDATA[<p>This is my first guest blogging opportunity on Netstumbler.com and I wanted to discuss what I believe is missing in most of the student/consultants I encounter. I would recommend these things for anyone preparing to be a consultant in IT security.</p>
<p>So, the <strong>first and most important thing to learn</strong> in my opinion is <a href="http://en.wikipedia.org/wiki/TCP/IP_model">TCP/IP</a>. You need to know it as well as you do the alphabet. The majority of people I meet in the University world and out in industry do not have a detailed and thorough knowledge of TCP/IP. For a security consultant it is best that you can look at the packets and know exactly what is taking place at the lowest level the wire. Elite hackers know TCP/IP as well as they can write their name. To be able to secure the environment and the enterprise it is imperative you know it like they do.</p>
<p>Take wireless for example, many people will start playing with <a href="http://www.wireshark.org">Wireshark</a> to observe the traffic over the wireless card, as most of you can attest to when you first use Wireshark with a wireless card you start a capture, and you see NOTHING, because you are at the application layer, and do not have a good understanding of the lower layers, and also do not understand that you need to be in monitor mode to capture traffic for the most part, and you are connected to the network, and cannot sniff the wireless traffic, so as you read the alert message that tells you to check the selection for promiscuous mode, and then you deselect it, and what do you see?  You see the 802.3 Ethernet traffic and not the 802.11 traffic you were expecting. Taking it one step further you need an understanding of the PHY layer before you start looking at a tools that analyze it for you.<br />
<span id="more-3050"></span><br />
The <strong>second most important thing is to learn</strong> Linux and Unix. Also, do not stop at Linux, download one of the Unix virtual machines and play with it until you get proficient at it.</p>
<p>A note on<strong> certifications</strong>, <em>they are good for getting you an interview, but once you get that interview you have to convince the people there that you know what you are doing.</em> There is <strong>no certification that can replace hands-on experience and knowledge</strong>, you can get that on your own by using virtual machines and building and running your own test labs. <em>The concern over certifications is most are based on rote memorization, it is the same problem we have in academic circles (more on that in a moment). </em></p>
<p>The problem with this is when you study and cram for a certification exam you memorize something take a test, and then you get certified, but what does this really mean? In my view it means you studied and took a test, and  be honest, some of these classes cram all of the information into your brain in 4-5 days, and if the class does not provide a study guide, or something similar to practice the types of questions you  may encounter you would not see 90% and above exam success rates touted by so many sites. Now, we shall discuss academic thinking, most of the “academics” without industry experience do not understand what I have been talking about either. I was on a <em>team that developed a Master of Science in Information Security</em>, and I was the only non-academic on the team, the entire group was made up of all PhDs but me, and as we discussed the curriculum I focused on teaching the students protocol analysis &#8230;  that is packets! Well this shocked pretty much all of the team, but I argued my point in many of the meetings, and finally swayed enough support where we had packet and protocol analysis as part of the curriculum</p>
<p>The <strong>most important thing I look for when hiring someone</strong> when I was running the Network Operations Center (NOC) is <strong>desire and initiative to learn</strong>. I would interview people with a list of certification as long as their arm, and when I asked them practical questions, they could not answer them, so they did not get the job. This is because I had junior personnel who could answer the questions, so how could I give someone a position over one of them at about 5 times the amount of pay they were getting. I could not justify it, and never did waiver on that. If  a person has desire that is the most important thing.  I had a guy come in fresh out of bootcamp that did not even know what UNIX was, and in 6 months he became my UNIX expert.</p>
<p>Another thing that helps is <strong>understanding programming</strong>, you do not have to be proficient at it, but being able to look at code and at least understand the fundamental concepts of it is very important in this field.</p>
<p><strong>Finally, it is all about research</strong>, I learned to do research in Graduate school, I had a Professor Frank Coyle that specializes in using JAVA for real time systems, and he was instrumental in teaching me how to do research, and that is the intent of these short research topics, the more practice you get the better you get to be at it. Today with the amount of online information you can  research  in a few hours with the Internet. When I was in graduate school, I spent weeks doing research at libraries, take advantage of this opportunity we have today. Recommend you dedicate one hour a night to reading something, a whitepaper etc. <em>There is a saying in the consultant field that as long as you can read the manual and understand it faster than the client you will always get the contract. That is why research is so important.</em></p>
<p>As I like to tell my clients, up until 2006 my certification count was 0, and now it is at 20, so it is not about getting a certification, it is what you do before and after you get that cert.</p>
<p><strong>- Kevin</strong></p>
<p>Kevin Cardwell currently works as a free-lance consultant and provides consulting services for companies throughout the world, and as an adviser to numerous government entities within the US and UK.</p>
<p>He is an Instructor, Technical Editor and Author for Computer Forensics, and Hacking courses. He is the<strong> author of the Center for Advanced Security and Training (CAST) Advanced Network Defense</strong> course. He is <strong>technical editor of the Learning Tree Course Ethical Hacking and Countermeasures</strong> and Computer Forensics. He is author of the Controlling Network Access course. He has presented at the Blackhat USA Conferences. He is a <strong>contributing author</strong> to the <strong>Computer Hacking Forensics Investigator V3 Study Guide and The Best Damn Cybercrime and Digital Forensics Book Period</strong>. He is a Certified Ethical Hacker (CEH), Certified Security analyst (E|CSA), Qualified Penetration Tester (QPT), Certified in Handheld Forensics, Computer Hacking Forensic Investigator (CHFI) and Live Computer Forensics Expert (LCFE), and holds a BS in Computer Science from National University in California and a MS in Software Engineering from the Southern Methodist University (SMU) in Texas.</p>
<p>You can find more information about Kevin at <a href="http://www.elitesecurityandforensics.com">www.elitesecurityandforensics.com</a></p>
]]></content:encoded>
			<wfw:commentRss>http://www.netstumbler.com/2011/12/21/so-you-want-to-be-a-security-consultant/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Offensive Mobile Forensics</title>
		<link>http://www.netstumbler.com/2011/12/12/offensive-mobile-forensics/</link>
		<comments>http://www.netstumbler.com/2011/12/12/offensive-mobile-forensics/#comments</comments>
		<pubDate>Mon, 12 Dec 2011 16:32:26 +0000</pubDate>
		<dc:creator>Brad Slavin</dc:creator>
				<category><![CDATA[Android]]></category>
		<category><![CDATA[iOS]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Wi-Fi]]></category>

		<guid isPermaLink="false">http://www.netstumbler.com/?p=3028</guid>
		<description><![CDATA[Christmas is around the corner. Some of the top gifts are going to be shiny new mobile devices – smartphones, tablets, hacked Kindle Fires, Playbooks, and others. Is Exchange ActiveSync turned on in your environment? What is your plan for handling mobility in the Enterprise? But the biggest question of all is – What does [...]]]></description>
				<content:encoded><![CDATA[<p>Christmas is around the corner. Some of the top gifts are going to be shiny new mobile devices – smartphones, tablets, hacked Kindle Fires, Playbooks, and others. Is Exchange ActiveSync turned on in your environment? What is your plan for handling mobility in the Enterprise? But the biggest question of all is – What does a lost or stolen mobile device mean to your organization in terms of risk? What about when the CEO loses her device? Can you quantify your risk today?</p>
<p>The data leakage disclosed in this post has been gathered from a technique the author refers to as Offensive Mobile Forensics.  The term forensics is usually associated with incident response and management.  In other words, an activity performed after something bad has happened.  In contrast, offensive forensics is the act of preemptively performing a forensic analysis of systems or applications as a function of security testing, or for the purpose of quantifying risk.  An interesting side-effect of applying this technique to mobile device analysis is that it enables one to truly understand the risk of an attacker stealing or finding a lost device.  For example, if your analysis turns up native or third-party applications storing user credentials in cleartext – the author has seen everything from Facebook and Twitter to enterprise users’ Exchange ActiveSync credentials stored in the clear – depending on the accounts and data available, that could be a serious issue.<br />
<span id="more-3028"></span><br />
This technique depends on the ability to jailbreak (iOS) or root (Android) the target device, which provides root access to the underlying file system. If the reader is unfamiliar with these terms, some great resources to learn about jailbreaking and rooting are <a href="http://www.redmondpie.com/">Redmond Pie</a> (iOS) and <a href="http://www.xda-developers.com/">XDA-Developers</a> (Android). The author typically utilizes <a href="http://blog.iphone-dev.org/">Redsn0w</a> for iOS and <a href="http://forum.xda-developers.com/showthread.php?t=803682">SuperOneClick</a> for Android, performing virtually all Android analysis on Samsung devices.</p>
<p><strong>iOS</strong></p>
<p>After jailbreaking is complete, only one other tool is necessary, OpenSSH, used to pull data from the device to a host computer for analysis over WiFi.  However, as is always the case with information technology, there’s more than one way to accomplish your objective.  So, experiment with other tools, and tweak and tune your own methodology.</p>
<p>Although outside the scope of this blog post, readers interested in learning about some of the other tools used for this analysis technique can check out the <a href="http://hakin9.org/hacking-data-1111/">iOS Insecurities</a> article in November’s issue of Hackin9 Magazine. The article is a greatly expanded version of what’s here, and also includes a table listing physical locations on iOS devices that contain interesting information for analysis.</p>
<p>There are many different locations containing interesting data on iOS devices.  Data often resides in SQLite databases, the chosen format for local storage on mobile devices.  The next best place to find sensitive information is in plist, or property list files – these are the primary storage medium for configuration settings in iOS, and they are also a fantastic source of sensitive information.  User credentials are often stored here, instead of inside the KeyChain where they should be.  Rounding out the top three data sources are binary or binary-encoded files, such as the device’s keyboard cache and pasteboard.  Although storage locations commonly change with the release of new iOS firmware, it is fairly simple to poke around the general area and find what you’re looking for.</p>
<p>The most severe threat to mobile devices and applications is loss or theft of the device.  As the old saying goes, “if an attacker has physical access, it is game over.”  It only takes a few days of analyzing applications on a device to discover that the vast majority of mobile application developers fail to consider the threat of physical access to their data.  Simply put, they are stuck in the mindset of web application or client/server developers, where virtually all threats affect applications remotely.  Add some terrible design and implementation decisions related to native apps and services from Apple themselves, and you have a device that can pose a significant risk to enterprises and consumers in the event of loss or theft.  The following examples are provided in no particular order.</p>
<p><strong>Keyboard Cache (dynamic-text.dat)</strong></p>
<p>In an effort to learn how users type, iOS devices utilize a feature called AutoCorrection to populate a local keyboard cache on the device.  The problem is this feature records everything a user types that is not entered into a SECURE text field, which masks displayed data.  The author fondly refers to this feature as “Apple’s native keylogging facility”.  Data typed into text fields for virtually any application can remain in the cache for more than a year if it is not reset periodically by the user:</p>
<p>Settings &gt; General &gt; Reset &gt; Reset Keyboard Dictionary</p>
<p>Developers can also disable this feature programmatically by using the AutoCorrection = FALSE directive in desired UITextFields, although studies conducted with applications disabling this feature have shown users unanimously disapprove of it.</p>
<p>The file itself is a binary file, so passing it to the utility ‘strings’ is all that is required to generate newline-terminated output suitable for analysis.  Figure 1 displays the result of running ‘strings’ against the file, and Table 1 provides examples of near-complete conversations recorded by AutoCorrection.</p>
<div id="attachment_3035" class="wp-caption alignleft" style="width: 242px"><img class="size-medium wp-image-3035" title="KeyBoardCache" src="http://www.netstumbler.com/wp-content/uploads/KeyBoardCache-232x300.png" alt="" width="232" height="300" /><p class="wp-caption-text">Figure 1: Keyboard cache output to stdout in terminal</p></div>
<p>The keyboard cache is a well-known weakness in the iOS system, and there are many more interesting system-related locations to explore as an exercise for the reader.</p>
<div id="attachment_3036" class="wp-caption alignleft" style="width: 738px"><img class="size-full wp-image-3036" title="keyboard-cache" src="http://www.netstumbler.com/wp-content/uploads/keyboard-cache.jpg" alt="" width="728" height="179" /><p class="wp-caption-text">Table 1: Keyboard cache entries - read column top-down</p></div>
<p><strong>Application Data Leakage</strong></p>
<p>Third-party applications represent the greatest threat of data leakage on iOS devices.  This is usually the result of lazy or poorly-informed, or trained, developers storing user credentials or other sensitive information in clear text.  This threat can be mitigated by developers in several ways including storing user credentials in the KeyChain, encrypting sensitive information in plist files with the <a href="http://developer.apple.com/library/mac/">Common Crypto</a> library, or encrypting sensitive information in <a href="http://sqlcipher.net/ios-tutorial/">SQLcipher</a> SQLite databases. Figure 2 shows one example of a mobile application improperly storing credentials in a plist file.  Unfortunately, this particular application utilizes various Internet APIs for authentication including Evernote, Google Docs, Dropbox, and others, which in the event of loss or theft, could result in the compromise of each account.</p>
<div id="attachment_3037" class="wp-caption alignleft" style="width: 675px"><a href="http://www.netstumbler.com/wp-content/uploads/app-data-leakage-creds.png"><img class="size-full wp-image-3037" title="app-data-leakage-creds" src="http://www.netstumbler.com/wp-content/uploads/app-data-leakage-creds.png" alt="" width="665" height="369" /></a><p class="wp-caption-text">Figure 2: Credentials disclosed in an application&#39;s configuration PLIST</p></div>
<p><a href="http://www.netstumbler.com/wp-content/uploads/WiFi_creds_annotated.png"><img class="size-full wp-image-3046" title="WiFi_creds_annotated" src="http://www.netstumbler.com/wp-content/uploads/WiFi_creds_annotated.png" alt="" width="334" height="551" /></a></p>
<p><strong>Android</strong></p>
<p>Although there are many similarities between iOS and Android, there are a few notable differences that should be discussed. First, Android does not use property list files (“plist”) for storing configuration data, which is common on iOS devices. Android uses XML files instead of plists. Also, analysts will find many more SQLite databases on an Android device. In fact, configuration information is sometimes stored in SQLite database in lieu of utilizing XML files. Similarly to the configuration files for iOS, the XML files storing preferences for Android applications commonly include user credentials and other sensitive information. Finally, there is a very rich diagnostic and debugging environment in the Android platform, and unfortunately this output is also a common source of data leakage.</p>
<p>A huge difference between iOS devices and Android devices is the presence of the Android Debug Bridge (“ADB”) for the latter. Using the ADB, one can push or pull files to the device, review diagnostic information, and even gain access to a remote shell. The ADB Shell is the primary method of accessing the device&#8217;s file system for the purposes of pulling data to a host computer for analysis, or performing analysis on the device itself. More information on this, and other, differences can be found in the <a href="http://hakin9.org/hakin9-mobile-111-1/">Android Insecurities</a> article in January’s issue of Hakin9 Magazine.</p>
<div id="attachment_3046" class="wp-caption alignleft" style="width: 839px"></dt>
<dd class="wp-caption-dd">Annotated WiFi Credentials</dd>
</dl>
</div>
<p><strong>Email</strong></p>
<p>The Android system, like iOS, stores email in a SQLite database. Unlike iOS however, which stores email credentials in the KeyChain, user credentials on an Android system are stored in cleartext in the email database. This may seem like a trivial occurrence of data leakage, but in addition to personal email accounts such as Gmail, Exchange ActiveSync (“EAS”) credentials are also stored there. As if credentials weren&#8217;t bad enough, the database also stores messages in the clear, along with email addresses of contacts that have sent the user mail. This could be particularly devastating for corporate enterprises utilizing EAS, in the absence of a proper mobile device management (“MDM”) solution.</p>
<p>EAS and personal email account credentials can be discovered in a couple of different ways.  Figure 3 shows analysis of the EmailProvider.db SQLite file in Base, a GUI SQLite client. An even easier way to find user information is by simply running the ‘strings’ utility against the database file, as seen in Figure 4.</p>
<div class="mceTemp">
<dl id="attachment_3038" class="wp-caption alignleft" style="width: 839px;">
<dt class="wp-caption-dt"><img class="size-full wp-image-3038" title="EAS_GMAIL_Creds_2.3.4_Annotated" src="http://www.netstumbler.com/wp-content/uploads/EAS_GMAIL_Creds_2.3.4_Annotated.png" alt="" width="829" height="276" /><p class="wp-caption-text">Figure 3: Email credentials disclosure</p></div>
<p>&nbsp;</p>
<p><strong>WiFi</strong></p>
<p>The email situation is bad, but equally shocking is the method in which the Android system stores WiFi configuration information. Navigating to the <strong>/data/misc/wifi</strong> directory yields a configuration file called wpa_supplicant.conf on a Samsung Captivate that stores configuration information for every WiFi network the device has connected to – in cleartext. Assuming the data is disclosed to an attacker, an organization’s only defense is the use of multifactor authentication for their wireless networks, i.e., if corporate enterprise is using a combination of username and password exclusively, this could be a serious issue. The configuration file stores SSID, key management type, and the pre-shared key for the network.</p>
<div id="attachment_3039" class="wp-caption alignleft" style="width: 651px"><img class="size-full wp-image-3039" title="Strings_EASGMAIL_EmailProviderDB" src="http://www.netstumbler.com/wp-content/uploads/Strings_EASGMAIL_EmailProviderDB.png" alt="" width="641" height="172" /><p class="wp-caption-text">Figure 4: Email credentials disclosure</p></div>
<p>&nbsp;</p>
<p><strong>Conclusion</strong></p>
<p>Now, obviously various mitigating controls exist for protecting a user’s data on a mobile device, most notably the hardware-based encryption and <a href="http://developer.apple.com/library/ios/documentation/Miscellaneous/Conceptual/iPhoneOSTechOverview/iPhoneOSTechOverview.pdf">Data Protection</a> on the iPhone 4 and above, and encryption Android devices with Gingerbread. Passcodes lock devices, and in the case of Data Protection, enable a secondary layer of software-based encryption. That said, a recent study indicated over 50% of users don’t use a passcode at all on their devices, and another 20% utilize a 4-character combination that can be easily guessed in the usual 10 tries allotted – 1234, 4321, 9876, and so on. Add to this the ability to deploy OpenSSH as part of the jailbreaking process for iOS devices, the most prevalent choice for the Enterprise, or simply crack the passcode, and loss or theft is illuminated as a serious threat to data security. In the current ecosystem, with physical access to the device, it’s game over.</p>
<p><strong>Joey Peloquin</strong></p>
<p>Joey Peloquin is the director of mobile security at <a href="http://www.fishnetsecurity.com/">FishNet Security</a>, where he’s responsible for MDM technology review, mobile security research, testing methodologies, and business development. He’s spent the last twelve of twenty years in IT specializing in Information Security. His experience ranges from risk assessment to intrusion analysis and incident response, network and application penetration testing, and mobile forensics.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.netstumbler.com/2011/12/12/offensive-mobile-forensics/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>My Wonderful Trip To South Africa That Didn&#8217;t Happen Thanks To The TSA And Delta Airlines</title>
		<link>http://www.netstumbler.com/2007/09/18/my-wonderful-trip-to-south-africa-that-didnt-happen-thanks-to-the-tsa-and-delta-airlines/</link>
		<comments>http://www.netstumbler.com/2007/09/18/my-wonderful-trip-to-south-africa-that-didnt-happen-thanks-to-the-tsa-and-delta-airlines/#comments</comments>
		<pubDate>Tue, 18 Sep 2007 14:22:59 +0000</pubDate>
		<dc:creator>Wayne Slavin</dc:creator>
				<category><![CDATA[Delta]]></category>
		<category><![CDATA[Personal]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[TSA]]></category>

		<guid isPermaLink="false">http://www.netstumbler.com/2007/09/18/my-wonderful-trip-to-south-africa-that-didnt-happen-thanks-to-the-tsa-and-delta-airlines/</guid>
		<description><![CDATA[I don&#8217;t normally post personal items, but I think that everyone should know about some of the horrible things happening at San Diego International Airport and with Delta Airlines. I wrote this immediately after the events that transpired so that I would have an accurate log. Summers are the busiest travel time of the year. [...]]]></description>
				<content:encoded><![CDATA[<p>I don&#8217;t normally post personal items, but I think that everyone should know about some of the horrible things happening at San Diego International Airport and with Delta Airlines. I wrote this immediately after the events that transpired so that I would have an accurate log.</p>
<p>Summers are the busiest travel time of the year. Each year more than 750 million passengers move through our country&#8217;s airports raking up more than 800 billion miles of travel. (<a href="http://www.bts.gov/xml/air_traffic/src/index.xml">Source</a>) Along with the increase in demand, air travel complaints are up as well. (<a href="http://airconsumer.ost.dot.gov/reports/2007/september/200709atcr.pdf">Source PDF</a>)</p>
<p><span id="more-2969"></span><br />
Now, we all know this year has been a special one for the airlines and air travel as a whole. From the <a href="http://www.nytimes.com/2007/02/17/business/17air.html?ex=1329368400&amp;en=3ae37894f1a0910a&amp;ei=5090&amp;partner=rssuserland&amp;emc=rss">JetBlue hostage crisis</a>, the terrorist <a href="http://www.cnn.com/2007/US/07/24/tsa.incidents/">&#8220;dry runs&#8221;</a> on airport security around the country, and the most recent debacle on Southwest Airlines where they asked a woman to <a href="http://www.msnbc.msn.com/id/20644329/">cover up</a> because of her lewd attire.</p>
<p>Also, after learning about <a href="http://www.boingboing.net/2007/08/29/moment-of-tsa-surrea.html">Xeni&#8217;s experiences</a>, reading <a href="http://www.schneier.com/essay-156.html">Bruce&#8217;s article</a>, I decided to post this. Here we go!</p>
<p>Recently, I had to travel to Johannesburg, South Africa for business. I had an important meeting for a big bid that was scheduled for Monday. I was scheduled to arrive on Sunday. The thing that was going to make the 25+ hour trip worth while was the opportunity to spend some time with my relatives that I have not seen in many years, so I had planned to have an extended stay.</p>
<p>Any way you slice it, it&#8217;s pretty crappy flight, mine was supposed to be the best of the worst according to friends that had made the same flight previously. It was certainly the least painful of all the previous routes that I have taken to Johannesburg in the past. My flight was from San Diego (SAN) to Atlanta (ATL) and then on to Johannesburg (JNB) via Dakar for some fuel. All flights on Delta. Flying coach.</p>
<p>I was scheduled to depart Saturday morning at 6:30 AM. I arrived at the airport on time, checked in at the Delta desk in <a href="http://www.san.org/documents/maps/SDIA_T2_Map_Apr07.pdf">Terminal 2</a> (PDF). I checked in at the First Class counter, they let me because no one else was waiting in that line.</p>
<p>That is when the fun began.</p>
<p>At the time that I place my bag on the scale I look over my left shoulder to scope out the security screening line.</p>
<p>Side note: Delta only lets you take 50 lbs. per bag, but they let you take two bags. I got charged $25 in overage. So much for the 70 lbs. of other international carriers.</p>
<p>&#8220;Jesus&#8221;, I thought to my self.</p>
<p>The security line was the longest I had ever seen it, dozens of switch-backs, and even extending onto the sky-bridge! Memories of the lines I endured at London Heathrow during the &#8216;liquid bomb&#8217; scare flash through my mind.</p>
<p>I ask the Delta agent if I had a fighting chance, she said that I should have &#8220;no problem, it moves fast&#8221;.</p>
<p>As I get in line, I look out over the sky-bridge just in time to see the sun beginning to rise.</p>
<p>The line shows no sign of life for minutes. Suddenly, some action &#8211; three steps forward&#8230;</p>
<p>The mother in front of me with her two little girls lets out a sigh. I tell her &#8220;just when you think there is no hope.. it moves&#8221;. She laughs and asks where I&#8217;m from, I tell her that I&#8217;m a San Diego native and ask her the same question. We chat about San Diego, and where we are traveling and things of that sort. I then ask her &#8220;What time is your flight?&#8221;, &#8220;7:30&#8243; she replies. &#8220;What about yours?&#8221;, &#8220;6:30&#8243;. She tells me that she will gladly hold my spot in line while I go to the front. I told her that I&#8217;ve got 45 minutes and there is no point getting nervous.</p>
<p>After fifteen minutes finally I make it inside the terminal, clock on the Blackberry reads 6:00 AM at this point. I see another nervous guy jump out of line and go up to the TSA staff and &#8220;First Class&#8221; security line. A minute passes and he returns discouraged and starts speculating about his flight leaving at 6:30, I asked him what they said. He was told to get back in line and that he would be fine. I was unimpressed with this, but figured it was just to early to start escorting passengers. I decide to wait.</p>
<p>The entire security line is snapped to attention when a rather large TSA employee decides that 6:05 AM is the perfect time to make an announcement at the top of his lungs. He requested that everyone make sure that all water bottles were out of the bags and that if you had anything larger than 3 oz. to come and get a zip lock bag from him. He also said that &#8220;If you have any questions, I am at the TSA desk and will be happy to help.&#8221;</p>
<p>It is now 6:12 AM on the Blackberry, the sign on the turnstile reads 25 minutes to go (the previous one read 15 minutes), I tell the woman and her husband, who had just arrived, that hopefully I won&#8217;t see them later (because I&#8217;ll be on my plane), but I would appreciate it if they could hold my spot. &#8220;No problem, good luck!&#8221;.</p>
<p>So I quickly walk up to the area where the loud TSA employee is standing and approach a woman wearing a maroon &#8220;Supervisor&#8221; polo-shirt. I tell her that I have a 6:30 flight. &#8220;Get back in line&#8221;, she tell me. With no eye contact.</p>
<p>I then hold out my ticket and say &#8220;Ma&#8217;am I&#8217;ve a 6:30 flight to Atlanta, I think I am going to miss my flight.&#8221;</p>
<p>&#8220;Get back in line&#8221;, louder this time, still no eye contact. (Think nightclub door man/bouncer.)</p>
<p>&#8220;Ma&#8217;am, please, I have an international connection in Atlanta I cannot afford to miss my flight.&#8221;</p>
<p>&#8220;I told you, GET BACK IN LINE&#8221; (Even louder, still no eye contact)</p>
<p>I then realize that this is going no where with this woman, and say to the TSA employee who made the announcement; &#8220;Sir, I beg you, please may I go through, I am going to miss my flight to South Africa.&#8221; He was standing right behind this &#8220;supervisor.&#8221;</p>
<p>This entire time, first class passengers are being allowed through their VIP entrance to their own x-ray and metal detector. No lines for VIPs. Just like a night club.</p>
<p>This lovely &#8220;supervisor&#8221; then snaps to him &#8220;Don&#8217;t get involved! Don&#8217;t make me call Frankie.&#8221;</p>
<p>Thinking that maybe this &#8220;Frankie&#8221; might have more intelligence and compassion I say, &#8220;Who&#8217;s Frankie? Lets call Frankie!&#8221;</p>
<p>&#8220;You don&#8217;t tell me who to call, sir!&#8221;, snaps the &#8220;supervisor&#8221; (Very loud and aggressive).</p>
<p>At this point, there were no more first class passengers going through this entrance.</p>
<p>I decide to hang around and wait, perhaps this &#8220;supervisor&#8221;, Jackie, would have a change of heart and let me through to make my flight. Given that there were no first class customers waiting, no sweat off her back. There is also no point in going back to the line, if I do that I am guaranteed to miss my flight.</p>
<p>At this point, I turn around and am confronted by two Harbor Police Officers. Officer Columbus Offord (Badge #3306) and Officer Walter Tucker (No badge number on his card?)</p>
<p>&#8220;This guy refuses to move!&#8221; Jackie pipes in from over my shoulder.</p>
<p>&#8220;Whats the problem?&#8221; the officers ask me.</p>
<p>At this point, we are in the middle of the terminal. Before I respond, the officers and I walk off to the side near the check-in counters.</p>
<p>&#8220;There is no problem officers. I am going to miss my flight, I have an international connection to make and she will not let me go through. I have been here with plenty of time to make it through security, but the line is not moving.&#8221;</p>
<p>&#8220;Well, we cannot just put you to the front of the line, you have to speak to Delta&#8221;</p>
<p>&#8220;Ok, I&#8217;ll go speak to Delta&#8221;</p>
<p>The Delta check-in desk is the closest to where I am now.</p>
<p>I walk over there, the officers stay put. I ask the First Class Delta employee &#8211; &#8220;Will they be holding the 6:30 flight for people that are waiting to get through security?&#8221;</p>
<p>&#8220;No, and if your not at the front already you wont make it&#8221;, she responds.</p>
<p>&#8220;Thanks&#8221; (Read: SHIT!)</p>
<p>So I walk back towards toward the line.</p>
<p>The officers then ask me, &#8220;What did they tell you?&#8221;</p>
<p>&#8220;That I&#8217;m not going to make it&#8221; I say.</p>
<p>&#8220;Let me have your passport&#8221;, demands one officer.</p>
<p>&#8220;What do you need it for?&#8221; (I&#8217;ve seen this movie before, I&#8217;ve done nothing wrong, but you know&#8230; abuse of power, police state, post 9/11 age, etc etc etc etc etc etc etc etc)</p>
<p>&#8220;So that I can know who I am talking to&#8221;, he says.</p>
<p>&#8220;Ok, here you go&#8221;, as I hand him my passport.</p>
<p>The officer then proceeds to radio my details in, and his partner just stands with me.</p>
<p>He then must have gotten word back from dispatch that I am NOT a terrorist, or he just wanted to log it in for their records.</p>
<p>He then gives me back my passport, waves his hand, and says &#8220;Go through.&#8221;</p>
<p>I then hand my tickets and passport to another first class &#8220;document checker&#8221;, and then Jackie says &#8220;What do you think your doing?&#8221;</p>
<p>&#8220;The officers said that I could come through!&#8221;, I plead.</p>
<p>&#8220;Oh no they didn&#8217;t, you get back in line where you were!&#8221;</p>
<p>Now, remember back now to the family holding my place in line? They had been watching this entire thing and were now at the front of the line, literally next in line. They waved to get my attention and say &#8220;We are here! We&#8217;re up here!&#8221;.</p>
<p>&#8220;I&#8217;m with those people, thats where I was&#8221;, I tell Jackie.</p>
<p>&#8220;Oh hell no, he&#8217;s not up there with those people, he&#8217;s got to get at the back of the line where he was.&#8221;, Jackie says.</p>
<p>&#8220;No, I was standing with them&#8221;, I plead again.</p>
<p>&#8220;They&#8217;re on Continental, they don&#8217;t know him!&#8221; (How could she know this?)</p>
<p>&#8220;I do know them, they are here from Florida on holiday, they were here for a week. Their flight connects in Houston!&#8221;, I say.</p>
<p>At this point the husband of the family, my hero &#8211; got love New Yorkers (living in Florida). Screams at the top of his lungs &#8220;He&#8217;s with us, you let him up here right now!&#8221; directly into the face of the TSA bouncer that made the announcement earlier.</p>
<p>The TSA officer says to the husband, &#8220;Sir, lower your voice.&#8221;</p>
<p>&#8220;Fine go through&#8221;, Jackie says knowing she could no longer deny me and <a href="http://sports.espn.go.com/broadband/ivp/index?id=3005028">had lost</a>.</p>
<p>At the same moment I walk through the First class line behind the TSA officer. I hear the husband ask, &#8220;Why are you guys doing this to this guy, he just wanted to get on his flight?&#8221;</p>
<p>As I walk by, I hear the TSA officer respond &#8211; &#8220;Sir, that gentleman made a death threat on my life&#8221;. AN OBVIOUS LIE! I ignore it, as at this point I am shaking from the stress of the situation and I am nervous that I am not going to make my flight.</p>
<p>&#8220;Oh, I didn&#8217;t know anything about that&#8221;, the husband says.</p>
<p>The family and I are now parallel in the lines. I say thank you to both the husband and wife for their help and they try to calm me down, I was visibly shaking. I give the husband my business card and say please get in touch so that I can thank you. I hope he reads this and does.</p>
<p>I did not think a thing about the TSA officer&#8217;s &#8220;death threat&#8221; statement and went to the x-ray machine.</p>
<p>I take out my Powerbook and put it in a bin with the case, and toss my sandals and backpack in another.</p>
<p>No x-ray or metal detector alarms, and I get re-dressed.</p>
<p>I then run to Gate 40, basically the farthest gate in the terminal (check map linked above). I though the adrenaline would have got me there faster, but by Gate 38 my legs were running at half speed. Note: It must have been the sandals <img src='http://www.netstumbler.com/wp-includes/images/smilies/icon_smile.gif' alt=':)' class='wp-smiley' /> </p>
<p>I get to the gate counter nearly dying and say to a Delta clerk, named Ana, &#8220;Did I make it for the 6:30?&#8221;</p>
<p>&#8220;Nope, its already gone.&#8221;, she says.</p>
<p>&#8220;How long did I miss it by?&#8221;, catching my breath.</p>
<p>&#8220;Technically you missed it by 5 minutes, but actually you missed it by 2&#8243;, she says. (Read: SHIT!)</p>
<p>&#8220;Let me see you ticket&#8221;, she says.</p>
<p>So I hand her my ticket, tell her I&#8217;m catching a connection to Johannesburg.</p>
<p>She then puts me on the 8:00 AM flight to Atlanta, and tells me that I will need to run, &#8220;No Starbucks&#8221;, and puts me as far forward on the plane as she could. Seat 12C.<br />
I ask her about my bag.</p>
<p>She says that it left on the plane without me, but assures me that it will be on the plane to Johannesburg.</p>
<p>I thank her and then go to the bathroom for a little moment. &#8220;This sucks, is it still worth going?&#8221; I think to my self.</p>
<p>I gather my composure and start walking back to the security screening area to find out the names of the people I had just dealt with so pleasantly at the security screening.</p>
<p>I spot a &#8220;security guard&#8221; on break and ask him if he knows who the woman (Jackie) at the front was and who the guy (TSA) was. He explains that TSA wear all white, and that some are private employees but still employed by the government.</p>
<p>He then says that he wants to see who these people were also and starts walking back with me.</p>
<p>On the way I see the two officers, Walter Tucker and Columbus Offord, sitting on coffee break and I approach them.</p>
<p>I say &#8220;Hi officers, I just wanted to let you know that I did not make my flight.&#8221; I continue, &#8220;I know you were just doing your job, but I would like to get your names and badge numbers.&#8221;</p>
<p>&#8220;What do you need that for?&#8221;, one says.</p>
<p>&#8220;You don&#8217;t need that!&#8221;, the other proclaims.</p>
<p>&#8220;What do you need it for?&#8221;, they both say obviously feeling defensive and threatened.</p>
<p>I respond, &#8220;I need it for the same reason that you needed to see my passport, so I know who I talked to. I want to be able to remember everything accurately.&#8221;</p>
<p>They then begin to pull out their business cards.</p>
<p>As the first officer, sitting on the right, hands me his business card, he says &#8220;You know you don&#8217;t come to the airport and make death threats.&#8221;</p>
<p>I respond by saying, &#8220;That is a ridiculous lie! You and I both know, you better than me, that if I had made a death threat to a federal officer that I wouldn&#8217;t be here right now, I would be arrested. You probably would have been the ones to do it. Its very easy for that TSA employee to make false accusations, I am just a regular citizen and I have no recourse, and he has no repercussions for making these false accusations.&#8221;</p>
<p>&#8220;Ok&#8221;, they say as they stare at me blankly.</p>
<p>After that, I walk towards the TSA kiosk, on the &#8220;secured&#8221; part of passenger screening.</p>
<p>I walk up to, a senior looking officer. Scott Stanfield.</p>
<p>I tell him, that I had a problem with some employees and I would like to know who they are so that I can file a complaint.</p>
<p>He says OK, but wants to make sure that he knows who I am talking about. So I tell him the woman in the front, with a maroon polo shirt, and the larger gentleman with a white TSA shirt at the desk in front. He walks me over to a more direct line of site, and points at them. I confirm that those are the people, even though I could not see the woman at the time.</p>
<p>He begins to tell me that the woman, Jackie, is not a federal employee, but is employed by a private firm GAT Security. I tell him thats fine, give me GAT Security&#8217;s number and the manager&#8217;s contact information and I will file a complaint with them.</p>
<p>Then I say I want to know who the TSA employee is, he says that he cannot give me his name because he is a federal employee. At this point I look at his badge and say &#8220;Scott Stanfield, are you kidding me? I can just go walk up and read his name off his badge, but you can&#8217;t tell me?&#8221;</p>
<p>&#8220;No, Sir I can&#8217;t. If you tell me what your complaint is, I will file the complaint for you&#8221;, he responds in a serious manner.</p>
<p>&#8220;Ok then&#8221;, I say.</p>
<p>At this point, several other TSA employees start to crowd around like school children trying to eavesdrop on a secret.</p>
<p>I tell him, that I don&#8217;t feel comfortable where we are standing and move over to the side a few feet.</p>
<p>I then explain to him, that as I walked behind the TSA officer he told another passenger that I had made a &#8220;death threat on his life.&#8221;</p>
<p>I tell Scott that this is a blatantly false accusation, and that his employees should not joke about these types of things. I also tell him, what everyone knows, that if it were true. I would be in custody.</p>
<p>I can see that this is not going anywhere, as he hardly agrees that this was a problem.</p>
<p>&#8220;This type of behavior must be encouraged&#8221;, I think to my self.</p>
<p>Before I go, they give me a piece of paper with &#8211; &#8220;G.A.T Security &#8211; Kyle 619-491-2864&#8243;, written on it. They say that Kyle is the Jackie&#8217;s manager. I thank them and go on my way.</p>
<p>When I return to Gate 40 I speak with Ana, the Delta clerk again. She says that I should go over and speak with the Delta manager, she points him out for me.</p>
<p>I walk up and ask the Delta Gate Manager about GAT Security and tell him my story.</p>
<p>He then says he will call a GAT manager to come speak with me.</p>
<p>I wait about 10 minutes and a guy shows up with a reflective safety vest, the GAT &#8220;manager&#8221;. He has been out on the runway, with his vest and ear plugs. This guy looks like a baggage handler, not the manager of airport security.</p>
<p>I explain to him what happened, and he tells me this in not the first time they have had problem with Jackie.</p>
<p>He then gives me the office number 619-491-2864 and Kyle&#8217;s name. I decide to give the number a call, it goes straight to voicemail on a cell phone, its Kyle&#8217;s cell phone. I start to wonder why is this number for the office going to Kyle&#8217;s cell phone?</p>
<p>I then go back up to Ana, she asks for my tickets again, and says if the plane doesn&#8217;t board in the next twenty minutes that I won&#8217;t make it. She wants to put on me on the same flights for tomorrow. I tell her &#8220;Ok, thank you&#8221;, and wait like the rest of the passengers.</p>
<p>At about 7:45 AM the plane has not boarded yet, and I get approached by another Delta manager who asks if the GAT supervisor was helpful. I tell him no. He then says, &#8220;come over here I want to lookup your flights.&#8221; He confirms that Ana had put me on for next day and says, &#8220;see you tomorrow.&#8221; It turns out that the bolt that they use to attach the plane to the vehicle for towing into the gate had broken and the plane was stuck on the runway.</p>
<p>I go up to Ana and thank her for being &#8220;the nicest person that I had dealt with today.&#8221; She said she was actually in a bad mood, but liked me. She asks for my tickets again, and at this point I figured I would ask about bulk-head seats for tomorrow. She said that they are only assigned the day of the flight. She then said, but don&#8217;t worry I have upgraded you to Business class. Don&#8217;t tell anybody.</p>
<p>I thanked her graciously and left the airport.</p>
<p>On my way out I see the TSA&#8217;s Scott Stanfield coming up the escalators near where this morning&#8217;s events began. I tell him that the second flight had mechanical problems and thanked him.</p>
<p>I spent several hours after I got home trying to find GAT Security in the White Pages and online, I could find nothing. I then decide to call the San Diego International Airport and ask for a manager&#8230; there is none. The only person to speak with is the directory assistance person.</p>
<p>I then try call the Harbor Police, I finally manage to get hold of a Sergeant Micksel. I explain to him what had happened with his two officers, that they initially refused to provide their badge numbers and names. I then spend nearly an hour and twenty minutes explaining to him why it was NOT appropriate behavior for them to tell me &#8220;You know you don&#8217;t come to the airport and make death threats.&#8221; He could not see why this was a problem. I tell try to walk him through the logic that it was a lie and a false accusation, and they knew it was false because if it were true they would have had to act.</p>
<p>Finally I tell him, &#8220;If you are not going to take my complaint seriously I will find someone who will.&#8221;</p>
<p>That gets his attention and he says he wants to get the dispatch logs and call me back. I wait for his call, and twenty minutes later he does call back.</p>
<p>He says that I dealt with &#8220;one African American officer and one Asian American officer.&#8221; I tell him, &#8220;No, actually they were both African American.&#8221; I don&#8217;t know why this was relevant?</p>
<p>He then tells me that all the dispatch logs said was that someone, called in &#8220;a disturbance&#8221;. I tell him that I had not created a disturbance, and the tells me that all the Harbor Police do is respond when they are called.</p>
<p>I then ask him how I can go about filing my complaint. He tells me to contact Internal Affairs and speak with John Reilly at 619-686-6590.</p>
<p>I thank him and hang up the phone.</p>
<p>The next morning I then decided that a trip of that length, when I have already missed my meeting is not worth taking.</p>
<p>My next mission is to get my ticket refunded.</p>
<p>I call Delta and ask for a refund, they tell me that I can&#8217;t get one even though it was a mechanical failure that prevented me from making my flight and even though I no longer need to make the trip.</p>
<p>I then ask how I can go about getting my bag back to San Diego&#8230; Remember? It flew WITHOUT me!</p>
<p>They tell me that they cannot get it, I have to go to the baggage desk at the airport.</p>
<p>So I go back to sleep and when I wake up I go to the airport to request my bag.</p>
<p>The baggage desk requests for the bag to be sent back to San Diego and delivered to my home.</p>
<p>My girlfriend, then says &#8220;Lets go to the Delta desk and ask for a refund.&#8221;</p>
<p>I oblige.</p>
<p>I tell the Delta clerk what happened, and that I no longer need to make the trip and would like a refund.</p>
<p>Interestingly, she does not offer me another ticket for another travel date. At the time I did not know that was the typical response. To be honest, I have never missed a flight before. Let&#8217;s hope this is not a new trend for me.</p>
<p>She then proceeds to do a TRR (Ticket Refund Request).</p>
<p>The manager comes over and explains that because I didn&#8217;t buy my ticket directly from Delta the amount that I purchased the ticket for does not show up in the system. Therefor, he cannot refund me today.</p>
<p>I tell him that I understand. The clerk then gives me a print out and tells me to call 1-800-847-0578 on the 23rd of August. They will take about two weeks to find out how much I paid and then be able to process the refund.</p>
<p>I thank her, and ask her about the $25.00 in over-baggage that I had to pay.</p>
<p>She says that they will be able to refund me when I call.</p>
<p>I thank her again, and go home.</p>
<p>Two weeks later, on Monday the 27th I call the refund center and give them my TRR number.</p>
<p>I am told that they can see my name in the system, but they have not yet received the actual request from the airport for a refund.</p>
<p>&#8220;What? I don&#8217;t understand, you have my name and the TRR number? What else do you need?&#8221;, I ask.</p>
<p>&#8220;We need the actual paper receipt from the airport, it can take up to 40 days&#8221;, the customer service representative replies as if this was normal.</p>
<p>&#8220;I have a paper copy&#8221;, I tell him.</p>
<p>&#8220;Ok, you can fax it to us at this number: 404-715-9256&#8243;, he explains.</p>
<p>So I fax it through immediately.</p>
<p>I wait until Wednesday and call back. I give the representative my TRR number and they tell me again that they have not received anything from the airport.</p>
<p>I tell them that I faxed it through already.</p>
<p>&#8220;When did you do that?&#8221;, she asks.</p>
<p>&#8220;On Monday&#8221;, I reply.</p>
<p>&#8220;What time?&#8221;, she says.</p>
<p>&#8220;Around 11:30 AM&#8221;, I tell her.</p>
<p>&#8220;Ohhhh I see that here, it will take at least seven business days to before anyone can get to that&#8221;, she explains.</p>
<p>&#8220;Ok, thanks&#8221;, I say and hang up.</p>
<p>Several days later I call back and ask for an update.</p>
<p>They tell me that they have refunded me $1943.71</p>
<p>I ask why the amount is $1943.71 and not $2143.71, which is what I was billed.</p>
<p>She tells me that there was a $200 penalty.</p>
<p>I tell her that I missed the flight because of Delta, and should not have to pay ANY penalty.</p>
<p>She says that its the policy.</p>
<p>I ask her about the $25.00 over baggage fee.</p>
<p>She says that it was not included with the refund request and cannot do anything.</p>
<p>I tell her that the Delta desk told me that the refund department would be able to process that at the time that my ticket will be refunded.</p>
<p>She tells me to go back to the airport and ask them.</p>
<p>And that is where we are today&#8230; So my friends, I pose the following questions:</p>
<p>What recourse do passengers that encounter things like this with the TSA have? This is obviously a case where the TSA officer felt that it would be easier to lie to justify his actions, rather than do the right thing and help someone.</p>
<p>How can Delta let my bag fly without me? I thought that airlines are supposed to remove passengers that do not board? Isn&#8217;t this a HUGE security risk? I mean, you could read my story and find a massive loop-hole in the security system at airports. Especially given that in recent &#8220;dry-runs&#8221; bags with simulated bombs made it onto planes. I know I don&#8217;t feel safe now, knowing that the baggage belonging to the guy being detained at security is on the plane even if he is not. Does keeping him off the plane make us safer?</p>
<p>Why should coach passengers be discriminated against? Why do first class passengers receive special security treatment? Are they <a href="http://business.timesonline.co.uk/tol/business/money/tax/article1996735.ece">paying more taxes to support the TSA?</a> No! They should be in line with every other tax payer in coach.</p>
<p>Seriously, what if I end up on a &#8220;no-fly&#8221; list? What recourse does one have in a situation like this? Like <a href="http://www.nydailynews.com/news/2007/09/16/2007-09-16_custodian_falsely_accused_of_child_rape_.html?print=1">this guy</a>?</p>
<p>Who is GAT Security? How did a company with two employees, Jackie and Kyle, with only a cell phone get into a position where they can over rule the TSA and dictate what passengers get on to their flights and which get delayed?</p>
<p>Why did the TSA&#8217;s Scott Stanfield refuse to provide me the name of the other TSA employee? His excuse was bogus, if the employee wears a badge&#8230; his name is not a government secret!</p>
<p>Why does it take Delta? Two weeks/40 Days/Seven days to process a refund? The kicker here is that my credit card was billed by &#8220;DELTA AIR LINES ALEXANDRIA VA&#8221; and not by the website that I purchased the tickets from &#8211; Cheapoair.com? Is this just an excuse to keep our money and make it difficult to get refunds for things that they did not provide?</p>
<p>Thanks for reading!</p>
<p>So much for the friendly skies.</p>
<p>If you are looking for some other interesting reading check out these articles:</p>
<p>http://www.msnbc.msn.com/id/20298840/site/newsweek/</p>
<p>http://www.schneier.com/blog/archives/2007/07/airport_securit_7.html</p>
<p>http://www.schneier.com/blog/archives/2006/08/behavioral_prof.html</p>
<p>http://blog.wired.com/27bstroke6/2007/08/court-says-trav.html</p>
<p>http://consumerist.com/consumer/travel/flight-delays-will-only-get-worse-say-experts-296266.php</p>
<p>http://consumerist.com/consumer/travel/united-airlines-hires-customer-service-specialist-from-disney-296134.php</p>
<p>Editor&#8217;s Note: This post was not proof read and was written on my blackberry. Please excuse any grammatical errors.</p>
<p><script type="text/javascript">// <![CDATA[
digg_url = 'http://www.netstumbler.com/2007/09/18/my-wonderful-trip-to-south-africa-that-didnt-happen-thanks-to-the-tsa-and-delta-airlines/';
// ]]&gt;</script><br />
<script type="text/javascript" src="http://digg.com/tools/diggthis.js"></script></p>
<p><script type="text/javascript">// <![CDATA[
reddit_url='http://reddit.com/goto?id=2qspx'
// ]]&gt;</script><br />
<script type="text/javascript">// <![CDATA[
reddit_title='Guy checks in on Delta, police get called, TSA says he made a death threat, misses flight, Delta charges him $200'
// ]]&gt;</script><br />
<script type="text/javascript" language="javascript" src="http://reddit.com/button.js?t=2"></script></p>
]]></content:encoded>
			<wfw:commentRss>http://www.netstumbler.com/2007/09/18/my-wonderful-trip-to-south-africa-that-didnt-happen-thanks-to-the-tsa-and-delta-airlines/feed/</wfw:commentRss>
		<slash:comments>240</slash:comments>
		</item>
		<item>
		<title>New Tools Found For Wi-Fi Hacking</title>
		<link>http://www.netstumbler.com/2007/08/09/new-tools-found-for-wi-fi-hacking/</link>
		<comments>http://www.netstumbler.com/2007/08/09/new-tools-found-for-wi-fi-hacking/#comments</comments>
		<pubDate>Thu, 09 Aug 2007 16:09:36 +0000</pubDate>
		<dc:creator>Kristin Abraham</dc:creator>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Tools]]></category>

		<guid isPermaLink="false">http://www.netstumbler.com/2007/08/09/new-tools-found-for-wi-fi-hacking/</guid>
		<description><![CDATA[Wi-Fi hackers have gotten more advanced and your private information is even more at risk. The recent Black Hat conference in Las Vegas featured a demonstration by Errata Security that detailed how a hacker can use new tools to steal your encrypted cookies and passwords and then control your online sessions. Errata has combated this [...]]]></description>
				<content:encoded><![CDATA[<p>Wi-Fi hackers have gotten more advanced and your private information is even more at risk. The recent Black Hat conference in Las Vegas featured a demonstration by Errata Security that detailed how a hacker can use new tools to steal your encrypted cookies and passwords and then control your online sessions.</p>
<p>Errata has combated this new hack threat with their own tools, Hamster and Ferret, which prevent attacks. It appears that the good guys are following closely behind the bad guys but they&#8217;re still slightly behind and all Wi-Fi users need to be careful.<br />
Via [<a href="http://www.securecomputing.net.au/news/58090,black-hat-conf-new-tools-found-for-wifi-hacking.aspx">securecomputing.net.au</a>]</p>
]]></content:encoded>
			<wfw:commentRss>http://www.netstumbler.com/2007/08/09/new-tools-found-for-wi-fi-hacking/feed/</wfw:commentRss>
		<slash:comments>7</slash:comments>
		</item>
		<item>
		<title>iPhones Flooding Wireless LAN At Duke University</title>
		<link>http://www.netstumbler.com/2007/07/18/iphones-flooding-wireless-lan-at-duke-university/</link>
		<comments>http://www.netstumbler.com/2007/07/18/iphones-flooding-wireless-lan-at-duke-university/#comments</comments>
		<pubDate>Wed, 18 Jul 2007 21:14:26 +0000</pubDate>
		<dc:creator>Kristin Abraham</dc:creator>
				<category><![CDATA[Apple]]></category>
		<category><![CDATA[Deployment]]></category>
		<category><![CDATA[Security]]></category>

		<guid isPermaLink="false">http://www.netstumbler.com/2007/07/18/iphones-flooding-wireless-lan-at-duke-university/</guid>
		<description><![CDATA[Duke University is facing a wireless LAN crisis which seems to be related to the recent release of Apple&#8217;s iPhone. Up to 30 wireless access points can be knocked out at a time as the built-in 802.11b/g adapter on the newly released phone flood the area with MAC address requests. The requests are for an [...]]]></description>
				<content:encoded><![CDATA[<p>Duke University is facing a wireless LAN crisis which seems to be related to the recent release of Apple&#8217;s iPhone.</p>
<p>Up to 30 wireless access points can be knocked out at a time as the built-in 802.11b/g adapter on the newly released phone flood the area with MAC address requests. The requests are for an invalid router address, since the iPhone making the request doesn&#8217;t get an answer it keeps asking, tying up the system for ten to 15 minutes at a time.</p>
<p>Right now this isn&#8217;t a huge problem but school officials are worried that the end of August will bring a huge influx of new iPhone users and more headaches than Duke can handle.<br />
Via [<a href="http://www.networkworld.com/news/2007/071607-duke-iphone.html">networkworld.com</a>]</p>
]]></content:encoded>
			<wfw:commentRss>http://www.netstumbler.com/2007/07/18/iphones-flooding-wireless-lan-at-duke-university/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>Wireless Network Admins Wising Up</title>
		<link>http://www.netstumbler.com/2007/06/26/wireless-network-admins-wising-up/</link>
		<comments>http://www.netstumbler.com/2007/06/26/wireless-network-admins-wising-up/#comments</comments>
		<pubDate>Wed, 27 Jun 2007 05:34:20 +0000</pubDate>
		<dc:creator>Kristin Abraham</dc:creator>
				<category><![CDATA[Security]]></category>

		<guid isPermaLink="false">http://www.netstumbler.com/2007/06/26/wireless-network-admins-wising-up/</guid>
		<description><![CDATA[RSA Security Inc. conducted its annual survey of New York, London and Paris and found that more wireless hot spots are working to secure their networks but a fifth of corporate access points remain open. In all three cities the percentage of hot spots protected by some form of encryption increased; London went from 76 [...]]]></description>
				<content:encoded><![CDATA[<p>RSA Security Inc. conducted its annual survey of New York, London and Paris and found that more wireless hot spots are working to secure their networks but a fifth of corporate access points remain open.</p>
<p>In all three cities the percentage of hot spots protected by some form of encryption increased; London went from 76 to 81%, New York only grew from 75 to 76%, while Paris jumped from 78 to 80%. They also found that Wired Equivalent Privacy (WEP) is being replaced by Wi-Fi Protected Access (WPA), a much more secure method.</p>
<p>The number of businesses without adequate protection is a bit surprising considering what could possibly be at risk for these companies. London and Paris both had about 18% of their companies unprotected and New Yorkers topped the list with a full 21% of their businesses tempting fate.<br />
Via [<a href="http://www.computerworld.com/action/article.do?command=viewArticleBasic&#038;articleId=9024818">computerworld.com</a>]</p>
]]></content:encoded>
			<wfw:commentRss>http://www.netstumbler.com/2007/06/26/wireless-network-admins-wising-up/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>More Wireless, Not Enough Security</title>
		<link>http://www.netstumbler.com/2007/06/24/more-wireless-not-enough-security/</link>
		<comments>http://www.netstumbler.com/2007/06/24/more-wireless-not-enough-security/#comments</comments>
		<pubDate>Mon, 25 Jun 2007 03:05:04 +0000</pubDate>
		<dc:creator>Kristin Abraham</dc:creator>
				<category><![CDATA[Security]]></category>

		<guid isPermaLink="false">http://www.netstumbler.com/2007/06/24/more-wireless-not-enough-security/</guid>
		<description><![CDATA[RSA, the security division of EMC, has found that larger cities have more Wi-Fi than ever and more security but the security is woefully outdated. Using New York, London and Paris as their target cities, they have found the number of Wi-Fi access points have risen 49%, 44% and 160% respectively. Encryption was found to [...]]]></description>
				<content:encoded><![CDATA[<p>RSA, the security division of EMC, has found that larger cities have more Wi-Fi than ever and more security but the security is woefully outdated.</p>
<p>Using New York, London and Paris as their target cities, they have found the number of Wi-Fi access points have risen 49%, 44% and 160% respectively. Encryption was found to be up but only by 6% in London and less than 2% in both New York and Paris.</p>
<p>The analysis of the data has shown an improvement in security over previous years but an unbelievable one fifth to one quarter of all businesses have no encryption security at all.<br />
Via [<a href="http://www.wi-fiplanet.com/news/article.php/3683621">wi-fiplanet.com</a>]</p>
]]></content:encoded>
			<wfw:commentRss>http://www.netstumbler.com/2007/06/24/more-wireless-not-enough-security/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Schools Want Urgent Wi-Fi Advice</title>
		<link>http://www.netstumbler.com/2007/05/29/schools-want-urgent-wi-fi-advice/</link>
		<comments>http://www.netstumbler.com/2007/05/29/schools-want-urgent-wi-fi-advice/#comments</comments>
		<pubDate>Tue, 29 May 2007 07:20:14 +0000</pubDate>
		<dc:creator>Kristin Abraham</dc:creator>
				<category><![CDATA[Health]]></category>
		<category><![CDATA[Security]]></category>

		<guid isPermaLink="false">http://www.netstumbler.com/2007/05/29/schools-want-urgent-wi-fi-advice/</guid>
		<description><![CDATA[Debate over the safety of Wi-Fi radiation levels in Britain continues. Britain has adopted municipal Wi-Fi fairly well and has added millions of users and several wireless cities to its roster, but they&#8217;re now finding the debate over health and safety is spreading. Stirring the pot of contention is the BBC program Panorama, which is [...]]]></description>
				<content:encoded><![CDATA[<p>Debate over the safety of Wi-Fi radiation levels in Britain continues. Britain has adopted municipal Wi-Fi fairly well and has added millions of users and several wireless cities to its roster, but they&#8217;re now finding the debate over health and safety is spreading. Stirring the pot of contention is the BBC program Panorama, which is questioning the level of control over Wi-Fi in the classroom. Britain&#8217;s Health Protection Agency acknowledges the concerns of citizens and vows to continue research into the topic, but at the same time reassures communities by saying that the networks produce very low power which does not represent a health risk. This ambiguity has served to alarm more than placate the public and watchdog groups have been set up to demand evidence of safety.<br />
Via [<a href="http://news.bbc.co.uk/1/hi/education/6676205.stm">news.bbc.co.uk</a>]</p>
]]></content:encoded>
			<wfw:commentRss>http://www.netstumbler.com/2007/05/29/schools-want-urgent-wi-fi-advice/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>How To Keep Your Wi-Fi Network Safe</title>
		<link>http://www.netstumbler.com/2007/05/02/how-to-keep-your-wi-fi-network-safe/</link>
		<comments>http://www.netstumbler.com/2007/05/02/how-to-keep-your-wi-fi-network-safe/#comments</comments>
		<pubDate>Wed, 02 May 2007 08:55:47 +0000</pubDate>
		<dc:creator>Eliza Villarino</dc:creator>
				<category><![CDATA[Security]]></category>

		<guid isPermaLink="false">http://www.netstumbler.com/2007/05/02/how-to-keep-your-wi-fi-network-safe/</guid>
		<description><![CDATA[With the ease in cracking the Wireless Equivalent Protection (WEP) code, many experts have recommended the use of Wi-fi Protected Access (WPA) to secure home wireless Internet networks. Unlike WEP, which hackers can breach in as little as 60 seconds, WPA appears to be a formidable protocol. &#8220;We have had a very close look at [...]]]></description>
				<content:encoded><![CDATA[<p>With the ease in cracking the Wireless Equivalent Protection (WEP) code, many experts have recommended the use of Wi-fi Protected Access (WPA) to secure home wireless Internet networks. Unlike WEP, which hackers can breach in as little as 60 seconds, WPA appears to be a formidable protocol. &#8220;We have had a very close look at WPA and we can&#8217;t find anything to exploit,&#8221; said Erik Tews, one of the researchers at the Darmstadt Technical University in Germany who discovered a method to break into a WEP-equipped network much more quickly. A brute force dictionary attack may defeat WPA and its later variant, WPA2, but this would entail the hacker to use millions of different words or combinations of words to obtain the correct password. As such, AirDefense wireless security expert Amit Sinha is endorsing the use of a non-dictionary password with WPA. &#8220;If you use one which is long enough &#8211; at least 20 characters &#8211; then it becomes unfeasible for a hacker to mount a brute force attack, because finding your password would take longer than the entire history of the universe.&#8221;<br />
Via [<a href="http://news.bbc.co.uk/2/hi/technology/6595703.stm">bbc.co.uk</a>]</p>
]]></content:encoded>
			<wfw:commentRss>http://www.netstumbler.com/2007/05/02/how-to-keep-your-wi-fi-network-safe/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Child Porn Case Shows That An Open WiFi Network Is No Defense</title>
		<link>http://www.netstumbler.com/2007/04/30/child-porn-case-shows-that-an-open-wifi-network-is-no-defense/</link>
		<comments>http://www.netstumbler.com/2007/04/30/child-porn-case-shows-that-an-open-wifi-network-is-no-defense/#comments</comments>
		<pubDate>Mon, 30 Apr 2007 10:50:47 +0000</pubDate>
		<dc:creator>Kristin Abraham</dc:creator>
				<category><![CDATA[Legal]]></category>
		<category><![CDATA[Security]]></category>

		<guid isPermaLink="false">http://www.netstumbler.com/2007/04/30/child-porn-case-shows-that-an-open-wifi-network-is-no-defense/</guid>
		<description><![CDATA[Leaving a wireless access point (WAP) open is generally considered a bad idea. Experts suggest you could be opening yourself to criminals by not password protecting your WiFi Network. But if you are a criminal then keeping and open WAP may become your defense. A growing number of file sharers believe they can throw reasonable [...]]]></description>
				<content:encoded><![CDATA[<p>Leaving a wireless access point (WAP) open is generally considered a bad idea. Experts suggest you could be opening yourself to criminals by not password protecting your WiFi Network. But if you are a criminal then keeping and open WAP may become your defense. A growing number of file sharers believe they can throw reasonable doubt into any lawsuit by demonstrating that anyone could have been accessing their computer through an open WAP. But this may not be the case. Recently a Texas man, convicted of possessing child pornography, tried to use this defense stating that the original evidence used to get the search warrant was based upon an email that could have been sent by his roommate over the man&#8217;s open WAP. In this case the District Court and the US Court of Appeals disagreed and the man was convicted. So, file sharers beware, an open WAP may not provide any protection from criminal prosecution.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.netstumbler.com/2007/04/30/child-porn-case-shows-that-an-open-wifi-network-is-no-defense/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>WiFi Thieves Busted In The UK</title>
		<link>http://www.netstumbler.com/2007/04/26/wifi-thieves-busted-in-the-uk/</link>
		<comments>http://www.netstumbler.com/2007/04/26/wifi-thieves-busted-in-the-uk/#comments</comments>
		<pubDate>Thu, 26 Apr 2007 10:48:12 +0000</pubDate>
		<dc:creator>Kristin Abraham</dc:creator>
				<category><![CDATA[Security]]></category>

		<guid isPermaLink="false">http://www.netstumbler.com/2007/04/26/wifi-thieves-busted-in-the-uk/</guid>
		<description><![CDATA[The city of Redditch in the UK has two unlikely criminals. The pair were recently arrested for using other people&#8217;s WiFi broadband internet connections without permission. Neighbors had become frustrated at the man parked in front of their home on his laptop and called the police. The police arrested the man and cautioned him for [...]]]></description>
				<content:encoded><![CDATA[<p>The city of Redditch in the UK has two unlikely criminals. The pair were recently arrested for using other people&#8217;s WiFi broadband internet connections without permission. Neighbors had become frustrated at the man parked in front of their home on his laptop and called the police. The police arrested the man and cautioned him for dishonestly obtaining electronic communications services with intent to avoid payment.<br />
Via [<a href="http://www.techworld.com/mobility/news/index.cfm?newsID=8606">techworld.com</a>]</p>
]]></content:encoded>
			<wfw:commentRss>http://www.netstumbler.com/2007/04/26/wifi-thieves-busted-in-the-uk/feed/</wfw:commentRss>
		<slash:comments>6</slash:comments>
		</item>
		<item>
		<title>Don&#8217;t Use WEP For Wi-Fi Security, Researchers Say</title>
		<link>http://www.netstumbler.com/2007/04/13/dont-use-wep-for-wi-fi-security-researchers-say/</link>
		<comments>http://www.netstumbler.com/2007/04/13/dont-use-wep-for-wi-fi-security-researchers-say/#comments</comments>
		<pubDate>Fri, 13 Apr 2007 09:02:00 +0000</pubDate>
		<dc:creator>Kristin Abraham</dc:creator>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[WEP]]></category>

		<guid isPermaLink="false">http://www.netstumbler.com:8080/?p=7</guid>
		<description><![CDATA[If you&#8217;re relying on Wired Equivalent Privacy (WEP) protocol for Wi-Fi security you may be at risk. Three German security researchers have found a way to tap into WEP protected data within a minute. Previosly, WEP had been criticized for flaws in the basic algorithm structure but cracking into the system took several minutes. Now, [...]]]></description>
				<content:encoded><![CDATA[<p>If you&#8217;re relying on Wired Equivalent Privacy (WEP) protocol for Wi-Fi security you may be at risk. Three German security researchers have found a way to tap into WEP protected data within a minute. Previosly, WEP had been criticized for flaws in the basic algorithm structure but cracking into the system took several minutes. Now, with the help of a 1.7 GHz Pentium M processor, WEP is rendered useless in a few seconds. Switching to WPA encryption can take up to a few hours but the switch could protect your private and sensitive data.<br />
Via [<a href="http://www.computerworld.com/action/article.do?command=viewArticleBasic&#038;articleId=9015559">computerworld.com</a>]</p>
]]></content:encoded>
			<wfw:commentRss>http://www.netstumbler.com/2007/04/13/dont-use-wep-for-wi-fi-security-researchers-say/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>New Attack Cracks WEP In Record Time</title>
		<link>http://www.netstumbler.com/2007/04/12/new-attack-cracks-wep-in-record-time/</link>
		<comments>http://www.netstumbler.com/2007/04/12/new-attack-cracks-wep-in-record-time/#comments</comments>
		<pubDate>Thu, 12 Apr 2007 08:12:00 +0000</pubDate>
		<dc:creator>Eliza Villarino</dc:creator>
				<category><![CDATA[Research]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[WEP]]></category>

		<guid isPermaLink="false">http://www.netstumbler.com:8080/?p=9</guid>
		<description><![CDATA[Researchers at the Technische Universitat Darmstadt have found a way to crack 104-bit WEP, a typical security tool for 802.11b/g/n networks. The team used a 1.7GHz Pentium-M machine to compute the success rate of grabbing the key. The attack needs sufficient traffic, so the researchers made the protected network generate packets. At 40,000 packets, the [...]]]></description>
				<content:encoded><![CDATA[<p>Researchers at the Technische Universitat Darmstadt have found a way to crack 104-bit WEP, a typical security tool for 802.11b/g/n networks. The team used a 1.7GHz Pentium-M machine to compute the success rate of grabbing the key. The attack needs sufficient traffic, so the researchers made the protected network generate packets. At 40,000 packets, the probability of extracting the key is at 50 percent. This could go up to 80 percent with an additional 20,000 packets, and rise to 95 percent when traffic involves 95,000 packets. Hitting 95 percent, based on the experiment, would only take 1 minute and 51 seconds. </p>
<p>Because of WEP&#8217;s vulnerabilities, it is recommended that wireless network owners opt for WPA2, which is yet to be cracked by any known cryptographic attacks. The mechanism also provides support for infrastructure and ad-hoc networks, and includes pre-authentication and CCMP encryption features.<br />
Via [<a href="http://arstechnica.com/news.ars/post/20070404-new-attack-cracks-wep-in-record-time.html">arstechnica.com</a>]</p>
]]></content:encoded>
			<wfw:commentRss>http://www.netstumbler.com/2007/04/12/new-attack-cracks-wep-in-record-time/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
