Category Archives: Security

Unique Codes of Sperm Whales

Our linguistic analysis of email proposes a coding system that could be implemented to detect attacks and fraud such as the 419 or AFF. A related approach is discussed in Wired, but in terms of the sounds made by sperm whales. Pattern analysis is being used to explore whether each whale has a different voice, or even a unique identifier.

“In terms of information transfer, the timing of the clicks is much less susceptible” to interference, said Rendell. “There is no doubt in my mind that the animals can tell the difference between the timing of individuals.” Moreover, 5R tends to be made at the beginning of each coda string as if, like old-time telegraph operators clicking out a call sign, they were identifying themselves. Said Rendell, “It may function to let the animals know which individual is vocalizing.”

Rendell stressed that much more research is needed to be sure of 5R’s function. “We could have just observed a freak occurrence,” he said. Future research will involve more recordings. “This is just the first glimpse of what might be going on.”

Maybe they also eventually will find whale fraud. At least it is a big step up from whale-feces research.

Russian Billboard Hacked with Porn

The accused was sentenced to 5 years of hard labor already for possession of 13 grams of marijuana, but getting caught for hacking a billboard in Moscow has only added to his time. He said he was a bored tradesman who was just trying to have some fun with computers.

All together, Blinnikov, 41, is going to spend six years behind bars, as he is currently serving another sentence for selling drugs in his home town.

He was already under investigation for selling marijuana when he decided to share a video from his personal collection with the world by downloading it on an unprotected computer he had gained access to through the Internet.

His defense seems to have some major holes (pun not intended). He argued that he did not know his explicit video would be widely distributed, but at the same time he claims to have had control enough to engineer a very specific time for it to be displayed.

Igor Blinnikov, pictured above, uploaded a 15-minute long pornographic video on the server of an advertising company one night last year and claims he did it “just for fun” and didn’t expected it to be broadcasted on billboards on the capital’s Garden Ring.

“I made it at night deliberately, at midday, so children wouldn’t see it. You should never corrupt children!” he told LifeNews.

Interesting defense. He will save the children by posting pornographic videos on billboards only at certain times of night.

Russian hacks seem to be in the news lately for defacement using sexual imagery. It reminds me of the artists who were charged recently by Russian federal agencies with anti-discrimination laws.

The Federal Security Service (FSB), in a darkly sarcastic twist of logic, assigned themselves status as a group and then claimed they were being discriminated against by protest art. The FSB, who have replaced the KGB, were faced with a 65 metre tall phallic image called “Dick captured by KGB” on the Liteyny Bridge, which spans the Neva in St. Petersburg. When it was raised it faced FSB Headquarters.

Rootkit Lessons from Early Polymorphism

I just dug up an old paper (01/08/2005) but still a good one called “Shadow Walker: Raising The Bar For Windows Rootkit Detection”. It suggests malware provide a randomly faked view of memory to a system/scanner without revealing any of its own code.

…imagine a rootkit that makes no effort to change its superficial
appearance, yet is capable of fundamentally altering a detectors view of an
arbitrary region of memory. When the detector attempts to read any region
of memory modified by the rootkit, it sees a ‘normal’, unaltered view of
memory. Only the rootkit sees the true, altered view of memory. Such a
rootkit is clearly capable of compromising all of the primary detection
methodologies to varying degrees.

The authors’ propose a better way for malware to hide than polymorphism is to lie; binary code change camouflage to evade scanners was said to be more difficult than just generating fake replies. Now it seems so commonplace as to be obvious to manipulate memory, and even incorporated into regular development, but back then it was Phrackworthy.

Cuckoo’s Egg Arms Race

The title is misleading, I admit, but it’s how the BBC describes research into which birds reject a cuckoo egg from their nest and why. Maybe, like me, you were expecting an update to Clifford Stoll’s famous book. Alas, it’s actually about real cuckoos and how they adapt to risk.

Cuckoos have target hosts. For example, a cuckoo that lays eggs in a redstart nest lays a blue egg. To the human eye, this is identical to the redstart egg.

However, the cuckoo that targets a dunnock nest lays a white egg with brown speckling, visibly different from the dunnock’s immaculately blue egg. Yet despite this obvious colour mismatch, dunnocks readily accept the foreign eggs, whereas redstarts are much more likely to eject the cuckoo’s egg.

The researchers give a couple theories for why a dunnock would put their own egg at risk (if a cuckoo egg hatches first the chick ejects the other eggs) instead of immediately rejecting the cuckoo’s egg.

Researchers think that naive hosts, like the dunnock, are still at early stages of the evolutionary arms race and; “they accept alien eggs, because they have not yet evolved defences against parasitism,” explains Ms Stoddard.

“Another’ hypothesis is that tolerating cuckoo eggs may be the most stable strategy for some hosts.”

So, for birds that do not often suffer cuckoo invasions, the overall “cost” of mistakenly ejecting their own eggs might be higher than the cost of tolerating the occasional parasite.

It sounds like they are either really dumb and unaware or…really smart and totally aware of the risks. That sure narrows it down.

I am now curious about the rate of a dunnock “mistakenly ejecting their own eggs”. If a dunnock is able to tell there is a difference and wants to eject the cuckoo egg (as the eggs are so different) then what causes a mistake? Clumsy footwork? I mean, if a cuckoo chick can tell the difference and eject the other eggs…