Why Making A Peace Sign In Public Is Now A Security Risk

from the and-not-just-for-political-reasons dept

The British have a number of traditions. Some, such as drinking tea, are famous around the world. Less well-known is a habit of revealing highly-confidential information by carrying pieces of paper in public that photographers using long-focus lenses are able to snap and then magnify to read. The Guardian wrote an entire article on the subject, detailing how numerous embarrassing leaks occurred in the UK because people forgot to put the documents they were holding in some kind of opaque folder. On one occasion, an anti-terror operation had to be brought forward when Britain’s most senior counterterrorism officer walked around with top secret documents on display — a blunder that cost him his job.

This mistake is so common that there are notices by the door of the UK Prime Minister’s residence at Number 10 Downing Street reminding people not to walk out with confidential material that is exposed. The fact that there is a photographer with a long-focus lens who hangs around outside No 10 in the hope that they do precisely that shows how often they ignore this warning.

Although the Brits have practically turned this activity into another weird sport alongside cricket, it’s not unknown in the US. For example, the following happened at the end of November last year:

Potential Donald Trump cabinet pick Kris Kobach accidentally leaked Department of Homeland Security plans when posing for a press photograph with the president-elect. Using photo editing tools, a zoomed-in view on the documents being carried by Kansas Secretary of State Kris Kobach reveals a plan to put Trump?s hard-line immigration platform into practice.

Aside from the carelessness of the people involved, the problem has arisen because long-focus lenses are now so powerful and commonly-deployed that it is relatively easy to capture a high-quality image of an exposed document so that its contents can be read. That’s a problem that will only get worse as camera technology advances, especially combined with digital enhancement techniques. If this story on the BBC’s website is to be believed, it’s not just documents that are now at risk as a result:

A Japanese researcher says doing the peace sign in a photo could lead to your fingerprints being stolen.

They might be easy to recreate if your digits are “in focus with strong lighting”.

That claim is from Isao Echizen, from the National Institute of Informatics (NIII), who says prints could then be made “widely available”.

That’s clearly a big problem at a time when fingerprints are increasingly being used to unlock digital devices, and to provide access to sensitive data. The British experience shows it’s hard enough to shield confidential papers; keeping fingerprints out of high-resolution photos seems like an impossible task.

Follow me @glynmoody on Twitter or identi.ca, and +glynmoody on Google+

Filed Under: , ,

Rate this comment as insightful
Rate this comment as funny
You have rated this comment as insightful
You have rated this comment as funny
Flag this comment as abusive/trolling/spam
You have flagged this comment
The first word has already been claimed
The last word has already been claimed
Insightful Lightbulb icon Funny Laughing icon Abusive/trolling/spam Flag icon Insightful badge Lightbulb icon Funny badge Laughing icon Comments icon

Comments on “Why Making A Peace Sign In Public Is Now A Security Risk”

Subscribe: RSS Leave a comment
56 Comments
Cdaragorn (profile) says:

Re: Re: Re:2 Biometrics

False, false, and soooooo false. It’s these very wrong belief’s about them that is creating a widespread security problem.

They are not perfect. In fact, it’s common for them to even change over time.

Even if you did have a perfect capture of whatever biometric you’re using, which actually rarely happens, the idea that they are unique has never been tested or proven true. It’s just always been assumed, and security is not a place we should be assuming anything.

They are ridiculously easy to replicate. I can most likely replicate at least one of your fingerprints just testing your outside doors and car doors.

Lawrence D’Oliveiro says:

Re: Biometrics are usernames, not passwords.

Unfortunately, no. Usernames are not confidential information, so there is no point in using biometrics for them.

A username is who you claim to be. But anybody can make that claim. You then have to accompany that claim with some kind of authentication protocol, to prove your claim. Which is where authentication comes in.

As Bruce Schneier has pointed out, there are three categories of ways to provide such authentication factors:

  • Something you know (a password)
  • Something you have (a physical key-type object, or other object that is easy to keep with you, such as a mobile phone)
  • Something you are (biometrics).

What’s called “two-factor” authentication means using factors from two different categories.

Cdaragorn (profile) says:

Re: Re: Biometrics are usernames, not passwords.

The fact that usernames are not confidential is irrelevant. Neither are biometrics.

A username is meant to identify a user. That’s exactly what biometrics are meant to do. Believing that a biometric is confidential is just inviting yourself to get hacked.

The problem I have with the push for biometrics today is that too much of the information people are basing their opinions on is assumption, not proven fact. The biggest two being that biometrics are unique to a single person (never proven true), and that they cannot be easily copied (proven false).

Anonymous Cowherd says:

Re: Re: Biometrics are usernames, not passwords.

That’s only true if the authenticator has physical access to the person being authenticated. To physically verify the person is actually using a key or biometrics, not just transmitting the right data to pretend to do so.

Remotely, all authentication factors are just information. Something you know.

Roger Strong (profile) says:

Re: Time to stop using fingerprints for authentication, then

Yup; Nippleprints. Most people keep those covered, so they should be secure. And we can reuse the same infrastructure – readers built into laptops and phones. The icons may have to change.

BTW, people’s lips match their nipple color. Good luck trying to look anyone in the face for the rest of today.

Ask me about two-factor authentication!

Roger Strong (profile) says:

Re: Re: Time to stop using fingerprints for authentication, then

Disregard. I forgot something:

A couple years ago I was ordered to make the UI for our new online shopping cart as intuitive as possible. Quick research revealed that “the only truly intuitive user interface is the nipple.”

I’m no longer allowed to discuss innovative nipple-based technology.

Cdaragorn (profile) says:

Re: Re: Time to stop using fingerprints for authentication, then

Despite their weaknesses, passwords are much better than any biometric.

If for no other reason the fact that I can change a password when it gets compromised or whenever I choose makes them better. Good luck finding a new biometric after someone gets all your fingerprints.

Roger Strong (profile) says:

Re: Other ways

Years ago German Interior Minister Wolfgang Schauble was pushing for biometric identity cards. So Chaos Computer Club hackers lifted his fingerprints off a glass and published 10,000 copies of them on acetate (suitable for leaving fingerprints) as a magazine insert.

Then in 2014 they obtained the fingerprints of German defence minister Ursula von der Leyen, this time from photographs including one gleaned from a press release issued by her own office.

Anonymous Coward says:

Re: Re:

Same here. I read the article expecting to get to a block about how some enterprising surveillance company had decided to add “Makes peace sign in public” as a classifier for adding people to some secret terrorist list. Fingerprint theft is a recurring problem. This is an interesting new take on it, but it’s not the instantly and broadly applicable problem that an overzealous surveillance state is.

Anonymous Coward says:

I read an article a few days ago that said that facial recognition is actually the safest public available method for authentication.
They held it up against passwords, pass phrases, fingerprint and iris scans. Incredibly enough they found that Windows hello was the hardest to fool when they couldn’t even use an identical twin to access someones computer.
It does have its troubles though… gain or loose weight, grow a beard, get a too obvious piercing, or get an injury and you would be locked out. This leads back to a secondary method of gaining access which is then dependent on one of the less safe methods.
It does provide a somewhat good security though, as faces are hard to copy when a cutout won’t work. Iris and fingerprints are just too simple to be effective.

OGquaker says:

Re: Re: diversion

I donated my machine shop to Makeup & Effects Laboratories years ago, and got a door key for 20 years. They were making latex faces for this government back then.
P.S. When i was giving pre-induction physicals for the Armed Forces Entrance & Examination Station, three or more nipples was seen almost every day…And, we resold your piss test for $75 a barrel..

Anonymous Coward says:

I am appalled, Glyn Moody

I am appalled at your disgusting attitude shown in

Although the Brits have practically turned this activity into another weird sport alongside cricket,

Cricket is the sublime, superior sport played all over the world. In backyards, on ovals, at the beach, nothing could be finer and more civilised than playing a game of cricket.

To denigrate this game in the way that you have, has completely diminished anything that your article might have provided.

You need to change your attitude to this most wonderful of sports.

Wheee, The Peeps (user link) says:

Take me wife. please

There are some of who allow anyone to use our cars, computers, etc., freely, as a matter of life style choice.

The established paranoids cannot abide such choices and personal responsibility.

So be it. Paranoids can choose to be crazy, as a personal life style. just do not include your unwilling neighbors.

ANON says:

Nothing New

I think it was Popular Photography back in the mid-1970’s that published an article about photographic insecurity. As a test, a press photographer took a huge (YUGE!!) telephoto into the Helsinki international summit press gallery. He got photos over Kissinger’s shoulder of him reading classified briefings – which turned out to be a simple newswire roundup. (Moral- governments will stamp anything as “Secret”, as if we didn’t know)

Similarly, about 20 years ago the Canadian government had to quickly rewrite parts of their budget; (budgets in Parliament are secret until the details are announced) the finance minister in a photo op the day before the release was flipping through the secret budget bill and someone realized that freeze-framing the video allowed them to read details of some new tax measures.

One of the early programs, even before iPhones, allowed a flip-phone user to video a page and feed it into a compute program to create a full-page higher resolution picture; something especially useful in Japan with pictographic printing. People would video the article they were reading at a magazine stand.

Leave a Reply to Anonymous Coward Cancel reply

Your email address will not be published. Required fields are marked *

Have a Techdirt Account? Sign in now. Want one? Register here

Comment Options:

Make this the or (get credits or sign in to see balance) what's this?

What's this?

Techdirt community members with Techdirt Credits can spotlight a comment as either the "First Word" or "Last Word" on a particular comment thread. Credits can be purchased at the Techdirt Insider Shop »

Follow Techdirt

Techdirt Daily Newsletter

Ctrl-Alt-Speech

A weekly news podcast from
Mike Masnick & Ben Whitelaw

Subscribe now to Ctrl-Alt-Speech »
Techdirt Deals
Techdirt Insider Discord
The latest chatter on the Techdirt Insider Discord channel...
Loading...