Why Making A Peace Sign In Public Is Now A Security Risk
from the and-not-just-for-political-reasons dept
The British have a number of traditions. Some, such as drinking tea, are famous around the world. Less well-known is a habit of revealing highly-confidential information by carrying pieces of paper in public that photographers using long-focus lenses are able to snap and then magnify to read. The Guardian wrote an entire article on the subject, detailing how numerous embarrassing leaks occurred in the UK because people forgot to put the documents they were holding in some kind of opaque folder. On one occasion, an anti-terror operation had to be brought forward when Britain’s most senior counterterrorism officer walked around with top secret documents on display — a blunder that cost him his job.
This mistake is so common that there are notices by the door of the UK Prime Minister’s residence at Number 10 Downing Street reminding people not to walk out with confidential material that is exposed. The fact that there is a photographer with a long-focus lens who hangs around outside No 10 in the hope that they do precisely that shows how often they ignore this warning.
Although the Brits have practically turned this activity into another weird sport alongside cricket, it’s not unknown in the US. For example, the following happened at the end of November last year:
Potential Donald Trump cabinet pick Kris Kobach accidentally leaked Department of Homeland Security plans when posing for a press photograph with the president-elect. Using photo editing tools, a zoomed-in view on the documents being carried by Kansas Secretary of State Kris Kobach reveals a plan to put Trump?s hard-line immigration platform into practice.
Aside from the carelessness of the people involved, the problem has arisen because long-focus lenses are now so powerful and commonly-deployed that it is relatively easy to capture a high-quality image of an exposed document so that its contents can be read. That’s a problem that will only get worse as camera technology advances, especially combined with digital enhancement techniques. If this story on the BBC’s website is to be believed, it’s not just documents that are now at risk as a result:
A Japanese researcher says doing the peace sign in a photo could lead to your fingerprints being stolen.
They might be easy to recreate if your digits are “in focus with strong lighting”.
That claim is from Isao Echizen, from the National Institute of Informatics (NIII), who says prints could then be made “widely available”.
That’s clearly a big problem at a time when fingerprints are increasingly being used to unlock digital devices, and to provide access to sensitive data. The British experience shows it’s hard enough to shield confidential papers; keeping fingerprints out of high-resolution photos seems like an impossible task.
Follow me @glynmoody on Twitter or identi.ca, and +glynmoody on Google+
Filed Under: fingerprints, photographs, privacy
Comments on “Why Making A Peace Sign In Public Is Now A Security Risk”
Biometrics
Biometrics are usernames, not passwords.
Re: Biometrics
They don’t get it, and they never will!
Re: Biometrics
Yup. In an ideal world biometrics are unique IDs, but they’re not secrets.
Re: Re: Biometrics
Biometrics are perfect, unique and very hard to completely replicate. The way they are measured is very far from perfect…
Re: Re: Re: Biometrics
Re: Re: Re:2 Biometrics
False, false, and soooooo false. It’s these very wrong belief’s about them that is creating a widespread security problem.
They are not perfect. In fact, it’s common for them to even change over time.
Even if you did have a perfect capture of whatever biometric you’re using, which actually rarely happens, the idea that they are unique has never been tested or proven true. It’s just always been assumed, and security is not a place we should be assuming anything.
They are ridiculously easy to replicate. I can most likely replicate at least one of your fingerprints just testing your outside doors and car doors.
Re: Re: Re:2 Biometrics
Re: Biometrics are usernames, not passwords.
Unfortunately, no. Usernames are not confidential information, so there is no point in using biometrics for them.
A username is who you claim to be. But anybody can make that claim. You then have to accompany that claim with some kind of authentication protocol, to prove your claim. Which is where authentication comes in.
As Bruce Schneier has pointed out, there are three categories of ways to provide such authentication factors:
What’s called “two-factor” authentication means using factors from two different categories.
Re: Re: Biometrics are usernames, not passwords.
Due to recent rulings, a fingerprint is a bad authenticator. You may be forced to give that up in court. A password and token are a lot harder to force out of me.
http://arstechnica.com/tech-policy/2017/01/court-rules-against-man-who-was-forced-to-fingerprint-unlock-his-phone/
Re: Re: Biometrics are usernames, not passwords.
The fact that usernames are not confidential is irrelevant. Neither are biometrics.
A username is meant to identify a user. That’s exactly what biometrics are meant to do. Believing that a biometric is confidential is just inviting yourself to get hacked.
The problem I have with the push for biometrics today is that too much of the information people are basing their opinions on is assumption, not proven fact. The biggest two being that biometrics are unique to a single person (never proven true), and that they cannot be easily copied (proven false).
Re: Re: Biometrics are usernames, not passwords.
That’s only true if the authenticator has physical access to the person being authenticated. To physically verify the person is actually using a key or biometrics, not just transmitting the right data to pretend to do so.
Remotely, all authentication factors are just information. Something you know.
Time to stop using fingerprints for authentication, then
Every technology has its day.
If fingerprints can be read at a distance, they’re no longer useful for authentication.
So, stop using them. We have plenty of better options anyway.
Re: Time to stop using fingerprints for authentication, then
Yup; Nippleprints. Most people keep those covered, so they should be secure. And we can reuse the same infrastructure – readers built into laptops and phones. The icons may have to change.
BTW, people’s lips match their nipple color. Good luck trying to look anyone in the face for the rest of today.
Ask me about two-factor authentication!
Re: Re: Time to stop using fingerprints for authentication, then
most people’s lips… good to know
Re: Re: Time to stop using fingerprints for authentication, then
I’ll bite. What about two-factor auth?
Re: Re: Re: Time to stop using fingerprints for authentication, then
I could venture a guess and suppose one might use a 2nd body part?
Re: Re: Time to stop using fingerprints for authentication, then
Disregard. I forgot something:
A couple years ago I was ordered to make the UI for our new online shopping cart as intuitive as possible. Quick research revealed that “the only truly intuitive user interface is the nipple.”
I’m no longer allowed to discuss innovative nipple-based technology.
Re: Re: Re: Time to stop using fingerprints for authentication, then
Sorry, but using both nipples is not “two-factor authentication”.
Re: Re: Re:2 Sorry, but using both nipples is not "two-factor authentication".
I misheard that as “tooth-factor authentication”.
Ouch…
Re: Re: Re: Time to stop using fingerprints for authentication, then
I don’t about ‘only’, I can think of one other that’s pretty intuitive…
Re: Re: Time to stop using fingerprints for authentication, then
Since most people who’s nipples I’m interested in tend to wear lipstick, I don’t think that helps much.
Well, not unless they also apply it to their nipples as well!
Re: Time to stop using fingerprints for authentication, then
“We have plenty of better options anyway.”
Such as?
Re: Re: Time to stop using fingerprints for authentication, then
Despite their weaknesses, passwords are much better than any biometric.
If for no other reason the fact that I can change a password when it gets compromised or whenever I choose makes them better. Good luck finding a new biometric after someone gets all your fingerprints.
Re: Re: Re: Time to stop using fingerprints for authentication, then
That’s easy! Just use a knife the make your fingerprints unique again! 😉
Re: Re: Re: Time to stop using fingerprints for authentication, then
I had a shop accident a few years ago and one of my fingerprints has been permanently changed so, it does happen. Fortunately, I had more than one finger recorded for my laptop’s fingerprint reader (and I still knew my password even if I lost all 10).
Other ways
Fingerprints can also be lifted and copied from objects touched. Doorknobs, beverage containers, etc. Not only that, but DNA can also be lifted and copied from various objects.
Re: Other ways
Years ago German Interior Minister Wolfgang Schauble was pushing for biometric identity cards. So Chaos Computer Club hackers lifted his fingerprints off a glass and published 10,000 copies of them on acetate (suitable for leaving fingerprints) as a magazine insert.
Then in 2014 they obtained the fingerprints of German defence minister Ursula von der Leyen, this time from photographs including one gleaned from a press release issued by her own office.
Re: Re: Other ways
Search for 31c3 Starbug talk if you want to know how bad prints and iris scans are.
Re: Re: Re: Other ways
Unfortunately they all seem to be in German which I don’t speak 🙁
I was relieved to learn that the security risk described was not what I initially feared when I read the headline.
Re: Re:
Same here. I read the article expecting to get to a block about how some enterprising surveillance company had decided to add “Makes peace sign in public” as a classifier for adding people to some secret terrorist list. Fingerprint theft is a recurring problem. This is an interesting new take on it, but it’s not the instantly and broadly applicable problem that an overzealous surveillance state is.
We need not worry about our prints in the US. The DMV already has them ready to be ‘lifted’.
White Gloves
So *this* is why I need to wear formal white cotton gloves!
Just like Charlie Chaplain!
Re: White Gloves
Like Mrs. Eisenhower?
Re: White Gloves
Gloves are the most obvious solution. I’m surprised it wasn’t mentioned in the OP.
I read an article a few days ago that said that facial recognition is actually the safest public available method for authentication.
They held it up against passwords, pass phrases, fingerprint and iris scans. Incredibly enough they found that Windows hello was the hardest to fool when they couldn’t even use an identical twin to access someones computer.
It does have its troubles though… gain or loose weight, grow a beard, get a too obvious piercing, or get an injury and you would be locked out. This leads back to a secondary method of gaining access which is then dependent on one of the less safe methods.
It does provide a somewhat good security though, as faces are hard to copy when a cutout won’t work. Iris and fingerprints are just too simple to be effective.
Re: Re:
Re: Re: facial recognition is actually the safest
You just have to look around this site for a minute or two to find plenty of evidence to the contrary.
Re: Re:
Well, then we’ll have to worry about people cutting our heads off (instead of just a finger or an eye) to be able to use to bypass security!
What about a professionally made latex cast of a face? the sort special effects artists or wax museums make?
Re: Re: diversion
I donated my machine shop to Makeup & Effects Laboratories years ago, and got a door key for 20 years. They were making latex faces for this government back then.
P.S. When i was giving pre-induction physicals for the Armed Forces Entrance & Examination Station, three or more nipples was seen almost every day…And, we resold your piss test for $75 a barrel..
Re: Re: Re:
Re: Re: Re: Re:
Even Windows Hello requires cameras that also see in IR so that fake faces (non-living ones) don’t work and that’s in consumer level equipment now. Anything that really needs to be secured should be using even better equipment than that.
Re: Re: Re:2 Re:
So you’ve never heard of infrared photography?
I am appalled, Glyn Moody
I am appalled at your disgusting attitude shown in
Cricket is the sublime, superior sport played all over the world. In backyards, on ovals, at the beach, nothing could be finer and more civilised than playing a game of cricket.
To denigrate this game in the way that you have, has completely diminished anything that your article might have provided.
You need to change your attitude to this most wonderful of sports.
Re: I am appalled, Glyn Moody
Test match cricket is probably the most boring of all sports.
Re: Re: I am appalled, Glyn Moody
No, the most boring sport is that American version of Rugby League called Gridiron, nothing ever happens in that. It’s like watching Days of Our Lives, you see two episodes 20 years apart and you have caught up on the entire 20 years.
Its not just because of the long lens
Just to add, the long lenses are not the sole or even main reason this can be done. They have been around for decades. It is more due to the high resolution sensors we have today. The resolving power is amazing.
Recently upgraded from my old Galaxy S4 to a Nexus 5X, and I’m pretty happy with it. It’s got a cool fingerprint reader on the back. It even works, I’ve tested it.
…And immediately turned on the pattern lock. I can change the pattern, or a PIN. I can’t change my fingerprints.
Re: Re:
Also police and border guards can’t legally compel you to hand over your password. They ARE however allowed to force your finger onto the reader.
Re: Re: Re:
Jurisdiction dependent. Some countries have legislation that can be used to compel providing passwords/cryptographic keys.
Upcoming government solution
Registration for hi-res cameras and lenses; and background checks.
Surprised no one in here thought of this. You can bet it’s occurred to government bozos.
Re: Upcoming government solution
I’ve got a 41 megapixel camera on my 2012 cell phone,
and a Canon Cine-35 45-200mm 1:2.8 zoom, six pounds and $20k from 1980.
Way to late.
Take me wife. please
There are some of who allow anyone to use our cars, computers, etc., freely, as a matter of life style choice.
The established paranoids cannot abide such choices and personal responsibility.
So be it. Paranoids can choose to be crazy, as a personal life style. just do not include your unwilling neighbors.
Re: Take me wife. please
…I am very sorry to phrase it this way, but… what, exactly, is your point?
Nothing New
I think it was Popular Photography back in the mid-1970’s that published an article about photographic insecurity. As a test, a press photographer took a huge (YUGE!!) telephoto into the Helsinki international summit press gallery. He got photos over Kissinger’s shoulder of him reading classified briefings – which turned out to be a simple newswire roundup. (Moral- governments will stamp anything as “Secret”, as if we didn’t know)
Similarly, about 20 years ago the Canadian government had to quickly rewrite parts of their budget; (budgets in Parliament are secret until the details are announced) the finance minister in a photo op the day before the release was flipping through the secret budget bill and someone realized that freeze-framing the video allowed them to read details of some new tax measures.
One of the early programs, even before iPhones, allowed a flip-phone user to video a page and feed it into a compute program to create a full-page higher resolution picture; something especially useful in Japan with pictographic printing. People would video the article they were reading at a magazine stand.
* Only if you are foolish enough to use a fingerprint as a password