Site icon The Punching Bag Post

CBS Reveals Smartphones are Shockingly Insecure

<p>It seems that everyone has a smartphone these days&period; And this little piece of technology&comma; which has become so integral to modern life&comma; can do so much more than call and text&period;&nbsp&semi;<&sol;p>&NewLine;<p>Today&&num;8217&semi;s mobile phones are used&nbsp&semi;for shopping&comma; photography&comma; directions&comma; health and fitness &ndash&semi; even investing&period; To discover how secure a smartphone really is&comma; 60 Minutes&rsquo&semi; Sharyn Alfonsi headed to Berlin&comma; Germany to meet some of the world&rsquo&semi;s greatest hackers&period; What she found will shock you&period;&nbsp&semi;<&sol;p>&NewLine;<p>In regards to security&comma; &ldquo&semi;all phones are the same&comma;&rdquo&semi; says German hacker Karsten Nohl&period;&nbsp&semi;Karsten has a doctorate in computer engineering and works for a company that advises Fortune 500 companies on computer security&period; He also tests the devices we use everyday for flaws hackers can use to gain access&period;&nbsp&semi;<&sol;p>&NewLine;<p>Most recently&comma; Karsten&rsquo&semi;s team has been probing the security of mobile phone networks&period; With just a phone number&comma; Karsten says he can track a person&rsquo&semi;s whereabouts&comma; listen in on phone conversations&comma; read text messages&comma; and even hack into any phone that called the original phone&period;&nbsp&semi;<&sol;p>&NewLine;<p>To test Karsten&rsquo&semi;s bold claims&comma; 60 Minutes handed New York Representative Ted Lieu a new smartphone and gave that number to the German hackers&period; Lieu&comma; who has a computer science degree from Stanford&comma; was informed that his phone would be hacked&period;&nbsp&semi;<&sol;p>&NewLine;<p>With a simple call from Sharyn to Congressman Lieu&comma; the hackers were in and listening&period; They were able to gain access through a flaw in Signaling System Seven&period;&nbsp&semi;SS7 is a massive network that connects all phone carriers&period; Most of us have never heard of it&comma; but every cellphone in the world uses SS7 to make calls&comma; send texts&comma; and roam&period;&nbsp&semi;<&sol;p>&NewLine;<p>But most hackers don&rsquo&semi;t use SS7 to get into your cell phone&period; To learn more about other methods of hacking&comma;&nbsp&semi;Sharyn attended an annual hacking convention in Las Vegas&period; There&comma; she was introduced to John Hering&comma; a hacker who co-founder the mobile security company &ldquo&semi;Lookout&rdquo&semi; at age 23&period;&nbsp&semi;<&sol;p>&NewLine;<p>&ldquo&semi;Any system can be broken&comma; it&rsquo&semi;s just knowing how to break it&comma;&rdquo&semi; says Hering&period;&nbsp&semi;When asked how likely it is that someone&rsquo&semi;s phone has been hacked&comma; Hering gave the chilling reply&colon; &ldquo&semi;In today&&num;8217&semi;s world there&&num;8217&semi;s really only two types of companies or two types of people&comma; which are those who have been hacked and realize it and those who have been hacked and haven&&num;8217&semi;t&period;&rdquo&semi;<&sol;p>&NewLine;<p>Phones are computers&comma; explains Hering&comma; but most people don&rsquo&semi;t think of them that way&period; &ldquo&semi;There&rsquo&semi;s more technology in your mobile phone than was in&comma; you know&comma; the space craft that took man to the moon&period;&rdquo&semi;<&sol;p>&NewLine;<p>To prove that he could hack into anything&comma; Hering gathered a team of specialists and met up with Sharyn at her Las Vegas hotel&period;&nbsp&semi;&ldquo&semi;Would you put your money in a bank that didn&&num;8217&semi;t test their locks on their safes&quest; We need to try and break it to make sure the bad guys can&&num;8217&semi;t&comma;&rdquo&semi; explains one of the ace hackers&period;&nbsp&semi;<&sol;p>&NewLine;<p>The hacking started when Sharyn used her phone to connect to the hotel&rsquo&semi;s Wi-Fi&period; Turns out&comma; it was a ghost network created by Hering designed to look like the hotel&&num;8217&semi;s Wi-Fi &lpar;this is called spoofing&rpar;&period;<&sol;p>&NewLine;<p>Sharyn was shocked when just seconds later the team had access to her email account&comma; phone number&comma; and credit card accounts&period;<&sol;p>&NewLine;<p>Human nature is the greatest weakness in mobile security&comma; points out Jon Oberheide&comma; another member of the team&period; &ldquo&semi;With social engineering&comma; you can&rsquo&semi;t really fix the human element&period; Humans are gullible&period; They install malicious applications&period; They give up their passwords every day&period; And it&rsquo&semi;s really hard to fix that human element&period;<&sol;p>&NewLine;<p>Meanwhile&comma; the team in Berlin had been busy spying on Congressmen Lieu&period; Using the aforementioned flaw in SS7&comma; Karsten was able to track Lieu&rsquo&semi;s movements and record entire phone conversations&period;&nbsp&semi;<&sol;p>&NewLine;<p>Karsten points out that even with location services turned off&comma; the GPS chip in your phone gives away your location&period; Since the flaw is in the mobile network &lpar;SS7&rpar; is shared by all cell phones&comma; any choices Lieu might have made regarding carrier&comma; passwords&comma; etc&period; would not have made a difference regarding phone security&period;&nbsp&semi;<&sol;p>&NewLine;<p>Lieu was shocked when Sharyn showed him what the hackers had been able to do&period; He was infuriated when she told him that US intelligence agencies know about the flaw and don&rsquo&semi;t want that hole sealed&period;&nbsp&semi;&ldquo&semi;The people who knew about this flaw&hellip&semi;should be fired&comma;&rdquo&semi; said Lieu&comma; concerned about the types of conversations bad guys might be able to gain access to if they hacked into the phones of congressmen and other officials&period; &nbsp&semi;<&sol;p>&NewLine;<p>&ldquo&semi;You cannot have 300-some million Americans &&num;8211&semi; and really&comma; right&comma; the global citizenry be at risk of having their phone conversations intercepted with a known flaw&comma; simply because some intelligence agencies might get some data&period; That is not acceptable&comma;&rdquo&semi; said Lieu&period;&nbsp&semi;<&sol;p>&NewLine;<p>The average person will not be exposed to such malicious and advanced attacks&comma; explains Hering&comma; but the goal of the experiment was to show what&rsquo&semi;s possible &&num;8211&semi; so that people will understand the magnanimity of the issue&period;&nbsp&semi;&ldquo&semi;We live in a world where we cannot trust the technology that we use&period;&&num;8221&semi;&nbsp&semi;<&sol;p>&NewLine;<p><strong>Editor&&num;8217&semi;s Note&colon;<&sol;strong> We believe the attack on privacy is one of the gravest threats to American culture&period; Information is power&period; Information about you is power over you&period; Without privacy you are powerless&period;<&sol;p>&NewLine;<p>&nbsp&semi;<&sol;p>&NewLine;

Exit mobile version