Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Security Privacy

WSIS Physical Security Cracked 196

An anonymous reader writes "A group of activists has apparently bypassed physical security checks at the WSIS Meetings. Not only did they bypass the physical security with a fake card, they found the system uses RFID tags to monitor participants -- possibly even who they interact with and their movements through the conference."
This discussion has been archived. No new comments can be posted.

WSIS Physical Security Cracked

Comments Filter:
  • Feels good (Score:5, Funny)

    by Hi_2k ( 567317 ) on Thursday December 11, 2003 @11:58PM (#7697617) Journal
    These people are looking to be put in charge of my Packets, yet they cant even keep a couple of geeks out of a confrence room? I'm sure we'll all feel REALLY safe ordering online with them in charge.
    • So what's the point? I don't get it at all. You trust a loan officer with your financial information, but you don't expect him to be an expert in good eating.

      What the ``activists'' did was present a fake ID. Whoop de freakin' do. Certainly something stupid on part of the summit organizers, but not exactly failing to ``keep a couple of geeks out of a conference room.''

      The part I really don't get, though, is the fuss about the RFID tags. Guess what? I bet they were using them for the same thing that sup

      • Re:Feels good (Score:5, Interesting)

        by cduffy ( 652 ) <charles+slashdot@dyfis.net> on Friday December 12, 2003 @12:44AM (#7697892)
        It's a security conference. There's a reasonable expectation is that security experts:
        1. Are innately concerned about avoiding unnecessary exposure of personal data (say, by displaying it in such a way that 3rd parties could observe or record personal information about other attendants).
        2. Will be able to use access control which is not circumvented by such a blatantly trivial mechanism as a fake ID.
        3. Will not permit other physical security measures (such as the use of metal sensors) to be trivially circumvented (as by smuggling in items which would not be permitted to be taken in during the conference itself beforehand).

        And so forth. The issue is not necessarily so much that the organizers are hostile as that they're incompetant in the very matter they're holding a conference about.
        • RTFA (Score:5, Informative)

          by lurker412 ( 706164 ) on Friday December 12, 2003 @01:48AM (#7698218)
          The World Summit on the Information Society is not a security conference. It is concerned with much broader issues of society and technology. You can find more info here [itu.int]
          • by cduffy ( 652 )
            Pardon. I did indeed read the article, but my eyes somehow read "Information Security".

            That said, I would argue that privacy and security are key among such issues, and would hope that those involved in such a society would be knowledgable regarding it.
    • Re:Feels good (Score:5, Insightful)

      by DataPath ( 1111 ) on Friday December 12, 2003 @12:20AM (#7697767)
      It's even better than that.

      The security at the conference is weak, and they're collecting personal data while they navigate the conference.

      I think they've pretty much proven they're the wrong people for the job.
    • by Geek of Tech ( 678002 ) on Friday December 12, 2003 @12:30AM (#7697821) Homepage Journal
      But don't worry about the data they collect! They're probably using 2-bit encryption! It's the only thing you can use with their 2-bit security measures......

  • huh? (Score:4, Funny)

    by junkymailbox ( 731309 ) * on Friday December 12, 2003 @12:01AM (#7697646)
    Ok, so these guys "cracked" the system by finding the name of a person, got a fake id, went there, took a picture and walked in.

    sidenote: all them kids in the clubs must be great crackers .. I see them "cracked" and "bypassed physical security" all the time ..
    oh wait .. this is slashdot .. no one goes to clubs here ..
    then they disect the card that were given to them to find out that they have RFID chips but no one seems to know what it does. .. Wait .. how's this different than any other place that asks for your information .. like Police and Lawyers Love E-ZPass [slashdot.org]?

    • Re:huh? (Score:3, Interesting)

      by Cumstien ( 637803 )
      From a forensic science conference I learned that law enforcement will use supermarket discount cards to place individuals at a particular place and time. You'd better think twice about saving $.79 before whacking an adversary.
      • Re:huh? (Score:5, Funny)

        by segfault7375 ( 135849 ) on Friday December 12, 2003 @12:38AM (#7697865)
        Yeah, but I bet you would feel differently about it if you were proven innocent because you were buying hand lotion and copy of Maxim when the crime was being committed.
        • Re:huh? (Score:2, Funny)

          by Trigun ( 685027 )
          In that case, I've been proven innocent in about a million crimes already! I love technology!

          And Maxim...
        • Not really. If I were buying hand lotion and Maxim, there would be witnesses to corroborate my story (the people in line and the person at the register). Not to mention, if you used a credit/debit card in that purchase, there would be a log of the transaction occuring and where it happened.
        • Re:huh? (Score:4, Funny)

          by HeghmoH ( 13204 ) on Friday December 12, 2003 @08:57AM (#7699638) Homepage Journal
          I'd rather go to jail for a crime I didn't commit than have a thousand strangers know that I read Maxim.
          • I'd rather go to jail for a crime I didn't commit than have a thousand strangers know that I read Maxim.

            But you just admitted that very thing to a thousand strangers. :)

            </tongue-in-cheek>

      • Re:huh? (Score:1, Funny)

        by Anonymous Coward
        That's why my VONS card is under the name Jeffery Lebowski
      • Re:huh? (Score:2, Interesting)

        This is exactly why my friends and I have started a policy of trading Grocery cards with anyone new that we meet, and encouraging them to do likewise.

        You get the same discount, you get to have some fun trading cards around and stuff, and they can't track you nearly as easily.

        • I do this too! There should be a website to host such an exchange program - send in a [somestore] card, a SASE, and get a random [somestore] card back (same kind as you send in of course).

    • The problem is that this is not a night club. It isn't different, it's stupid, and it's a big fat birthday invitation for potential abuse.

      None of this would be a problem if the people making these decisions were in any way whatsoever educated in computer science. They're not, however, and considering their complete and utter incompetence regarding everything else they do... why should their involvement here be any better?

    • Re:huh? (Score:5, Insightful)

      by sholden ( 12227 ) on Friday December 12, 2003 @12:20AM (#7697766) Homepage
      You can't see the difference between this and a club?

      One is a venue which wants to transfer money from your wallet to them in exchange for alcohol and a good time. The government says they aren't allowed to take money from people below a certain age, so they don't let them in. If you have a fake ID, then why would the club care that you choose to spend your money on their product?

      One is a venue filled with the heads of governments of numerous countries, government ministers, UN bigwigs (like the Secretary-General), and other such VIPs (in some people's eyes). It doesn't want to sell people a product which the government has decreed you have to be a certain age to have, but possibly wants to stop VIPs being harrassed and bombs being planted.
    • Re:huh? (Score:3, Interesting)

      >>> Ok, so these guys "cracked" the system by finding the name of a person, got a fake id, went there, took a picture and walked in.

      Even worse. I think the article said "...a name from the WSIS website of attendees." No cracking, unless you consider surfing the web "cracking".

  • Well. . . (Score:5, Funny)

    by Anonymous Coward on Friday December 12, 2003 @12:02AM (#7697652)
    Days before the Summit no physical security was available. Anyone could bring anything inside the conference

    Yep, it was fairly easy to sneak my tin foil hat in.
  • by Anonymous Coward on Friday December 12, 2003 @12:04AM (#7697669)
    except they were walking around and stuff.... neato.
  • by JohnGrahamCumming ( 684871 ) * <slashdotNO@SPAMjgc.org> on Friday December 12, 2003 @12:05AM (#7697675) Homepage Journal
    Huh? If you RTFA you'll find that what they did was use a fake ID with the name of a real participant to obtain a badge. Nothing very clever about that.

    Basically the "researchers" represented themselves as being someone else and used a fake (potentially) illegal piece of identification. Doesn't seem clever, just seems fraudulent.

    They then go on to speculate about how "data mining" and RFID might be used for all sorts of nasty tricks and end up sounding like a bunch of paranoid crack-pots.

    So, if I buy a fake passport on a street corner and then use it enter Germany, did I just "crack" Germany's security and can I get my picture on Slashdot?

    John.
    • by irokitt ( 663593 ) <archimandrites-iaur@@@yahoo...com> on Friday December 12, 2003 @12:13AM (#7697729)
      Nobody is saying the "crackers" were clever. We're saying the "Safety Experts" were stupid. They should have taken precautions in both the physical and electronic realms.
      • > We're saying the "Safety Experts" were stupid. They should have taken precautions in both the physical and electronic realms.

        So to fix the problem that the "researchers" exposed you need a participant to submit _prior_ to the conference some token that only they would know or have. So they could have demanded a photo, fingerprint, eye scan, urine sample before hand. Then they could have demanded the same when getting your badge.

        But you have to ask whether that would be an appropriate level of secur
    • So, if I buy a fake passport on a street corner and then use it enter Germany, did I just "crack" Germany's security

      Obviously.

      And it would be of great concern to Germany. Just as this should be of great concern to the organisers of the summit.

      The probably don't want protesters or terrorists getting in just as much as Germany doesn't want illegal immigrants or terrorists getting through its security.
    • by dark404 ( 714846 )
      I think the pseudo-slang term you are looking for to describe what they did is, "Social Engineering." Unfortunately, the weakest link in any system of security (real or virtual) is the user. A parallel can easily be drawn from what was done here to the old days of AOL (maybe the current days too, been years since I used AOL) where script kiddies and wanabe hackers would 'phish' (compromise) accounts by impersonating AOL employees and asking people for their passwords over Instant Messages. Of course people
    • by DataPath ( 1111 ) on Friday December 12, 2003 @12:31AM (#7697824)
      I don't think the purpose of the writeup is to give m4d pr0pz to the 133t m34tsp4c3 haxxorz. It seems to me that the points they were trying to get across were:

      1) These people have little concern for security, seeing as how they didn't even comply with the multiple applicable laws governing that sort of conference
      2) These people have little concern for privacy, again, as they didn't comply with multiple applicable laws on the matter
      3) Their ineptitude could possibly be opening these people for extortion or blackmail, or even endangering their lives.
      4) These are the people who are deciding how the internet is going to be governed
      • by TWX ( 665546 )
        "4) These are the people who are deciding how the internet is going to be governed"

        Not to get too off-topic, but I don't think that I like the direction that they want to take the Internet. Yes, it spans the globe, but it's something that a lot of private and public American funding went into designing, developing, and maintaining. I understand the need for standards, but I don't think that the U.N. is really right for governing the Internet. They have a hard enough time running peacekeeping missions
        • I agree. There aren't many organizations that would be a poorer choice for governing the internet, but if I understand correctly, that is EXACTLY what WSIS is intended to be doing.
        • They [the UN] have a hard enough time running peacekeeping missions in European countries

          The UN might be more capable/powerful running those missions if the U.S. were paying their share of the contribution.

          The U.S. had the single largest contribution to the idea of a global information network in the form of the Internet. If the rest of the world wants one of their own, let them create it themselves.

          Ha, but a European guy invented HTML, without which 'American' internet would be pretty useless, would

          • having used the internet quite a lot before the "invention" of HTML, I find your statement uninformed. We had a world wide web before the world wide web - it was called gopher. It didn't have graphics or blink tags, or even a choice of fonts, but darnit! We liked it anyway! IIRC it had something resembling hyperlinks, which with or without this "a European guy" (I've never heard the story of the invention of HTML), would have evolved just like everything else on the internet.

            Oh yeah - what made the int
    • Well, they still proved that the security system was pretty much useless because the weakest link was somewhere else (only a simple ID with no other info is sufficient). It's like saying "my front door lock is unbreakable" and leaving the back door open. And BTW, I believe it's still harder to get a fake passport with your picture on it than to do what they did.
    • by ShaunC ( 203807 ) on Friday December 12, 2003 @12:37AM (#7697852)
      If you RTFA you'll find that what they did was use a fake ID with the name of a real participant to obtain a badge. Nothing very clever about that.
      You'll also find that they should have been required to produce their letter of invitation and a registration number. They had neither, but got in anyway. Perhaps not so much clever as scary, this place is hopping with "important people" and anybody can walk right in with no invite and a fake ID.

      The security at freaking MacWorld was better (or worse, depending on your perspective) than this the last time I went! Unless you got your badge via mail, you had to produce not only your ID but also the credit card that you used to register. Not infallible, but at least a challenge - and Javits wasn't full of diplomats, either.
    • So, if I buy a fake passport on a street corner and then use it enter Germany, did I just "crack" Germany's security and can I get my picture on Slashdot?

      Give it a try. I think that's how David Hasselhoff got his big break.
    • can I get my picture on Slashdot?
      No. That could only happen in three ways:
      • Paying for an ad.
      • Hacking slashdot.
      • Being so obnoxious that you get your own topic icon. Like Bill Gates.
    • ... and can I get my picture on Slashdot?

      No, but I'm sure it would appear on a few mug shots.
    • So, if I buy a fake passport on a street corner and then use it enter Germany, did I just "crack" Germany's security

      Yes.

      and can I get my picture on Slashdot?

      No, because there is no particular expectation that German security is any better than that of, say, France or the US. European nations don't have a lot of security along their borders with other Western nations. So, it isn't hard for an American to enter Germany, France, or the UK illegally.

      However, there is a natural expectation that security
    • caption from one of their photos:

      The system includes also a X-Ray and metal screening system. Two days before we were in the Congress bringing all kind of boxes and equipment. No physical access security was implemented until the very late time and we could move inside freely carrying any items.

      Why were they bringing in equipment two days before? Were they testing security or were they employeed to carry stuff around by the conference? If the latter is true then it isn't much of an accomplishment to

  • by markov_chain ( 202465 ) on Friday December 12, 2003 @12:07AM (#7697686)
    microwave for 1s
  • by Anonymous Coward on Friday December 12, 2003 @12:10AM (#7697705)
    that geeks are merely terrorists under another name!
  • Tracking locations? (Score:4, Interesting)

    by fred911 ( 83970 ) on Friday December 12, 2003 @12:10AM (#7697711) Journal
    In order to track locations to see who's close to who, you need many, many rfid transceivers. Probably so many, so close there'd be other issues (rf issues).
    • by interiot ( 50685 )
      Read the article, the badges are "passive" in that they only reflect radio waves sent to it. Also, the RF transmitters/sensors are placed only at entrances and pop machines, so attendees weren't tracked really closely, and apparently they can't sense much more than 20 feet away, making RF interference much less of a problem.
  • Nothing is safe. (Score:5, Insightful)

    by irokitt ( 663593 ) <archimandrites-iaur@@@yahoo...com> on Friday December 12, 2003 @12:11AM (#7697713)
    The fact that the security was breached is not the most alarming thing about this. Nothing programmed by man is ever completely safe. The scary thing is that people professing to be security concious were bested because of something so simple, and which could have been prevented or easily stopped.
  • Still Important (Score:4, Insightful)

    by digitalvengeance ( 722523 ) on Friday December 12, 2003 @12:16AM (#7697744)
    Though many have criticized this article as not really representing cracking or bypassing security in any impressive manner, I think there is a deeper issue here.

    What information of use could be gleaned at future meetings or other UN events? The same people very likely do event security for this and other conferences, and the type of information that could be gleaned or the damage that could be done at other events is something to be taken seriously.

    Personally, I despise the UN - but they (through US) are a force in the world and a breach of their security is nothing to laugh at too quickly.
  • by irokitt ( 663593 ) <archimandrites-iaur@@@yahoo...com> on Friday December 12, 2003 @12:18AM (#7697759)
    The problem here was one of physical security-all these guys really needed to get started was a name. During the 80's/early 90's, one of the concerns in the security field was also physical security-a hacker posing as a janitor and accessing unsecured systems, or dumpster diving, or using personal connections to get at employees and talk something valuable out of them. I would think that people would have learned by now that it takes more than simple electronic measures to stop "hacking". This could have been prevented if the powers-that-are had made the ID process a little harder.
  • by the man with the pla ( 710711 ) on Friday December 12, 2003 @12:20AM (#7697764)
    begins.

    They are going to put these in tires. When you buy your tires the seller is going to be required to enter your information in a database.

    One day when you are going a little too fast in a school zone or run a yellow that switches to red too fast an underground computer is going to sense the rfid in your tire, immediately reporting the number via rf link to police headquarters.

    You would think that this would be for the purpose of giving you a ticket. You're right, you will get a ticket. But that is not the end the trail for your rfid number.

    It immediately gets sent to the state government where it checks to make sure you are not a deadbeat dad that the wherabouts of are unknown. Simultaneously sending it to the FBI to see if you are a name on the "patriot" act watchlist and indexes your location. If you drive on the same street on a regular basis they will know where to find you.

    You're not a deadbeatdad, lawbreaker, or terrorist you say??? Well the trail that your rfid number takes does not end there. Your rfid number is sold by cashed-strapped states to a commercial database under the auspices of "risk mitigation" that insurance companies subscribe to. Because you were speeding, you are at an increased risk and your car insurance rates are subsquently raised. Because you drive dangerously, your health insurance rates are also raised. Maybe they cancel your policy outright.

    You're thinking I'll just remove the rfid. No you won't. Driving with unregistered tires is against the law, and if the police can't scan you as you drive past his cruiser he pulls you over and immediately suspends your license and impounds your car. But you won't be able to remove it anyway, without destroying the tire, as it is purposefully integrated with the "steel belt".

    Does the trail end for your rfid tire number now? No, it most certainly doesn't. To see where it leads further, you are going to have to talk to my patent attorney.
    • by Anonymous Coward
      What is it that makes you think RFID technology suddenly enables this?

      Lemme clue you in, there's this wild and crazy technology that puts a unique identifier on every automobile driving on public roads. It's linked to your name in state databases and it's required by LAW. It's called a license plate, you dumb shit.

      And amazingly, if you get caught by an officer speeding in a school zone or blowing a red light, they will run your license plate in their little laptop to see if you have any warrants out, like
      • RFID technology automates all this, no need for the cop anymore. No need for visually checking license plates. Suddenly everyone and anyone is tracked.

        That is the big difference. The fact that this information will be entered into several hundred databases automatically.
    • Simple way of taking care of the RFID tags in this tin hat situation;

      Pay cash, (until the gov stops printing it, they must accept it) give them a fake name and phone number (the phone book is full of them), buy or make a RFID reader and locate the tag in the tire and cut that section of the tire out and put it in a microwave for about 30 seconds. DING! The RFID tag is fried, now replace the cutout in the tire and freely run down kids in school crosswalks with the red lights.

      Hmm, just read the rest of your
    • Four different tags, one for each tire? Or just one tagged tire? How long would it be before folks started holding swap-meets to exchange tires? Make that illegal too, I suppose.

      But then, are you going to make illegal the large parking lots full of swappable tires outside, say, WalMart? Or any Mall? How long would it take to exchange 1 "hot" tire without the knowledge of the donor?

      Why stop at tires anyway? A tag in the battery would be more difficult to remove, and look at all the power available for

    • Or a speeder....... what now?

      How is this different than a ticket issued by a cop who's using radar, and by the way-
      the state I live in, and every one I have lived in- automatically does give moving violations to insurance agencies, and rates do rise! based on violations of the motor vehicle sort..

      I've been having this ethical oddity lately.. from my youth when I was a rebellious sort, to now when I have wife child home, and don't believe in 'breaking the law'

      I do feel strongly people are entitled to

    • I hear that the DOT has developed a new driver identification system called 'license plate'. It uses a specially developed optical identification system that can be read at a distance not only by sensors but by individual motorists. The serial number encoded on each 'license plate' can be used with a government database to identify the owner of the vehicle and even reference their criminal record.
    • Of course, I purchased the tires and donated them to a poor(er) person who could not afford new tires on their own. Looks like I got busted for someone elses crimes. Damn, this will hold up in court for sure!
  • Yawn (Score:1, Insightful)

    by Anonymous Coward
    > they found the system uses RFID tags to monitor participants -- possibly even
    > who they interact with and their movements through the conference.

    Or they could just use a camera to follow your movements through the conference and see who you interact with. Nothing new here... move along.
  • by Anonymous Coward
    If anyone really wanted to track people by "remotely activating" their RFID tags without them knowing, they would need so many of these close-range readers that you wouldn't be able to walk! Plus you would need to figure out who's who by getting into the "DATABASE" that nobody knows about.

    You might as well drop one of these nifty wireless camera in each corner of the room, betcha it would be way more effective for tracking people's whereabouts.

    PS/ I hear they (Privacy Enemies) can track me down and see wh
  • by pbug ( 728232 ) on Friday December 12, 2003 @12:27AM (#7697807) Homepage
    The problem with any system in place is that when convenience is place ahead of security. The more convenient it is made for the people who it is going to protect and the people who are enforcing the system the less secure it will become. Well at least that is what I think part of the problem is.
  • by LostCluster ( 625375 ) on Friday December 12, 2003 @12:31AM (#7697822)
    This wasn't a technical hack by any means... they brought a fake ID with the name of a real person on the guest list, and they got that person's badge issued to them. From that point on, they had as much clearance as that real person had, not surprising at all.

    Just goes to show the inherent insecurity in demanding only a government-issued ID when many governments are involved. Any given state's drivers license has many anti-forgery features, but unless you have an inch-thick book with all of the features of every acceptable ID listed, an international event is gonna have a hard time relying on that alone.

    Still, what's newsworthy about this failure? It happened at an important-to-the-Internet event, but it didn't really cause and damage...
    • From that point on, they had as much clearance as that real person had, not surprising at all.

      Was anything done to prevent the real person showing up? If the organisers had discovered that person's badge had already been issued, they should have cancelled its clearance and sent someone through the crowd with a scanner looking for the associated rfid tag.

  • His biggest *break-ins* were physically walking into a computer room. Nowadays that is the least talked about security issue. Mitnick does a lot of educating on the topic but a lot of people called him *old fashion*. Well there you go, it happened, and to none other than WSIS. I think you should check those locks on your server rooms again.
  • Group of idiots commit fraud to crash an important meeting and discover -- rf tags. Then in sanctimonious puffery they tell the world about it because...

    Do you not think the organizers knew there were limits to what they had to spend on security?

    Rfid tags have the advantage of not needing an interpreter if the delegate only speaks another tongue.

    See who gets painted by the same brush as these jerks, not scientists, not researchers...
  • ...that allows people to be tracked by their looks, voice, smell, gait, handedness, hair color, height, skin color and sex.

    It is possible to track interaction around a room or hall between individuals, while also recording conversations, gestures and purchases.

    The collected data can be recalled at any time, based on any combination of queries or profiles.

    What kind of techical gadget is this?

    My memory. Be afraid....be bery, very afraid.
    • This article [wired.com] came to mind because of the quote:

      For example, Allen has discovered that Apple uses a sophisticated video-monitoring system to automatically count the number of customers who enter the store, and to document their behavior once inside.

      According to Allen, Apple uses a ShopperTrak [rctanalytics.com] system to count the number of people passing the store, the percentage who enter, and the percentage of those who make a purchase. Allen declined to state his source. An Apple spokeswoman confirmed that the company car

  • by MojoReisen ( 218327 ) on Friday December 12, 2003 @03:00AM (#7698553) Journal
    This is probably another case of "You get what you pay for", but the issues here go beyond simply using a fake ID to breach physical security. The fact that the data needed to fake the ID was culled from the attendee list on the website speaks volumes as to how much thought actually went into the security architecture for this event. I mean, really, someone should of thought of that possibility. Why didn't they verify or vet this identification in some way ?
    Another frightening fact is that these jokers' security processes, if you consider the RFIDs as 'security',are violating the laws of both the host country and the EU. This is the biggest issue, IMHO. "Security" also means adhering to all applicable laws and regulations, in order to limit your liability, and the liability of your employer.
    And what about these guys walking around snapping photos of the screener's monitors ? Whats up with that ?
    The bottom line is that these "security experts" at SportAccess, or wherever, are incompetent. Their security model was ill-conceived, poorly executed, needlessly intrusive and (obviously) completely ineffective.
  • by GodLogiK ( 650517 ) on Friday December 12, 2003 @04:07AM (#7698753)
    I'm curious what happened to the person who they pretended to be... were they sick? Just didn't show up? Or when they came did security say, "sorry sir you've already signed in" deemed him a fake and locked the real guy away and are torturing him even as we speak? I dunno curious about that....
  • by Zog The Undeniable ( 632031 ) on Friday December 12, 2003 @05:19AM (#7698912)
    If this was the type of card you just flash at an underpaid, gum-chewing security guard, the authors of the article didn't have to go to much effort to produce a fake.

    As part of physical security testing, my colleagues have successfully gained access to premises using

    • a white sachet of tartare sauce
    • a square-cut jam sandwich
    It's difficult enough getting security guards to turn up for work on the minimum wage, let alone actually *challenge* people.
  • by cocotoni ( 594328 ) on Friday December 12, 2003 @05:29AM (#7698937)
    The part about RFID tags used for tracking is utter and total BS. In fact yesterday I was at WSIS. I did have the badge, and yes it is marked with a RFID, but the bugger is passive and I had to put it real close to the scanner to read it. I tried to just casualy swipe it from afar, but I had to actualy put it right in front of the reader.

    More on security: at the entrance you walk through metal detector gates, with a X-ray scanner for the bags. You are processed by 4 security guys - one takes your bags, other works the gate and X-ray scanner, third scans your badge and compares your face to picture on the badge to picture in the DB they get based on the RFID tag. All these images have to match. If there is any problem there is the fourth guy standing behind with a rifle.

    Yes - the 1337 h4x0rz could have bypassed this by getting the official badges, because when you have the badge you don't have anything standing in your way. No - they could not have gotten to the bigwigs, because that part of the conference was separated, with stronger security checks, which were obviously not done just at the place, since the bigwigs were escoreted from their mansions, with the whole entourage, and I suppose that you don't expect presidents and prime-ministers to go around carrying badges on the straps around their necks, and walk through the metal-detector gates a few times.

    In fact, the easiest way for "terrorists" to sneak in would be to get listed as active participants by a frendly government of a rogue state.

    I wish that people would concentrate more on the positive results of WSIS, instead of spreading FUD.
    • I suppose that you don't expect presidents and prime-ministers to go around carrying badges on the straps around their necks, and walk through the metal-detector gates a few times.

      You know, if there was some kind of law that said all those powerful politicians have to wait in line and go through the security screenings just like us "little people", I bet airport security would be a lot better and more convenient than it is right now. I thought the President was a person, just like you and me. So if I have
      • Hey, don't blame the politicians...for the most part, they don't demand special treatment. It gets offered by their hosts. As an example, if you do any amount of travelling to Washington, DC, you may notice your representatives or senators up there in first class. Chances are pretty good that they didn't buy a first class ticket, but no airline offering first class seating is going to watch as a high ranking politician sits with the hoi polloi. They get upgraded as a "courtesy". Ditto with the standing
        • I will happily blame the politicians. Even if they aren't the ones deciding to skip all of the security, they are the ones making all of the useless rules in the first place. And I don't think that they would be making such useless rules if they were also subjected to them, particularly since politicians travel by air more often than other people.

          The problem isn't really one-size-fits-all requirements. The problem is that the people who decide these things have decided that making people feel safe is more
  • Two comments (Score:4, Informative)

    by Anonymous Coward on Friday December 12, 2003 @06:23AM (#7699125)
    I'm a delegate to WSIS, so I've been here for going on three days...

    First, the security here is quite interesting...as other posters have mentioned, getting into the actual facility is more or less impossible without the proper badge. The exploit that these individuals used was to simply trick the badging desk - a location right next door manned (mostly) by teenage girls. I highly doubt that they're trained security professionals.

    Two, the RFID badge has a range of about an inch. If there are transponders all over the place, I have yet to see them. The physical layout of the building would kaie it difficult to place them inconspicuously...there's far too much open space, with thirty foot ceilings...

    Just my two cents (CHF)...
  • Security (Score:5, Insightful)

    by salesgeek ( 263995 ) on Friday December 12, 2003 @08:37AM (#7699570) Homepage
    When I was in the US Navy, I got to learn a few things that most security experts get to learn the hard and embarrasing way:

    1) Security is hard work and requires the involvement of people with great integrity willing to work very hard. Security requires the highest level of attention to detail, trust that proceedures will be followed and absolute trust that when the proceedures don't work, don't apply or are circumvented that the individual will make the right decisions.

    2) You cannot delegate security to any machine. This includes padlocks, safes, computers, surveilance systems, and alarm systems. These are all designed to assist the hard working humans with great integrity. They have no ability to make decisions when their processes fail, are circumvented or don't apply.

    3) The inclusion of anyone without great integrity inside a secured area is insecure. Loose lips sink ships. This is why security is so difficult in any semi-democratic organization - there is no way to exclude those you can't trust.

    4) Confidence is like corrosion. It slowly destroys even the strongest security just as corrosion will eventually sink the most powerful ship in the fleet.

    Sounds like WSIS violated three of four of these rules.
  • by Halo- ( 175936 ) on Friday December 12, 2003 @10:42AM (#7700355)
    I have to admit the main link was a bit of a let-down, but after following the link to the pictures [nodo50.org] page, I start see why this is a big deal. A few things happened which aren't well expressed in the main link:
    1. Participants were sent credentials which were supposed to serve as a second form of ID. The activists circumvented this second ID by simply claiming to be someone else and showing a generic fake ID. The list of participants was available beforehand, which was a mistake. Think of it like if an airport published lists of all the passengers on a plane and allowed "ticketless" travel using any form of ID. (instead of governement issued photo ID) You just need to say you're "John Smith" and present a fake anything (library card, etc...)
    2. Notice all the cameras in the photos? That's sorta creepy. My bank doesn't have that many.
    3. There are pictures of RFID scanners, which means the whole "they are gonna track participants movements" bit isn't entirely tinfoil-hat paranoia. The presence of the sensors implies they plan to track.
    4. There were metal detectors and X-Ray machines maned by the Swiss Army (insert knife joke here) at the entrances, but they didn't get placed until very later. The "safety" this buys the participants is marginal unless the entire conference center was sweep very, very carefully after the gates were put up. Most people with the motive to blow up an international conference don't do it as a spur of the moment thing. When a head of state visits somewhere, an advance team sweeps the room/route/etc and seals it as they go.
    5. Privacy and data security are totally lacking. The organizers failed to inform participants about what information was to be collected, and more severely, couldn't produce a detailed accounting when asked. The data collected was visible on monitors to casual observers, which completely negates most of the value and allows for theft.

    In short, the photos show a group that appears to know how to spend a lot of money on toys, but doesn't know how to use them. I think this is a serious concern. The information they are collecting isn't providing security, and could actually undermine it.

    The illusion of security is worse than no security at all.

  • from the article:

    The World Summit of Information Society has contracted SportAccess, a Company of Kudelski Group, as the main responsible of an integrated solution for physical access control solution during the United Nations Summit of Information Society.

    This stunt proves nothing about the security and privacy practices of WSIS, despite the general clamour in this forum. This was a minor slip-up of a third party, not WSIS itself. SportAccess gave passes to people who misrepresented themselves.

    BTW - w

E = MC ** 2 +- 3db

Working...