Sensitive Data Stolen Via Digital Cameras 318
Jack writes "ITO is running an interesting story on a new security threat connecting digital cameras and hackers." From the article: "Following a spate of reports about Bluetooth and iPods devices being used to steal sensitive data from organizations, businesses are now urging to be vigilant as hackers use digital cameras to sidestep security measures. 'Camsnuffling', the latest IT managers headache being used to computer attackers to extract and store data with the help of digital camera." We've previously discussed this problem.
Memmory Sticks next? (Score:5, Insightful)
Re:Memmory Sticks next? (Score:4, Insightful)
Removable storage devices are the problem, and the invention of "camstuffing" seems like a lame gimmick to try to spin more news out of it. The article ridiculously claims that "many employees use digital cameras in their day to day work" - Maybe at a photojournalism shop, but in most real businesses you'd look pretty odd connecting your camera to the PC. It's vastly lower on the threat scale than PDAs, cell phones, burnable media, or flash cards/keys.
While I think the whole hacker vs cracker thing is a lame debate, in this case they're talking about people simply stealing or misappropriating data that they rightfully have access to. There is nothing (h|cr)ackeresque about that.
Re:Memmory Sticks next? (Score:4, Informative)
It's not as ridiculous as you think.
Perhaps most keyboard jockeys may not use digital cameras, but most of the businesses I know of who have employees that leave the building outfit their employees with digital camera.
Building inspectors use them for taking pictures of job sites. Insurance agents use them for making appraisals, insurance adjusters use them for taking pictures of accidents. Rig foremen use them to take pictures of their rigs. General contractors, cabling salesmen, and land surveyors use them to take pictures of job sites.. and this is just off the top of my head. I'm hard pressed to think of a company I deal with that doesn't have at least one digital camera for staff use.
Re:Memmory Sticks next? (Score:2)
Re:Memmory Sticks next? (Score:2)
You did, however, say that *most* businesses don't do it, which was what I was addressing. As I said, most businesses I know of have at least one digital camera for staff to use in the field (and many have one per field employee.)
Re:Memmory Sticks next? (Score:2)
Re:Memmory Sticks next? (Score:5, Funny)
Re:Memmory Sticks next? (Score:5, Interesting)
Re:Memmory Sticks next? (Score:3, Funny)
Re:Memmory Sticks next? (Score:2)
My secret hiding place (Score:4, Funny)
I could've been hiding it in my POCKET? Oh shit...
Re:My secret hiding place (Score:3, Funny)
Defense Contractors, memory sticks, and cameras (Score:5, Interesting)
Oh, and when the news reports came out, they did also briefly ban Furbies (remember when they were marketed as being able to mimic language? Security feared they'd be used as recording devices) and Coke cans (Coke was running that contest where prize cans had a GPS transmitter in them to lead in the prize team. This is more of the signal interference than a security thing, but people weren't hot on a GPS transmitter inside secured locations either).
Re:Memmory Sticks next? (Score:2)
Given the size of media (thumb drives in particular), having a policy to prohibit the media is certainly one part of the solution, but if anyone
What the USA National Archives do... (Score:5, Interesting)
They check everyone who enters, no cameras are allowed. Everyone needs a special Id issued by them to eneter. No jackets are allowed. No loose sweaters are allowed. They have lockers where any banned item can be kept, outside the secure area. Once you make it to the guards station, they stamp every sheet of paper you take in. When you leave, you can only take out papers they stamped. They check EVERYTHING. And they have a ton of security cameras in the building, and employees that keep track of who comes and goes. I needed papers which were in a secure area. They made me wear an ID tied around my neck, and I was escorted by an employee.
They also make it a crime to try and decieve them (for example, sneak a camera in). People can go to jail, and there are heavy penalties. They have multiple checks. The first one is a metal detector and a police officer who is more than willing to use the hand wand. The next step is the security officer who checks you in.
If companies want security, it is not hard to ban everything, hire 20 or 30 police officers, make it a crime to violate their policy, and treat everyone as dishonest liars who are more likely to steal.
A chain is only as strong as the weakest link. That is the mentality these institutions have, so they don't trust anyone, not even thier own guards.
Re: (Score:2)
Re:What the USA National Archives do... (Score:2, Insightful)
We understand that the work we do has a potential for security risks that need to be handled. You'd be a fool, in this industry, to have lax security. In the long run it's in
Re:Memmory Sticks next? (Score:2, Funny)
I have a photographic memory so my employer forces me to work blindfolded.
Re:Memmory Sticks next? (Score:2, Funny)
Re:Memmory Sticks next? (Score:2, Interesting)
Bios changes were
Re:Memmory Sticks next? (Score:2, Insightful)
iPod 60GB - $460
USB cable - $8
Misappropriating the financial database because you're the DBA - Priceless
Well, maybe not priceless. Billions of dollars in actual and capitalization damage, destroyed market image, thousands or tens of thousands who'll have issues for years.
It isn't tired - it's a very, very real risk. Too much data is being treated sloppily, and while this is only one
Why go to all that trouble... (Score:5, Insightful)
Re:Why go to all that trouble... (Score:2)
The only downside is that some monitor that Dell packaged with the system keeps bitching about me "having low hard drive space" every few minutes because of the 128 MB thumb drive.
Re:Why go to all that trouble... (Score:2)
Re:Why go to all that trouble... (Score:5, Informative)
Re:Why go to all that trouble... (Score:3, Informative)
Re:Why go to all that trouble... (Score:2)
Windows things have been turned off, unless it happened in BIOS.
Re:Why go to all that trouble... (Score:2)
Good luck getting that to work when the front-panel USB connectors (if present) are unplugged from the motherboard and the back-panel connectors are taped over.
Re:Why go to all that trouble... (Score:2)
This can include removal of floppy and CD drives, locking of the BIOS setup, removing CD, floppy, and USB drives from the boot order, etc.
Easy fix, remove access to the usb ports (Score:5, Insightful)
I know its not realistic, but alot of security problems can be fixed if we give up convenience.
Free Luna! (Score:2, Funny)
Re:Easy fix, remove access to the usb ports (Score:2)
Re:Easy fix, remove access to the usb ports (Score:2)
You know... (Score:2, Offtopic)
Re:You know... (Score:3, Insightful)
Re:You know... (Score:2)
How serious are you about security? (Score:5, Insightful)
The problem starts when the copmpany talks the talke, but doesn't back it up with action, leaving IT staff with a mixed message.
A clear, well-written security policy that has been bought off by and supported by exec mgmt is the only way to go. Sarbox is a great tool for scaring mgmt into line here.
Re:How serious are you about security? (Score:2)
Re:How serious are you about security? (Score:2)
Let's start with the obvious... (Score:3, Insightful)
Re:Let's start with the obvious... (Score:2)
Re:Let's start with the obvious... (Score:2, Insightful)
Re:Let's start with the obvious... (Score:2)
And what about the people that work with the sensitive data?
The only thing that works is a strict, multi-layered security policy that enforces both physical and electronic security. I've been in some facilities where entry is similar to the airport with a metal detector and X-ray machine, except the people working the machines are soldiers with M-16s. Anyone with a "visitor" badge that doesn't have a clearance is escorted by an employee with a designated "es
Re:Let's start with the obvious... (Score:2)
> And what about the people that work with the sensitive data?
Only hire temps. And execute them at the end of every shift.
Re:Let's start with the obvious... (Score:2, Funny)
"Cameras" is a little misleading/shortsighted... (Score:5, Insightful)
Re:"Guns" is a little misleading/shortsighted.. (Score:3, Insightful)
To use your analogy, it would be like someone writing an article on why a pocket knife could be dangerous in a criminal's hands.
cannot be helped (Score:4, Insightful)
Big zoom cameras are something too. (Score:5, Interesting)
Anyone here run a business with a display visible from a window, even one half a city block from the next window?
Re:Big zoom cameras are something too. (Score:2, Insightful)
Re:Big zoom cameras are something too. (Score:2)
Re:Big zoom cameras are something too. (Score:2)
Technically (and probably relevant to this discussion) I think Jennifer Aniston wouldn't be suing a photographer for taking the photos, but for publishing them. I don't keep up to date with the intricacies of copyright law, model releases etc, but from the basics I do remember there is a very big difference between taking photos and having them in your possession, and taking them then
Re:Big zoom cameras are something too. (Score:3, Funny)
Define "peeping tom" (Score:2)
If I was indoors and topless with the drapes open, and somebody was not on my property, and looked in the window, are they a peeping tom? Or am I an idiot for not closing the drapes?
I
Re:Big zoom cameras are something too. (Score:4, Informative)
The digital angle mostly means it's much more convenient, and with Photoshop very convenient indeed. Plus the whole memory card angle, though in the kind of scenario under discussion here a film canister wouldn't be too hard to smuggle out of a sensitive location.
I was recently walking by a ground-floor open-plan office - architects, I think - and the guy closest to the window had his back to the window. Presumably to avoid distractions. Which of course meant his ginormous LCD monitors were facing the window...
May as well... (Score:4, Funny)
But who... (Score:2)
Camera phones? Phht, how about MP3 players? (Score:2)
My son had been begging me for an MP3 player especially a 1GB model that was on sale.
Now, an MP3 player isn't much more than a memory stick with some extra intelligence to recognize music files.
So, I buy the MP3 player, copy the files off to the player then offload those to my home PC.
My son will get the MP3 player he wanted for Christmas.
Having proven that this is possible,
Re:Camera phones? Phht, how about MP3 players? (Score:2)
Oh no (Score:3, Insightful)
Re:Oh no (Score:2)
Re:Oh no (Score:2)
Re:Oh no (Score:2)
Camsnuffling (Score:4, Funny)
"Camsnuffling?" (Score:2)
"Your search - camsnuffling - did not match any documents.
Suggestions:
* Make sure all words are spelled correctly.
* Try different keywords.
* Try more general keywords."
Unless you lock the USB ports... (Score:4, Interesting)
I'd bet everyone here has seen a picture of the USB flash drive disguised as a PEZ(tm) dispenser. What about the new Swiss Army Knife that has one built in? Heck, you could mod a USB drive to look like a Zippo or a Bic lighter. As others have said, I can't even see why camera phones are such a hot deal other than for their ability to take pictures; storing documents can be done in a far less noticeable way when there's access to USB ports.
Data stolen via digital cameras (Score:2)
I read TFA, and both the article and the title would lead a nontech savvy person to believe that's how they were being used. I think
James Bond Minox Camera Trick (Score:2)
Didn't anyone learn anything from watching old James Bond Movies? http://www.mwbrooks.com/submini/flicks/ [mwbrooks.com] Those old Minox camera even had the lanyard marked to let you know the proper focus distance for shooting a document.
Julius Caesar (Score:4, Funny)
I hope you liked this short intro to ENCRYPTION and understand how it can solve some of your problems. Thank you and goodnight.
Phones and PDAs next .. (Score:2)
Someone has a PDA that can store 2 GB of data in a SD card. If they want, they can have as many of these as they need.
2.5" drives are very discret, and are normally powered by USB.
Don't give anyone access to USB/Bluetooth/WiFi.
Human larynx as security risk (Score:5, Insightful)
Of course this description is (intended to be) humorous, but the serious point is one we've heard often enough: you can't solve a human problem with a technological solution.
Re:Human larynx as security risk (Score:2)
plugging the Laptop hole ? (Score:2)
I have heard of a company that does a good job of plugging these types of 'holes' through effective management of the desktop environment... (the guy I know complains that he can't attach *anything* USB to his machine). The funny thing is, after all that, they let him and other people (sales team, managers, etc) walk out of the front door with their laptops
This article is just the latest in a never-ending trend of "danger ! these
At the grocery store... (Score:2)
Re:At the grocery store... (Score:2)
If they did, and were successfully prosecuted because you raised the issue, the chances are good that you could receive a fat reward from Visa.
Uhhh... Isn't this common sense? (Score:2)
collateral damage (Score:4, Interesting)
Re:collateral damage (Score:2, Insightful)
Warning... (Score:5, Interesting)
Okay, I did RTFA, but I'm not entirely sure "how" a digital camera is a threat other than being used to take snapshots of sensitive data. Sure, you can plug it into a USB slot, but for a lot of cameras, they're little more than thumbdrives when they're connected via USB, so a thumbdrive would certainly be less conspicuous, but then you have to ask how this is much different from say, floppy disks, which until recently, were pretty ubiquitous.
The article mistakenly states: "Hence, simply plugging it into a computer's USB can allow hackers to obtain sensitive data." How? Does plugging in a camera suddenyl disable all security in a computer? Suddenly all your encrypted data is decrypted? Suddenly the camera has access to everything? This is a completely unqualified statement that means nothing. It's a thumb drive and you have no more access to sensitive data than the person at the keyboard which is presumably the same person with the camera.
Sorry, maybe I'm missing something, but this seems like a pretty stupid article.
This reminds me of the time . . . (Score:3, Interesting)
That is to say that the conveniece of plug-n-play mass storage (whether it be usb stick, camera, iPod) can be a major security risk. Add that to unsecured systems running as administrator (or root, etc.) in the workplace or showroom, and you have a great potential for mischief.
Information Classification (Score:2, Insightful)
When I did defense work, classisfied systems sat on seperate networks behind locked doors. Only those who knew
Camsnuffling? (Score:2)
is this news ? (Score:2)
there are companies that prohibit music recording devices, because they had cases when somebody was playing data (with special software) and recording it (through analog port), later reconstructing files.
so, if you are concerned about security at this level, you probably limit devices allowed and working components of computers.
now, most companies do not balance these measures - they get extensive security systems, restrict their users to the point where they can not perform their d
GUILTY He says !!!!! (Score:2)
Ian Callens, Icomm Technologies, explains: "This is a very difficult issue to manage and a real threat to business continuity and data security. If someone is seen in the workplace using an iPod it's more than likely that it's for the wrong reasons - either podslurping or downloading music without permission. This is relatively easier to police.
So if you use an iPod at work you are assumed to be a criminal regardless of what you are doing with it? Like for instance
Cellphones too (mounting Trans Flash) (Score:2)
Next up is cellsnuffling.
roll your own (Score:2, Interesting)
$INDUSTRY_GROUP="Icomm"
$SECURITY_HOLE="data smuggling"
$TECHNICAL_FIX="camera ban"
$10_SE
Bluetooth != storage device (Score:5, Insightful)
From all the grammar mistakes, to the pointless buzzwords ("camsnuffling", "podslurping"), to the mention of how USB devices instantly give anyone access to any data on a computer, to the fact that "hackers" and "computer attackers" are mentioned several times when the data being taken is clearly being taken by employees who have access to it in the first place.
And "Bluetooth" is apparently a USB storage device. Way to go.
But in all seriousness, companies do have security issues regarding sensitive data leaving their computers in the hand of employees. How can these companies be sure that their data is secure while still maintaining access for the people who need it and not treating their employees like criminals?
If I were Dell, or some other prebuilt Windows box company, I would offer a desktop computer with no external ports at all. No USB, no serial port, no floppy disk, no CD writer, no nothing. Just a hard drive and a network connection, and a DVD/CD-ROM drive. That way, companies can make all their data available over the internal network (c'mon, is setting up shared server space really *that* difficult?) and it's much harder to get the data out of the company. If the company is truly paranoid about people taking hard drives out of their desktops to take home with them, set up the computer with an encrypted file system which asks the main server for the passphrase every time the computer boots. If you're worried about people sending themselves things as attachments, then don't allow emails with attachments from your servers. If outside companies need access to sensitive data in order to do business with you, then set up a secure server for data exchange. No sweat.
Precautions can be taken on the server side that make it very difficult for employees to steal sensitive data, but that still allow for efficient data flow within the company. And, of course, none of these ways will prevent anyone who is truly determined to get your data, but it will stop the casual stealers, and your chances of sensitive data getting out are much lower.
Back to Dumb Terminals (Score:2, Insightful)
A Non-story (Score:2)
What does this have to do with cameras, or ipods, or anything of the sort? This is a security issue that has existed since the dawn of the idea of computer security.
Whether it's taking a reel of paper tape out the door with you, or bluetooth copying data to your cell phone what's the freaking difference?
This article reads like a writer just discovered that you can put data other than music on a c
PostIt now! (Score:5, Insightful)
"Firstly, regularly change system passwords that employ both letters and numerals."
...resulting in a new security breach know as PostIt snatching
Enough with the Neologisms Already! (Score:3, Insightful)
Re:Enough with the Neologisms Already! (Score:3, Funny)
Re:iPods only for illegal use? (Score:3, Insightful)
Re:Top-Secret Information Leaking (Score:4, Insightful)
Employees don't need to be treated like criminals, but they shouldn't have more access than they need. For instance USB storage devices should be disallowed as a matter of security policy (not as a lame "leave what you tell us about at the door", but as an actual OS enforced system policy [microsoft.com]). I care about this from a user and customer perspective, where random employees of banks, insurance companies, and other businesses have access to an enormous amount of my data: I've worked at a large bank and a large insurance company, and the controls aren't anything like most people imagine.
Re: (Score:3, Insightful)
Re:Top-Secret Information Leaking (Score:2)
Comment removed (Score:5, Interesting)
Re:Top-Secret Information Leaking (Score:2)
Word for word copy of another post (Score:2, Informative)
Re:Wrong Solution (Score:2)
Without wireless, ethernet and serial you could obtain even more dumb terminal.