Monday, November 1, 2010

Thoughts About the Guest Speaker Panel

On Thursday we had a guest panel of speakers. I went into class not really sure what to expect, and thinking that we were going to have just one speaker. Instead, we had an entire row of guests. They were each introduced, including the country they were from. I found the variety of cultures and backgrounds they came from to be incredible, and I knew right away that with only an hour or so of class time that we wouldn't be able to even scratch the surface of the stories they could each share with us about their respective countries. They started taking questions from students. One of the first questions was about whether there are similar opportunities for women as men in each of the guests' countries. The woman from Tunisia said that there were equal opportunities, and that women were even taking over the field of journalism. Conversely, the guest from Saudi Arabia said that she did not have the same opportunity, and an even bigger problem was that women aren't allowed to drive in her country, so she couldn't even drive to cover stories. On top of that, only older women in Saudi Arabi are allowed to hire cabs, so she couldn't even get driven there at all.

Another question had to do with how much they had to censor their news for their home governments. A few countries, like Lebanon, said that it was never a big deal, but in Egypt, it apparently was not OK to criticize the government in any way. The man from Morocco said that his paper got into trouble for taking photographs of the royal family. This topic of freedom was extended when the man from Mauritania said that he felt that sometimes "too much freedom" was a bad thing, and that if a government provided everything for its citizens, it shouldn't matter whether they were free. I found it interesting that almost every other panelist's hand shot up while he was speaking, and a few that got a chance to speak immediately said that they had different opinions about this. One said that America was a lot farther ahead with respect to freedom, but that her country was working on catching up.

I think overall seeing the guests in this panel was a great chance to hear first hand from people from a part of the world that we don't normally get to hear from in America. Seeing how they had different experiences and opinions about issues showed just how different they could all be.

Gadget Photos


This is a macro of my smart phone (Google's Nexus One) from an interesting angle. I am considering the trackball to sort of be the focal point, and I positioned it slightly to the side to adhere to the rule of thirds. I opened the aperture of my camera as much as possible to try to blur the background and have the foreground (the subject) in sharp focus. I am emulating the style of photography I have seen gadget review sites use when they photograph technology.




This is another macro shot of my laptop's keyboard (Alienware m11x). Again, I tried to blur the foreground and background, and put the emphasis on the center keys. The focus is slightly out of the center of the frame, per the rule of thirds. I also like the angles of the keys and the lines they create going away from the camera. It makes the shot feel fluid and active, rather than just a flat shot of a keyboard.



Thursday, October 14, 2010

Bluetooth Study Raw Data






Questions we asked the survey takers on video:

1. What do you think about cellphone security?
2. Do you know what bluetooth is?
3. Are you able to distinguish whether your device is accessible to others via bluetooth?
4. Did you know that bluetooth can be a security risk?
****SHOW THEM THE DEVICES****
5. What are your thoughts on bluetooth security?

“Partner Project- Bluetooth Vulnerability” Final Draft



Mobile phones and Laptops are more apart of are world today then ever. A survey by CTIA of wireless carriers revealed that over 285 million Americans are mobile subscribers, about 91 percent of the total population. We want to take a look at how secure mobile phones really are. If so many citizens use mobile phones, what could happen if cell phone’s data wasn’t as secure as we once thought. Our research shows that bluetooth technology is the most used means of attempting mobile phone security breaches. Bluetooth is an open wireless technology standard for exchanging data over short distances (using short wavelength radio transmissions) from fixed and mobile devices. One of the essential elements of ensuring widespread uses was the having low expectations of users technical ability and minimum levels of user setup and configuration. Each bluetooth device will creating a personal area networks (PANs) with high levels of security.

Despite this security, the wireless nature of bluetooth means that the signals being sent through the air can be intercepted by others. During the communication the address itself isn’t enrypted although the message maybe encrypted. When that signal is caught out of the air it can be analysed and decoded. A would-be attacker could also connect a bluetooth monitor and mouse to your pc to take control and steal your data, or someone could hack into the connection between your mobile phone and bluetooth headset to listen in on your conversation. In addition a hacker could use Brute Force address discovery process to record the MAC address and hack the device with software called RedFang. This software is widely available for download (http://www.net-security.org/software.php?id=519).

There are also ways that attackers can spoof the identity of a particular device, to take its place in a bluetooth connection. To combat these risks, bluetooth was designed with several security measures in place. Generally when you connect two devices, you need to input a PIN on both. This sets up a secured connection between the two. One other hacking technique that gets around this is called “bluesnarfing” which can apparently allow hackers to silently access a mobile phone’s contacts, calendars, and pictures. There is at least one worm that attempts to spread itself via bluetooth, and DoS (Denial of Service) attacks are also possible. So in short, there are a lot of vulnerabilities of the bluetooth architecture. (Source- http://ntrg.cs.tcd.ie/undergrad/4ba2.05/group15/index.html)

To start our study we went to three locations and attempted to see which of these bluetooth PAN networks were accessible. In each location there at least 20 or so students (most with phones and laptops) with visible and accessible PANs. We then wanted to conduct a survey to poll people’s knowledge of bluetooth technology and mobile phone security. In our survey we found that most subjects barely even knew what bluetooth technology was. Most had seen the bluetooth symbol on their wireless devices but didn’t know much about how to turn it off or what implications it had. After we informed the subjects that bluetooth technology could possibly lead to a security breach most felt they would be more careful in the future.

The faculty of engineering at University of Ulster did a case study very similar to ours but on a much larger scale. They first researched bluetooth vulnerabilities and learned about the different means of hacking bluetooth enabled devices. Like us, they did this to gauge the overall lack of awareness in the area and to identify the percentage of popular devices susceptible to security breaches. They found that over 340 devices were detected during the five day period of their study. They were able to see that over 50 of the 340 devices could be at risk for attack. Companies such as Nokia and Sony Ericsson have since acknowledged the existence of bluetooth vulnerabilities and recommend users “to set their bluetooth devices to undiscoverable” and that they wouldn’t be releasing a fix for these vulnerabilities because the potential for attacks are limited. http://www.scribd.com/doc/2682865/Case-Study-on-the-Bluetooth-Vulnerabilities-in-Mobile-Devices

In addition to Nokia’s tip to make your device “undiscoverable” here are a are a few additional steps that will help ensure that your mobile phone isn’t breached. Firstly don’t accept any request to pair your device if you’re not facilitating this. Secondly use atypical patters as PIN keys when you are attempting to pair your device. Thirdly delete devices that you aren’t using but are still paired with. Lastly enable encryption when establishing connections and make sure to get the latest security updates installed. These tips should help prevent unauthorized connections to your device.
http://www.brighthub.com/computing/smb-security/articles/30045.aspx

Tuesday, October 12, 2010

“Partner Project- Bluetooth Vulnerability”

Mobile phones and Laptops are more apart of are world today then ever. A survey by CTIA of wireless carriers revealed that over 285 million Americans are mobile subscribers, about 91 percent of the total population. We want to take a look at how secure mobile phones really are. If so many citizens use mobile phones what could happen if cell phone’s data wasn’t as secure as we once thought. Our research shows that bluetooth technology is the most used means of attempting security breaches. Bluetooth is an open wireless technology standard for exchanging data over short distances (using short wavelength radio transmissions) from fixed and mobile devices, creating personal area networks (PANs) with high levels of security.

Despite this security, the wireless nature of bluetooth means that the signals being sent through the air can be intercepted by others. A would-be attacker could connect a bluetooth monitor and mouse to your pc to take control and steal your data, or someone could hack into the connection between your mobile phone and bluetooth headset to listen in on your conversation. There are also ways that attackers can spoof the identity of a particular device, to take its place in a bluetooth connection. To combat these risks, bluetooth was designed with several security measures in place. Generally when you connect two devices, you need to input a PIN on both. This sets up a secured connection between the two. One other hacking technique that gets around this is called “bluesnarfing” which can apparently allow hackers to silently access a mobile phone’s contacts, calendars, and pictures. There is at least one worm that attempts to spread itself via bluetooth, and DoS (Denial of Service) attacks are also possible. So in short, there are a lot of vulnerabilities of the bluetooth architecture. (Source- http://ntrg.cs.tcd.ie/undergrad/4ba2.05/group15/index.html)

To start are study we went to three location and attempted to see which of these PAN networks were accessible to use given that we knew there password. In each location with at least 20 or so students (most with phones and laptops) that we could see there PAN network was visible and assisible. We then wanted to conduct a survey to poll people’s knowledge of bluetooth technology and mobile phone security. In are survey we found that most subjects barely even knew what bluetooth technology was. Most had seen the bluetooth symbol on there wireless devices but didn’t know much about how to turn it off or what implications it had. After we informed the subjets that bluetooth technology could possibly lead to a security break most felt they would be more careful in the future.

Monday, October 4, 2010

Privacy and Consumer Electronics

Consumer electronics can do all sorts of wonderful things for us. My android phone for example lets me check email, manage my calendar, search the internet, and has a gps receiver so I can get directions for wherever I need to go. All of these great things require some pretty significant back end work on Google's part. They have to host servers to store and deliver my gmail and google calendar to me, they have to provide me with google maps over my phone's data connection on the fly for my gps navigation, and deliver me search results whenever I ask for them. Besides the initial cost of the phone, this is all free (I still have to pay my wireless provider for service of course). Exactly what does Google stand to gain from all of this work they are doing? One word- information.

Google has made its money from web advertising, and specifically, targeted ads based on what users search for, or in the case of gmail, what is written in their email messages. They are pushing really hard into the cell phone market with android phones because they realize the potential to make even more money from more users and more advertising. This isn't necessarily an evil thing, and we have all been using Google for searching for years, but there are some serious potential privacy issues possible here. Before continuing, I want to state that I am personally a HUGE Google fan and absolutely LOVE my android phone (and have no idea how I would get through my daily life without it). So when I am saying that I have privacy concerns about the android operating system, it is not just a thinly veiled attack on Google.

My concern with android is just how much information they have about me. It is one thing for google to keep track of your searches on a computer. Oh sure, they may find out over time that you really have a thing for woodcarving and classic American muscle cars, and deliver you appropriate ads. But let's consider for a moment the sort of data that is used as part of a smart phone. First of all, there are your searches, just like on a computer. Same for email, which if you use gmail, they also have access too. Oh and your calendar and contacts, aka, where you will be at various times of the day and the people you will see. But now you are going to get directions from the phone to get somewhere. That search for the location you want, stored on google's servers. The route they send back to you, ditto. And finally, your exact location courtesy of the gps reciever, is constantly sent to google throughout the experience, so they can update the maps they are sending back to you. If you want to use google's "voice" service, they will store your voicemails for you.

Those things I just described are just what google for sure is legally collecting now. In reality, if they wanted, they could also see your call and text message history, and listen in on google voice conversations or play back your voicemails. So in all, google (or someone else who could somehow get their hands on this information) could know who you've talked to, what you have said, where you are going to be at a particular time, and track you as you travel there. Here is google's android privacy policy, which sort of says that these things won't happen, but still, it is uncomfortable, at least to me, that so much of my information is sent to one place.

I described here just one example of privacy concerns about one particular gadget, but these questions are important to consider regardless of what product it is. Any time you have a device that is sending your data off across the internet, someone else out there has it, and while they may say that they will protect it appropriately, who is to say that this will actually happen. I will continue to use my android phone for the time being, because it really is a very convenient device, but I am always going to wary about my digital privacy.

Monday, September 27, 2010

Good and Bad Sources for Learning about Consumer Electronics

It is important to consider whether sources are "good" or not when trying to find out more about any particular topic. This is sometimes not as difficult with printed media because it takes a significant amount of expense to mass produce and distribute something. It becomes much more difficult when using the internet, as having a webpage is significantly cheaper and can reach far more people than printed media can. As a result, pretty much anyone that wants can make information available on the web, regardless of whether it would be considered a "good" source. Without the proper precautions, a web-surfer could utilize this information with ill effects.

With that understanding of good and bad sources know, let's look at the world of consumer electronics and try to find some good and bad sources of information. Within the gadget world, the most common types of websites are those that either provide reviews of new electronics or speculate on upcoming products. There are also sites that provide forums where owners of a particular device can chat and help each other learn about new features or solve problems.

There are several well-known gadget blogs that provide news and speculation about upcoming and newly-released gadgets. Two of these I frequent regularly are Engadget and Gizmodo. I feel that they are sometimes good sources to get new information about this topic because they provide information on a wide range of topics. For every particular post, they credit their source, and when there is a mistake in something they have presented, they correct it immediately. That being said there are occasionally problems with these sites. Here is a blog post titled 5 ways gadget blogs fail readers. It points out the fact that sometimes there is false information on these sites. Also, and this is a another point I agree with, these blog sites often post information on company announcements or prototype products that never actually materialize. I know that I have read about several really cool things over the years that were coming "soon" and I have yet to actually see in the marketplace. So in a way, I guess these sites have to be characterized as potentially bad, but with some good information mixed in.

Another type of site that can help learn more about gadgets is one that reviews new products. One site that comes to mind for me is CNET. CNET prides itself on providing unbiased reviews for a wide variety of electronics. In my opinion, it is definitely a good site to get this sort of information. Two sites that may not always provide the best information, in my opinion, are PC World and Mac World. These sites have biases toward PCs and Macs respectively, and tend to only cover news and information about their own products, with news about competitors having a more negative slant.

If you look at this list of recent Mac World stories about the Android operating system, you will notice that many of the articles are negative towards android. Some example article titles are "Android apps on the Galaxy tab may be 'a little ugly'" and "Motorola's android 2.2 rollout: What a mess." A similar list of articles on Gizmodo has a very different tone. Sure there are negatively titled articles, but there are positive and neutral articles as well. There are also a LOT more of them on Gizmodo then Mac World, as many in the past week as Mac World has had in the past few months. There is probably a very similar effect with PC World stories about the iPhone vs. Gizmodo stories about the iPhone. Basically, using a single source to learn about new technology that is biased to one particular company or another would mean you would not learn about the entire landscape of products available, or that you would get nothing but the negative stories. Uninformed consumers that blindly buy products from one company or the other without even taking the time to learn a little bit about the competition may miss out on some things that would really work well for them. Informed consumers can help create competition among businesses, which spurs cheaper prices and more innovation, things that are really important to the tech industry.

In conclusion, the best types of sites for consumer electronics information are probably like CNET, Gizmodo, and Engadget, though with the blogs you do have to watch out for some occasional bad information or useless information about prototypes that will never make it to market. If you truly want to be an informed consumer, you need to consider where your information is coming from, and if the title of the site is something like PC World or Mac World, you may want to take the information with a grain of salt.