backtop


Print 8 comment(s) - last by viper69.. on Sep 5 at 3:50 AM


  (Source: Wired's Threat Level)
MBTA tries to silence discussions on ticketing smartcards

The Electronic Frontier Foundation will appeal a temporary injunction entered against three MIT researchers, who were set to give a presentation Sunday on hacking the Massachusetts Bay Transportation Authority’s CharlieCard fare system at the DEF CON hacker and security convention in Las Vegas, Nevada.

The student researchers, Zack Anderson, R.J. Ryan, and Alessandro Chiesa, were originally scheduled to give a presentation called “The Anatomy of a Subway Hack: Breaking Crypto RFIDs & Magstripes of Ticketing Systems,” on Sunday.  Their talk would have revealed details on hacking Mifare Classic-brand RFID smartcards, which are frequently used in security and fare collection systems around the world, as specifically applied to the CharlieCard.

The MBTA filed suit against the trio in a federal court last Friday, where they sought a temporary restraining order to prevent details of the hack from being disclosed – either via a presentation at DEF CON or over the internet – citing the “irreparable harm” it would suffer.

While the MBTA succeeded in cancelling the researchers’ presentation, its actions proved to be too little too late. Conference CD-ROMs, containing copies of the all scheduled speakers’ slides, were already handed out to DEF CON attendees Friday morning. In the words of an unnamed DEF CON spokeswoman, “the MBTA was a day late.”

US District Judge Douglas P. Woodcock cited a federal computer intrusion statute in forbidding the researchers from “providing program, information, software code, or [commands] that would assist another in … [circumventing] the security of [the MBTA’s Fare System].”

The EFF says the statute that Woodcock cited applies to “code programs” in a computer, not someone who gives a presentation to humans. Some critics said the judge’s interpretation equates speech with computer hacking.

Anderson says that he and his team planned to leave out a critical detail in his presentation, which would prevent potential attackers from exploiting the MBTA’s system. “We wanted to share our academic work with the security community,” he said, “and had planned to withhold a key detail of our results so that a malicious attacker could not use our research for fraudulent purposes. We're disappointed that the court is preventing us from presenting our findings even with this safeguard.”

Court records reveal that the MBTA learned of the team’s plans on July 30, when it was pointed to a conference schedule at the DEF CON website; the description of the presentation began with “Want free subway rides for life?” Lawyers met with the researchers on August 5, but left empty-handed as the team refused to provide copies of the materials to be presented –though it appears that they succeeded, however, in redacting the description’s references to free subway rides and social engineering tactics.

A team of Dutch researchers at Radboud University previously disclosed details on hacking Mifare Classic smartcards late last June, after announcing that they had successfully hitched free rides on the London Underground and entered restricted areas of Dutch Interior Ministry buildings.

The EFF says it is using MBTA v. Anderson et al as a poster child for its new Coders’ Rights Project, which will work to shield software developers and hackers from legal threats hampering their work.



Comments     Threshold


This article is over a month old, voting and posting comments is disabled

Details...
By JonnyDough on 8/13/2008 1:56:09 AM , Rating: 2
quote:
Anderson says that he and his team planned to leave out a critical detail in his presentation, which would prevent potential attackers from exploiting the MBTA’s system. “We wanted to share our academic work with the security community,” he said, “and had planned to withhold a key detail of our results so that a malicious attacker could not use our research for fraudulent purposes. We're disappointed that the court is preventing us from presenting our findings even with this safeguard.


Bullcrap. If it's a hacker convention I'm sure someone there will be able to "figure it out." What are these dopes trying to pull?

On the one hand you have freedom of speech. You should be able to show people how to make a pipe bomb. They are still responsible for their own actions, they don't HAVE to rig it to explode in a mailbox.

On the other hand you have aiding a criminal. If you have information that can be used for evil and you know this, then you are responsible for what you do with that information. Information is power. A weapon is power. If selling a nuclear bomb to a terrorist is illegal, then so should be giving away information that could harm someone.

This is no different than the freedom of privacy vs wiretapping thing. Where do you draw the line? If people just act in a responsible manner then they won't get their wires tapped and they won't have to deal with getting shot down by the authorities of a transportation system in court.

At the same time, those that are being wrongfully attacked by a government need a mass majority to fight big brother, so us that would be seemingly unaffected cannot be complacent when it comes to privacy issues and rights. What to do, what to do...

That's just my 2 cents.




“And I don't know why [Apple is] acting like it’s superior. I don't even get it. What are they trying to say?” -- Bill Gates on the Mac ads

Related Articles













botimage
Copyright 2014 DailyTech LLC. - RSS Feed | Advertise | About Us | Ethics | FAQ | Terms, Conditions & Privacy Information | Kristopher Kubicki