Massachusetts Sues to Halt Defcon Subway Hacking Talk 270
According to CNET, "The state of Massachusetts has asked a federal judge for a temporary restraining order preventing three MIT students from giving a presentation on Sunday about hacking smartcards used in the Boston subway system." It'll be interesting to see whether Dutch-style openness or Soviet-style secrecy prevails in Las Vegas. Update: 08/09 20:57 GMT by T : "Too late," says reader Bluey: "Injunction was already granted."
oh good... let's all bury our heads... (Score:5, Insightful)
rather then make sure they have a techie in attendance so that they may learn something and find a workaround the issue, Boston's lawyers suggested that burying your head in the sand (or, alternatively, in the piles of garbage and crap in Boston) will solve the issue just as well. "As long as we don't let them say it publicly, it does not exist" one Boston official explained the position.
this is why I love government bureaucrats. They tend to be smarter then the average bear.
Re:oh good... let's all bury our heads... (Score:4, Funny)
this is why I love government bureaucrats. They tend to be smarter then the average bear.
I was with you until right around... there.
Re: (Score:2)
Re: (Score:3, Insightful)
Re:oh good... let's all bury our heads... (Score:5, Funny)
Boston is merely afraid that this information will end up in Lunar hands. Entirely reasonable given that city's sad recent history.
Re: (Score:2)
No, they're just lunatics. Nothing lives on the Moon, but that doesn't mean the Moon isn't going to their heads.
Re: (Score:2)
Nothing lives on the Moon,
The toast king [weebls-stuff.com] lives on the moon.
Re: (Score:3, Funny)
http://www.boston.com/news/globe/ideas/brainiac/2007/01/attack_of_the_m.html [boston.com]
This should answer your confusion.
Re:oh good... let's all bury our heads... (Score:5, Interesting)
Re:oh good... let's all bury our heads... (Score:5, Insightful)
Maybe put the amount on the card, so the bus doesn't have to call home every time someone steps on a bus, but at least keep all transactions in a database so they can check for fraud after the fact.
I think you hit the nail on the head with this. I don't know about the Charlie card system, but the issue with many transit cards is that it's difficult or impossible for moving vehicles to always be able to check in with the network database to determine the value of an account. So the account value has to be stored on the card.
This is exactly like storing the value of your ATM or gift card on the card itself. But with ATMs and gift cards, the terminal where you use them is always going to have network access (or if it doesn't you probably won't be able to use the card).
Of course, even just storing an account number or identifier on a card doesn't make it fraud-proof. Magstripe cards are trivially easy to re-encode with only a few dollars worth of equipment. Copying these can mean defeating physical access systems, being able to use someone else's gift card balance, or worse.
Re: (Score:3, Informative)
That's a pretty weak argument. All you need is a laptop with a cellular data connection. If you really have places where you can't get a cell signal, get the cell company to add
Re:oh good... let's all bury our heads... (Score:5, Insightful)
That's a pretty weak argument. All you need is a laptop with a cellular data connection. If you really have places where you can't get a cell signal, get the cell company to add a picocell at the bus stops or add a Wi-Fi hot spot. Odds are you won't have to add too many of them in any major metro area.
Well, I'm not the one making the argument, I'm just going by what I see being implemented in transit systems. Storing the value on the card means fast retrieval and processing, and no reliance on a network. What if the data links drops for some reason? What if it takes longer than usual to connect? Transit systems have schedules to keep (ideally!).
Furthermore, it's easy to say "get the cell company to add a picocell at the bus stops", but it's not as if a transit system can simply mandate that it be done. Who's going to pay for it? And at what point does the expense of ensuring reliable network connectivity become greater than simply expecting a certain percentage of fraud? After all, this is a transit system we're talking about, not a bank.
If you have access to somebody else's card, yes. Otherwise, if you are able to steal access, your number space is too small. Use a 256-bit number (or 1024-bit if you're really paranoid) and ensure that new numbers are assigned randomly within that space so that your odds of picking a valid number are remarkably close to zero.
I know. That's why I talked about copying. Plus, given that with things like gift cards, the identifier is often written on the card itself, sometimes you don't even need to have a card reader to get the information. Or, you have security leaks. When I was an undergrad, the University of Maryland inadvertently exposed the ID numbers of the entire university population through its LDAP entries. Those same IDs were used as identifiers on the magstripe cards that gave building access, and dining hall access.
Re: (Score:2)
if access to the network is not always available then why not just keep a copy of all transit card information on each train and just phone home once a day or when access to the network becomes available?
Because if you buy a new card the buses won't know.
If you add credit the buses won't know until the next update.
If you make a journey by bus, other buses don't know your new balance (which might be below the minimum fare).
Re: (Score:2)
I doubt it's that simple, or else you'd find far fewer people bitching about not getting cell signal at home.
Alternately: where the hell can I get one?
Re: (Score:2)
It's just as well that people typically only get on and off buses which are stopped
Re:oh good... let's all bury our heads... (Score:5, Interesting)
Why should the value available on a smart card actually be something that can be changed by the person holding the card. Shouldn't the card just have an ID, and that ID is tied to an account, which is tied to a person.
With a correct implementation - that uses good cryptography - it is quite possible to have secure stored value cards. One upside to stored value cards, especially to slashdot readers, is that they help to protect our right to travel because they can be just as anonymous as cash.
Re:oh good... let's all bury our heads... (Score:4, Insightful)
However good the cryptography such a card would be vulnerable to a "known plaintext" attack. Since an attacker can see how the encrypted information changes as they alter the value of the card and compare several with the same value.
To make things easier these systems tend to use proprietary cryptography which equates to very poor cryptography. In the case of Mifare Classic this was described by Bruce Schneier as "kindergarten cryptography". Maybe they'd have done better to use something like the "Vigenere Cipher" which was at least considered unbreakable for 300 years.
Re: (Score:2)
However good the cryptography such a card would be vulnerable to a "known plaintext" attack.
AES is believed to be resistant to known plaintext attacks.
Re: (Score:2, Insightful)
Purchase a single card, with 10$ on it. Record the stored value, use the card, and then restore the old value. Viola. Broken card.
However, if the card could be made to increment a counter every time it was adjusted (in such a way that could not be undone) and each card had an immutable card
Re: (Score:2)
Simple smart card technology can include some write-once memory that burns a fusible link, preventing it from being rewritten. Old pay-as-you-go stored value telephone cards used to use this. They were for use in pay phones. The routine was simple: one bit equaled one unit of value. As the value was used, the pay phone would signal the card to burn out the next bit. Once the bits were all burnt, the card had no value.
Of course this was defeated by hackers, who replaced the card with a computer contr
Re: (Score:2)
By placing the memory only under control of a cryptographic processor on the smart card, and by burning a private key into each card, you can build a secure end device, which results in an effective smart card system. Home satellite dishes fought this battle 10 years ago, and are fairly successful at stopping piracy today.
That is not the way the MiFare cards work, of course.
The drawback to an effective system is that you need to distribute both private and public keys all over the place: the cards nee
Re: (Score:2, Insightful)
Re:oh good... let's all bury our heads... (Score:5, Insightful)
Well, that does seem to be the goal of the US govt. at this point. The RealID (national id) alone seems to be a huge step in that direction. They aren't gonna let you travel without one soon...within the US even.
Re:oh good... let's all bury our heads... (Score:5, Insightful)
Because the people designing these systems don't know what they are doing. This dosn't just apply to RFID systems. There was a case recently involving a magnetic strip card which could be "cloned" by the using nothing more sophisticated than scissors/knife together sticky tape/glue
Shouldn't the card just have an ID, and that ID is tied to an account, which is tied to a person.
Unless it's intended to also use the system to track specific individuals then you don't need any such tying. Just a method of ensuing that every ticket has a unique ID. That only one instance of a ticket with a given ID is in use at any time in the system and that a "never issued ID" or one reported lost/stolen cannot be used.
Maybe put the amount on the card, so the bus doesn't have to call home every time someone steps on a bus, but at least keep all transactions in a database so they can check for fraud after the fact.
A bus might well "call home" periodically anyway, for such things as uploading it's position/CCTV footage/etc at this point it can check the tickets which have recently been used. If it isn't possible to operate a data link all the time.
It seems like the way they have it set up, would be the equivalent of having your bank account balance completely controllable by modifying the information on your bank card.
IIRC at one time it was possible get around withdrawal limits by modifying/cloning cards since they used a read/write area to record this information on the card. So as to enable offline/batch operation of machines.
Even retail stores have this figured out so that their gift cards only hold a number, and the actual value on the card is stored in some computer database.
Probably only as a consequence of being exploited though
Re: (Score:2)
I guess that was a little to hard to implement, so they went with the simple solution of making the RFID chip read-writable and storing the data lo
Re: (Score:2, Informative)
The current system is designed to allow for anonymity. You simply ask a T employee for a 0 balance card, and one is handed to you, no questions asked. As many of us would prefer to not have our every movement stored in a database and linked to us, this is a GOOD thing if you value privacy.
So sure, a central DB system would solve this security problem easily, but at a significant cost to privacy, especially when the database inevitably gets leaked and everyone can see where you go.
Re:oh good... let's all bury our heads... (Score:4, Insightful)
Re: (Score:2, Insightful)
Is MBTA actually going to do anything? (Score:5, Insightful)
Is MBTA actually going to get the card system provider to fix the problem? Because from what I've seen, you'll have a hard time even getting the department and the contractor to admit that the problem exists. And even if they do admit it, is the solution going to be any more than "it's unlikely people will exploit this"?
That sort of attitude seems to be how Maryland feels about its AccuVote TS voting machines. Three independent reviews have all revealed flaws with them, but we're still using them, despite the fact that those flaws essentially mean that the contractor has violated its agreement with the State.
Furthermore, I doubt much criminal activity is going to result from releasing the information. Only a few people are going to have the time and patience to actually follow the exploit through, and if the system is well-designed (though apparently it may not be), modifying card data shouldn't be able to damage or disrupt the system.
Re: (Score:2, Insightful)
One of the problems is that the MBTA is losing money like crazy, in spite of vastly increased ridership because of gasoline prices. They can't afford to do basic mechanical maintenance and now they have to redo their smart card system too!? Of course one could argue that it would save them money in the long run, but only if people took advantage of this flaw.
As for the database system someone suggested, that would be expensive to implement and administer, and (worst of all) would mean that people would be
Re:Is MBTA actually going to do anything? (Score:5, Insightful)
One of the problems is that the MBTA is losing money like crazy, in spite of vastly increased ridership because of gasoline prices. They can't afford to do basic mechanical maintenance and now they have to redo their smart card system too!?
They were somehow able to "afford" the many, many millions of dollars required to install this slow, unreliable, and annoying smart card system. That expense was how they were able to justify the fare increase. I would be fine with an increased fare if it was used to improve service, but instead the service is now significantly worse than before, the smart card machines are terrible (every month I have to wrestle with it to get it to recognize my credit card to buy a pass, and I know others who have the same problem), and they haven't even accomplished the original goal.
And, of course, they voluntarily installed this terrible smart card system even after New York tried installing the same system, and it ended up so terrible that they voluntarily ate the lost money and went with another contractor. I never quite heard the rationale for failing to learn from their mistake...
So, yes, they are losing money like crazy, but my sympathy is limited. They've consistently shown that they don't really know what they're doing.
As for the card vulnerability: it's another demonstration of how worthless the system is, but it hardly matters. Part of the justification for the system was to make sure people paid their fares. It has been a dreadful failure at that, but whatever. The number of people who will go to all the trouble of counterfeiting their MBTA passes is dwarfed by the number that will simply trail someone else through the gates or hop on the green line without paying. This has always been the case. It's not a new or surprising point that secure cryptography cannot prevent social engineering. The fact that it turns out to be insecure cryptography just makes the whole thing more pathetic...
Re: (Score:2, Troll)
Remember, it's Boston: the city that is terrified of Cartoon Network. [forbes.com] The city that went $8.6 billion over budget on "The Big Dig" which should have cost $6 billion, and it's a piece of crap. [wikipedia.org] Did you really expect competence from that government?
Re:oh good... let's all bury our heads... (Score:4, Informative)
I'd think giving a talk about it would be a slam dunk. If they rule against this, then it is really scary that our first amendment is gonna be in jeopardy. So far...describing how to do many things without inciting anyone to do it..as been protected speech.
Re: (Score:2)
If they rule against this, then it is really scary that our first amendment is gonna be in jeopardy.
That's why we keep our second amendment handy.
Re: (Score:2)
Re:oh good... let's all bury our heads... (Score:5, Informative)
Re: (Score:2)
Re:oh good... let's all bury our heads... (Score:5, Insightful)
I don't agree with the Massachusetts decision to attempt to stifle the presentation. This was foolish on a number of levels, not the least of which was it will probably help draw far more attention to the hack than it otherwise would have obtained.
That being said, it is perfectly reasonable to not "fix" a system if the cost of the fix is more than the cost of fare evasion. Look - in many cities "evading the fare" is as simple as getting on the bus and choosing not to pay. These systems depend on users for the most part obeying an honor system with periodic random enforcement by transit personnel checking for passes / ticket validation. This is done across Europe and in a number of cities in Canada (not sure about the USA). Why do this? For starters most people aren't jerks, and pay their fares. Second, there will ALWAYS be a way to evade a fare system without massive (expensive) enforcement that would cost far more than the added fare revenue. You would not get on one of the systems where there is no ticket check on entry and then crow about how you evaded the system (or you wouldn't without looking like a complete dork).
It's worth noting that this injunction is not analogous to software companies hiding known exploits in their systems where their customers may suffer the consequences. Boston IS the end user.
Moving people from place to place should always be the highest priority of transit authorities. In general most people are good about paying their fares. Dealing with smalltime one-off thieves is a waste of their resources.
If you use the system without paying, you are a thief and you are doing a tremendous disservice to your fellow citizens.
Frist Amendment (Score:5, Insightful)
Re:Frist Amendment (Score:5, Funny)
Who needs free speech anyway?
I can't say.
Re: (Score:2)
You have said too much and apparently know to much, please come with us.
Re: (Score:2)
Id rather plead the 2nd personally.
Re: (Score:2)
Try that and you'll have a group of men tied to the goverment pleading the 2nd at your doorstep.
Re: (Score:2)
Then I hope some lawyer who actually does love the law beats the people requesting this to death with the Liberty Bell.
"It tolls for YOU. [CLANG] It tolls for YOU. [CLANG] YOU! [CLANG] YOU!! [CLANG] YOU!!! [CLANG]"
Re: (Score:3, Funny)
Re: (Score:3, Insightful)
The dissonance between your post and your sig is making my brain hurt.
Re:Frist Amendment (Score:5, Insightful)
What does free speech have to do with releasing software that will help people steal from the transit system?. It sound criminal to me, assisting people to steal.
Right... because clearly that's what the MIT students are trying to do. Help people steal. That was their plan all along...
It couldn't have anything to do with revealing flaws in RFID-based transit card systems that are being increasingly adopted by state and local governments all across the nation, and for that matter, the world. It couldn't have anything to do with shaming a government agency into actually getting on the ball and working with its contractor to improve security of its system. It couldn't have anything to do with plain and simply academic curiosity.
What's it got to do with free speech? Maybe that we think they ought to have the freedom to not only do the work they've done, but talk about it as well?
Re: (Score:2, Insightful)
Personally, seeing the direction that the govt. is headed, I really don't care if they choose to put their heads in the sand. It means free trips for anyone savvy enough (or with friends in the right places) to crack their pathetic systems. Not to rant on about how america is turning into a police state, but if I can hack my RealID or whatever bullshit congress dreams up next, and they refuse believe it can be hacked, then they don't DESERVE to know about security flaws.
Re: (Score:2)
A real demonstration of the flaw makes a much better impression than theoretical discussion. If I have access to the tools, I can demonstrate the issue myself.
As for shaming being helpful? Bureaucracies, especially Government bureaucracies, are greatly motivated by CYA. Nothing will move them to action like embarrassment.
Re:Frist Amendment (Score:5, Interesting)
What does free speech have to do with releasing software that will help people steal from the transit system?. It sound criminal to me, assisting people to steal.
Everything. Perhaps because software, and more relevantly, the presentation, is expression and thus protected under the First Amendment? In a free society where participants are expected to take responsibility for both their own actions and the governance of that society, denying an individual information limits his freedom --knowledge really is power and thus important to freedom -- and destroys his ability to make good governing decisions. For any of us to actually be free, society has to make the fundamental assumption that the average individual will not use the powers given to them to commit criminal acts. You seem to be assuming the opposite. Even if you consider it from a "need to know" point of view (and you shouldn't): both the people who buy into this transportation system and the shareholders of the system, who I understand to be the public, have a right to know the strengths and weaknesses of this system. So they -- we -- the public, have a need to know this information to make the best decisions they can about this system. In fact, we the public have a need to know all things that occur in government, in government contracts and in the public life.
Also, I think you're a bit confused on what "assisting" means. There has to be stealing going on for anybody to assisting in it, and I've seen no evidence that there is. By what I infer your definition of assisting to be: "providing any tool or information used to complete a task" then other things that should sound criminal to you include (but aren't limited to): providing a drunk driver with an alcohol (before he was driving), selling a gun, knife, baseball bat, pencil or anything else to someone who then uses it in a violent crime, teaching anyone any sort of OS or computer security theory (if the students are criminal for providing the information to criminally hack the system, is the professor not criminal for assisting the "criminal" students by providing them with information needed to discover the hack?), etc, etc, etc.
Re: (Score:3, Interesting)
What I want to know is why these students didn't give a presentation to the MBTA itself or the MA state government. Seems like they're willing to pay attention.
Re:Frist Amendment (Score:4, Insightful)
"personal information"=="software flaw"
is valid.
It seems like the 4th Amendment could be seen as creating a distinction.
However, I am not a lawyer, just someone applying common sense.
TFA:
That could be difficult to enforce. Every one of the thousands of people here who registered for Defcon received a CD with the students' 87-page presentation titled "Anatomy of a Subway Hack." It recounts, in detail, how they wrote code to generate fake magcards. Also, it describes how they were able to use software they developed and $990 worth of hardware to read and clone the RFID-based CharlieCards.
Seems like the MA government could or should already have all of the relevant material.
The injunction amounts to a fart in a thunderstorm, and feckless as the RFID cards in question.
Re: (Score:2)
I'm against this gag order, but the case about First Amendment rights seems to be weak. Under your argument, it would be fine if I posted your Social Security and credit card numbers on the internet, as long as I'm not the one stealing anything from your accounts.
The case about First Amendment rights is unquestionable. This software and presentation are clearly speech and thus can't be restricted under the First Amendment (in combination with the 14th). I don't think my argument necessarily says posting Social Security and credit card numbers should be considered speech. I'm also not sure if they considered "things that occur in government, in government contracts and in the public life." There's clearly a privacy factor that operates with these numbers that act ess
Re: (Score:2)
Re: (Score:2, Insightful)
I'm against this gag order, but the case about First Amendment rights seems to be weak. Under your argument, it would be fine if I posted your Social Security and credit card numbers on the internet, as long as I'm not the one stealing anything from your accounts.
Since Social Security #'s and CC #'s shouldn't mean anything in and of themselves I see no problem. It's the whole issue of these things being used in the way they are that makes them worth anything.
A SS# should be entirely useless outside the context of the SSA. I mean the damn cards say right on them that they are useless for identification purposes - but so many entities use the worthless number as an identifier and think it means something. I'll not go into the fact that they (SSA, SSN, etc.) should n
Re:Frist Amendment (Score:5, Insightful)
Even if that was the intent to show people how to steal ( which it wasn't ), its still a protected right to talk about it.
Now that said, It wouldn't be protected speech if you ordered people to try it themselves.
Much like its a protected to get up on your soapbox about hating a particular race/whatever and wishing them gone, but it wouldn't be protected if you were organizing a lynching.
I hope you see the difference and why its important to the foundation of freedom in our country.
Just a point (Score:3, Informative)
temporary restraining order != permanent injunction
And as TFA has already pointed out, the power point presentation is already out in the open
Re: (Score:2)
.....so?
Re: (Score:2)
Exactly. All that proves is that the people suing are even stupider than they seem because they're trying to stop something that's already on the internet, and we all know how that goes.
Re:Just a point (Score:4, Interesting)
It's actually even worst than that. By the action of suing they have drawn attention to the issue. As well as "confirming" the research.
Probably also ensuring that the relevent information will wind up being published in places it wasn't likely to end up before before. Note that the article mentions that thousands of people (not covered by the injunction) already have copies of the "paper". Some of those copies may be already out of the court's jurisdiction too.
Re:Just a point (Score:4, Interesting)
Which is exactly why an injunction should never have been granted.
Re: (Score:2)
If the injunction lasts longer than the duration of Defcon it might as well be a permanent injunction.
1st Amendment Right should trump this easily. I'm sure they could try twisting it into some 'National Security' issue but please... Some bus ticketing system isn't gonna bomb the White House.
BS (Score:2)
Soviets would have just hauled your ass off to Siberia. Get a grip.
Re: (Score:3, Insightful)
*mumbles something about Guantanamo Bay*
Re: (Score:2)
Anonymous Coward (Score:3, Insightful)
Barbra Streisand seen fleeing the scene.
Ron Rivest (Score:4, Interesting)
The article mentions that the authorities met with the students and Ron Rivest (e.g. the "R" in the RSA crypto system).
It would be interesting to see what his involvement with this project is.
Re:Ron Rivest (Score:4, Informative)
He was their professor. Their research was done as a part of a class taught by Rivest.
Too late (Score:5, Informative)
It'll be interesting to see whether Dutch-style openness or Soviet-style secrecy prevails in Las Vegas.
Injuction was already granted [cnet.com]. Insert Soviet joke here.
Re: (Score:2)
In Soviet Russia, the government controls the buttheaded bureaucrats.
Excellent! (Score:3, Informative)
Treat it like the DNS flaw. (Score:5, Insightful)
Re: (Score:3, Informative)
Two problems (Score:5, Insightful)
I see two major problems with the application for the order. The first is that it claims that disclosure of how to hack the cards constitutes a danger to the public. How so? All these cards are good for is paying the fare. Hacking them allows people to ride the subway for free. That's petty larceny, not a danger to the public.
The second is that the application asked the court to forbid:
There's no conceivable justification for that. Even if there is justification for forbidding disclosure of the details of the hack, stating that there is a problem is certainly constitutionally protected. (It is possible that the court did not include such language in the TRO; this is what Massachusetts asked for, but possibly not what they got. Anybody got a link to the actual TRO?).
Re: (Score:3, Informative)
Anybody got a link to the actual TRO?).
the actual TRO [eff.org]
What I want to know is... (Score:5, Interesting)
Re: (Score:2, Interesting)
I want to know what genius decided to have this conference in the USA.
Re: (Score:2)
"Congress shall make no law..." (Score:4, Insightful)
"abridging the freedom of speech, or of the press;"
-US Constitution
Re: (Score:2, Insightful)
Well, this is the State of Massachusetts, not Congress...
Re:"Congress shall make no law..." (Score:5, Informative)
Well, this is the State of Massachusetts, not Congress...
They already fixed that loophole [wikipedia.org]
"No State shall make or enforce any law which shall abridge the privileges or immunities of citizens of the United States; nor shall any State deprive any person of life, liberty, or property, without due process of law; nor deny to any person within its jurisdiction the equal protection of the laws."
Re: (Score:2)
Actually even though it in no particular way different than a state, it's the Commonwealth of Massachusetts and for some reason the people that live there are always insisting on it being called that. I no longer live there thank goodness.
Re: (Score:2)
Well, this is the State of Massachusetts, not Congress...
Note the part where it says "federal judge" in the summary? And if you followed the link to the article, you'd see that this is taking place in Los Vegas, which I'm pretty sure isn't in Massachusetts.
On a side note, when they first rolled out the CharlieCard system, I remember asking a coworker "I wonder how long it will take for someone to figure out how to hack the cards to get free rides?" The answer is "a little over a year and a half" - they were rolled out in December 2006.
Re: (Score:2)
ATHF Again? (Score:2)
If this happens, (Score:5, Insightful)
Its one more strike against the first amendment and another step down the path of the government deciding what you are allowed to know.
Too late; do it anyway. (Score:4, Insightful)
Fuck this.
They need to give their presentation regardless.
It's clearly a first amendment issue, and when people allow things like threats from the authorities or bullshit unconstitutional court injunctions to stop them from what they want to tell the masses it only serves to justify the actions of those who would try to stop people from expressing important matters.
From what i can tell this isn't about public safety at all, it's more about money. If it were about public safety, they would take it seriously and work with these guys to resolve the issues.
On top of that, when these sorts of uses for RFID were being planned and discussed years ago (things like this and passports, etc) many, many people warned that this would occur...
Someone needs to take that CD and quickly get the contents onto usenet. It's already in the public record anyway - once the cat is out of the bag it's out of the bag.
Re:Too late; do it anyway. (Score:4, Insightful)
I realize that it's easier for me to say it than it is for them to do it. That goes without saying. My entire point is that if people down start saying "damn the consequences, fuck this, I believe I have the right" then you might as well give up completely on having rights at all when you come up against any organization (corporate or governmental) that wants to stop what you are saying.
I didn't say anything in my post about "taking up arms and shooting down the government" - I didn't even allude to such a thingm in the slightest, so I don't know where that even came from.
Was that an attempt to raise an objection to something I didn't even say?
Yes, I know it's out there; hence "public record" and "the cat is out of the bag."
The PowerPoint was an excellent read. (Score:3, Insightful)
judicial misconduct (Score:2)
WOW preemptive limitation of free speech is almost unheard of. Usually asking a judge to stop someone from talking before the fact is met with ridicule by the judge.
If I tell you how to hack the DC transit system... (Score:5, Informative)
In the DC system, you have to scan your card to get into and out of every station. Rather than having standard boarding fares like NY, it actually takes into account where you scanned in and where you scanned out and then deducts the appropriate amount for the fare between those two points at the time you scan out.
But say you leave the same station you entered. Maybe you missed your train and decided to take a cab, or forgot something, or got a call and changed your plans, or just want to rip off the DC transit system. Whatever. You always have to scan a card to get out, and if you scan the same card, it doesn't let you out for free, but charges you a minor fee. I think it was $0.25.
So, say you have a standard commute to work and back every day on the DC transit system:
Go into your point of departure and buy two cards, one with the appropriate fare to your destination. Swipe both of them in.
Ride to your point of departure. Swipe the exact fare card out and throw it away.
Go about your business at your destination. When you return:
Buy a new card and swipe it in.
Ride to your point of origin and Swipe OUT the card you only swiped IN at the same point earlier. You just rode there for $0.25.
The next day, swipe that same card in at the same station. Ride to your point of departure, and swipe out with the card you bought at that point yesterday. Another $0.25 trip.
Always continue to scan in and out at the same station using the same card. Every trip between those stations will be $0.25.
There is no expiration on how much time may pass between swiping in and out of the same station for the minimum fee. There is nothing set up to catch that one card is swiped in and out of the same station every day about 9 hours apart, while another card is swept in and out of another station about 15 hours apart. At least, not unless they've fixed it in the past few years.
Obviously, buy the cards you use for this with cash, not a credit card.
If you really want to be a cheap skate, quadruple your money [schneier.com] also. Then all repeat rides in the system will be priced at approximately $0.07 each.
Capitalist America (Score:2)
illegal behavior vs. illegal speech (Score:2, Insightful)
IANAL, but slide 5 of the presentation says "AND THIS IS VERY ILLEGAL". Maybe they are getting their rocks off, testing and exposing security weaknesses - whatever. public good, harming society, doesn't matter. if we follow free speech and assembly, the talk should not have been stopped, for ANY reason. when ever and where ever we go down the road of "illegal information" tyranny is sure to follow.
it would seem that a much better approach would have been to allow the speech to continue, but indict and
The EFF? Seriously? (Score:2)
I have to wonder who in their right mind would be represented by the EFF these days. Their track record is like wearing a sign on your back that says "please laugh me out of court."
Re: (Score:2)
Re: (Score:2, Insightful)
Re: (Score:3, Informative)
Re: (Score:2)
Re: (Score:2)
constitutes a threat to public health or safety
How? Are people going to try and mug you with a CharlieTicket now that they might potentially be useless?
That's easy. If someone were to rob a bank or mug someone, then use a metro bus or the subway as their getaway vehicle using these cards, they might use a hacked card with false identification info. The police would be unable to identify the perpetrator without leaving the police station, interviewing witnesses, examining security camera records, dusting for
Re: (Score:2)
Print and send a copy to the Mass government and the judge.