<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Scott Schober</title>
	<atom:link href="https://scottschober.com/feed/" rel="self" type="application/rss+xml" />
	<link>https://scottschober.com/</link>
	<description>Cybersecurity &#38; Wireless Technology Expert</description>
	<lastBuildDate>Wed, 16 Oct 2024 21:22:13 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.0.11</generator>

<image>
	<url>https://scottschober.com/wp-content/uploads/2021/01/cropped-ScottSchoberSquareLogo-32x32.gif</url>
	<title>Scott Schober</title>
	<link>https://scottschober.com/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Stalking threats still very real for TV actress</title>
		<link>https://scottschober.com/stalking-threats-still-very-real-for-tv-actress/</link>
					<comments>https://scottschober.com/stalking-threats-still-very-real-for-tv-actress/#respond</comments>
		
		<dc:creator><![CDATA[Scott Schober]]></dc:creator>
		<pubDate>Wed, 16 Oct 2024 18:59:17 +0000</pubDate>
				<category><![CDATA[Privacy Concerns]]></category>
		<guid isPermaLink="false">https://scottschober.com/?p=6162</guid>

					<description><![CDATA[<p>Whether it’s Sports Illustrated swimsuit model Brooks Nader or Elon Musk and his private jet, celebrities have the public’s attention which sometimes becomes obsession. And obsession can be fed through both legal and illegal tracking of such celebrities. But what happens when an unknown stalker’s threats cannot even be proven? Just this past week, Days&#8230; <a class = "more-link" href = "https://scottschober.com/stalking-threats-still-very-real-for-tv-actress/">Read More &#187;</a></p>
<p>The post <a rel="nofollow" href="https://scottschober.com/stalking-threats-still-very-real-for-tv-actress/">Stalking threats still very real for TV actress</a> appeared first on <a rel="nofollow" href="https://scottschober.com">Scott Schober</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" class="alignnone wp-image-911608" src="https://storage.googleapis.com/stateless-www-bvsystems-com/2024/08/c1acf028-jessica-serfaty.jpg" alt="" width="700" height="323" /></p>
<p>Whether it’s <a href="https://scottschober.com/executive-protection-has-a-new-weapon-in-its-arsenal/">Sports Illustrated swimsuit model Brooks Nader</a> or <a href="https://www.bvsystems.com/wp-content/uploads/2023/08/Executive-Protection.pdf">Elon Musk and his private jet</a>, celebrities have the public’s attention which sometimes becomes obsession. And obsession can be fed through both legal and illegal tracking of such celebrities. But what happens when an unknown stalker’s threats cannot even be proven?</p>
<p>Just this past week, Days of Our Lives star and social media influencer, Jessica Serfaty contacted police to report an unknown device tracking her. That unknown device was apparently identified by her own iPhone as an Apple AirTag placed somewhere in her Range Rover as she drove around with her young son. However, as originally <a href="https://www.tmz.com/2024/08/19/jessica-serfaty-alerted-tracker-car/">reported by TMZ</a>, when “Sheriff’s deputies showed up and searched the vehicle, but couldn’t find the AirTag. It’s unclear if it fell off, or someone removed it.”</p>
<p>The distraught actress claimed to have never put any tracking device in her own vehicle so not only is she left with a mystery as to where the tracking device went, but she also does not have a real motive or possible stalker to even avoid or guard against. Could a passenger or passerby have placed the AirTag to simply steal the car at a more convenient time or place? Perhaps she has an unknown stalker trying to keep tabs on her whereabouts.</p>
<p>Another rumor involves an allegedly abusive fiancé that she recently posted about on social media. <a href="https://perezhilton.com/days-of-our-lives-star-jessica-serfaty-hidden-tracker-car-iphone-stalker/">According to PerezHilton.com</a>, Jessica quickly retracted her abuse allegations but this wouldn’t be the first time a victim protected their own abuser from consequences.</p>
<p>As a wireless cybersecurity expert, I feel like I’ve now overstayed my welcome at the Hotel California with all its glamour and scandals. However, I do feel confident in speaking to the fear that victims of stalking have to endure and the difficulty in sometimes convincing authorities and even friends of that clear and present threat. I receive calls and emails every week from people claiming to be tracked by the government, by jealous ex and by complete strangers.</p>
<p>The dramatic increase in wireless tracking technology and decrease in the price has allowed anyone with $20 and a free iCloud account to track anyone, anywhere in the world at their leisure. So while beautiful and famous starlets tend to make the stalking headlines, regular folks also feel the threats in a very real way. Apple has added some anti-stalking tech into their devices letting users know when an unknown tag has been tracking them for an extended period of time. The problem is that these stalking alerts rely upon physical movement and time durations in order to trigger an alert. Sometimes it can take days or even hours to reveal a hidden AirTag in your car or purse.</p>
<p>Because of the potential warning delays, my company has developed, <a href="https://www.bvsystems.com/product/bluesleuth-lite-ble-tag-detector/">BlueSleuth-Lite</a>, a pocket-sized tool that immediately alerts users to all nearby tags including Apple’s AirTag, Samsung’s Smart Tag, Tile trackers and many other hidden trackers. Bodyguards, private security and executive protection service providers rely on immediate feedback for their high profile clients, but they’re not the only ones who have come to us for help. Anyone with something to lose including their privacy or safety has the right to protect themselves and loved ones.</p>
<p><img loading="lazy" class="alignnone size-full wp-image-911606" src="https://storage.googleapis.com/stateless-www-bvsystems-com/2024/08/c68c63d6-bluesleuth-lite-female-hand.jpg" sizes="(max-width: 1774px) 100vw, 1774px" srcset="https://storage.googleapis.com/stateless-www-bvsystems-com/2024/08/c68c63d6-bluesleuth-lite-female-hand.jpg 1774w, https://storage.googleapis.com/stateless-www-bvsystems-com/2024/08/c68c63d6-bluesleuth-lite-female-hand-248x300.jpg 248w, https://storage.googleapis.com/stateless-www-bvsystems-com/2024/08/c68c63d6-bluesleuth-lite-female-hand-847x1024.jpg 847w, https://storage.googleapis.com/stateless-www-bvsystems-com/2024/08/c68c63d6-bluesleuth-lite-female-hand-1271x1536.jpg 1271w, https://storage.googleapis.com/stateless-www-bvsystems-com/2024/08/c68c63d6-bluesleuth-lite-female-hand-1695x2048.jpg 1695w, https://storage.googleapis.com/stateless-www-bvsystems-com/2024/08/c68c63d6-bluesleuth-lite-female-hand-150x181.jpg 150w, https://storage.googleapis.com/stateless-www-bvsystems-com/2024/08/c68c63d6-bluesleuth-lite-female-hand-414x500.jpg 414w, https://storage.googleapis.com/stateless-www-bvsystems-com/2024/08/c68c63d6-bluesleuth-lite-female-hand-800x967.jpg 800w" alt="" width="1774" height="2144" /></p>
<p>Jessica Serfaty recently posted “Courage doesn’t mean you don’t get afraid. Courage means you don’t let fear stop you”. She has not issued any further statements about her stalking scare, but her somewhat cryptic message on her social media seems to indicate that she feels safe to move about freely in her life again.</p>
<p>The post <a rel="nofollow" href="https://scottschober.com/stalking-threats-still-very-real-for-tv-actress/">Stalking threats still very real for TV actress</a> appeared first on <a rel="nofollow" href="https://scottschober.com">Scott Schober</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://scottschober.com/stalking-threats-still-very-real-for-tv-actress/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>CrowdStuck thanks to CrowdStrike - CrowdStrike outage torpedoes travel plans for millions</title>
		<link>https://scottschober.com/crowdstuck-thanks-to-crowdstrike/</link>
					<comments>https://scottschober.com/crowdstuck-thanks-to-crowdstrike/#respond</comments>
		
		<dc:creator><![CDATA[Scott Schober]]></dc:creator>
		<pubDate>Thu, 25 Jul 2024 18:06:55 +0000</pubDate>
				<category><![CDATA[Transportation Sector]]></category>
		<guid isPermaLink="false">https://scottschober.com/?p=6137</guid>

					<description><![CDATA[<p>In an era where technology permeates every aspect of our lives, the travel industry stands as one of the most heavily reliant sectors. From booking tickets to navigating airports, technology has streamlined travel, making it more efficient and convenient. However, global outages due to a Microsoft system failure sparked by a CrowdStrike software update bug&#8230; <a class = "more-link" href = "https://scottschober.com/crowdstuck-thanks-to-crowdstrike/">Read More &#187;</a></p>
<p>The post <a rel="nofollow" href="https://scottschober.com/crowdstuck-thanks-to-crowdstrike/">CrowdStuck thanks to CrowdStrike</a> appeared first on <a rel="nofollow" href="https://scottschober.com">Scott Schober</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><a href="https://scottschober.com/wp-content/uploads/2024/07/crowdstruck-animation.gif" rel="attachment wp-att-6141"><img loading="lazy" class="alignnone size-full wp-image-6141" src="https://scottschober.com/wp-content/uploads/2024/07/crowdstruck-animation.gif" alt="CrowdStuck" width="700" height="467" /></a></p>
<p>In an era where technology permeates every aspect of our lives, the travel industry stands as one of the most heavily reliant sectors. From booking tickets to navigating airports, technology has streamlined travel, making it more efficient and convenient. However, global outages due to a Microsoft system failure sparked by a CrowdStrike software update bug left millions of travelers stranded highlighting a significant downside to our overreliance upon technology.</p>
<p><iframe loading="lazy" title="CrowdStrike and Microsoft Fallout Details" width="500" height="281" src="https://www.youtube.com/embed/r5tPGqIe1fE?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p><b>The Fragility of Technological Systems</b></p>
<p>Modern travel depends on a web of interconnected technological systems. Airlines, airports, and travel agencies all use complex software to manage reservations, check-ins, security, and flight operations. While these systems are generally robust, they are not infallible. When they fail, the consequences can be catastrophic.</p>
<p>On July 17, 2023, a coordinated ransomware attack hit United Airlines, causing a system-wide failure in their reservation and check-in systems. This led to the grounding of over 2,000 flights and affected more than 1.5 million passengers over three days. Travelers found themselves stranded, unable to rebook or get timely updates. Airports became scenes of chaos, with frustrated passengers forming long lines at understaffed counters, trying to find alternative travel arrangements. At the time, United issued statements denying an attack trying to downplay  the fact that their security systems were antiquated and required updating. I told <a href="https://drupal-cloudfront.benzinga.com/top-stories/15/07/5658141/were-todays-computer-glitches-too-coincidental">Benzinga that a series of &#8220;glitches&#8221; were too coincidental to not be coordinated attacks</a>, especially considering the cyber vulnerabilities that most companies continue to overlook.</p>
<p><b>The Human Element</b></p>
<p>In the long term, over reliance on technology always leads to a reduction in the human workforce in any industry and the travel industry is no different. Automated kiosks and online check-ins have replaced many front-line staff. While this shift has increased efficiency, it has also left the industry vulnerable when technology fails.</p>
<p>During the 2023 outage, the shortage of human staff exacerbated the problem and the major outages affecting Delta this week appear to be no different. Many passengers reported that there were not enough ground personnel to handle the crisis, leading to a breakdown in communication and customer service. This incident underscores the importance of maintaining a balance between technology and human resources. Human employees can provide flexibility and problem-solving skills that automated systems cannot, especially during emergencies.</p>
<p><b>Here come the Hackers</b></p>
<p>This week, US Secretary of Transportation, Pete Buttigieg, weighed in on the massive outages. While many airlines were affected, it seemed that Delta Airlines were not only affected but entirely too slow in recuperating and continue to face massive delays even as I write.</p>
<p><a href="https://www.foxbusiness.com/media/us-investigating-delta-eye-toward-accountability-pete-buttigieg-says">&#8220;We need to understand how that happened, and we are investigating with an eye toward accountability over that breakdown as we have done in other cases,&#8221; Buttigieg said.</a></p>
<p>Whether there ever is true accountability for the likes of Delta or CrowdStrike, we can be certain of one thing, cyber criminals will take advantage of the uninformed customers. Angry and frustrated customers will begin receiving phishing emails and texts claiming to be from CrowdStrike, Delta or possibly some other airlines. When you have millions of angry travelers receiving fake apology emails and texts offering travel vouchers or some kind of customer credit, you are bound to get many folks clicking on those messages. Just because the CrowdStrike outage wasn&#8217;t the result of a hack, doesn&#8217;t mean that hackers won&#8217;t seize the opportunity to exploit the victims even more. I touch on this in my interview with NTD News on the many lessons and takeaways from this outage.</p>
<p><iframe loading="lazy" title="Lessons from massive CrowdStrike outage" width="500" height="281" src="https://www.youtube.com/embed/Fg-c3gbtD0I?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p><b>The Domino Effect</b></p>
<p>Technology’s interconnectedness means that a problem in one area can quickly cascade, affecting multiple systems. The CrowdStrike incident showed how a single point of failure in a routine software update could cripple an entire global network. Flights were grounded not only for the affected airlines but also for those sharing codes and using the same airport facilities.</p>
<p>This domino effect highlights the need for robust contingency planning. Travel companies should develop comprehensive backup strategies to ensure continuity of operations during technological failures. This could include maintaining offline systems that can be activated during emergencies and training staff to handle manual processes when necessary. It would seem that most airlines had some redundancies in place but not Delta.</p>
<p><b>Lessons for the Future</b></p>
<p>The CrowdStrike travel disruption serves as a wake-up call for the industry and travelers alike. It underscores the need for a balanced approach to technology, where innovation is tempered with resilience and security. Travel companies must invest in robust systems, cybersecurity, and human resources to ensure they can withstand and quickly recover from technological failures.</p>
<p>For travelers, it is essential to be prepared for unexpected disruptions. This includes keeping backup copies of important documents, maintaining flexible travel plans, and staying informed about potential risks. I always print out hardcopies of my itineraries when possible before traveling. By taking proactive measures, travelers can reduce their vulnerability to the pitfalls of overreliance on technology.</p>
<p>The post <a rel="nofollow" href="https://scottschober.com/crowdstuck-thanks-to-crowdstrike/">CrowdStuck thanks to CrowdStrike</a> appeared first on <a rel="nofollow" href="https://scottschober.com">Scott Schober</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://scottschober.com/crowdstuck-thanks-to-crowdstrike/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>AT&#038;T breach too big to ignore</title>
		<link>https://scottschober.com/att-breach-too-big-to-ignore/</link>
					<comments>https://scottschober.com/att-breach-too-big-to-ignore/#respond</comments>
		
		<dc:creator><![CDATA[Scott Schober]]></dc:creator>
		<pubDate>Sun, 14 Jul 2024 20:52:15 +0000</pubDate>
				<category><![CDATA[Privacy Concerns]]></category>
		<category><![CDATA[AT&T]]></category>
		<category><![CDATA[breach]]></category>
		<category><![CDATA[data leak]]></category>
		<category><![CDATA[hack]]></category>
		<category><![CDATA[metadata]]></category>
		<category><![CDATA[snowflake]]></category>
		<guid isPermaLink="false">https://scottschober.com/?p=6122</guid>

					<description><![CDATA[<p>AT&#38;T has been hacked&#8230;again. Not to be confused with a massive data leak back in 2021, this latest breach involves the customer data of 110 million people. AT&#38;T insists that no call or text content was compromised, only the metadata from that content. So instead of private conversations being leaked and sold all over the&#8230; <a class = "more-link" href = "https://scottschober.com/att-breach-too-big-to-ignore/">Read More &#187;</a></p>
<p>The post <a rel="nofollow" href="https://scottschober.com/att-breach-too-big-to-ignore/">AT&#038;T breach too big to ignore</a> appeared first on <a rel="nofollow" href="https://scottschober.com">Scott Schober</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" class="alignnone size-full wp-image-911548" src="https://storage.googleapis.com/stateless-www-bvsystems-com/2024/07/92cc54f9-att-breach-to-big-to-ignore.jpg" alt="ATT breach to big to ignore" width="700" height="432" /></p>
<p>AT&amp;T has been hacked&#8230;again. Not to be confused with a <a href="https://www.engadget.com/att-resets-millions-of-customers-passcodes-after-account-info-was-leaked-on-the-dark-web-160842651.html">massive data leak back in 2021</a>, this latest breach involves the customer data of 110 million people. AT&amp;T insists that no call or text content was compromised, only the metadata from that content. So instead of private conversations being leaked and sold all over the dark web, we might soon see phone numbers, call durations, cell site IDs and other location-related metadata go up for grabs. The lack of private content breached might come as a relief to some, but it simply serves as a reminder that our data privacy laws in the US are almost non-existent, non-regulated and have become just the cost of doing business. But can we afford it?</p>
<p><iframe loading="lazy" title="This AT&amp;T breach is too big to ignore" width="500" height="281" src="https://www.youtube.com/embed/pvj2FmXxThY?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p><em>Speaking with News 12 NJ&#8217;s Walt Kane about AT&amp;T&#8217;s massive data breach</em></p>
<p>An overly cynical viewpoint of this hack is that we have simply removed the middle man known as data brokers. You probably never heard of companies like CoreLogic, Epsilon, Acxiom, but you may have heard of Experian. These companies are data brokers and all make their revenue from buying access to metadata just like this from companies just like AT&amp;T. Experian is not only selling data but also the credit freezing and protection services when your data is breached so they&#8217;re making money on both sides of the problem.</p>
<p>Instead of shady data brokers directly supplying your personal data to law enforcement, loan companies and even political consultants, the dark web is poised to collect metadata from 110 million AT&amp;T customers. This breached data even includes some non-AT&amp;T customers who were contacted or texted by AT&amp;T customers. Once distributed across the dark web, chunks of data will be bundled and sold to hackers looking to pull out contact information to deploy phishing attacks and much more. The lines between local law enforcement collecting data on citizens and hackers collecting data on citizens can sometimes blur enough to make it difficult to tell which ones are the good guys and while proposals like FAINFSA (Fourth Amendment Is Not For Sale Act) would attempt to <a href="https://www.brennancenter.org/our-work/research-reports/closing-data-broker-loophole">close the data broker loophole</a>, we still do not have a federal mandate on our personal data.</p>
<h2>It&#8217;s the metadata, stupid</h2>
<p>Our most valuable data (passwords, financial account numbers, medical records, etc.) remain protected through a combination of obfuscation and encryption, but these defenses are still somewhat reliant upon the integrity our own security habits. We have some help from our devices, tech companies and even some deterrents in the form of basic legislation, but if you leave your phone unprotected with a security PIN and it is hacked, you really have no one to blame but yourself. Metadata is different from this private data. As consumers, we leave metadata breadcrumb trails everywhere we go and metadata is not protected in the same manner. For an example of the difference between our private data and our metadata, we need look no further than our own smartphone cameras. Every picture we take on our phones reveals exactly where, when and how we took that image. However, if there are people in that image or sensitive material, these are considered data and to be guarded fiercely. But the metadata that surrounds this sensitive data is generally unprotected and can be reverse engineered to fill in many blanks that the private data would&#8217;ve provided.</p>
<p>Metadata has been reverse engineered for years now. <a href="https://www.wired.com/story/redact-pdf-online-privacy/">Redacted data can be exposed</a> and <a href="https://religionnews.com/2021/07/23/priest-outed-via-grindr-app-highlights-rampant-data-tracking/">location data can be exposed</a>which can sometimes fill in even more details than the actual data especially in a court of law. For years, prosecutors and defenders have been citing cell site IDs to geolocate their clients. The data says nothing of motives or even proof in the way of innocence or guilt, but when you introduce enough circumstantial evidence into a case, it can not only create a very compelling argument for or against the burden of proof, but even defeat damning confessions and physical evidence in the minds of jurors.</p>
<h2>Snowflake in the Cloud</h2>
<p>AT&amp;T might be responsible for this massive data breach but they weren&#8217;t the ones who were actually breached. Snowflake is a 3rd party cloud storage platform storing and analyzing exabytes of customer data. At some point in mid-April of 2024, Snowflake was compromised by attackers using stolen login credentials provided by an installed malware package called Infostealer. Due to a lack of MFA (Multi-Factor Authentication) enforcement in Snowflake&#8217;s security infrastructure, hackers were able to exfiltrate massive amounts of data. Snowflake has since increased reliance upon MFA but this is only due to the public and media scrutiny they have faced. The larger problem falls back into AT&amp;T&#8217;s court. Cloud, payment and support systems are too complex for even billion dollar companies like AT&amp;T to handle internally which is why they outsource these services to a variety of providers. These relationships are generally good for the consumer but when 3rd part vendors aren&#8217;t vetted properly or audited regularly, security is always the first casualty.</p>
<p>Snowflake does more than just store data. They use AI and ML to analyze tons of data for AT&amp;T and other high profile clients. This means that not only was AT&amp;T customer data stolen, it was also analyzed and packaged for AT&amp;T to sell to the highest bidder. The only question is will the highest bidders contact &#8220;legitimate&#8221; data brokering services or simply go directly to the dark web to get the stolen data.</p>
<p>You may recall another massive breach from way back in 2013 involving Target. Fazio Mechanical was one of many vendors working with Target but they were the only <a href="https://www.securityinfowatch.com/retail/article/53098895/the-target-breach-10-years-later">ones who were infected by malware allowing entry into Target&#8217;s vendor portal</a>. Without proper compartmentalization of this portal, Target faced root compromise of servers. It&#8217;s hard to believe that the Target hacking story was the first major breach I covered. What&#8217;s even harder to believe is that such a large breach only amounted to an $18.5 million fine. Fast forward 11 years and it appears little has changed. Let&#8217;s hope that the monetary fines are adjusted not just for inflation but also for culpability.</p>
<p>The post <a rel="nofollow" href="https://scottschober.com/att-breach-too-big-to-ignore/">AT&#038;T breach too big to ignore</a> appeared first on <a rel="nofollow" href="https://scottschober.com">Scott Schober</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://scottschober.com/att-breach-too-big-to-ignore/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Behind the Great Skim</title>
		<link>https://scottschober.com/behind-the-great-skim/</link>
					<comments>https://scottschober.com/behind-the-great-skim/#respond</comments>
		
		<dc:creator><![CDATA[Craig Schober]]></dc:creator>
		<pubDate>Tue, 19 Dec 2023 17:25:57 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://scottschober.com/?p=6068</guid>

					<description><![CDATA[<p>Cybersecurity expert and BVS, Inc. CEO, Scott Schober, bags another hidden skimmer into evidence Massive Ponzi schemes created by the likes of a Bernie Madoff or Sam Bankman Fried get all the attention. They rake in greedy or gullible investors and depending upon their positioning within the pyramid, stand to make a lot of money&#8230; <a class = "more-link" href = "https://scottschober.com/behind-the-great-skim/">Read More &#187;</a></p>
<p>The post <a rel="nofollow" href="https://scottschober.com/behind-the-great-skim/">Behind the Great Skim</a> appeared first on <a rel="nofollow" href="https://scottschober.com">Scott Schober</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" class="wp-image-911165 aligncenter" src="https://storage.googleapis.com/stateless-www-bvsystems-com/2023/11/54e228c1-scott-schober-with-skimmer-evidence-300x225.jpg" alt="" width="700" height="525" /></p>
<p><em>Cybersecurity expert and BVS, Inc. CEO, Scott Schober, bags another hidden skimmer into evidence</em></p>
<p>Massive Ponzi schemes created by the likes of a Bernie Madoff or Sam Bankman Fried get all the attention. They rake in greedy or gullible investors and depending upon their positioning within the pyramid, stand to make a lot of money or lose their shirts. It’s certainly a grift predicated on betting big in order to win big. But there’s another, smaller ongoing grift that affects all of us. Some of us in small ways and some in big ways.</p>
<p>According to <a href="https://www.fico.com/blogs/us-card-skimming-fraud-grows-700-first-half-2022#:~:text=For%20the%20first%20half%20of,skimming%20card%20and%20PIN%20information.">FICO, debit card skimming increased by 700+% in the first half of 2022 and 70% of fraud cases</a> in the U.S. are tied to skimmers in CA, NY, PA, FL, and WA. Skimming is a multi-billion dollar crime and these large numbers don’t even take into account all of the collateral damage that stems from the ensuing identity theft and credit fraud down the line. Card skimming is essentially an extra card reader secretly inserted into any normal looking ATM, gas pump or vending machine. It allows the customer to make their transaction seamlessly while also stealing their card and personal data.</p>
<p>If you’ve ever gotten alerts from your bank detailing possible fraudulent charges, there’s a good chance that your card has been recently skimmed. And even if you’re lucky enough to not have had your accounts drained, you still face the major inconvenience of waiting for a new card to be issued to you only after a series of unnerving questions surrounding your recent purchases. Of course, you also face the distinct possibility of identity and monetary theft if you fail to freeze your credit in time. So am I just trying to scare you into a defensive posture right now or do I have a point to this lecture?</p>
<p>One point I would like to make is that the good guys are on the case. The public is regularly reminded to check for suspicious alterations made to gas pump and ATM card slots and keypad overlays. Skimmer alerts are regularly issued to service stations or banks that fall into an epicenter of fraudulent activity, particularly when an actual skimmer is discovered. Skimmer fraud task forces are also on the case, but is this enough? We don’t think so which is why my company has entered into the card skimmer detection game. We sold hundreds of <a href="https://www.bvsystems.com/product/skim-scan-atm-pos-credit-card-skimmer-detector/">Skim Scan</a><img src="https://s.w.org/images/core/emoji/14.0.0/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" /> skimmer detectors to retail centers, credit unions and fuel stations across the country and we’re just getting started. Unlike other anti-skimming solutions, our skimmer detectors require no hardware modifications, can be operated by anyone, and only takes a few seconds to detect a hidden skimmer without the need to open up every machine for thorough inspections.</p>
<p>My company is really a wireless security company at its heart, so we have also introduced BT (Bluetooth) skimmer detection products which have become a growing concern. A BT skimmer can be hidden deep inside a payment terminal. It behaves like any other card skimmer but transmits all stolen card credentials wirelessly to a nearby cyber thief. The risk of getting caught while trying to retrieve stolen data wirelessly is next to none. This quick turnaround allows thieves to steal credentials and create an army of cloned cards all in the same day. These cards are then dispersed around the area to withdraw large but controlled sums of cash from victims’ accounts so as not to arouse too much suspicion among account holders, banks or law enforcement. According to studies, the average card skimming event captures 185 cards and the average skimmed card will generate $2,000 in fraudulent charges before being detected. Some simple math tells us that a single skimmer can generate around $370,000 of stolen cash. But the thieves aren’t finished yet. They go on to sell all of those stolen card credentials on the Dark Web. They package thousands of stolen cards into bundles and sell them to an assortment of criminals and Dark Web bottom-dwellers.</p>
<p>But haven’t modernized chip and pin cards put an end to card skimming? Not really. Old fashioned magnetic stripe cards have always been easy to skim and clone. And most modern chip card readers in the U.S. continue to support mag stripe cards so we are left with a self-perpetuating system of fraud that exists so long as consumers aren’t incentivized to update their card technology and retailers and banks aren’t incentivized to update their card reader technology. And on top of all of that, card shimmers have emerged.</p>
<p>A shimmer is simply a duplicate chip reader hidden inside a card reader that can capture data stored on the microchips stored in any EMV-compliant credit or debit cards. So the old guard of pitifully secured mag stripe card readers are slowly being replaced by the new guard of advanced EMV chip cards and readers that have already been hacked by advanced shimmers. There’s not too much good news to go around except that companies like ours are working with law enforcement on a detection solution and should have something to bring to market in 2024. In the meantime, keep a watchful eye on both your surroundings and the ATM or fuel pump right in front of you next time you are getting cash or paying at the pump. It could save you a major headache and lots of money.</p>
<p>This blog originally appeared in <a href="https://www.thebeverlyhillstimes.com/editions.html">The Beverly Hills Times Magazine</a>.</p>
<p>The post <a rel="nofollow" href="https://scottschober.com/behind-the-great-skim/">Behind the Great Skim</a> appeared first on <a rel="nofollow" href="https://scottschober.com">Scott Schober</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://scottschober.com/behind-the-great-skim/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Tracking the Trackers&#8230; for Better or Worse</title>
		<link>https://scottschober.com/tracking-the-trackers-for-better-or-worse/</link>
					<comments>https://scottschober.com/tracking-the-trackers-for-better-or-worse/#respond</comments>
		
		<dc:creator><![CDATA[Scott Schober]]></dc:creator>
		<pubDate>Sat, 09 Dec 2023 20:32:07 +0000</pubDate>
				<category><![CDATA[Privacy Concerns]]></category>
		<category><![CDATA[AirTag]]></category>
		<category><![CDATA[BLE tags]]></category>
		<category><![CDATA[GPS tracker]]></category>
		<category><![CDATA[Satellite tracker]]></category>
		<category><![CDATA[stalking]]></category>
		<guid isPermaLink="false">https://scottschober.com/?p=6061</guid>

					<description><![CDATA[<p>Ever since the first GPS (Global Positioning Satellites) systems went live back in the early nineties, privacy experts have warned us about our diminishing rights. And while we have gained both safety and security as a result of this ability to globally track people and things, we seemed to have lost our true sense of&#8230; <a class = "more-link" href = "https://scottschober.com/tracking-the-trackers-for-better-or-worse/">Read More &#187;</a></p>
<p>The post <a rel="nofollow" href="https://scottschober.com/tracking-the-trackers-for-better-or-worse/">Tracking the Trackers&#8230; for Better or Worse</a> appeared first on <a rel="nofollow" href="https://scottschober.com">Scott Schober</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><a href="https://scottschober.com/wp-content/uploads/2023/12/airtag-alerts-1500x1310-1.png" rel="attachment wp-att-6062"><img loading="lazy" class="alignnone wp-image-6062" src="https://scottschober.com/wp-content/uploads/2023/12/airtag-alerts-1500x1310-1-1024x894.png" alt="" width="800" height="699" srcset="https://scottschober.com/wp-content/uploads/2023/12/airtag-alerts-1500x1310-1-1024x894.png 1024w, https://scottschober.com/wp-content/uploads/2023/12/airtag-alerts-1500x1310-1-300x262.png 300w, https://scottschober.com/wp-content/uploads/2023/12/airtag-alerts-1500x1310-1-768x671.png 768w, https://scottschober.com/wp-content/uploads/2023/12/airtag-alerts-1500x1310-1-344x300.png 344w, https://scottschober.com/wp-content/uploads/2023/12/airtag-alerts-1500x1310-1-600x524.png 600w, https://scottschober.com/wp-content/uploads/2023/12/airtag-alerts-1500x1310-1.png 1500w" sizes="(max-width: 800px) 100vw, 800px" /></a></p>
<p>Ever since the first GPS (Global Positioning Satellites) systems went live back in the early nineties, privacy experts have warned us about our diminishing rights. And while we have gained both safety and security as a result of this ability to globally track people and things, we seemed to have lost our true sense of privacy. I&#8217;ve been inventing devices that track these trackers for decades, mostly in an effort to assist law enforcement from becoming the victims of tracking themselves, and here is what I have learned.</p>
<p>It all began with GPS trackers back in 1994 when fully operational GPS systems began to emerge. Tracking valuable things on the move usually manifested itself as fleet vehicles containing hidden GPS trackers. This gave fleet managers both a way to keep an eye on potentially stolen vehicles and their own drivers at the same time. Before smartphones hit the mainstream in the mid to late 2000s, GPS trackers were expensive, bulky, and mostly relied upon users to install and fetch GPS trackers in order to see where it had been.</p>
<p>Smartphones emerged with their own GPS and cellular broadband connectivity, allowing users to track their hidden GPS trackers in real time. When the GPS tracker sensed movement, it would ping out to the nearest cell tower and update its whereabouts. Users could log into their account any time to see real-time positioning of their tracker. After a few days or weeks, the tracker would start to run low on power and have to be retrieved for a recharge. Suspicious spouses, insecure bosses, and a variety of criminal elements began to use GPS trackers for all kinds of surreptitious purposes.</p>
<p>The legality of tracking someone or something without their consent began to splinter in the U.S., with <a href="https://www.ncsl.org/technology-and-communication/private-use-of-location-tracking-devices-state-statutes#:~:text=In%20six%20states%20(California%2C%20Florida,of%20a%20person%20without%20consent." target="_blank" rel="noopener">many states allowing some degree of electronic tracking without consent</a>. By this point, smartphones had become cheap enough to be used as tracking devices by themselves. An inexpensive phone could be purchased and left in someone&#8217;s bag or car for several days while an app communicates with the user&#8217;s account to notify them whenever the phone is on the move. The majority of phone users simply go about their day with GPS, Wi-Fi, Bluetooth, and cellular data switched on all day. These radios are being tracked and tagged by marketers, telecom companies, and individuals in an effort to resell that data to parties willing to pay. According to a <a href="https://www.ponemon.org/local/upload/file/How%20much%20is%20the%20data%20on%20your%20mobile%20device%20worth%20Final%2010.pdf" target="_blank" rel="noopener">study by the Ponemon Institute</a>, $14,000 is the average value of the personal data contained on a mobile device.</p>
<p>My company began developing tools to track all kinds of cellular signals legally. We never relied on metadata or any kind of saved user data. We didn&#8217;t even communicate with the devices. We simply looked at the signal strength of all nearby phones and created alert systems to trigger when these signals got too strong or too close to secure areas. Sometimes our cell phone detectors were used to catch bad guys trying to wirelessly hack into a network, but many times, we are our own worst enemies, so the business of detecting and alerting to a common cell phone left in one&#8217;s pocket by accident during a confidential meeting has remained a lucrative one. GPS trackers utilize the same broadband cellular networks, so while it can be tricky to detect these subtle, infrequent pulses from a tracker hidden in a vehicle, we managed to modify our cell phone detectors to do just that.</p>
<p>There is still no federal-wide data privacy laws, but lawmakers on both sides of the aisle have introduced a <a href="https://www.forbes.com/sites/nicksibilla/2023/08/01/congress-could-soon-ban-police-from-buying-your-data-without-a-warrant/?sh=2d8c3a8c5171" target="_blank" rel="noopener">bill banning law enforcement and intelligence agencies</a> from easily purchasing personal data use that includes location tracking, social media activity, and search history records. In the meantime, both law enforcement and criminals have not sat idly by, waiting for lawmakers to catch up. Everyone has moved onto the latest inexpensive tracker that can be hidden anywhere and track someone for up to a year.</p>
<p>Ever since Apple&#8217;s AirTags were introduced, users have been finding new ways to protect their belongings while sometimes simultaneously violating the privacy of others. Tiny BLE (Bluetooth Low Energy) tags are being placed in people&#8217;s vehicles, pockets, bags, and other items on the move all the time. Mostly, these are harmless trackers, but an <a href="https://arstechnica.com/tech-policy/2023/10/apple-airtags-triggered-explosion-of-stalking-reports-nationwide-lawsuit-says/" target="_blank" rel="noopener">increase in stalking, theft and even murder has resulted over the past few years</a>, and where tech companies have failed to respond, victims are looking for ways to fight back.</p>
<p>My company developed a BLE tag detector that can sit in your pocket all day that will immediately alert you when any hidden BLE tag is nearby. Apple has built some smarts into their AirTag and its vast Find My network of devices, but these alerts do not always arrive quick enough to help someone before a stalking escalates into a confrontation or worse.</p>
<p>By detecting a special sequence of packets, our detectors identify hidden tags and even help users to find them using signal strength coupled with a bit of direction finding. This might not be necessary if you&#8217;re digging through your own pockets to discover a hidden tag, but one can spend large amounts of time searching the inside and outside of a large automobile every day and still fail to find that tiny AirTag hidden under a passenger seat. This is where our product solutions can really shine for professionals tasked with providing security for events and executive protection of important individuals.</p>
<p>GPS trackers and BLE tags rely on cellular networks and millions of devices around the world that serve as a giant mesh network. So one would assume that our privacy and security remain intact in areas where wireless activity is virtually non-existent. After all, 75% of the earth is ocean where most cellular signals cannot reach. Throw in wilderness and desert and you have huge, uninhabited areas where vehicles and people simply cannot be tracked, right? Not so fast.</p>
<p>Thousands of satellites canvas the earth&#8217;s upper and lower atmospheres. The same technology that allows a SpaceX Starlink device to communicate with someone from the middle of the Atlantic Ocean also allows others to know exactly where that tracking device is located. This might not seem like such a threat until we consider a more dangerous target to track. The U.S. Navy relies upon the vastness of the world&#8217;s oceans to keep their missions and destinations a secret from state enemies. But what happens when these ships can be tracked all over the world by enemies of the U.S. Navy?</p>
<p>In fact, these enemies could use the United States&#8217; own satellite technology against them. Satellite trackers do not rely upon conventional cellular bands to transmit their whereabouts. They communicate directly with satellites that orbit the Earth. It&#8217;s not difficult to imagine a state enemy hiding a satellite tracker somewhere aboard a giant U.S. naval ship or even a small enemy drone dropping a payload containing an active satellite tracker. We have already been approached by concerned security experts on just this matter. My engineers and I are confident that we can not only detect nearby satellite trackers but also determine their location through some advanced triangulation.</p>
<p>Advanced wireless technology will always allow for tiny, tracking devices that can easily violate our privacy and security. However, the flipside to this is that this same technology also allows all kinds of wireless trackers to be detectable and locatable. Technology has a way of blurring the lines between good and bad intentions, so one of my jobs is to ensure our products help the good guys more than they could ever possibly help the bad guys.</p>
<p>This blog originally appeared on <a href="https://www.secureworld.io/industry-news/tracking-the-trackers?utm_content=273287203">SecureWorld</a></p>
<p>The post <a rel="nofollow" href="https://scottschober.com/tracking-the-trackers-for-better-or-worse/">Tracking the Trackers&#8230; for Better or Worse</a> appeared first on <a rel="nofollow" href="https://scottschober.com">Scott Schober</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://scottschober.com/tracking-the-trackers-for-better-or-worse/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Executive Protection has a new weapon in its arsenal</title>
		<link>https://scottschober.com/executive-protection-has-a-new-weapon-in-its-arsenal/</link>
					<comments>https://scottschober.com/executive-protection-has-a-new-weapon-in-its-arsenal/#respond</comments>
		
		<dc:creator><![CDATA[Scott Schober]]></dc:creator>
		<pubDate>Thu, 07 Sep 2023 16:21:57 +0000</pubDate>
				<category><![CDATA[Privacy Concerns]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://scottschober.com/?p=6027</guid>

					<description><![CDATA[<p>There are roughly 250,000 CEOs in the United States. That doesn’t include CISOs, CFOs, VPs and of course, an array of other very important and wealthy people. That’s a lot of attack surfaces as we say in the cybersecurity biz. You might think you know why a cybersecurity expert like myself would even be writing&#8230; <a class = "more-link" href = "https://scottschober.com/executive-protection-has-a-new-weapon-in-its-arsenal/">Read More &#187;</a></p>
<p>The post <a rel="nofollow" href="https://scottschober.com/executive-protection-has-a-new-weapon-in-its-arsenal/">Executive Protection has a new weapon in its arsenal</a> appeared first on <a rel="nofollow" href="https://scottschober.com">Scott Schober</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" class=" wp-image-911061" src="https://www.bvsystems.com/wp-content/uploads/2023/09/executive-security-300x150.jpg" alt="" width="618" height="309" /></p>
<p>There are roughly 250,000 CEOs in the United States. That doesn’t include CISOs, CFOs, VPs and of course, an array of other very important and wealthy people. That’s a lot of attack surfaces as we say in the cybersecurity biz. You might think you know why a cybersecurity expert like myself would even be writing about the protection of wealthy business people, influential politicians and famous celebrities, but you’d probably be wrong.</p>
<p>In the world of executive protection, car chases, fist fights and guns blazing are only a last ditch effort and should never be considered unless there are no safer alternatives. Protecting the privacy and safety of any high-powered individual is all about avoiding unsecured situations and people. It’s about prevention. Before we discuss any solutions, we need to first define the problem.</p>
<p>Headlines would have us all believe that criminals are content with hacking the accounts of famous people in order to steal a few compromising photos and hold them for ransom. There’s no denying that Jlaw’s nude photos would’ve been easy money for criminals that hacked her iCloud account back in 2014 had they not been caught. But there are lesser known criminal schemes that can pay off by orders of magnitude more because they also involve a breach in the physical privacy and safety of highly sought after targets.</p>
<p>Famous people stay famous by engaging with their public and fans. This means more than just accruing as many Insta followers as they can. It also means public appearances, late night parties and press junkets physically spread all over town and beyond. The same goes for prominent dignitaries, powerful executives and sports stars. Only their trusted inner circle of bodyguards, representatives and assistants know where they are headed at any given moment, but they might not be the only ones.</p>
<p>Up until recently, physical stalkers had two choices: follow an important individual around all day to determine their regular routines or slip a GPS tracker onto their vehicle and follow their car digitally. The former involves a lot of time and there is always the possibility of being made (industry term meaning caught following someone). The criminal drawbacks of a GPS tracker involve a traceable user account and a typical battery life of only a few days. But tiny trackers have recently emerged that give new life to creepy and dangerous stalking. Devices such as Apple’s AirTags and Tile’s Trackers are small enough to slip into anyone’s pocket, bag, or outside of their vehicle. Moreover, such devices can track the whereabouts of anyone in the world in real time for a full year due to their highly efficient BLE (Bluetooth Low Energy) technology and one year battery life.</p>
<p>In 2022, famous Sports Illustrated swimsuit model, Brooks Nader, was tracked by someone while walking home from a local bar. She never learned the identity of her stalker but they were watching and following her thanks to the AirTag they slipped into her purse earlier that evening.</p>
<p>If one is inclined to stalk, all one would have to do is briefly gain access to the target’s clothes, bag, vehicle or any personal item in order to quickly place the lightweight (about 4 ounces) tag. Once the tracker is planted, non-stop surveillance can begin. By now you may be thinking that tech giants like Apple and Google have already solved this problem, but they haven’t. AirTags do not notify iPhone users that they are being tracked by a hidden tag until anywhere between 3 hours and 3 days. A lot can happen to our personal safety in the span of a few hours. And that little chime that plays when the tag has been away from its owner and on the move for a while can be easily disabled. Modified, mute tags are being sold on Ebay, Etsy and of course, the Dark Web.<br />
<img loading="lazy" class="alignnone wp-image-910991" src="https://www.bvsystems.com/wp-content/uploads/2023/02/BlueSleuth-Lite-with-AirTag-300x261.jpg" alt="BlueSleuth-Lite with AirTag" width="500" height="435" /></p>
<p>It seems like the deck is stacked against people who deem their privacy a prerequisite but not so fast. My company has been detecting hidden GPS trackers for years so the detection of an AirTag is only a natural extension of this technology. After a successful Kickstarter campaign, we have begun selling <a href="https://www.bvsystems.com/product/bluesleuth-lite-ble-tag-detector/">BlueSleuth-Lite at www.bvsystems.com</a> and on <a href="https://www.amazon.com/BlueSleuth-Lite-Detector-AirTags-Trackers-Devices/dp/B0CH98VM6G">Amazon</a>. This $499 little wonder will detect all BLE tags (AirTag, Tile, Galaxy SmartTag, etc.) and notify the user immediately all from their pocket. The device doesn’t rely on consumer smart phones or apps. Rather, it uses a sophisticated receiver and custom antenna to not only detect any nearby BLE tag but also identify the manufacturer and even assist the user in locating the hidden tag. Many of our customers are law enforcement agents, private investigators, bodyguards and executive protection teams, but some are just regular folks who have been stalked by jealous ex-boyfriends or spouses and want to maintain their safety and privacy.</p>
<p>No device or security expert can guarantee the safety of any one individual, especially if their movements are being tracked by a criminal or a stalker, but there are some precautions that can even benefit those of us that can afford a full time security staff.</p>
<ul>
<li>Stop all contact and communication with a stalker if safe to do so</li>
<li>Keep evidence of stalking (voicemails, texts, emails, etc.,) as evidence</li>
<li>If someone is following you, it is generally not a good idea to go home</li>
<li>Have a safe place in mind to go in the event of an emergency (police station,<br />
place of worship, public area, the home of a friend unknown to the stalker)</li>
<li>Try not to travel alone. If you run or walk for exercise, get an exercise buddy</li>
<li>Always try to vary your daily routes to school, work, home, etc.</li>
<li>Be aware of tracking devices on your car or person especially if you<br />
vary your routes but the stalker still seems to find you</li>
<li>Be aware of personal information you post online</li>
</ul>
<p>The post <a rel="nofollow" href="https://scottschober.com/executive-protection-has-a-new-weapon-in-its-arsenal/">Executive Protection has a new weapon in its arsenal</a> appeared first on <a rel="nofollow" href="https://scottschober.com">Scott Schober</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://scottschober.com/executive-protection-has-a-new-weapon-in-its-arsenal/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The importance of compartmentalization in security - Air National Guard, cyber transport systems specialist, Jack Tiexeira accused of massive breach</title>
		<link>https://scottschober.com/the-importance-of-compartmentalization-in-security/</link>
					<comments>https://scottschober.com/the-importance-of-compartmentalization-in-security/#respond</comments>
		
		<dc:creator><![CDATA[Craig Schober]]></dc:creator>
		<pubDate>Sun, 23 Apr 2023 17:44:16 +0000</pubDate>
				<category><![CDATA[Data Breach]]></category>
		<guid isPermaLink="false">https://scottschober.com/?p=5969</guid>

					<description><![CDATA[<p>&#160; There are many facets surrounding the arrest of 21 year old Air National Guardsman, Jack Tiexeira, that would suggest run-of-the-mill hacking, but that would be misguided. So what went wrong in the chain of security that led to such a massive breach by such an inexperienced and alleged traitor to the intelligence community? We&#8217;ve&#8230; <a class = "more-link" href = "https://scottschober.com/the-importance-of-compartmentalization-in-security/">Read More &#187;</a></p>
<p>The post <a rel="nofollow" href="https://scottschober.com/the-importance-of-compartmentalization-in-security/">The importance of compartmentalization in security</a> appeared first on <a rel="nofollow" href="https://scottschober.com">Scott Schober</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>&nbsp;</p>
<p><img loading="lazy" class="alignnone size-full wp-image-910884" src="https://www.bvsystems.com/wp-content/uploads/2023/04/data-breach-animation.gif" alt="" width="700" height="394" /></p>
<p>There are many facets surrounding the arrest of 21 year old Air National Guardsman, Jack Tiexeira, that would suggest run-of-the-mill hacking, but that would be misguided. So what went wrong in the chain of security that led to such a <a href="https://www.cnn.com/2023/04/14/politics/pentagon-leak-jack-teixeira-what-matters/index.html">massive breach</a> by such an inexperienced and alleged traitor to the intelligence community?</p>
<p>We&#8217;ve seen it before. Hackers score a big data deposit and then go on to brag about it to their <a href="https://www.secureworld.io/industry-news/hackers-brag-taunting">colleagues, the hacker community and even across social media</a>. Like young hip hop stars boasting about their conquests and money, it&#8217;s become almost cliche for young hackers to behave similarly &#8211; only, these boasts can go on to wreak havoc upon billion dollar companies or even the most powerful intelligence communities in the world.</p>
<p>By all appearances, Jack Tiexeira is not a hacker motivated by monetary gains and is unaffiliated with any known groups. His small gaming chat group on Discord, Thug Shaker Central, never appeared to benefit in any substantial way from his leaks except to boost their importance in their own minds. They boasted front row seats to highly confidential U.S. Intelligence reports, plans and projections pertaining to the war in Ukraine. And this data didn&#8217;t appear long after the body counts and battlefields were already reported. According to latest reports from the New York Times, <a href="https://www.nytimes.com/2023/04/21/us/politics/jack-teixeira-leaks-russia-ukraine.html">classified data leaks began appearing in Discord as early as February of 2022.</a> Sensitive data involving Ukrainian troop deployments and potential Russian targets were made visible all in an effort for this 21 year old IT technician to prove his worthiness to his chat group friends. So how did such a seemingly minor player in the game of global intelligence get access to such treasured information?</p>
<p>Jack Tiexeira held the title of cyber transport systems specialist at the Air National Guard airforce base in Massachusetts. He did not hold security clearance for the data that was allegedly leaked but as an IT tech, he did have indirect access to all kinds of classified information. Just like when we take our PC laptops in for repair, we provide the technician with a password so that they can freely move about our system without having to constantly ask us to enter in the password while they look in the other direction, IT specialists have clearances that allow them to access, networks, devices and even SCIFs (Sensitive Compartmented Information Facility).</p>
<p>SCIFs are physical spaces designed primarily for the communication of highly classified information. This communication often comes in the form of simple briefings from one individual to others, all with high level security clearances. Sometimes powerpoint-like projections are used, sometimes secured landlines are used and sometimes just oral reports are used to convey top secret details, but all of these methods are confined within the SCIF. SCIFs typically contain <a href="https://h9k8y6q8.stackpathcdn.com/wp-content/uploads/2021/07/SCIF.pdf">safeguards to detect devices entering into its confines as well as wireless transmissions that could be communicating to other sources</a> outside the walls of the SCIF.</p>
<p>A security detail is posted to physically search for obvious contraband such as cell phones, cameras and tablets but also less invasive items such as smartwatches, wireless earbuds and MP3 players. This is because any device containing a wireless Bluetooth or Wi-Fi chip can be configured to record or transmit private communications with or without the user&#8217;s knowledge. In addition, malware can be planted and spread into nearby networks and devices so it is paramount for security to detect and intercept such electronic devices.</p>
<p><a href="https://www.nytimes.com/2023/04/21/us/politics/jack-teixeira-leaks-russia-ukraine.html">According to latest NYT reports</a>, &#8220;At times, he appeared to be posting from the military base where he was stationed. In one conversation, he said he was about to enter an area where people with security clearance can access classified computer networks, known as a SCIF&#8230;&#8221; and at one point he writes, &#8220;The job I have lets me get privilege’s above most intel guys,”</p>
<p>The ability for one individual with limited security clearance to laterally move within a classified network is concerning to say the least. However, President Biden and his administration don&#8217;t seem too concerned about the leaks. <a href="https://nypost.com/2023/04/14/blase-biden-pentagon-leak-response-raises-red-flags-expert/">In my recent interview with NY Post</a> reporter Caitlin Doornbos, I expound on that notion further.</p>
<p>“Just the fact that US classified information was leaked could potentially lessen the flow of future classified intelligence sharing for fear of being leaked,” he said. “Downplaying the seriousness might be a smart political move in the short term but it sends the wrong message to US allies that will reverberate far beyond this current administration.”</p>
<p>As the CEO of a wireless security company and a cybersecurity expert, this story pushes all of my buttons. In my books and live presentations, I always stress layers of security or compartmentalization as the best method to keep hackers at bay. It&#8217;s the reason I also commissioned the development of several <a href="https://www.bvsystems.com/product-category/wireless-security/">wireless products designed to improve detection and security audits performed regularly on SCIFs</a>. Our products are currently in use by every Department of Defense agency, but what good are they if insider threats (even those who do not appear to be sophisticated hackers) are given the keys to the kingdom? When an individual is granted broad access to confidential data, it&#8217;s like using a cheat code in a video game. Everyone (except for one player) is at an enormous disadvantage and the entire system is at risk.</p>
<p>Safeguards that were not in place need to be and exploits like these, no matter how juvenile their motivations appear to be, need to be taken seriously. Unfortunately, that usually requires someone be made an example of. In this case, the perpetrator appeared to have been working alone so I expect to see substantial incarceration for this young man.</p>
<p>The post <a rel="nofollow" href="https://scottschober.com/the-importance-of-compartmentalization-in-security/">The importance of compartmentalization in security</a> appeared first on <a rel="nofollow" href="https://scottschober.com">Scott Schober</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://scottschober.com/the-importance-of-compartmentalization-in-security/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Stalking has never been easier so let&#8217;s change that - An inventor&#039;s Kickstarter journey so far</title>
		<link>https://scottschober.com/stalking-has-never-been-easier-so-lets-change-that/</link>
					<comments>https://scottschober.com/stalking-has-never-been-easier-so-lets-change-that/#respond</comments>
		
		<dc:creator><![CDATA[Scott Schober]]></dc:creator>
		<pubDate>Wed, 08 Feb 2023 16:40:59 +0000</pubDate>
				<category><![CDATA[Privacy Concerns]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[AirTag stalking]]></category>
		<category><![CDATA[anti-stalking]]></category>
		<category><![CDATA[illegal tracking]]></category>
		<category><![CDATA[kickstarter]]></category>
		<category><![CDATA[tile tracker]]></category>
		<guid isPermaLink="false">https://scottschober.com/?p=5933</guid>

					<description><![CDATA[<p>&#160; As an average sized male, I have come to realize that I take many things for granted. After speaking to my wife and daughter, it has become alarmingly clear that my personal safety is clearly one of those things. I don&#8217;t worry about walking alone at night and I don&#8217;t have to have my&#8230; <a class = "more-link" href = "https://scottschober.com/stalking-has-never-been-easier-so-lets-change-that/">Read More &#187;</a></p>
<p>The post <a rel="nofollow" href="https://scottschober.com/stalking-has-never-been-easier-so-lets-change-that/">Stalking has never been easier so let&#8217;s change that</a> appeared first on <a rel="nofollow" href="https://scottschober.com">Scott Schober</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>&nbsp;</p>
<p><a href="https://scottschober.com/wp-content/uploads/2023/02/woman-stalked-using-AirTag.gif" rel="attachment wp-att-5939"><img loading="lazy" class="size-full wp-image-5939 aligncenter" src="https://scottschober.com/wp-content/uploads/2023/02/woman-stalked-using-AirTag.gif" alt="" width="800" height="515" /></a></p>
<p>As an average sized male, I have come to realize that I take many things for granted. After speaking to my wife and daughter, it has become alarmingly clear that my personal safety is clearly one of those things. I don&#8217;t worry about walking alone at night and I don&#8217;t have to have my keys, flashlight and pepper spray handy as I approach my door. As a wireless tech expert, inventor and CEO of my own wireless security company, I am painfully aware of the problems associated with a new breed of low-cost, personal trackers being used to track more than just personal belongings. People are being increasingly stalked, robbed and assaulted thanks in part to technology we all use.</p>
<p>It&#8217;s no secret that tech companies like Google and Facebook track our every move. It&#8217;s just a part of consumerism in modern digital life so it&#8217;s consensual &#8211; consumers give up a degree of personal privacy in exchange for services that connect us all. These services are mostly bankrolled by advertisers and retailers looking to find new customers. But what happens when individual users are able to do the tracking instead of advertisers?</p>
<p>Stalking goes way back so you would think that by now, people would have a clear understanding of the patterns, perpetrators and causes behind it all but that doesn&#8217;t seem to be the case. National Stalking Awareness Month has been publicly observed since 2004, but some of the <a href="https://nationaltoday.com/national-stalking-awareness-month/">statistics they publish</a> continue to be stark reminders that not only is this problem not going away, this problem is growing due to advances in wireless technology.</p>
<div class="holiday-listicle-item-inner">
<ul>
<li>Around six to 7.5 million people are stalked per year in the United States.</li>
<li>Nearly one in six women and one in 17 men are victims of stalking at least once in their life.</li>
<li>50% of victims said they were stalked before the age of 25.</li>
<li>Stalkers harm victims with weapons in one out of five cases.</li>
<li>Only 25% of the victims were stalked by strangers.</li>
</ul>
<p>Last year, my company was contacted by law enforcement to help them locate BLE trackers hidden inside packages also containing drugs or other illegal items. We developed a professional tool that gave authorities the ability to quickly scan vehicles, storage areas and people for hidden BLE trackers. They found many AirTags being used to track illegal packages, but told us that companies like Apple were hesitant to work with any authorities without lengthy warrants issued by a judge. Meanwhile, the <a href="https://www.theguardian.com/technology/2022/sep/05/i-didnt-want-it-anywhere-near-me-how-the-apple-airtag-became-a-gift-to-stalkers">press continues to hold Apple&#8217;s feet to the fire for keeping stalking victims in the dark</a>for too long while they are being tracked. It was time to take action.</p>
</div>
<p>I met with my engineers and we came up with a product solution that addressed the problem but at 1/12th the price of our best-selling professional solution. After a few moments of worrying about cannibalizing our own profits, we decided to take the leap and go for it. But we weren&#8217;t just breaking with our own business model by offering the cheapest product we&#8217;ve ever made to a market that we&#8217;ve never even served before. We also decided to <a href="https://www.kickstarter.com/projects/1458746827/bluesleuth-lite-detect-hidden-airtags">crowdfund some of our R&amp;D using Kickstarter</a>. Sure we&#8217;ve designed many products based upon customer feedback over the years, but we&#8217;ve never taken their money until the finished product shipped. Kickstarter was an entirely new paradigm for an old school business like mine. I might run a wireless tech company but it&#8217;s a 50 year  old one!</p>
<div id="attachment_910728" style="width: 610px" class="wp-caption aligncenter"><img aria-describedby="caption-attachment-910728" loading="lazy" class="wp-image-910728" src="https://www.bvsystems.com/wp-content/uploads/2023/02/kickstarter-hero-image.png" alt="" width="600" height="341" /><p id="caption-attachment-910728" class="wp-caption-text">Prototype features some digital manipulation but this is essentially the final product</p></div>
<p>BlueSleuth-Lite was first conceived only a few months ago but we&#8217;ve been detecting bluetooth and BLE (Bluetooth Low Energy) devices now for years using our BlueSleuth and BlueSleuth-Pro products. The device had to be small enough to fit comfortably into a pocket but also operate in that pocket all day without losing power. In order to keep the price down, we used LCD displays, components and interface buttons we had used in previous products. However, we did design our first wireless charging system integrated directly into BlueSleuth-Lite to give it that consumer experience one might expect. Once we perfected the algorithms and features, <a href="https://www.kickstarter.com/projects/1458746827/bluesleuth-lite-detect-hidden-airtags">BlueSleuth-Lite was ready for the world of Kickstarter</a>.</p>
<p>As I write, our Kickstarter campaign is roughly half way through and we are also half way to our funding goal. With Kickstarter, it&#8217;s all or nothing so it&#8217;s too close to call right now. Regardless of the outcome, my mission remains the same; protect people&#8217;s privacy and security through wireless solutions. Based upon <a href="https://www.rcrwireless.com/20200218/internet-of-things/connected-devices-will-be-3x-the-global-population-by-2023-cisco-says">estimates that wireless devices will grow to 3x the world population</a> sometime this year, I&#8217;d say I have my work cut out for me.</p>
<p>Please check out the <a href="https://www.kickstarter.com/projects/1458746827/bluesleuth-lite-detect-hidden-airtags">BlueSleuth-Lite Kickstarter here</a> and <a href="https://youtu.be/fqxGfWoAaFU">watch the video</a> for more details on how stalking is made easier through ubiquitous technology we all use.</p>
<p>The post <a rel="nofollow" href="https://scottschober.com/stalking-has-never-been-easier-so-lets-change-that/">Stalking has never been easier so let&#8217;s change that</a> appeared first on <a rel="nofollow" href="https://scottschober.com">Scott Schober</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://scottschober.com/stalking-has-never-been-easier-so-lets-change-that/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>This is why nobody is allowed a cell phone in classified debriefings</title>
		<link>https://scottschober.com/this-is-why-nobody-is-allowed-a-cell-phone-in-classified-debriefings/</link>
					<comments>https://scottschober.com/this-is-why-nobody-is-allowed-a-cell-phone-in-classified-debriefings/#respond</comments>
		
		<dc:creator><![CDATA[Scott Schober]]></dc:creator>
		<pubDate>Fri, 18 Nov 2022 17:28:37 +0000</pubDate>
				<category><![CDATA[Government Spying]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Wireless Security]]></category>
		<category><![CDATA[classified]]></category>
		<category><![CDATA[confidential]]></category>
		<category><![CDATA[debriefing]]></category>
		<category><![CDATA[national security]]></category>
		<category><![CDATA[no cell phones]]></category>
		<category><![CDATA[NSA]]></category>
		<category><![CDATA[Trump]]></category>
		<category><![CDATA[tweet]]></category>
		<category><![CDATA[twitter]]></category>
		<guid isPermaLink="false">https://scottschober.com/?p=5888</guid>

					<description><![CDATA[<p>Three years ago, former President Trump tweeted this image along with a denial of the U.S.&#8217; involvement with a launch accident involving Iran&#8217;s Safir SLV rocket. Now, this image has been officially declassified so why are Pentagon and intelligence officials so disturbed? Trump&#8217;s controversial handling of classified documents is nothing new. When his Mar-a-Lago home&#8230; <a class = "more-link" href = "https://scottschober.com/this-is-why-nobody-is-allowed-a-cell-phone-in-classified-debriefings/">Read More &#187;</a></p>
<p>The post <a rel="nofollow" href="https://scottschober.com/this-is-why-nobody-is-allowed-a-cell-phone-in-classified-debriefings/">This is why nobody is allowed a cell phone in classified debriefings</a> appeared first on <a rel="nofollow" href="https://scottschober.com">Scott Schober</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" class="alignnone wp-image-910645" src="https://www.bvsystems.com/wp-content/uploads/2022/11/Trumps-Tweet.png" alt="Trump's Tweet" width="600" height="321" /></p>
<p>Three years ago, former President Trump tweeted this image along with a denial of the U.S.&#8217; involvement with a launch accident involving Iran&#8217;s Safir SLV rocket. Now, this image has been officially declassified so why are Pentagon and intelligence officials so disturbed?</p>
<p>Trump&#8217;s controversial handling of classified documents is nothing new. When his <a href="https://www.theguardian.com/us-news/2022/aug/31/fbi-searched-trump-mar-a-lago-home-over-efforts-to-hide-classified-files-justice-department-says">Mar-a-Lago home was raided back in August</a>, piles of classified and declassified papers were discovered. Trump offered several explanations (some of them contradictory) for the appearance of these documents in his personal office and home. That investigation is ongoing but this tweet in question is over 3 years old so why is the intelligence community speaking out now? While political motivations are likely behind many of these concerns, there are also legitimate concerns over the handling of sensitive information by anyone, even the most powerful person in government.</p>
<p>Looking at Trump&#8217;s own tweet (see image below), it becomes clear that he (or someone using his phone) simply snapped a pic during a classified debriefing. The glare in the center of the photo (I&#8217;ve added red circle and arrow) and shadow are a dead giveaway that this image was either re-photographed or projected against a wall as indicated by the glare from an overhead light or reflected light from a projector. Once the image ended up in the President&#8217;s phone&#8217;s camera roll, it was a simple matter of inserting it into a tweet for the world to see.</p>
<div id="attachment_910647" style="width: 510px" class="wp-caption alignnone"><img aria-describedby="caption-attachment-910647" loading="lazy" class="wp-image-910647" src="https://www.bvsystems.com/wp-content/uploads/2022/11/Trumps-tweet-glare.jpg" alt="Trumps' Tweet (glare from reflection)" width="500" height="500" /><p id="caption-attachment-910647" class="wp-caption-text">Classified photo was clearly re-photographed and posted on Twitter</p></div>
<p>We&#8217;ve had years of media speculation as to why <a href="https://www.bvsystems.com/one-way-secure-trumps-phone/">Trump flouted security protocol</a> the way he did so I don&#8217;t want to revisit those arguments, but as a cybersecurity expert and CEO of a wireless security company that deals with Dept. of Defense agencies and customers everyday, I want to touch upon a few basic security tenets.</p>
<p><a href="https://www.businessinsider.com/trump-tweeted-classified-intelligence-briefing-photo-2019-8">According to Business Insider</a>, Trump asked to keep a copy of this photo he first saw during a daily intelligence briefing. An hour later, the photo and his tweet went out to his 60 million Twitter followers. Trump claimed to do nothing wrong at the time but I&#8217;m more interested in how we even got to this point.</p>
<p>Classified data and briefings are generally communicated through SCIFs (Sensitive Compartmentalized Information Facility) within secure facilities. SCIFs (<a href="https://www.bvsystems.com/wp-content/uploads/2021/07/SCIF.pdf">learn all about SCIFs here</a>) are generally small enclosures sealed off and air-gapped from all electronic communications. All wireless communications inside and around the SCIF are monitored for any transmissions and the entire SCIF is swept for bugs and any rogue PEDs (Personal Electronic Devices) prior to any debriefing. Finally, everyone entering the SCIF is searched and asked to relinquish any PEDs on their person. This includes the President of the United States of America.</p>
<p>These layers of security and protocol have been followed by the intelligence community for decades for good reason. Bringing an unsecured consumer smartphone into a classified meeting puts everyone in danger. Wi-Fi, Bluetooth, BLE, 5G and any wireless communication standard &#8211; none are truly secure. We know this because we have manufactured and sold tens of thousands of wireless security tools to law enforcement, government agencies and private companies over the past decade. Through malware, hackers have repeatedly demonstrated the ability to hijack phones and steal data without their owner&#8217;s knowledge. Once they acquire that data, hackers have all the power by selling state secrets to enemies or by making demands through ransomware already installed on the insecure devices.</p>
<p><iframe loading="lazy" title="Best way to stop ransomware is before it strikes" width="500" height="281" src="https://www.youtube.com/embed/BIQ7vwp2VBo?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen></iframe></p>
<p><a href="https://www.bvsystems.com/product/sentryhound-pro-folding-ferrous-detection-portal/">Security portals</a> stop all personal electronic devices (powered on or off) at the door and <a href="https://www.bvsystems.com/product/yorkie-pro-wireless-intrusion-detection-system/">handheld receivers</a> sweep secure facilities for hidden bugs and nearby active rogue devices but these tools are only as good as their operators and security protocols in place. All security personnel must follow best practices in detection, location and seizure of all personal electronic devices in order to avoid leaks, hacks and theft of classified information. These rules apply to everyone in an organization, even the President.</p>
<p>The post <a rel="nofollow" href="https://scottschober.com/this-is-why-nobody-is-allowed-a-cell-phone-in-classified-debriefings/">This is why nobody is allowed a cell phone in classified debriefings</a> appeared first on <a rel="nofollow" href="https://scottschober.com">Scott Schober</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://scottschober.com/this-is-why-nobody-is-allowed-a-cell-phone-in-classified-debriefings/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Death of the VPN: A Security Eulogy - Zero Trust models offer more security and flexibility over legacy VPN</title>
		<link>https://scottschober.com/death-of-the-vpn-a-security-eulogy/</link>
					<comments>https://scottschober.com/death-of-the-vpn-a-security-eulogy/#respond</comments>
		
		<dc:creator><![CDATA[Scott Schober]]></dc:creator>
		<pubDate>Wed, 24 Aug 2022 18:11:21 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[cloud]]></category>
		<category><![CDATA[CloudSecurity]]></category>
		<category><![CDATA[COVID]]></category>
		<category><![CDATA[Firewall]]></category>
		<category><![CDATA[RemoteWork]]></category>
		<category><![CDATA[VPN]]></category>
		<category><![CDATA[ZeroTrust]]></category>
		<category><![CDATA[ZTNA]]></category>
		<guid isPermaLink="false">https://scottschober.com/?p=5845</guid>

					<description><![CDATA[<p>Trust can be a hard thing to come by in this world but in the world of cybersecurity, trust is virtually non-existent, or at least it should be. VPNs got us all from crawling to walking in the early days of the internet, but security needs have outpaced VPNs’ abilities to deliver true security and&#8230; <a class = "more-link" href = "https://scottschober.com/death-of-the-vpn-a-security-eulogy/">Read More &#187;</a></p>
<p>The post <a rel="nofollow" href="https://scottschober.com/death-of-the-vpn-a-security-eulogy/">Death of the VPN: A Security Eulogy</a> appeared first on <a rel="nofollow" href="https://scottschober.com">Scott Schober</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><a href="https://scottschober.com/wp-content/uploads/2022/08/RIP-VPN.jpg" rel="attachment wp-att-5847"><img loading="lazy" class="alignnone wp-image-5847" src="https://scottschober.com/wp-content/uploads/2022/08/RIP-VPN.jpg" alt="Death of the VPN" width="700" height="424" srcset="https://scottschober.com/wp-content/uploads/2022/08/RIP-VPN.jpg 2000w, https://scottschober.com/wp-content/uploads/2022/08/RIP-VPN-300x182.jpg 300w, https://scottschober.com/wp-content/uploads/2022/08/RIP-VPN-1024x620.jpg 1024w, https://scottschober.com/wp-content/uploads/2022/08/RIP-VPN-768x465.jpg 768w, https://scottschober.com/wp-content/uploads/2022/08/RIP-VPN-495x300.jpg 495w, https://scottschober.com/wp-content/uploads/2022/08/RIP-VPN-1536x930.jpg 1536w, https://scottschober.com/wp-content/uploads/2022/08/RIP-VPN-600x363.jpg 600w" sizes="(max-width: 700px) 100vw, 700px" /></a></p>
<p>Trust can be a hard thing to come by in this world but in the world of cybersecurity, trust is virtually non-existent, or at least it should be. VPNs got us all from crawling to walking in the early days of the internet, but security needs have outpaced VPNs’ abilities to deliver true security and privacy for users and organizations so we now look to more advanced solutions to keep us cybersafe.</p>
<p>Back in 1996, a Microsoft, Ascend and 3Com developed the peer-to-peer tunneling protocol or PPTP. PPTP was created in order to ensure a more secure and private connection between the user and the internet. As the internet rapidly expanded, so did viruses, malware and a plethora of attacks targeting end users and even their networks. It became clear that not only a more secure method of connection was in order but also a more convenient one too. In the early 2000s, internet users were becoming increasingly on-the-go and required the ability to connect remotely to a private network over a public connection.</p>
<p>This called for a standard that not only maintained privacy through encryption but also prevented malware all while affording users the ability to connect to their sensitive data from anywhere in the world. VPNs or Virtual Private Networks were born out of necessity for businesses to keep their data safe while employees accessed these private networks.</p>
<p>Unlike the original PPTP protocol, VPN allows many users and devices simultaneous access to private networks across a very public internet. This is accomplished using a three-layered approach involving tunneling, authentication and encryption. This was sufficient for its time, but the internet has exploded in use since the early 2000s and not just by business users.</p>
<p>Billions of internet users including consumers, journalists and gamers regularly connect using VPNs but the same convenience that allows them to connect from anywhere using any device also carries risks that stem from traffic that VPNs were never designed to handle. The rise of cloud computing among all internet users has revealed cracks in the surface of these networks that VPNs worked so hard to conceal and remediate.</p>
<p>Many free VPNs collect vast amounts data on their users that they then turn around and sell to advertisers. And while encrypted VPN data cannot be read by your internet service provider, they can determine that you are using a VPN and even the nature of the encrypted data since it all passes through their pipes. This can become an issue for users who are bound by agreements restricting internet use outside their own country for something as harmless as streaming a show on Netflix to something as serious as reporting human rights violations from within China.</p>
<p>The final nail in the coffin of VPN came in early 2020. The COVID-19 pandemic changed so many things about our daily lives especially remote working. Seemingly overnight, the remote workforce went from roughly 6% to over one-third of workers. Flexible remote work opportunities exploded during the pandemic so much so that many bosses and companies have resigned to the fact that many of these workers will never be stepping foot into their employers’ offices again. Many other companies have adopted hybrid-remote policies in an attempt to keep an eye on employees while also affording them work-from-home independence. Unfortunately, all of these approaches collectively expand an ever-increasing attack surface that VPNs were not designed to handle.</p>
<p><a href="https://scottschober.com/wp-content/uploads/2022/08/zero-trust-sign.jpg" rel="attachment wp-att-5851"><img loading="lazy" class="alignnone wp-image-5851" src="https://scottschober.com/wp-content/uploads/2022/08/zero-trust-sign.jpg" alt="" width="200" height="239" srcset="https://scottschober.com/wp-content/uploads/2022/08/zero-trust-sign.jpg 602w, https://scottschober.com/wp-content/uploads/2022/08/zero-trust-sign-251x300.jpg 251w, https://scottschober.com/wp-content/uploads/2022/08/zero-trust-sign-600x718.jpg 600w" sizes="(max-width: 200px) 100vw, 200px" /></a></p>
<p>Zero Trust Network Access or ZTNA isn’t a new concept, but security providers have been quick to adopt it due to urgent needs both during and post-pandemic. The essential difference between ZTNA solutions and VPNs is that ZTNA models utilize a “never trust, always verify” approach to each user before granting access. If we liken users and data to a two-way spigot extending off a giant network barrel, ZTNA offers unlimited spigots (one for each user) while VPN offers just one giant spigot for everyone. Zero Trust, as implied by the name, not only requires robust authentication but also segments users with granular access to specific apps. This limits their exposure to the network and minimizes risks to all users and networks.  ZTNA is implemented with the <a href="https://www.perimeter81.com/zero-trust-network-access">security designed around users</a> so when employees are connected both your network and your employees are protected.</p>
<p>And since ZTNA is a cloud-based solution, it scales globally all while implementing posture checks before connecting devices, privatizing user access with multi-factor authentication and allows user and network management all from a single platform. Due to the physicality of VPN firewalls, similar scalability is more expensive, more time consuming and decidedly less secure.</p>
<p>ZTNA providers allow any organization a flexible, 360-degree view of all access and security. See all the benefits of <a href="https://assets.perimeter81.com/uploads/2022/05/ZTNA-vs-On-Premises-Firewall-VPN-White-1.pdf">ZTNA vs On-Premises Firewall VPN for the Remote Workspace</a> so you can keep your organization cybersafe.</p>
<p>This blog was sponsored by <a href="https://www.perimeter81.com/">Perimeter 81</a></p>
<p>The post <a rel="nofollow" href="https://scottschober.com/death-of-the-vpn-a-security-eulogy/">Death of the VPN: A Security Eulogy</a> appeared first on <a rel="nofollow" href="https://scottschober.com">Scott Schober</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://scottschober.com/death-of-the-vpn-a-security-eulogy/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
