Sunday, October 30, 2016

More Smartguns

I've previously posted about how the so-called "smart gun" as promulgated by popular culture and politicians will not make a significant difference in the safety of firearms and could be detrimental. Here I will show what smart gun could be implemented in a way that benefits the gun user.

Smartgun System 1: AR-15 series

The AR-type rifle lends itself to customization. With a modified or unique lower receiver, it would make a great host for a Smart Gun. the Smart Gun system should be as modular as the rifle, with additional components adding functionality. The core of the system would be contained in specialized grip. This grip would have the controller and login system, that the shooter interfaces with with passive rings or some other local RF system. It would actuate the safety (Via a modified Safety plunger) to on-safe when connection with the login device is lost. This would *not* prevent the user from actuating the safety to "Fire" manually, in case of system failure. The computer would log the user, number of shots fired and timestamp shots, logins and disconnects.

The system could be integrated with a TrackingPoint-style scope, perhaps receiving information from target designators and other field sensors to keep blue-on-blue incidents to a minimum and lead to better hits with automatic ranging. Video of shots could be captured for forensic investigation. The scope could be integrated with a round counter and other sensors to detect and diagnose stoppages. A small sensor pack could automatically safe the gun when the user is not directly aiming (such as on the move running or marching, or in a vehicle or coming into the bounds of a "safe zone").

Benefits to the user:
The user get's takeaway protection in the form of the automatic safety engagement. The other benefits are primarily for issuing organizations being able to show who fired a shot, when it was fired. the additional information does not need the smartgun integration

Smartgun System 2: 1911-style Pistol

By using a modified frame, a solenoid built into the left grip panel could automatically actuate the safety lever and/or the grip safety in order to lock out an unauthorized user  in the event of a gun grab or takeaway. In this case the emergency reset would be removing the grip panel and resetting or disabling the system. This introduces a new failure possibility into the gun and would require the authorized user to quickly identify a lockout failure and change tactics.

Benefits to the user:
Automatic takeaway safety, and unauthorized user lockout. If the grip safety was used for the lockout the gun could still be loaded and unloaded safely.

Saturday, October 29, 2016

Security Protect Your Device

Protecting your Device

Your communications cannot be secure if your device is not. Attacks from keyloggers, remote access tools, and other various data exfiltration threats make any in transit protections moot. Your device might be a phone or a PC or something else. For the purposes of this post, we will consider how to secure computers. Phones and tablets etc, will have to be a separate post.

The modern computer is next to useless without an always on internet connection. Tablets, e-readers and other devices have take over the disconnected computer use space. Our use case is specific to communications and therefore requires a connected PC. Therefore we have to be more advanced in our protection.

Full Disk Encryption

Full disk encryption protects your data from being read without your knowledge or consent. All three of the major operating systems offer this feature. The main benefit is that your data stays safe even if you are separated from your device. This protects your information if you laptop is stolen, or your computer is seized by governments. Full disk encryption does not protect you from malware running on your computer or people from looking at your data when your computer is on and logged in. In order to ensure your disk is protected, turn your computer all the way off, not just "sleep" mode. This is especially important for FDE desktops, It also is not compatible with dual booting PCs like Apple+Bootcamp or Linux and Windows on the same machine.

Be advised that the government can compel you to divulge your  password, or hold you in contempt of court until you do. If your disk is imaged, they can try to attack it outside of of your grasp until they get it. This is a concern at borders especially. Full disk encryption is a place you really want to use a long, secure password that is easy to type and difficult to guess. See this video for some more information.

Windows:

Windows markets it FDE as a "Professional" feature called Bitlocker. Be advised that if you log into your Windows PC with your Windows Live ID that Microsoft can reset a "Lost" Bitlocker key. It is best to create a local (or domain) account to protect your data. there is a rumor that Bitlocker is backdoored for US police access, but I have not found any proof of this. Since there is no code review, there is no way to know for sure.  All Windows 10 PCs also have "Device Encryption" which is good enough to protect your data from thieves and other non-technical attacks, but can be reset the same way and cannot be configured without Microsoft recovery options.

Apple:

On Mac computers, FileVault is the full disk encryption tool. Again there is an Apple recovery option that could be used to unlock your machine by the government. If you want to protect your data from the government, we recommend you do not use the iCloud or other Apple options. Also, while it has been attacked and tested, Apple has not released the code fro review as far as I can tell. However, based on Apple's actions during the San Bernardino case a backdoor is unlikely at the time of this writing.

Linux:

Most Linux distributions include a Full Disk Encryption option in the advanced installations. Unlike the other options this code is open for code review and has no outside recovery option to be cooped by the government.

With all of these options we recommend you encrypt the empty space if offered the option. Full disk encryption is strong protection, but it is often only useful if you are already being investigated or detained. It can certainly help, but it isn't a panacea.

Malware Protection:

Malware is the generic term for viruses, spyware and other programs that can exfiltrate your data without your knowledge. Luckily, this is a concern shared by nearly all computer users and there are lots of software solutions available.

Adblockers

At the time of this writing, ads serving malware is one of the most effective ways to infect wary websurfers. In addition on privacy concerns, may like how it prevents sites from monetizing your view without your consent.

Antivirus

An old standby of computer protection, Antivirus is now integrated into Windows, and widely available for free. Antivirus now stands more a a scanning tool and emergency protection rather then a front line defense.

Anti-Spyware

This is often integrated into Antivirus and also is partly built into Windows. for deep removal of persistent malware specific solutions exist and are useful.

General protection and computer hygiene:

These are more behaviors then they are software. Some behaviors can open you up for attacks more then others.

Installation

When installing software, double check the source of the software. Many search engines will preface your search result with ads that will repackage the software you want with ads and malware you don't be sure to download from the site of the company, not a third party.

Patches

In the always connected world in which we live often software will ship and bugs (especially security bugs) will be found later. Or exploits will overcome previously secure code. For these reasons, keeping your programs and operating system up to date is an important safety concern. Most good software will have a service builtin to check for and install updates and patches, often automatically.

Other Solutions:

The most paranoid thing you can do to protect your computer from being compromised is to run your operating system off of an ROM disc, such as a Linux Live CD. As long as the software was secure when you wrote it to disc, you can be sure that each session is not compromised. Unfortunately, modem software needs constant patching to stay secure and safe, requiring you to create new ROM discs on a fairly regular basis. ROM based operating systems are alos slow, don't have bookmarks, cookies or other labor saving devices. They are excellent in assuring a safe connection, but difficult to actually use.

Recommendations:

  • Use Adblockers, anti-malware and software from the publisher's site.
  • Keep software up to date.
  • Use full disk encryption, especially on laptops.