<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Welcome &#8211; New England Safety Partners, LLC</title>
	<atom:link href="https://www.newenglandsp.com/category/welcome/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.newenglandsp.com</link>
	<description>New England Safety Partners, LLC</description>
	<lastBuildDate>Wed, 22 Feb 2023 12:30:20 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
	<item>
		<title>A Device to Turn Traffic Lights Green</title>
		<link>https://www.newenglandsp.com/2023/02/a-device-to-turn-traffic-lights-green/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=a-device-to-turn-traffic-lights-green</link>
		
		<dc:creator><![CDATA[Ed Gardner]]></dc:creator>
		<pubDate>Wed, 22 Feb 2023 12:30:20 +0000</pubDate>
				<category><![CDATA[Welcome]]></category>
		<guid isPermaLink="false">https://www.schneier.com/?p=66958</guid>

					<description><![CDATA[<p>Here’s a <a href="https://www.thedrive.com/news/hacker-uncovers-how-to-turn-traffic-lights-green-with-flipper-zero">story</a> about a hacker who reprogrammed a device called “Flipper Zero” to mimic Opticom transmitters—to turn traffic lights in his path green.</p>
<blockquote><p>As mentioned earlier, the Flipper Zero has a built-in sub-GHz radio that lets the device receive data (or transmit it, with the right firmware in approved regions) on the <a href="https://www.thedrive.com/tech/i-tried-the-honda-keyfob-hack-on-my-own-car-it-totally-worked">same wireless frequencies as keyfobs and other devices</a>. Most traffic preemption devices intended for emergency traffic redirection don’t actually transmit signals over RF. Instead, they use optical technology to beam infrared light from vehicles to static receivers mounted on traffic light poles...</p></blockquote>]]></description>
										<content:encoded><![CDATA[<p>Here&#8217;s a <a href="https://www.thedrive.com/news/hacker-uncovers-how-to-turn-traffic-lights-green-with-flipper-zero">story</a> about a hacker who reprogrammed a device called &#8220;Flipper Zero&#8221; to mimic Opticom transmitters&#8212;to turn traffic lights in his path green.</p>
<blockquote>
<p>As mentioned earlier, the Flipper Zero has a built-in sub-GHz radio that lets the device receive data (or transmit it, with the right firmware in approved regions) on the <a href="https://www.thedrive.com/tech/i-tried-the-honda-keyfob-hack-on-my-own-car-it-totally-worked">same wireless frequencies as keyfobs and other devices</a>. Most traffic preemption devices intended for emergency traffic redirection don&#8217;t actually transmit signals over RF. Instead, they use optical technology to beam infrared light from vehicles to static receivers mounted on traffic light poles.</p>
<p>Perhaps the most well-known branding for these types of devices is called <a href="https://www.gtt.com/">Opticom</a>. Essentially, the tech works by detecting a specific pattern of infrared light emitted by the Mobile Infrared Transmitter (MIRT) installed in a police car, fire truck, or ambulance when the MIRT is switched on. When the receiver detects the light, the traffic system then initiates a signal change as the emergency vehicle approaches an intersection, safely redirecting the traffic flow so that the emergency vehicle can pass through the intersection as if it were regular traffic and potentially avoid a collision.
</p>
</blockquote>
<p>This seems easy to do, but it&#8217;s also very illegal. It&#8217;s called &#8220;impersonating an emergency vehicle,&#8221; and it comes with hefty penalties if you&#8217;re caught.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Fines as a Security System</title>
		<link>https://www.newenglandsp.com/2023/02/fines-as-a-security-system/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=fines-as-a-security-system</link>
		
		<dc:creator><![CDATA[Ed Gardner]]></dc:creator>
		<pubDate>Mon, 20 Feb 2023 12:09:21 +0000</pubDate>
				<category><![CDATA[Welcome]]></category>
		<guid isPermaLink="false">https://www.schneier.com/?p=66946</guid>

					<description><![CDATA[<p>Tile has an <a href="https://www.engadget.com/tile-thinks-a-1-million-fine-will-deter-stalkers-from-using-its-trackers-181857358.html">interesting security solution</a> to make its tracking tags harder to use for stalking:</p>
<blockquote><p>The Anti-Theft Mode feature will make the devices invisible to Scan and Secure, the company’s in-app feature that lets you know if any nearby Tiles are following you. But to activate the new Anti-Theft Mode, the Tile owner will have to verify their real identity with a government-issued ID, submit a biometric scan that helps root out fake IDs, agree to let Tile share their information with law enforcement and agree to be subject to a $1 million penalty if convicted in a court of law of using Tile for criminal activity. So although it technically makes the device easier for stalkers to use Tiles silently, it makes the penalty of doing so high enough to (at least in theory) deter them from trying...</p></blockquote>]]></description>
										<content:encoded><![CDATA[<p>Tile has an <a href="https://www.engadget.com/tile-thinks-a-1-million-fine-will-deter-stalkers-from-using-its-trackers-181857358.html">interesting security solution</a> to make its tracking tags harder to use for stalking:</p>
<blockquote>
<p>The Anti-Theft Mode feature will make the devices invisible to Scan and Secure, the company&#8217;s in-app feature that lets you know if any nearby Tiles are following you. But to activate the new Anti-Theft Mode, the Tile owner will have to verify their real identity with a government-issued ID, submit a biometric scan that helps root out fake IDs, agree to let Tile share their information with law enforcement and agree to be subject to a $1 million penalty if convicted in a court of law of using Tile for criminal activity. So although it technically makes the device easier for stalkers to use Tiles silently, it makes the penalty of doing so high enough to (at least in theory) deter them from trying.</p>
</blockquote>
<p>Interesting theory. But it won&#8217;t work against attackers who don&#8217;t have any money.</p>
<blockquote>
<p>Hulls believes the approach is superior to Apple&#8217;s solution with AirTag, which emits a sound and notifies iPhone users that one of the trackers is following them.</p>
</blockquote>
<p>My complaint about the technical solutions is that they only work for users of the system. Tile security requires an &#8220;in-app feature.&#8221; Apple&#8217;s AirTag &#8220;notifies iPhone users.&#8221; What we need is a common standard that is implemented on all smartphones, so that people who don&#8217;t use the trackers can be alerted if they are being surveilled by one of them.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>CISA Releases ESXiArgs Ransomware Recovery Script</title>
		<link>https://www.newenglandsp.com/2023/02/cisa-releases-esxiargs-ransomware-recovery-script/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=cisa-releases-esxiargs-ransomware-recovery-script</link>
		
		<dc:creator><![CDATA[Ed Gardner]]></dc:creator>
		<pubDate>Tue, 07 Feb 2023 23:27:16 +0000</pubDate>
				<category><![CDATA[Welcome]]></category>
		<guid isPermaLink="false">http://www.newenglandsp.com/?guid=cf864004848913b551482cdda64f99c7</guid>

					<description><![CDATA[Original release date: February 7, 2023CISA has released a recovery script for organizations that have fallen victim to ESXiArgs ransomware. The ESXiArgs ransomware encrypts configuration files on vulnerable ESXi servers, potentially rendering virtual ...]]></description>
										<content:encoded><![CDATA[<p>Original release date: February 7, 2023</p>
<p>CISA has released a recovery script for organizations that have fallen victim to ESXiArgs ransomware. The ESXiArgs ransomware encrypts configuration files on vulnerable ESXi servers, potentially rendering virtual machines (VMs) unusable.</p>
<p>CISA recommends organizations impacted by ESXiArgs evaluate the script and guidance provided in the accompanying README file to determine if it is fit for attempting to recover access to files in their environment.</p>
<p>Organizations can access the recovery script here:&nbsp;<a href="https://github.com/cisagov/ESXiArgs-Recover">https://github.com/cisagov/ESXiArgs-Recover</a></p>
<div class="field field--name-body field--type-text-with-summary field--label-hidden field--item">
<p class="privacy-and-terms">This product is provided subject to this <a href="https://us-cert.cisa.gov/privacy/notification">Notification</a> and this <a href="https://www.dhs.gov/privacy-policy">Privacy &amp; Use</a> policy.</p>
</div>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>NESP Turns 10 &#8211; vCISO Chronicles Podcast</title>
		<link>https://www.newenglandsp.com/2023/02/nesp-turns-10-vciso-chronicles-pdcast/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=nesp-turns-10-vciso-chronicles-pdcast</link>
		
		<dc:creator><![CDATA[Ed Gardner]]></dc:creator>
		<pubDate>Tue, 07 Feb 2023 14:37:51 +0000</pubDate>
				<category><![CDATA[Press Release]]></category>
		<category><![CDATA[Welcome]]></category>
		<guid isPermaLink="false">https://www.newenglandsp.com/?p=17778</guid>

					<description><![CDATA[This month marks the 10th anniversary of our creation as a corporate entity and our 8th year of paying the rent with this security gig. It&#8217;s been an exciting decade, filled with excellent employees, excellent clients, and excellent partners. Last month I was honored to sit down with Caroline McCaffrey for what appears to be [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p>This month marks the 10th anniversary of our creation as a corporate entity and our 8th year of paying the rent with this security gig. </p>



<p>It&#8217;s been an exciting decade, filled with excellent employees, excellent clients, and excellent partners.</p>



<p>Last month I was honored to sit down with <a rel="noreferrer noopener" href="https://www.linkedin.com/in/carolinemccaffery/" data-type="URL" data-id="https://www.linkedin.com/in/carolinemccaffery/" target="_blank">Caroline McCaffrey</a> for what appears to be the inaugural episode of <a rel="noreferrer noopener" href="https://securityexpertmarketplace.substack.com/p/episode-1-the-vciso-chronicles#details" data-type="URL" data-id="https://securityexpertmarketplace.substack.com/p/episode-1-the-vciso-chronicles#details" target="_blank">her new podcast, the vCISO chronicles</a>. We talked through many things that seem relevant to our anniversary, so it&#8217;s timely that it was released this month. </p>



<figure class="wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio"><div class="wp-block-embed__wrapper">
<iframe title="The vCISO Chronicles Episode #1 w Ed Gardner" width="640" height="360" src="https://www.youtube.com/embed/gu5Q4IxcPLs?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe>
</div></figure>



<p>Rather than blogging about it, <a href="https://securityexpertmarketplace.substack.com/p/episode-1-the-vciso-chronicles#details" data-type="URL" data-id="https://securityexpertmarketplace.substack.com/p/episode-1-the-vciso-chronicles#details" target="_blank" rel="noreferrer noopener">just head over and give it a listen!</a></p>



<p>Thanks again, Caroline! We look forward to more!</p>



<p>And here&#8217;s to another 10 years for NESP!</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>CISA Releases Six Industrial Control Systems Advisories</title>
		<link>https://www.newenglandsp.com/2023/02/cisa-releases-six-industrial-control-systems-advisories-3/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=cisa-releases-six-industrial-control-systems-advisories-3</link>
		
		<dc:creator><![CDATA[Ed Gardner]]></dc:creator>
		<pubDate>Thu, 02 Feb 2023 18:00:00 +0000</pubDate>
				<category><![CDATA[Welcome]]></category>
		<guid isPermaLink="false">http://www.newenglandsp.com/?guid=96c7d2afe0c5d5df0b9a62373af23fbf</guid>

					<description><![CDATA[Original release date: February 2, 2023CISA released six Industrial Control Systems (ICS) advisories on February 2, 2023.These advisories provides timely information about current security issues, vulnerabilities, and exploits surrounding ICS.

CISA en...]]></description>
										<content:encoded><![CDATA[<p>Original release date: February 2, 2023</p>
<p>CISA released six Industrial Control Systems (ICS) advisories on February 2, 2023.These advisories provides timely information about current security issues, vulnerabilities, and exploits surrounding ICS.</p>
<p>CISA encourages users and administrators to review the newly released ICS advisories for technical details and mitigations:</p>
<ul>
<li>ICSA-23-033-01 <a href="https://www.cisa.gov/uscert/ics/advisories/icsa-23-033-01">Delta Electronics DIAScreen</a></li>
<li>ICSA-23-033-02 <a href="https://www.cisa.gov/uscert/ics/advisories/icsa-23-033-02">Mitsubishi Electric GOT2000 Series and GT SoftGOT2000</a></li>
<li>ICSA-23-033-03 <a href="https://www.cisa.gov/uscert/ics/advisories/icsa-23-033-03">Baicells Nova</a></li>
<li>ICSA-23-033-04 <a href="https://www.cisa.gov/uscert/ics/advisories/icsa-23-033-04">Delta Electronics DVW-W02W2-E2</a></li>
<li>ICSA-23-033-05 <a href="https://www.cisa.gov/uscert/ics/advisories/icsa-23-033-05">Delta Electronics DX-2100-L1-CN</a></li>
<li>ICSA-22-221-01 <a href="https://www.cisa.gov/uscert/ics/advisories/icsa-22-221-01">Mitsubishi Electric Multiple Factory Automation Products (Update D)</a></li>
</ul>
<div class="field field--name-body field--type-text-with-summary field--label-hidden field--item">
<p class="privacy-and-terms">This product is provided subject to this <a href="https://us-cert.cisa.gov/privacy/notification">Notification</a> and this <a href="https://www.dhs.gov/privacy-policy">Privacy &amp; Use</a> policy.</p>
</div>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Bulk Surveillance of Money Transfers</title>
		<link>https://www.newenglandsp.com/2023/01/bulk-surveillance-of-money-transfers/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=bulk-surveillance-of-money-transfers</link>
		
		<dc:creator><![CDATA[Ed Gardner]]></dc:creator>
		<pubDate>Tue, 24 Jan 2023 12:14:13 +0000</pubDate>
				<category><![CDATA[Welcome]]></category>
		<guid isPermaLink="false">https://www.schneier.com/?p=66623</guid>

					<description><![CDATA[<p>Just another obscure <a href="https://www.engadget.com/us-money-transfer-mass-surveillance-trac-183552282.html">warrantless surveillance program</a>.</p>
<blockquote><p>US law enforcement can access details of money transfers without a warrant through an obscure surveillance program the Arizona attorney general’s office created in 2014. A database stored at a nonprofit, the Transaction Record Analysis Center (TRAC), provides full names and amounts for larger transfers (above $500) sent between the US, Mexico and 22 other regions through services like Western Union, MoneyGram and Viamericas. The program covers data for numerous Caribbean and Latin American countries in addition to Canada, China, France, Malaysia, Spain, Thailand, Ukraine and the US Virgin Islands. Some domestic transfers also enter the data set...</p></blockquote>]]></description>
										<content:encoded><![CDATA[<p>Just another obscure <a href="https://www.engadget.com/us-money-transfer-mass-surveillance-trac-183552282.html">warrantless surveillance program</a>.</p>
<blockquote>
<p>US law enforcement can access details of money transfers without a warrant through an obscure surveillance program the Arizona attorney general&#8217;s office created in 2014. A database stored at a nonprofit, the Transaction Record Analysis Center (TRAC), provides full names and amounts for larger transfers (above $500) sent between the US, Mexico and 22 other regions through services like Western Union, MoneyGram and Viamericas. The program covers data for numerous Caribbean and Latin American countries in addition to Canada, China, France, Malaysia, Spain, Thailand, Ukraine and the US Virgin Islands. Some domestic transfers also enter the data set.</p>
<p>[&#8230;]</p>
<p>You need to be a member of law enforcement with an active government email account to use the database, which is available through a publicly visible web portal. Leber told <i>The Journal</i> that there haven&#8217;t been any known breaches or instances of law enforcement misuse. However, Wyden noted that the surveillance program included more states and countries than previously mentioned in briefings. There have also been subpoenas for bulk money transfer data from Homeland Security Investigations (which withdrew its request after Wyden&#8217;s inquiry), the DEA and the FBI. </p>
</blockquote>
<p>How is it that Arizona can be in charge of this?</p>
<p><i>Wall Street Journal</i> <a href="https://www.wsj.com/podcasts/whats-news/inside-the-surveillance-program-on-money-transfers/f52df319-7ad9-4ee7-b878-d4fe1db6a203">podcast</a>&#8212;with transcript&#8212;on the program. I think the <a href="https://epic.org/sen-wyden-reveals-secret-dhs-program-to-collecting-millions-of-money-transfer-records/">original reporting</a> was from <a href="https://www.wsj.com/articles/secret-surveillance-program-collects-americans-money-transfer-data-senator-says-11646737201">last March</a>, but I missed it back then.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>No-Fly List Exposed</title>
		<link>https://www.newenglandsp.com/2023/01/no-fly-list-exposed/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=no-fly-list-exposed</link>
		
		<dc:creator><![CDATA[Ed Gardner]]></dc:creator>
		<pubDate>Mon, 23 Jan 2023 12:02:56 +0000</pubDate>
				<category><![CDATA[Welcome]]></category>
		<guid isPermaLink="false">https://www.schneier.com/?p=66620</guid>

					<description><![CDATA[<p>I can’t remember the last time I thought about the US no-fly list: the list of people so dangerous they should never be allowed to fly on an airplane, yet so innocent that we can’t arrest them. Back when I thought about it a lot, I realized that the TSA’s practice of giving it to every airline meant that it was not well protected, and it certainly ended up in the hands of every major government that wanted it.</p>
<p>The list is back in the news today, having been <a href="https://www.dailydot.com/debug/no-fly-list-us-tsa-unprotected-server-commuteair/">left exposed</a> on an insecure airline computer. (The airline is CommuteAir, a company so obscure that I’ve never heard of it before.)...</p>]]></description>
										<content:encoded><![CDATA[<p>I can&#8217;t remember the last time I thought about the US no-fly list: the list of people so dangerous they should never be allowed to fly on an airplane, yet so innocent that we can&#8217;t arrest them. Back when I thought about it a lot, I realized that the TSA&#8217;s practice of giving it to every airline meant that it was not well protected, and it certainly ended up in the hands of every major government that wanted it.</p>
<p>The list is back in the news today, having been <a href="https://www.dailydot.com/debug/no-fly-list-us-tsa-unprotected-server-commuteair/">left exposed</a> on an insecure airline computer. (The airline is CommuteAir, a company so obscure that I&#8217;ve never heard of it before.)</p>
<p>This is, of course, the problem with having to give a copy of your secret list to lots of people.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The FBI Identified a Tor User</title>
		<link>https://www.newenglandsp.com/2023/01/the-fbi-identified-a-tor-user/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=the-fbi-identified-a-tor-user</link>
		
		<dc:creator><![CDATA[Ed Gardner]]></dc:creator>
		<pubDate>Tue, 17 Jan 2023 12:02:26 +0000</pubDate>
				<category><![CDATA[Welcome]]></category>
		<guid isPermaLink="false">https://www.schneier.com/?p=66503</guid>

					<description><![CDATA[<p><a href="https://www.vice.com/en/article/z34dx3/fbi-wont-say-hacked-dark-web-isis-site-nit">No details</a>, though:</p>
<blockquote><p>According to the complaint against him, Al-Azhari allegedly visited a dark web site that hosts “unofficial propaganda and photographs related to ISIS” multiple times on May 14, 2019. In virtue of being a dark web site—­that is, one hosted on the Tor anonymity network—­it should have been difficult for the site owner’s or a third party to determine the real IP address of any of the site’s visitors.</p>
<p>Yet, that’s exactly what the FBI did. It found Al-Azhari allegedly visited the site from an IP address associated with Al-Azhari’s grandmother’s house in Riverside, California. The FBI also found what specific pages Al-Azhari visited, including a section on donating Bitcoin; another focused on military operations conducted by ISIS fighters in Iraq, Syria, and Nigeria; and another page that provided links to material from ISIS’s media arm. Without the FBI deploying some form of surveillance technique, or Al-Azhari using another method to visit the site which exposed their IP address, this should not have been possible...</p></blockquote>]]></description>
										<content:encoded><![CDATA[<p><a href="https://www.vice.com/en/article/z34dx3/fbi-wont-say-hacked-dark-web-isis-site-nit">No details</a>, though:</p>
<blockquote>
<p>According to the complaint against him, Al-Azhari allegedly visited a dark web site that hosts &#8220;unofficial propaganda and photographs related to ISIS&#8221; multiple times on May 14, 2019. In virtue of being a dark web site&#8212;­that is, one hosted on the Tor anonymity network&#8212;­it should have been difficult for the site owner’s or a third party to determine the real IP address of any of the site’s visitors.</p>
<p>Yet, that’s exactly what the FBI did. It found Al-Azhari allegedly visited the site from an IP address associated with Al-Azhari’s grandmother’s house in Riverside, California. The FBI also found what specific pages Al-Azhari visited, including a section on donating Bitcoin; another focused on military operations conducted by ISIS fighters in Iraq, Syria, and Nigeria; and another page that provided links to material from ISIS’s media arm. Without the FBI deploying some form of surveillance technique, or Al-Azhari using another method to visit the site which exposed their IP address, this should not have been possible.</p>
</blockquote>
<p>There are lots of ways to de-anonymize Tor users. Someone at the NSA gave a <a href="https://www.theguardian.com/world/interactive/2013/oct/04/tor-stinks-nsa-presentation-document">presentation</a> on this ten years ago. (I <a href="https://www.theguardian.com/world/2013/oct/04/tor-attacks-nsa-users-online-anonymity">wrote about it</a> for the <i>Guardian</i> in 2013, an essay that reads so dated in light of what we&#8217;ve learned since then.) It&#8217;s unlikely that the FBI uses the same sorts of broad surveillance techniques that the NSA does, but it&#8217;s certainly possible that the NSA did the surveillance and passed the information to the FBI.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Hacked Cellebrite and MSAB Software Released</title>
		<link>https://www.newenglandsp.com/2023/01/hacked-cellebrite-and-msab-software-released/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=hacked-cellebrite-and-msab-software-released</link>
		
		<dc:creator><![CDATA[Ed Gardner]]></dc:creator>
		<pubDate>Mon, 16 Jan 2023 12:14:13 +0000</pubDate>
				<category><![CDATA[Welcome]]></category>
		<guid isPermaLink="false">https://www.schneier.com/?p=66566</guid>

					<description><![CDATA[Cellebrite is an cyberweapons arms manufacturer that sells smartphone forensic software to governments around the world. MSAB is a Swedish company that does the same thing. Someone has released software and documentation from both companies.
]]></description>
										<content:encoded><![CDATA[<p><a href="https://cellebrite.com/en/home/">Cellebrite</a> is an cyberweapons arms manufacturer that sells smartphone forensic software to governments around the world. <a href="https://www.msab.com/">MSAB</a> is a Swedish company that does the same thing. <a href="https://ddosecrets.substack.com/p/cellebrite-msab-phone-forensics-leak">Someone</a> <a href="https://boards.4chan.org/pol/thread/412110904">has</a> <a href="https://archive.ph/OEI3g">released</a> software and documentation from both companies.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Threats of Machine-Generated Text</title>
		<link>https://www.newenglandsp.com/2023/01/threats-of-machine-generated-text/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=threats-of-machine-generated-text</link>
		
		<dc:creator><![CDATA[Ed Gardner]]></dc:creator>
		<pubDate>Fri, 13 Jan 2023 12:13:13 +0000</pubDate>
				<category><![CDATA[Welcome]]></category>
		<guid isPermaLink="false">https://www.schneier.com/?p=66495</guid>

					<description><![CDATA[<p>With the release of ChatGPT, I’ve read many random articles about this or that threat from the technology.  This <a href="https://arxiv.org/pdf/2210.07321.pdf">paper</a> is a good survey of the field: what the threats are, how we might detect machine-generated text, directions for future research. It’s a solid grounding amongst all of the hype.</p>
<blockquote><p>Machine Generated Text: A Comprehensive Survey of Threat Models and Detection Methods</p>
<p><b>Abstract:</b> Advances in natural language generation (NLG) have resulted in machine generated text that is increasingly difficult to distinguish from human authored text. Powerful open-source models are freely available, and user-friendly tools democratizing access to generative models are proliferating. The great potential of state-of-the-art NLG systems is tempered by the multitude of avenues for abuse. Detection of machine generated text is a key countermeasure for reducing abuse of NLG models, with significant technical challenges and numerous open problems. We provide a survey that includes both 1) an extensive analysis of threat models posed by contemporary NLG systems, and 2) the most complete review of machine generated text detection methods to date. This survey places machine generated text within its cybersecurity and social context, and provides strong guidance for future work addressing the most critical threat models, and ensuring detection systems themselves demonstrate trustworthiness through fairness, robustness, and  accountability...</p></blockquote>]]></description>
										<content:encoded><![CDATA[<p>With the release of ChatGPT, I&#8217;ve read many random articles about this or that threat from the technology.  This <a href="https://arxiv.org/pdf/2210.07321.pdf">paper</a> is a good survey of the field: what the threats are, how we might detect machine-generated text, directions for future research. It&#8217;s a solid grounding amongst all of the hype.</p>
<blockquote>
<p>Machine Generated Text: A Comprehensive Survey of Threat Models and Detection Methods</p>
<p><b>Abstract:</b> Advances in natural language generation (NLG) have resulted in machine generated text that is increasingly difficult to distinguish from human authored text. Powerful open-source models are freely available, and user-friendly tools democratizing access to generative models are proliferating. The great potential of state-of-the-art NLG systems is tempered by the multitude of avenues for abuse. Detection of machine generated text is a key countermeasure for reducing abuse of NLG models, with significant technical challenges and numerous open problems. We provide a survey that includes both 1) an extensive analysis of threat models posed by contemporary NLG systems, and 2) the most complete review of machine generated text detection methods to date. This survey places machine generated text within its cybersecurity and social context, and provides strong guidance for future work addressing the most critical threat models, and ensuring detection systems themselves demonstrate trustworthiness through fairness, robustness, and  accountability.</p>
</blockquote>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
