National Post (National Edition)

Feds saying little about flaw in Wi-Fi security

- National Post sxthomson@postmedia.com Twitter.com/stuartxtho­mson National Post tblackwell@nationalpo­st.com Twitter.com/Tomblackwe­llNP

MONITORING ISSUE

shows that if someone who’s talented puts their mind to it, (Wi-Fi) is vulnerable,” said Christian Leuprecht, a political-science professor at Queen’s University and Royal Military College, who has studied cybersecur­ity issues.

Shared Services, the government department responsibl­e for IT, wouldn’t confirm if it was aware of the flaw or if the government has been affected.

The department emailed a statement through a spokespers­on saying it “remains vigilant in monitoring any potential threats and has robust security measures in place to address them.”

More than 8,000 wireless access points are in use by federal employees.

The tech website Ars Technica wrote that “the vulnerabil­ity is likely to pose the biggest threat to large corporate and government Wi-Fi networks.”

The Communicat­ions Security Establishm­ent, the national cryptologi­c agency, said it was not aware of any reported exploitati­on of the Shared Services, the federal government department responsibl­e for its IT, wouldn’t confirm if it was aware of the Wi-Fi flaw or if the government has been affected. vulnerabil­ity and stressed to government department­s that applying relevant patches “as soon as they are made available by vendors is key to protecting networks from vulnerabil­ities.”

Since the flaw could affect nearly every Wi-Fi-enabled device in the world, there’s almost no limit to what can be affected.

Android and Linux devices are particular­ly susceptibl­e to the KRACK issue, with Windows and iOS devices less so.

David Skillicorn, a professor at the Queen’s University School of Computing, said a likelier target than government Wi-Fi networks could be the home networks of high-level officials government.

If someone who works with sensitive informatio­n works from home using their Wi-Fi network it could be vulnerable if the router hasn’t been patched.

Data travelling from the person’s phone or PC could be intercepte­d by hackers.

One mitigating factor is that an attacker would have to actually be in the area — or control a device in the area — which limits their ability to exploit this security flaw.

Still, the vexing thing about the KRACK exploit is that it leaves secure networks vulnerable, so the people who went to the in the trouble of password-protecting their home networks are the ones affected.

In the wake of security problems like this and recent high-profile hacking incidents, there has been a move to more secure websites across the internet.

More than half the web now uses HTTPS, rather than its insecure cousin HTTP, to communicat­e web data to users.

Some sections of the government’s website still use the old, non-secure standard.

For example, a page on the government’s website where users can request a status update on document authentica­tion is an unsecured HTTP website.

Informatio­n from the Chrome web browser says the site is not secure and that users “should not enter any sensitive informatio­n on this site (for example, passwords or credit cards), because it could be stolen by attackers.”

The form asks for a user’s full name, telephone number, and complete address.

The United States government has adopted a protocol that requires secure servers across all government websites.

The Treasury Board has plans for a “HTTPS everywhere” standard that is currently being implemente­d.

“Of course it’s a problem. These are reasonably straightfo­rward things we should be doing. This is not rocket science, it’s a simple way of making sure all your communicat­ion is secure,” said Leuprecht.

A website explaining the U.S government policy makes a strong case for HTTPS.

“Today, there is no such thing as non-sensitive web traffic, and public services should not depend on the benevolenc­e of network operators,” it reads.

Most affected manufactur­ers have been rolling out patches so the best defence against this, and any other, exploit is to update your devices frequently.

Or to be really safe but a little less mobile, use an ethernet cable to connect to your router, rather than connecting to the Wi-Fi. a “few” animals are still being used in high-level training, though the military is studying alternativ­es that might prove as beneficial.

“This training has saved soldiers’ lives,” she said. “We conduct this training in as humane a way as possible. There is an individual that must be present throughout the training, whose only responsibi­lity is to ensure the animal does not suffer.”

Pigs are kept under anesthetic­s during “surgical wounding” and treatment, then euthanized, according to Tien’s paper.

Pippin said the alternativ­es — computeriz­ed simulators that try to duplicate the effects of injury — have developed rapidly since the end of Canada’s Afghan mission.

They include “strategic operations cut suits” that are worn by real people who can act out the movements and reaction of a wounded person, and “operative experience” mannequins that are so realistic, a blood-like substance spurts out when a limb is severed, he said.

The new study notes Canadian Forces medics trained solely on simulators until January, 2007, when York-Landrace pigs were introduced, with trainees first working on the live hogs in an operating room, then in simulated combat conditions.

Medics are taught how to stop heavy bleeding; treat airway blockages by cricothyro­tomy — cutting a hole in the throat; and to relieve tension pneumothor­aces — potentiall­y deadly buildups of air around the lungs — by puncturing the chest with a special needle.

Of the 38 medics who responded to the survey, 88 per cent had performed life-saving procedures on troops in Afghanista­n, most more than five times.

About 90 per cent of those who had been deployed both before and after the pigs were introduced said the change was valuable and urged that it be maintained.

 ??  ??

Newspapers in English

Newspapers from Canada