Cargo Security Blunders
Cargo Security Blunders
630-252-6168 [email protected]
http://www.ne.anl.gov/capabilities/vat
Argonne National Laboratory
3 sq miles, ~3200 employees, $630+ million annual budget
R&D and technical assistance for government & industry
Vulnerability Assessment Team (VAT)
Sponsors
• DHS
A multi-disciplinary team of physicists,
engineers, hackers, & social scientists. • DoD
• DOS
• IAEA
• Euratom
The VAT has done • DOE/NNSA
vulnerability assessments on • private companies
hundreds of physical security • intelligence agencies
devices, systems, & programs.
• public interest organizations
Realities of Cargo Security Technology 1
There are three kinds of men. The one that learns by reading. The few who learn
by observation. The rest of them have to pee on the electric fence for themselves.
-- Will Rogers (1879 - 1935)
Seal Realities
4. A seal must be inspected, either manually or with an automated
reader, to learn anything about tampering or intrusion. The person
doing this must know exactly what they are looking for.
5. Unlike locks & safes, defeating seals is more about fooling people
& the use protocol than beating hardware.
• And how the seal data and reader are stored & protected and
• How the seal installers/inspectors are trained.
Seal Realities
• “tamper-resistant” seal
• security seal vs. indicative seal
• “high security” seal (e.g. ISO 17712)
10. You must watch out for the wrong seal getting installed, or for the
seal or door not being fully closed!
14. Just because the seal reader is happy does not mean the seal
inspector should be happy.
Seal Realities
15. Both during seal installation & seal inspection: The door, hasp,
locking mechanism, and container must be carefully inspected.
16. Don’t write the seal serial number on the truck or railcar!
17. Truck drivers should not inspect the seal or carry the seal
paperwork.
19. Protect seals (and seal parts) both prior to use and after
removal.
21. The correct serial number is not enough. The seal must be
carefully inspected. Watch out for the correct serial number, but the
wrong kind of seal!
22. The way they are typically used, adhesive label seals are
Security Theater.
29. Both the seal data (e.g., serial numbers) and the seal reader
(if there is one) must be constantly protected.
Inventory
! Counting and locating stuff
! No nefarious adversary
! May detect innocent errors by insiders, but not
surreptitious attacks by insiders or outsiders.
Security
! Meant to counter nefarious adversaries (insiders and
outsiders)
! Watch out for mission creep: inventory systems
that come to be viewed as security systems!
Inventory vs. Security Misconceptions
We disagree.
Examples of Confusing Inventory & Security
• rf transponders (RFIDs)
• GPS
RFID Skimmers, Sniffers, Spoofers, and Cloners; oh my! Documents, code, plans needed to build your own: free.
<:,5,+1&+(+:'=,+;(4=,5+-.+3'&-.7,5&+'&14=+-:1&+>?@ABC+-,3:4.).=*D+16+-:,*+;.4E-+-:14F+(G.'-+&,3'51-*H+
+ + + +++ ++++++++++II++J'F(&+K5'49();++>35,(-.5+.6+?@B'78C
Spoofing Civilian GPS Receivers
LMM+78:N
8,==,;+&1=4()+
&-5,4=-:
GPS Spoofing
Some Potential GPS Spoofing Attacks
• Interfere with military logistics (DoD uses civilian GPS for cargo)
• Interfere with battlefield soldiers using civilian GPS (against policy, but
common practice anyway)
• Spoof GPS ankle bracelets used by courts and GPS data loggers used for
counter-intelligence
GPS Satellite
Tracking Information Sent to HQ
(perhaps encrypted/authenticated)
GPS
Signal
(vulnerable here)
!"#$%&'(")(*$#+(,--#.-+)*D+QMQRIQMS#+>SMM$C+
Selected VAT Security & Human Factors Publications
RG Johnston, “Countermeasures to Perceptual Blindness”, Proceedings of the INMM (2010).
EG Bitzer and A Hoffman, "Psychology in the Study of Physical Security", Journal of Physical
Security 2, 1-18 (2007).
EG Bitzer, “Strategies for Cutting Turnover”, Security Management 50, 88-94 (2006).
EG Bitzer and RG Johnston, “Turnkey Turnaround Solutions: Exploiting the Powerful Tools of
I/O Psychology”, Los Alamos National Laboratory Report LAUR-05-1130, (2005).
RG Johnston, JS Warner, ARE Garcia, et al., "Nuclear Safeguards and Security: We Can Do
Better", Paper 1009, Proceedings of the 10th International Conference on Environmental
Remediation and Radioactive Waste Management, September 4-8, 2005, Glasgow, Scotland.
EG Bitzer and RG Johnston, "A Taxonomy for Security Assignments", J Security Administration
26, 1-11 (2003).
Access Control (AC), Including Biometrics
$ Increases complexity
$ Leads to complacency
I watch a lot of game shows and I’ve come to realize that the people with the
answers come and go, but the man who asks the questions has a permanent job.!
-- Gracie Allen (1895? – 1964)
Vulnerability Assessment (VA) Myths
http://www.ne.anl.gov/capabilities/vat