
Tough luck if you’re taking an expensive laptop with you on a trip from Europe to the States, and wouldn’t dream of checking it into the airplane’s hold. You might have to stay at home.
The Daily Beast reports that the United States intends to extend its laptop ban to cover any flight coming from Europe.
“Acting on fears that terrorists can build bombs into laptops, Homeland Security has decided to expand the ban it imposed on Middle Eastern flights. Computers will now be checked as baggage.”
This feels like pure security theatre to me.
Imagine your laptop was a bomb. Is it any less dangerous in the hold than it is in the cabin?
I don’t think so. In fact, if something caught fire in the hold it’s likely that it would be a far more serious problem than it ignited somewhere people might actually notice and be able to take action against it!
And don’t try to tell me that something checked into the hold goes through tighter security screening than the items a passenger carries onboard themselves. If that’s the case then *why* isn’t the same screening being done for the cabin?
If you put your thinking cap on, it’s not hard to determine that checking your laptop into the hold…
- …increases the chances of it being stolen.
- …increases the chances of it being handled roughly or damaged. Which, by the way, might be pretty bad news for any item containing a temperamental Li-ion battery.
- …increases its chance of not turning up at the other end, but instead being sent to Athens airport instead.
Oh, and I guess that a laptop checked into the hold also increases the chances of some nefarious intelligence agency tampering with it en route – perhaps to steal information or to plant some spyware.
But hey, forget that. After all, this has little to do with real security.
In March we tackled the earlier ban on carrying electronic devices on some Middle Eastern and African flights to the United States and UK in our “Smashing Security” podcast. Check it out below.
Show full transcript ▼
This transcript was generated automatically, probably contains mistakes, and has not been manually verified.
They've got machine learning technology. They're analyzing the open and the dark web, offering great insight into emerging threats.
Sign up to Recorded Future's newsletter and you will get those latest insights in your inbox every morning, scaring away the nightmares. Go to recordedfuture.com/intel.
Sorted with a Deadly Tweet with Carole Theriault and Graham Cluley.
Hello, hello everybody, and welcome to Smashing Security episode 13, where we'll be discussing all the interesting things which have been happening in the world of computer security in the last 7 days.
And as ever, I am joined by my good buddy Carole. Hello, Carole.
Yes, we have dragged in a veteran of the computer security industry who's held senior positions at a long list of technology companies for many, many decades, including the likes of Malwarebytes, which I'm sure many listeners have heard of.
It is Mr. Alex Eckelberry. Hello, Alex.
I'm glad things have been going great for you because I was just going to ask, how have things been for you since our last podcast?
Well, if you remember, last time we chatted, I was out in Kuwait doing a little gig. And I'd spotted bother on the way home, which actually caught the attention of the media.
And I thought, should I just—
So, the question on everybody's lips is, is Graham Cluley a Nazi?
And the reason why you might be asking that is because my Twitter account posted some Nazi propaganda last week, which was pretty embarrassing for me, to be honest, although I wasn't aware initially that it occurred because I was actually flying from Kuwait to Dubai Airport.
And the first I knew of it was I got off the plane. The first thing anybody does, right, when they get off a plane is they turn on their smartphone.
And I got this message from a journalist I know at the Financial Times saying, "Would you like to comment about your Twitter account?" And I'm like, "Why does the FT want to know about my Twitter account?" Then I got another one from another British journalist saying, "What's going on with your Twitter account?" I thought, "Oh my word." So I had a look and I'd seen that it posted this message.
Now at first I thought, "Oh crikey, has my Twitter password been grabbed somehow?" But you know, I've got two-step verification enabled on my Twitter account.
So even if they got my password, right, you followed all our advice. Yeah, even if they've got my password, they shouldn't be able to get in.
But I thought maybe I'd connected to the Wi-Fi or something, you know, who knows what happened. But anyway, fortunately, it turned out that it wasn't just me had been affected.
There were hundreds of Twitter accounts which had posted the same message.
And what they all had in common was that they had connected to their Twitter account, a third-party service called TwitterCounter. And TwitterCounter had been hacked.
So you can see, and you know, I had connected this to my Twitter account, I think about three years ago or something.
The reason why it wants write access is so it can, if you want it to, tweet out, hey, I've used TwitterCounter and it found out that I've got this many followers, whatever, you know.
And I've obviously never allowed it to do that because that would be stupid. But it just sat there lurking. And then of course, it posted this Nazi message.
And all the journalists, of course, I don't blame them. What a great story. So-called security expert has his account pwned.
So they never got my password, but they did manage to post some Nazi spam from my account, which obviously I deleted. And I revoked TwitterCounter's access to my account.
And if it's a vanity app and not an app that you absolutely need, think twice before hooking it up to one of your lifelines online.
And I'm signing in and guess what? It could not connect to Twitter. So now I'm really nervous.
I think they decided they just— they didn't need to pull the plug, basically, because they clearly have a problem.
Turns out they were actually hacked round about 4 or 5 months ago as well. And that affected less accounts. And I wish really that I'd acted then because I should have done.
It can happen to any of us.
And, you know, often I don't think we think enough about that. And then if we stop using it, we don't disconnect them.
So if you're installing, for instance, an Android flashlight application, here's a classic example, it doesn't need access to your contacts and your address list, doesn't need to know where you are in the world.
If it's asking for things like that, chances are it's trying to monetise you in some fashion by displaying adverts, for instance.
And so we all do need to be very careful about these things.
I certainly, certainly 3 or 4 years ago when I attached TwitterCounter to my Twitter account, I thought it was a legitimate service.
I still believe it was meant to be a legitimate service. Unfortunately, they were a bit rubbish at security, and as a result, it was my name which was pulled through the mud.
I'm sorry, that's, that's, I think that's the White House calling me about my new cybersecurity job as cybersecurity czar, which—
Because, you know, they have something like 17,000 positions open. And just apply to become the cybersecurity czar as a gag.
Then I thought, well, then for the rest of my life I will be associated as Trump's cybersecurity czar. Probably not good positioning, but I thought it'd be just a gag.
Anyway, yeah, so I apologise for my phone ringing in the background, but we have very important things that go on here at my home office.
People calling me constantly with offers for my lawn service and other things, which great relevancy to this podcast.
There is a Newsweek political journalist, his name is Kurt Eichenwald, and he appears on the news from time to time, and he appeared actually on Fox News.
He's claimed in the past that the then president-elect Donald Trump, friend of the show, had spent some time in a mental institution. I don't know if that's true or not.
But anyway, he went on Fox News and he was discussing this, and it was a fairly rambunctious conversation which he was having with the anchorman on Fox News.
And it obviously riled up some of the audience.
And what happened was one of the viewers tweeted the journalist, Kurt Eichenwald, and they sent him an animated GIF, an animated GIF of a strobing light alongside a message which said, "You deserve a seizure for your posts."
And this week, agents in Maryland have arrested a 29-year-old who's thought to have sent the tweet.
And the guy they've arrested, they believe he sent a number of other messages to Twitter users, sort of direct messages saying, "Hey, I hope this sends him into a seizure." And, "I spammed this out.
Let's see if he dies." And, "I know he has epilepsy." In fact, the police went into his iCloud account, and they claim that they found a screenshot of the victim's Wikipedia page showing a fake obituary with his date of death being the one when the tweet was sent.
And also screenshots from epilepsy.com.
We could even include a link to the actual interview in question, which happened on this day, which maybe spurred this particular attack.
But clearly, he's not going to be on Donald Trump's Christmas card list. Let's put it that way. And his supporters, as we know, want to defend the commander-in-chief.
And some of them may well take things into their own hands, which clearly is the wrong thing to do.
I mean, I'm lucky enough I don't suffer from epilepsy, but I've never really considered before that, of course, you could have an attack from an animated GIF.
In fact, in 2008, the Epilepsy Foundation's website was defaced by hackers who planted rapidly flashing images on the site, which were then displayed to site visitors.
It's real sort of 4chan activity, isn't it? It's a real sort of troll-like thing to do. But this sort of thing happens.
And since the attack happened on Eichenwald, more than 40 other people sent strobing images to his Twitter account, knowing that they could trigger seizures.
And the details of those he's passed on to the FBI and told people obviously that they may well be investigated as well. So what should be done about this? That's what I'm wondering.
What can be done?
I mean, we're trying to, you know, maybe responsible and people do have this issue, but are we going to start getting too politically correct if we start to filter GIFs on Twitter?
You know, you will find yourself in a situation where there might be strobing lights.
You're watching television, and quite often these days you will be warned if there's a lot of flashlight photography or if there are images.
They will tell you before that part of the program is shown.
I did find out that in some browsers, Firefox for instance and Internet Explorer, though disappointingly not Microsoft Edge or Chrome as far as I could see, you can turn off image animation, which I believe will prevent the animated GIF from working.
There's even an option inside Twitter.
If you go into settings, you can go to your account section, scroll down to content and uncheck video autoplay, which will also, I believe, prevent animated GIFs from happening as well.
I can't even believe I actually said that. Look, I mean, the internet will fail if we don't allow animated GIFs. I mean, I use animated GIFs all the time.
It's gonna collapse the internet. The internet will be over.
But it does seem to have been the accepted wisdom now that it's a GIF. I think you're deliberately being a bit of a hipster and a fogey, aren't you?
You know, don't send images like this deliberately designed to cause seizures.
It's just, it's really surprising and kind of, I don't know, I don't understand it at all.
And I think that, you know, but we do have to take a reasonable approach.
I'm very empathetic and sympathetic to those who suffer from this disorder, but, you know, they can turn these images off or turn the animated graphical interchange format files off.
See, are you happy with that?
So a company that I know of, actually one of our neighbors in our building, who was in a total panic because they'd gotten some ransomware.
And now fortunately it didn't infect— it only infected one server, but the fact that the ransomware got in there was pretty disturbing.
Of course, a lot of this comes through social engineering. It comes through an email, click here. Now, when you look at the problem of phishing, we go, okay, well, phishing's bad.
But actually, you know, we don't talk about the fact that the biggest problem in security is 3 inches back of the forehead. It is the problem of 3 inches.
And I remember a stat years ago, you know, 80% of all malware attacks occur because of social engineering.
You're not going to be able to go in and do a dictionary attack where you just keep throwing different passwords at Gmail. It won't let you.
What you're going to have to do if you wanted to grab someone's Gmail account, for example, or do something nefarious, is you're going to want to get control of that account.
And the only way to really get control of that account is by social engineering. You know, we saw this happen last year with John Podesta, who was the advisor to Hillary Clinton.
And, you know, he got an email that said, hey, you know, you need to reset your password. Well, he ended up by clicking that, and it was a very, very convincing email.
I mean, I saw it, and many of us would probably be fooled, although I'm extremely cautious about this stuff.
But the normal person, John Podesta, not a cybersecurity expert, clicked on the link, reset his password, and immediately gave control of that Gmail box to the hackers.
We presume those hackers are Russians, and there went all that data to WikiLeaks.
And of course, we have this recent news item where a single spear phishing click caused this massive Yahoo data breach.
This stuff is serious, and I think that the security awareness training field, of which I admit that I have a bit of a bias, I'm on the board of one of the security awareness training companies, but I'm not talking about this company, I'm talking about the general field in general.
When I see the statistics of how many people click on these emails, you know, security awareness training companies send out fake emails to employees.
They're run by the IT department. They click on these emails. I think you've had even a sponsor on previously that was doing this. It's a great service.
They click on these emails and then they get a little training video or some sort of message that, hey, you clicked on something bad and here's why you shouldn't do that.
And I've seen numbers into the teens, 12, 14, 15% of the employees will click on these things, but after they run these campaigns for a while, the number goes dramatically down.
I'm a huge fan of this. We actually did it internally at my company that I'm at now, and it was fantastic.
I had an employee come up to me and say, "You know, now I really understand why I shouldn't click on these links." But the average person doesn't.
I'm sure the subscribers of these podcasts do, but the rest of the world doesn't.
It's not going to involve zero-day vulnerabilities. It's not going to be all that really nerdy stuff.
The way in which the attacker is going to get your password is simply by asking for it. And if they use the right social engineering, they will trick someone.
Just, I'm just going to check on something.
I mean, okay, there's the obvious: enlarge your body parts, or click on this bank link, or come to Nigeria, or whatever. Those are the obvious ones.
But the not-so-obvious ones are, hey, this is Jill from accounting, can you update your payroll records? And those are the ones that scare the bejesus out of them.
Where, you know, they may have details about you, they may know where you live, they may know what your job role is inside the company.
And so they can forge the email to look so convincing.
So, you know, and it's hard to tell people how to avoid them because they are so sneaky.
I even know of a security company, the CEO got an email from the CFO saying, hey, can you go ahead and approve this bank wire.
That was a spoofed address, meaning they put the person's name.
So, you can go to LinkedIn, you can go to any company and find out who the CFO is and who the CEO is, and you just get that name and you spoof it.
Because the mail transfer protocol service, SMTP, allows spoofing. It's trivial. And then you can just send that email as the CFO. I'm not divulging any great secret here.
Any hacker knows these tricks. And the point is, email back or email the person and say, did you send this?
Maybe there's a 1 instead of an L or something that, so it's hard to tell the difference in the font.
If you phone them, especially if it's an unusual request, then you can perhaps confirm whether it is them or not.
Because, and the other possibility, of course, is that their real email account may have been hacked. So that's why I'm saying maybe phoning is a good idea too.
So even if hackers do ever manage to get your passwords, they will be more limited as to the damage which they can do with it.
And I sit on the board with a fellow by the name of Kevin Mitnick, who— he's terrifying to be in a board meeting with.
I mean, I will be in the board meeting, I'll lean over to my laptop, and I'll start to type something, and then he seems to perk up, and I'm always very nervous because is he running Wireshark on the network?
But the physical security stuff, and let's just start with a simple thing.
There's a USB drive out now, I'm sorry, a USB stick, that will overload the capacitors in the machine and kill the machine.
So you've probably heard this story, you may have even covered it before.
And it's unfortunately common, of course, these studies have been done, I mean, they were done quite a while ago, but where, you know, some researchers would just go ahead and throw a bunch of USB sticks out in a parking lot and people pick them up and they grab them.
Well, that could have malware in it, it could have all kinds of junk, or it could have something that blows the capacitors and destroys your machine.
There's tricks to— all kinds of physical access tricks that can be used.
So, you know, it's just— it's not to— again, I don't want to scare people, and I always hate the fact that in security we end up scaring people to death because the world is actually generally safe out there, and security has gotten a lot better.
But just a bit of education goes a tremendously long way, and it's just general caution.
I think we're not trying to scare, we're trying to raise awareness and educate about these threats, because actually the internet and computers bring us so much, so much positive stuff, and we want people to be able to use them in a positive way and to make their companies more successful as a result.
So we have to be aware of some of these threats.
So don't have nightmares, but be aware that some of these things go on and just be a little bit cynical and questioning sometimes, I think is a good piece of advice as well.
Okay, Carole, what have you got for us?
They've just announced an in-cabin ban on laptops and tablets on direct flights to the UK from named countries, or actually, namely Turkey, Lebanon, Jordan, Egypt, Tunisia, and Saudi Arabia.
The concern that's cited is that bombs could be hidden in a series of these devices, in some of these devices.
And Downing Street has said it's necessary, effective, and proportionate, quote unquote.
So this basically says to me what the government's saying, that is that we have a huge reason to be doing this and causing this disruption, but we can't tell you what it is.
And I guess it comes down to whether you trust government or not as to what's going on.
So BA, EasyJet, Monarch, Thomas Cook, all those, they're impacted by this. So if they're having any direct flights from these countries to the UK, this ban is going to be in effect.
The US, however, have only named targeted airlines that operate from the affected countries as opposed to US-based carriers. What's affected? So smartphones are still allowed, right?
So travelers can travel with things as small as smartphones, game consoles, and DVD players. Seem to be okay.
But there's a big red X for devices like phablets, readers, tablets, laptops. And they're saying they have to go into the hold, right? So this raises the whole concern.
And the reason is, remember, we were talking about bombs. So this leads me to ask, don't bombs often go off remotely?
You know, they'll be able to work out how high they are in the air and then trigger. And so being in the hold would, for instance, I imagine, just work just as successfully.
Or if a fire ignited in the hold, that's going to be kind of difficult to deal with, isn't it?
I think normally on a passenger aeroplane, people in the cabin can't gain access to the hold, can they?
So there's a weird, weird situation here.
And, you know, if people have gone to Israel and gone through the security procedures at the Israeli airports, they really see security in action.
Because the security forces in Israel are looking for patterns, behavior, intelligence. They're doing a lot more than just randomly pulling out people's water bottles and laptops.
I mean, I really begin to wonder, and you know, the failures of security have tended to be, at least for physical airport security, have tended to be intelligence failures.
And I believe there have been incidents in the past where they've discovered sort of hard-to-detect explosives hidden inside electronic devices, which haven't been picked up.
So they've got this intelligence, maybe they're worried that the security arrangements in some countries' airports are not sufficient.
So it's not being in Israel, for instance, where they take security really darn seriously.
And so they're worried that because of lax security, people might get on board those planes and might be carrying these things. I get all that. I kind of understand all that.
What worries me is the logic of, but it's all right to put it in the hold.
Because it'll be thrown around and, you know, treated luggage gets treated.
So now you have to check it in and you can't work on the plane whilst you're getting there. So there's going to be disruption that is going to impact everybody.
What if people, for example, don't go— you know how you go through airport security, you dump your luggage off to go into the hold, and then you go through airport security and they go, oh, you have a laptop, you can't bring that on the plane.
What do you do? Do you just throw it away like a water bottle? What's the procedure for that? So there's going to be a lot of confusion.
So leave more time for travel if you're going to these countries or coming from those countries in the near future, which you always would anyway.
There will be some bigwig who has a beloved smart device which he refuses to put into the hold because he needs to play solitaire or whatever it is on his flight.
And so he said, well, if it's any bigger than this. Well, I tell you, you've done these long flights.
Because you know what it can be like for parents with children on a long flight. And the only thing you can do is give them the opium of the iPad to entertain them.
And they are going to be going feral on the planes.
It's going to be like The Walking Dead. Who was talking about fear, uncertainty, and doubt? There you go.
Well, thank you very much, Carole, and thank you as well, Alex, for joining us today on today's Smashing Security. We really appreciate it. Thank you for spending time with us.
We hope you won't be a stranger. You'll come again soon.
You can listen to us on all kinds of different podcast services, including now iHeartRadio as well. So check us out and subscribe.
And who knows, they might even help you with nightmares on vampire cats.
We are @SmashingSecurity, that's smashin without a G security. And until next time, bye bye. Toodaloo.

Grant Theft Laptop
What is next, your 2th limb needs a 2th location..
never forget the dangers of breastimplants, remove now!
secure all shoelaces.. they might entangle reality..
and all of us into tight nuts
Or you start connecting though Toronto or Montreal. This crap stinks of security theater.
If they ban laptops on flights to the US then either this ban will spread to other international flights or passengers will need to be segregated for the entire journey between the security scan and the plane. It isn't sufficient to prohibit laptops from passengers with US boarding cards because a passenger with a European boarding card could pass the security check then hand a laptop to a different passenger.
A comprehensive ban would be more disruptive on short-haul flights because business travellers often take a day trip with only hand luggage.
I think if I was forced to put the device in my checked baggage, I would see how easy it is to remove the hard drive and carry that with me. Would not be happy if the device is stolen but at least I have my data.
actually if you think about it, it more likely they will just remove the laptop(s) for easy access to copy or insert maleware or other measures and not say anything
I look forward to the day when DHS requires that all passengers strip completely when checking in and fly naked to and from the U.S. Of course, they will also not be allowed to carry on any objects, food, pills, etc. whatsoever. Oh, and it will be necessary for all passngers to submit to cavity searches before boarding. Stupid as this sounds, it would fit right in to the mind set of the DHS turkeys who believe that perfect security is attainable, and, of course, the sheeple who fly would just sigh and go along with it.
As Mark points out above, this will be impossible o enforce without either a blanket ban on all international travellers or some sort of "laptop free" zone being set up for US-bound travellers separate from other destinations. That seems unworkable (at least in the short term) so it may mean that any terminal with US departures will have to ban all laptops in carry-ons.
I suppose non-US travellers could "check" their laptop bags at Security and have them returned at boarding (the way the US does duty-free so that killer alcohol doesn't fall into the wrong hands). They'd probably only lose or break a few laptops a day…
As far as your own data security goes, it looks like a Chromebook-style "dumb terminal" laptop may be the way to go. With flash storage capacity so large and cheap, encrypted personal files and apps can be carried on a USB stick or – even more secure from border guards – encrypted and kept on remote storage. (Although this also makes access possible by other remote users).
Who do you fear more – the $15/hr jobsworth Homeland Insecurity thug or the NSA snoopers?