Attacks by kids on telecoms networks in the early 20th century

I spotted the following old sign whilst in Fowey, Cornwall the other week in the window of a Bed and Breakfast along with some other old telecoms stuff. I’d not seen it before and was intrigued to know the story behind it.

From my brief internet research, I uncovered some nice stories that helped me to understand why the signs were put in place. This discussion about Tiree (an island off Scotland) and some memories of Ballinasloe in Ireland by Declan Burke help to explain:

“Angus MacKechnie of Crossapol was recorded talking to Maggie Campbell of Kilmoluaig in October 2005 about his schooldays. He was strapped at school, deservedly so according to himself, for breaking the ceramic insulators on the telegraph poles on the road to Heylipol School.

This was a popular sport amongst schoolchildren, in Ruaig as well as Heylipol, and required accuracy in throwing stones. A boy’s reputation depended upon success, especially if the girls, who were guilty of the same activity, scored a direct hit.”

And:

 

“The Red Bridge had the salubrious effect with the railway embankment providing a wind-break so we could sunbathe. I always thought the suntan obtained at northern latitudes lasted a lot longer and looked better than that acquired in southerly climes. You could even get sunburn there.
Sometimes.
Amazingly, the Railway people were very tolerant of our use of their property, and sadly there was always some bastard who would abuse that trust. The ceramic insulators on the telephone poles were a very tempting target and these delinquents would destroy them with stone-throwing as casually as they would flick a cigarette butt away.
Then, ‘the man’ would shut off our access for a while, and who could blame him?”

 

Connected Earth gives some more explanation:

“These notices were screwed into telegraph poles to warn off potential vandals. The porcelain insulators holding the wires at the top of the poles were fragile and needed rapid and costly replacement. In areas where they were particularly vulnerable they could be replaced with more robust rubber ones.”

So, an interesting story of how telecoms networks used to be attacked by kids, even if it was just for target practice. Connected Earth states that the signs were in use from the 1910s through until the 1950s. Leave a comment if you know anything more about the story behind these signs!

New stuff and a shop…

So I’ve made a few changes this evening on the blog. You’ll notice a few links above which you can peruse (and there are more to come) and of course, as promised I’m selling the “it’s not f**king phone hacking” t-shirts through the official mobilephonesecurity.org shop. There’ll be more in there soon, but why not treat yourself to a default PIN #hackgate mug? It’s as easy as 1,2,3… (actually I won’t go there).

Blackhat & DEFCON19 – mobile presentations

With the main sessions of Blackhat starting tomorrow morning (Las Vegas time), I’ve posted the mobile-related talks here for those who are interested.

The mobile hacking training course which took place today (I think) was sold out. What has interested me the most is the increase in interest from the security and hacking community in all types of mobile platforms. As you’ll see below, there are really quite a few presentations focussed on mobile. Also, as smartphones become more advanced, a lot of the other presentations not listed here become relevant (for example web application security). I just want to highlight two of the presentations: ‘Aerial Cyber Apocalypse’ which will demonstrate a UAV equipped with WiFi and GSM hacking capabilities (see the picture below) and ‘War Texting: Identifying and Interacting with Devices on the Telephone Network’ which shows attacks on car systems which use SMS to remote control the car. Fun in the sun.

From: http://www.geek.com/articles/geek-pick/wasp-the-linux-powered-flying-spy-drone-that-cracks-wi-fi-gsm-netwokrs-20110729/

Blackhat USA 2011 (Briefings 3-4th August)
Schedule: https://www.blackhat.com/html/bh-us-11/bh-us-11-schedule.html

Don A. Bailey:
War Texting: Identifying and Interacting with Devices on the Telephone Network

Karsten Nohl + Chris Tarnovsky:
Reviving smart card analysis

Andrey Belenko
Overcoming IOS Data Protection to Re-enable iPhone Forensics

Ravi Borgaonkar + Nico Golde + Kevin Redon:
Femtocells: A poisonous needle in the operator’s hay stack

Dino Dai Zovi:
Apple iOS Security Evaluation: Vulnerability Analysis and Data Encryption

Richard Perkins + Mike Tassey:
Aerial Cyber Apocalypse: If we can do it… they can too.

Long Le + Thanh Nguyen:
ARM exploitation ROPmap

Jennifer Granick:
The Law of Mobile Privacy and Security

Riley Hassell + Shane Macaulay:
Hacking Androids for Profit

Tyler Shields + Anthony Lineberry + Charlie Miller + Chris Wysopal + Dino Dai Zovi + Ralf-Phillipp Weinmann + Nick Depetrillo + Don Bailey:
Owning Your Phone at Every Layer – A Mobile Security Panel

DEFCON19: (4th-7th August)
Schedule: https://www.defcon.org/html/defcon-19/dc-19-index.html

Abusing HTML5

Cellular Privacy: A Forensic Analysis of Android Network Traffic

Getting SSLizzard

This is REALLY not the droid you’re looking for…

Mobile App Moolah: Profit taking with Mobile Malware

Wireless Aerial Surveillance Platform

Seven Ways to Hang Yourself with Google Android

Staying Connected during a Revolution or Disaster

So, plenty to keep everyone going then! It’ll be interesting to see what the next few weeks bring.