Online:
Visits:
Stories:
Profile image
By ActivistPost (Reporter)
Contributor profile | More stories
Story Views

Now:
Last Hour:
Last 24 Hours:
Total:

Researchers find security flaws in backscatter X-ray scanners

Wednesday, August 20, 2014 11:04
% of readers think this story is Fact. Add your two cents.

(Before It's News)

Editor’s note: Latest research highlights the ongoing ruse of supposedly tightened airport security. Meanwhile, those who profited from these scanners laugh all the way to the bank. Then of course there are the negative health effects.

B4INREMOTE-aHR0cDovLzIuYnAuYmxvZ3Nwb3QuY29tLy1YV3pqcU5YY25Qby9VX1RoMkJtX0JySS9BQUFBQUFBQWZGby9feDd1ZExiTlk2VS9zMTYwMC9haXJwb3J0JTJCc2Nhbm5lcnMlMkIyJTJCXyUyQmNyb3AuanBnActivist Post

A team of researchers from the University of California, San Diego, the University of Michigan, and Johns Hopkins University have discovered several security vulnerabilities in full-body backscatter X-ray scanners deployed to U.S. airports between 2009 and 2013.

In laboratory tests, the team was able to successfully conceal firearms and plastic explosive simulants from the Rapiscan Secure 1000 scanner.  The team was also able to modify the scanner operating software so it presents an “all-clear” image to the operator even when contraband was detected.

“Frankly, we were shocked by what we found,” said J. Alex Halderman, a professor of computer science at the University of Michigan. “A clever attacker can smuggle contraband past the machines using surprisingly low-tech techniques.”

The researchers attribute these shortcomings to the process by which the machines were designed and evaluated before their introduction at airports.  “The system’s designers seem to have assumed that attackers would not have access to a Secure 1000 to test and refine their attacks,” said Hovav Shacham, a professor of computer science at UC San Diego.  However, the researchers were able to purchase a government-surplus machine found on eBay and subject it to laboratory testing.


Many physical security systems that protect critical infrastructure are evaluated in secret, without input from the public or independent experts, the researchers said.  In the case of the Secure 1000, that secrecy did not produce a system that can resist attackers who study and adapt to new security measures.  “Secret testing should be replaced or augmented by rigorous, public, independent testing of the sort common in computer security,” said Shacham.

Secure 1000 scanners were removed from airports in 2013 due to privacy concerns, and are now being repurposed to jails, courthouses, and other government facilities.  The researchers have suggested changes to screening procedures that can reduce, but not eliminate, the scanners’ blind spots.  However, “any screening process that uses these machines has to take into account their limitations,” said Shacham.

The researchers shared their findings with the Department of Homeland Security and Rapiscan, the scanner’s manufacturer, in May.  The team will present their findings publicly at the USENIX Security conference, Thursday Aug. 21, in San Diego.  Details of the results will be available at https://radsec.org/ on Aug. 20.



Source: http://www.activistpost.com/2014/08/researchers-find-security-flaws-in.html

Report abuse

Comments

Your Comments
Question   Razz  Sad   Evil  Exclaim  Smile  Redface  Biggrin  Surprised  Eek   Confused   Cool  LOL   Mad   Twisted  Rolleyes   Wink  Idea  Arrow  Neutral  Cry   Mr. Green

Top Stories
Recent Stories

Register

Newsletter

Email this story
Email this story

If you really want to ban this commenter, please write down the reason:

If you really want to disable all recommended stories, click on OK button. After that, you will be redirect to your options page.