{"id":1079,"date":"2014-08-28T14:21:31","date_gmt":"2014-08-28T19:21:31","guid":{"rendered":"https:\/\/justinparrtech.com\/JustinParr-Tech\/?p=1079"},"modified":"2015-05-18T14:48:31","modified_gmt":"2015-05-18T19:48:31","slug":"technology-related-movie-myths","status":"publish","type":"post","link":"https:\/\/justinparrtech.com\/JustinParr-Tech\/technology-related-movie-myths\/","title":{"rendered":"Technology-Related Movie Myths"},"content":{"rendered":"<p>In the movies, technology is often depicted as a deus ex machina, a convenience for the writer to instantly solve a problem.\u00a0 It&#8217;s common for writers to stretch the truth a little bit, in order to facilitate flow or continuity, but with technology, writers can sometimes imbue nearly magical qualities.\u00a0 Rightly so, as Arthur C. Clarke stated, &#8220;<em><strong>Any sufficiently advanced technology is indistinguishable from magic<\/strong><\/em>&#8220;.<\/p>\n<p>And sometimes, the writers just plain get it wrong.<\/p>\n<p>Worse, sometimes, the incorrect depiction is MORE appealing than the real-world functionalities and capabilities, leading to the creation of a mythology that gets propagated until the myth itself is part of pop-culture folklore.<\/p>\n<p>Here are some examples of movie tech myths run amok.<\/p>\n<p><!--more--><\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_81 counter-hierarchy ez-toc-counter ez-toc-custom ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\"><p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<\/div><nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/justinparrtech.com\/JustinParr-Tech\/technology-related-movie-myths\/#phone-myths\" >Phone Myths<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/justinparrtech.com\/JustinParr-Tech\/technology-related-movie-myths\/#phreaking\" >Phreaking<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/justinparrtech.com\/JustinParr-Tech\/technology-related-movie-myths\/#tracing-calls\" >Tracing Calls<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/justinparrtech.com\/JustinParr-Tech\/technology-related-movie-myths\/#graphical-map-display-for-tracing-calls\" >Graphical Map Display for Tracing Calls<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/justinparrtech.com\/JustinParr-Tech\/technology-related-movie-myths\/#bouncing-calls\" >Bouncing Calls<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/justinparrtech.com\/JustinParr-Tech\/technology-related-movie-myths\/#%e2%80%9chackers%e2%80%9d-can-control-physical-devices\" >&#8220;Hackers&#8221; Can Control Physical Devices<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/justinparrtech.com\/JustinParr-Tech\/technology-related-movie-myths\/#myth-computer-controlled-inanimate-objects\" >Myth:\u00a0 Computer-Controlled Inanimate Objects<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/justinparrtech.com\/JustinParr-Tech\/technology-related-movie-myths\/#myth-wirelessly-controlled-%e2%80%9cdumb%e2%80%9d-electronics\" >Myth:\u00a0\u00a0 Wirelessly-Controlled &#8220;Dumb&#8221; Electronics<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/justinparrtech.com\/JustinParr-Tech\/technology-related-movie-myths\/#reality-the-emergence-of-smart-appliances-%e2%80%93-the-%e2%80%9cinternet-of-things%e2%80%9d-and-the-%e2%80%9csmart-grid%e2%80%9d\" >Reality:\u00a0 The Emergence of Smart Appliances &#8211; the &#8220;Internet of Things&#8221;, and the &#8220;Smart Grid&#8221;<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/justinparrtech.com\/JustinParr-Tech\/technology-related-movie-myths\/#myth-hacking-in-to-%e2%80%9csmart%e2%80%9d-devices\" >Myth:\u00a0 Hacking in to &#8220;Smart&#8221; devices<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/justinparrtech.com\/JustinParr-Tech\/technology-related-movie-myths\/#remotely-driving-cars-flying-planes\" >Remotely Driving Cars \/ Flying Planes<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/justinparrtech.com\/JustinParr-Tech\/technology-related-movie-myths\/#gps-tracking\" >GPS Tracking<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/justinparrtech.com\/JustinParr-Tech\/technology-related-movie-myths\/#myth-tracking-a-gps-device\" >Myth: \u00a0Tracking a GPS Device<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-14\" href=\"https:\/\/justinparrtech.com\/JustinParr-Tech\/technology-related-movie-myths\/#myth-all-phones-have-gps\" >Myth: \u00a0All Phones Have GPS<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-15\" href=\"https:\/\/justinparrtech.com\/JustinParr-Tech\/technology-related-movie-myths\/#real-world-gps-and-location-services-tactics\" >Real-World GPS and Location Services Tactics<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-16\" href=\"https:\/\/justinparrtech.com\/JustinParr-Tech\/technology-related-movie-myths\/#%e2%80%9chacking%e2%80%9d-passwords-and-%e2%80%9cbreaking%e2%80%9d-encryption\" >&#8220;Hacking&#8221; Passwords and &#8220;Breaking&#8221; Encryption<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-17\" href=\"https:\/\/justinparrtech.com\/JustinParr-Tech\/technology-related-movie-myths\/#myth-%e2%80%9chacking%e2%80%9d-passwords\" >Myth:\u00a0 &#8220;Hacking&#8221; Passwords<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-18\" href=\"https:\/\/justinparrtech.com\/JustinParr-Tech\/technology-related-movie-myths\/#real-world-tactics-for-password-compromise\" >Real-world Tactics for Password Compromise<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-19\" href=\"https:\/\/justinparrtech.com\/JustinParr-Tech\/technology-related-movie-myths\/#myth-%e2%80%9cbreaking%e2%80%9d-encryption\" >Myth:\u00a0 &#8220;Breaking&#8221; Encryption<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-20\" href=\"https:\/\/justinparrtech.com\/JustinParr-Tech\/technology-related-movie-myths\/#common-uses-of-encryption\" >Common Uses of Encryption<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-21\" href=\"https:\/\/justinparrtech.com\/JustinParr-Tech\/technology-related-movie-myths\/#real-world-methods-for-attacking-encryption\" >Real-world Methods for Attacking Encryption<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-22\" href=\"https:\/\/justinparrtech.com\/JustinParr-Tech\/technology-related-movie-myths\/#%e2%80%9chacking%e2%80%9d-involves-writing-a-script-or-program\" >&#8220;Hacking&#8221; involves writing a script or program<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-23\" href=\"https:\/\/justinparrtech.com\/JustinParr-Tech\/technology-related-movie-myths\/#real-world-scripts\" >Real-world Scripts<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-24\" href=\"https:\/\/justinparrtech.com\/JustinParr-Tech\/technology-related-movie-myths\/#bluejacking\" >Bluejacking<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-25\" href=\"https:\/\/justinparrtech.com\/JustinParr-Tech\/technology-related-movie-myths\/#virtual-reality\" >Virtual Reality<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-26\" href=\"https:\/\/justinparrtech.com\/JustinParr-Tech\/technology-related-movie-myths\/#camera-systems\" >Camera Systems<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-27\" href=\"https:\/\/justinparrtech.com\/JustinParr-Tech\/technology-related-movie-myths\/#mistake-security-camera-recording-follows-the-subject\" >Mistake:\u00a0 Security Camera Recording Follows the Subject<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-28\" href=\"https:\/\/justinparrtech.com\/JustinParr-Tech\/technology-related-movie-myths\/#myth-camera-zoom\" >Myth:\u00a0 Camera Zoom<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-29\" href=\"https:\/\/justinparrtech.com\/JustinParr-Tech\/technology-related-movie-myths\/#myth-focus-and-image-enhancement\" >Myth:\u00a0 Focus and Image Enhancement<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-30\" href=\"https:\/\/justinparrtech.com\/JustinParr-Tech\/technology-related-movie-myths\/#myth-cameras-and-keyboards\" >Myth:\u00a0 Cameras and Keyboards<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-31\" href=\"https:\/\/justinparrtech.com\/JustinParr-Tech\/technology-related-movie-myths\/#summary\" >Summary<\/a><\/li><\/ul><\/nav><\/div>\n\n<p>&nbsp;<\/p>\n<h2><span class=\"ez-toc-section\" id=\"phone-myths\"><\/span>Phone Myths<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Because they are all interconnected via mysterious &#8220;packet-switched global communication networks&#8221;, phones are a great source of tech myths!<\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"phreaking\"><\/span>Phreaking<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Phreaking is the practice of hacking the phone system, usually for the purpose of making free phone calls or getting free long distance.<\/p>\n<p>In the 1960&#8217;s and 1970&#8217;s, phone switches used the tones from a touch-tone phone for routing calls, and for switch-to-switch signalling (known as trunking).\u00a0 By emulating tones generated by phones and switches, it was possible to fool the switches in to routing calls.\u00a0 Phreakers also used tricks such as shorting to ground, to simulate coins being inserted in to a pay phone, and using special, undocumented numbers for diagnostics or to access special administrative or routing functions.<\/p>\n<p>By the 1980&#8217;s, most telephone switches were either digital (and no longer operated using these principles), or included countermeasures for these simple hacks.<\/p>\n<p><em>When you see someone in the movies whistling in to a phone, that is a specific reference to a real person known as &#8220;Whistler&#8221;, who grew up in the 60&#8217;s and 70&#8217;s, and was known to have perfect pitch &#8211; the ability to recognize and reproduce specific tones, simply by whistling.<\/em><\/p>\n<p>Unlike what you frequently see in movies, neither his unique ability nor any combination of mechanical whistles, harmonicas or other devices would have done him very much good from the 80&#8217;s onward.\u00a0 On the newer phone switches, &#8220;auto dialers&#8221;, devices that generate sequences of tones, could still be used to originate legitimate calls, but could no longer be used to hack phone switches.<\/p>\n<p>Another tactic demonstrated in the movie &#8220;Wargames&#8221;, shows the protagonist shorting a payphone&#8217;s current to ground, to simulate a coin being dropped in to the coin slot.\u00a0 Older payphones did work this way, and it&#8217;s questionable whether the older, vulnerable equipment would still have been deployed in the field at the time of the movie.\u00a0 On a side note, he uses a pop tab (or beer tab) to do this &#8212; pop tabs used to litter every roadway and parking lot, but are now extinct!<\/p>\n<p><strong>Phreaking, as it existed in the 1960&#8217;s and 70&#8217;s, no longer exists.\u00a0 <\/strong>As a movie myth, phreaking continues to live on in infamy.<\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"tracing-calls\"><\/span>Tracing Calls<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><em>In many dramatic movie moments, the protagonist desperately tries to negotiate with the villain while tracing his call.\u00a0 A computer screen shows the call &#8220;bouncing&#8221; across a map, through multiple points of origin, with a line that slowly traces its way to the villain&#8217;s ultimate point of origin.\u00a0 Just as the hero is about to determine the location of the villain&#8217;s hideout, he disconnects the call, breaking the trace just in time!<\/em><\/p>\n<p>When you originate a call on any phone network, your local phone company&#8217;s switch creates a connection to the phone switch where the recipient&#8217;s phone is connected to the network.\u00a0 Sometimes, a call must traverse multiple switches on its path from one end to the other, and the path must stay &#8220;open&#8221; (connected) for the duration of the call.\u00a0 When either party disconnects, the phone switches recycle the connections, allowing other users to place calls to other destinations.<\/p>\n<p>For billing purposes, every phone switch, whether on a land-line or cellular network, records &#8220;Call Detail Records&#8221; (CDRs) &#8211; a complete log of every connection THIS switch has made to any and every OTHER switch.\u00a0 These logs are used to bill consumers and other telephone companies, so the logs always exist, and they are always accurate.<\/p>\n<p>Unlike what you see in the movies, &#8220;tracing&#8221; a call means sifting through the CDRs of each phone switch in sequence, identifying the inbound and outbound port used by each switch for a particular call, which identifies the next downstream switch, until the &#8220;station&#8221; port is identified.\u00a0 Each station port (phone line) has meta information, such as the subscriber&#8217;s name, address, and phone number.<\/p>\n<p>If the call happens to originate and terminate inside the same phone carrier&#8217;s network, the phone company&#8217;s switch management software might be able to provide real time call trace information.\u00a0 However, because of the way the phone system works, tracing a single call might involve traversing 3 or more phone companies!\u00a0 There are multiple local providers, known as &#8220;Local Exchange Carriers&#8221; (LECs).\u00a0 The LEC might pass the call over to a Long Distance (LD) carrier, or over to another LEC.\u00a0 Cell phone calls are even harder to trace, because cell phones have no predefined entry point in to the phone system.<\/p>\n<p>&#8220;What about &#8216;Caller ID&#8217;?&#8221;, you may ask&#8230; Caller ID is based on Automatic Number Identification (ANI), and consists of meta information passed from switch to switch as each connection is made.\u00a0 Meaning, ANI (and thus Caller ID) can be completely faked at the point where the call originates.\u00a0 Any digital PBX can be reprogrammed to display any name or number information that the villain wants, and there are commercial &#8220;black boxes&#8221; that the villain can use to set ANI on most phone lines.\u00a0 The hero can&#8217;t rely on Caller ID information!<\/p>\n<p><strong>Tracing a single call could take hours or even days, not including obtaining the proper, legal search warrants.<\/strong><\/p>\n<p>Once you use trace information to finally determine the villain&#8217;s originating line (phone switch port), the bad news is that the villain probably gave you a fake name.\u00a0 You can usually put any name you want on the phone line (land line or cellular)<\/p>\n<p>The good news is that the phone company installs and maintains the phone lines, and the address information is tied to the phone line.\u00a0 This information feeds the &#8220;e911&#8221; (Enhanced) service, where the 911 emergency operator automatically receives name and address information from the switch that originates the call, meaning that you have a very good chance of at least getting an accurate address!<\/p>\n<p>However, if he buys a cell phone, especially pre-paid cell phone, he can list whatever name and address he wants!<\/p>\n<p><strong>Most of the time, tracing a call is tedious and time consuming, since you must often match up CDRs from multiple sources in order to identify where a specific call originated. \u00a0<\/strong>Moviegoers will continue to be entertained by nearly-instant trace programs that the hero can use to find the villain.<\/p>\n<p><strong>Further, there is no pre-set time limit after which a call can be traced, and disconnecting a call doesn&#8217;t erase the CDRs.\u00a0<\/strong> If you wanted to trace a local call (assuming one phone company) in real time, it would take you 20 minutes just to get the right tech on the phone who could perform that procedure, and it would probably take him another 15 minutes to run the right program, log in to the switch management console, and obtain the correct information.\u00a0 Let&#8217;s hope the villain is quite a talker!<\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"graphical-map-display-for-tracing-calls\"><\/span>Graphical Map Display for Tracing Calls<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Setting aside the question of accurate and timely trace information, there is the &#8220;visual trace&#8221; myth.<\/p>\n<p><em>In the movies, the hero watches the trace narrow down the villain&#8217;s location on a map, as the trace &#8220;closes in&#8221; on his location.<\/em><\/p>\n<p>In reality, once a port (line) has been identified via the trace process, it&#8217;s up to the carrier to provide the address information for that subscriber, based on meta data associated with the line.\u00a0 Because of the way the phone system works, there is virtually no relation between the path through the phone switch network and the physical location of an individual phone line.\u00a0 Aside from the address meta data associated with the individual line, the phone company can only narrow down geography based on &#8220;Central Office&#8221; (CO) in the case of a land line, or cell tower in the case of a cell phone, both of which vary in size and location based subscriber density.\u00a0 Assuming the address meta data for the line is incorrect or has been faked, and if the villain calls you from somewhere out in the country instead of the city, you&#8217;ll need to search a much larger geographical area.<\/p>\n<p><strong>Tracing a call returns address metadata that CAN be displayed on a map, but the trace process has nothing to do with narrowing down a geographical (map) location. <\/strong>\u00a0 It LOOKS really cool, however, when the hero&#8217;s &#8220;trace program&#8221; systematically narrows down, and zooms in on the villain&#8217;s map location.<\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"bouncing-calls\"><\/span>Bouncing Calls<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>&#8220;Bouncing&#8221; a call means routing it through multiple points of origin.\u00a0 In the movies, this is done as some kind of &#8220;computer hack&#8221;, where the call appears to be re-routed within the phone system itself.<\/p>\n<p><strong>There are a few very good reasons why this is impractical:<\/strong><\/p>\n<ul>\n<li><em><strong>The phone system isn&#8217;t that easy to hack.<\/strong><\/em>\u00a0 Since the 1960&#8217;s, people have been trying to hack the phone system, meaning that the phone companies have had 50 years of experience at defending their equipment!\u00a0 Although data networking and the internet means that it&#8217;s technically possible to remotely connect to a switch, the phone companies have long-since known to isolate their core switches from remote access connections!<\/li>\n<li><em><strong>Call routing is based on converged routing tables.<\/strong><\/em>\u00a0 What does this mean?\u00a0 All call routing is based on the digits at the beginning of the destination phone number (or at the beginning of whatever sequence the originator dials), called the prefix digits.\u00a0 At a high level, the whole network knows the most efficient path, at any given time, to route a specific prefix.\u00a0 If you were to hack in to ONE switch and modify its routing table, to route, for example, one string of digits through the wrong trunk line, the next switch on the other end of the trunk line would simply route the call right back, creating a loop!\u00a0 You would have to hack every switch in sequence in order to hide a single phone call, while preventing a routing loop!<\/li>\n<li><em><strong>Hacking the phone network won&#8217;t hide the call.<\/strong><\/em>\u00a0 Within a given switch network, even if a path is convoluted, the switches themselves would have near real-time information about the origination and destination.\u00a0 The phone company&#8217;s switch management software would still have information about the complete call pathway.\u00a0 Convolution is only effective if routing calls BETWEEN switch networks (for example, between different providers)<\/li>\n<li><em><strong>Lag.\u00a0<\/strong><\/em> Each connection adds a few microseconds of lag.\u00a0 Longer geographical distances over which the call is routed, as well as increasing the number of &#8220;hops&#8221; within the network, increases the time it takes to transmit the voice information.\u00a0 It&#8217;s almost impossible to conduct a normal conversation, because the lag disrupts the natural rhythm between the two people who are conversing, resulting in one person inadvertently talking over the other, or missing part of the conversation completely.<\/li>\n<li><em><strong>A PBX at a small company is often an easier target to hack.\u00a0<\/strong><\/em> Most small companies can&#8217;t afford a full-time PBX administrator, which means that they probably pay a third-party company to service their PBX &#8211; if someone new joins the company, they need a phone number assigned, and their name has to be assigned.\u00a0 If someone moves from one cubicle to another, their phone information needs to follow them.\u00a0 If someone leaves the company, their phone number and voice mail needs to be disabled.\u00a0 Third-party service providers can&#8217;t afford to send a technician on site for simple changes, so more often than not, they use a remote-access mechanism to remotely administer the PBX.\u00a0 If THEY can get in, YOU can get in.\u00a0 It&#8217;s only about a million times easier to hack a PBX than a telco-owned switch.<\/li>\n<\/ul>\n<p><strong>In real life, with the above caveats in mind, there are a few ways to legitimately bounce a call:<\/strong><\/p>\n<ul>\n<li><em><strong>Voice over IP (VoIP) Services.<\/strong><\/em>\u00a0 Probably THE best way to hide or bounce a phone call, many free or cheap VoIP services allow you to connect to a land line using a virtual phone.\u00a0\u00a0 Most of these services don&#8217;t keep accurate or timely records, because they don&#8217;t provide the same services as a regular phone company.\u00a0 Some VoIP services can be coupled together, creating the opportunity to further convolute a phone call.<\/li>\n<li><em><strong>Physically-coupled.<\/strong><\/em>\u00a0 Either direct-wiring or via acoustic coupler, two phones can be linked from microphone to speaker, allowing one phone to receive the incoming call, and the second one to originate a separate call.\u00a0 Tracing the second call yields the location of the second phone line, concealing the true location of the originator.\u00a0 This is a &#8220;quick and dirty&#8221; way to perform a one-time misdirection on an opponent.<\/li>\n<li><em><strong>PBX hack.<\/strong><\/em>\u00a0 Although less common today, many Private Branch eXchange (PBX) systems used in companies (and even some government facilities) allow an inbound call to be routed to an outbound line.\u00a0 This is considered a security hole, and most PBX systems are configured to disallow this type of access.\u00a0 Lazy or less-knowledgeable PBX administrators could easily leave a hole like this exposed, where a hacker could make what looks like a local call in to the PBX, and then use a separate line on the same PBX to originate a second call.\u00a0 Assuming that you keep a low profile, a PBX hack is a good way to make infrequent calls over a long period of time.\u00a0 If you have full control of the PBX, remember to erase the CDRs!\u00a0 Every PBX has CDRs.<\/li>\n<li><em><strong>A hard-wired trunk, also called a cross-connect<\/strong><\/em>, connects two phone switches together.\u00a0 Used as an easy and inexpensive way for medium-sized businesses to expand PBX capacity, cross-connecting a 2nd PBX node could allow an attacker to enter the first PBX node via its inbound trunk, navigate to the 2nd PBX via the cross-connect, and then originate an outbound call on the 2nd PBX&#8217;s outbound trunk line.\u00a0 This is a difficult vulnerability to trap, even when the individual PBXs are configured correctly.\u00a0 Like a PBX hack, a hard-wired trunk is an excellent way to make infrequent calls over long periods of time, without having to compromise the PBX.\u00a0 The bad news is that there will probably be a CDR trace of your activity.<\/li>\n<li><em><strong>Connect a cordless phone to, or splice a neighbor&#8217;s line.<\/strong><\/em>\u00a0 You can make calls that appear to originate from your neighbor instead of you.\u00a0 The bad news is that you have to be fairly close, and because of the physical connection to your neighbor&#8217;s line, this type of attack is fairly easy to detect.\u00a0 This type of attack is best used when combined with direct \/ acoustic coupling to another line.<\/li>\n<li><em><strong>Compound bounce.<\/strong><\/em>\u00a0 For example, a land line can be acoustically-coupled to a cell phone, making a trace significantly more complicated, and introducing more delay between the hunter and his target.<\/li>\n<\/ul>\n<p><strong>Bouncing done well:<\/strong>\u00a0 &#8220;Hackers&#8221;, where they acoustically-coupled multiple payphones in order to misdirect the authorities.\u00a0 The &#8220;signal trace&#8221; resulted in the cops raiding the physical location of the payphones, burning time and introducing delay between hunter and hunted.<\/p>\n<p><strong>Bouncing done badly:\u00a0<\/strong> &#8220;Sneakers&#8221;, where &#8220;Whistler&#8221; (ostensibly named for the real &#8220;Whistler&#8221;) bounces the signal all over the world while Marty talks to the NSA.\u00a0 Between the extreme lag due to the geographical distance, and poor signal quality due to the number of hops, the connection would be so bad that Marty wouldn&#8217;t be able to hear or be heard!<\/p>\n<p>&nbsp;<\/p>\n<h2><span class=\"ez-toc-section\" id=\"%e2%80%9chackers%e2%80%9d-can-control-physical-devices\"><\/span>&#8220;Hackers&#8221; Can Control Physical Devices<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>There are numerous movie scenes where a &#8220;hacker&#8221; controls a physical device in order to save the day!<\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"myth-computer-controlled-inanimate-objects\"><\/span>Myth:\u00a0 Computer-Controlled Inanimate Objects<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Some movies are so far disconnected with reality, that they depict computers physically levitating, controlling, or steering inanimate objects.<\/p>\n<p>Inanimate objects.\u00a0 Objects with no motors, hinges, actuators, levers, pistons, screws, propellers, nor any practical means of locomotion, simply can&#8217;t move.<\/p>\n<p>Further, objects with no electronics can&#8217;t be &#8220;hacked&#8221; by an electronic computer.<\/p>\n<p><strong>Only the bottom writers in the barrel would use computer-controlled inanimate objects as a plot device.<\/strong><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"myth-wirelessly-controlled-%e2%80%9cdumb%e2%80%9d-electronics\"><\/span>Myth:\u00a0\u00a0 Wirelessly-Controlled &#8220;Dumb&#8221; Electronics<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><em>Movie scene:\u00a0 whiz kid gets a computer.\u00a0 Two scenes later, whiz kid is controlling every electronic device in the house with his computer.<\/em><\/p>\n<p><strong>To control an electronic object, even a motorized one, the following requirements must be met:<\/strong><\/p>\n<ul>\n<li><em><strong>Motors or actuators.<\/strong><\/em>\u00a0 The object must be able to move on its own.<\/li>\n<li><em><strong>Automated controls.<\/strong><\/em>\u00a0 A computer can&#8217;t override a manual control, such as a light switch, that has to be physically operated by the user.<\/li>\n<li><em><strong>Remote control interface and protocol<\/strong><\/em>, for manipulating the automated control.\u00a0 For example, an automatic light, one that turns itself on at dusk and off at dawn, can&#8217;t be arbitrarily turned on or off unless the electronic switch can be accessed remotely.<\/li>\n<li><em><strong>Wired or wireless control link<\/strong><\/em> between computer and device.<\/li>\n<li><em><strong>Control software<\/strong><\/em>.\u00a0 The computer must be running software that connects to the control interface, and knows the protocols used by the remote device.<\/li>\n<li><em><strong>User interface<\/strong><\/em>.\u00a0 The hacker has to be able to tell the control software what to do.\u00a0 The interface could be command-line or graphical.<\/li>\n<\/ul>\n<p><strong>Here are some additional movie cliches that don&#8217;t add up:<\/strong><\/p>\n<ul>\n<li><strong>Light switches<\/strong> can&#8217;t be controlled, unless they have automated control capability, a remote control interface, a control link, and some means to access the remote automation.<\/li>\n<li><strong>Sprinklers and fire hydrants<\/strong> can&#8217;t be turned on or off, unless they have motorized valves that are designed to be remotely controlled.\u00a0 Most fire suppression systems are passively-triggered, meaning, they expect a smoke or heat event to trigger a response.\u00a0 Only VERY high-end installations, such as datacenters and other high-security facilities use computerized fire suppression that would even be capable of being triggered remotely.<\/li>\n<li><strong>Door locks<\/strong> can&#8217;t be opened remotely, unless they have a motor, and remote administration capability.\u00a0 Magnetic logs (&#8220;mag locks&#8221;) usually have a badge reader that CAN be programmed remotely, but do not typically provide the ability to remotely unlock the door itself &#8211; that has to be done via an approved badge.<\/li>\n<li><strong>Traffic lights<\/strong> CAN be <strong><em>monitored<\/em><\/strong> remotely, but very few, if any, provide the ability to remotely change their state.\u00a0 Traffic lights have error checking, to make sure that both sides can&#8217;t turn green at once, and to keep the timing of the lights in sync.\u00a0 The first thing that happens when a traffic light fails, is that it goes to blinking red &#8211; a signal to all drivers to treat it as a stop sign (all sides must stop).\u00a0 Traffic lights in most cities have a strobe light detector, allowing police and emergency vehicles to quickly obtain a green light.\u00a0 Some websites sell devices designed to manipulate these sensors, but if the cops ever catch you with one, they&#8217;ll practically throw you UNDER the jail.<\/li>\n<li><strong>Most household appliances<\/strong> lack both a remote control interface and a control link, and can&#8217;t be manipulated.\u00a0 Some smart appliances can now be <em><strong>monitored<\/strong> <\/em>remotely, but very few can be manipulated.<\/li>\n<li><strong>Cars<\/strong> absolutely can move, but the steering wheel, pedals, ignition, and other controls lack any kind of automated control capability.<\/li>\n<\/ul>\n<p><strong>The movie scenes where a hacker remotely turns on household appliances, drives a car, opens locks or doors, or disables the security system are mostly mere exaggerations.<\/strong><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"reality-the-emergence-of-smart-appliances-%e2%80%93-the-%e2%80%9cinternet-of-things%e2%80%9d-and-the-%e2%80%9csmart-grid%e2%80%9d\"><\/span>Reality:\u00a0 The Emergence of Smart Appliances &#8211; the &#8220;Internet of Things&#8221;, and the &#8220;Smart Grid&#8221;<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>The ironic twist, is that because there are actually home automation packages, along with the emergence of smart appliances and security systems, IoT (M2M), and the &#8220;Smart Grid&#8221;, the capability to access and manipulate devices in the home might actually be on the horizon.\u00a0 <span style=\"text-decoration: underline;\">As of this writing:<\/span><\/p>\n<ul>\n<li><strong>Automation packages<\/strong> such as X10 existed as early as the late 90&#8217;s, initially allowing remote control, and later allowing PC-based &#8220;home automation&#8221; of X10 modules that control lighting and other dumb home appliances.\u00a0\u00a0 Hacking either the X10 network, using a PC equipped with an X10 controller, or by remotely-controlling the existing PC that acts as the X10 controller, would allow an attacker to turn lights on or off, dim them, or remotely activate &#8220;dumb&#8221; appliances plugged in X10 modules.<\/li>\n<li>Although <strong>electronic door locks<\/strong> have been around for quite some time, most of them lack the remote control interface, control link, and control software to be manipulated remotely.\u00a0 Newer &#8220;smart locks&#8221; connect to WiFi, and allow the homeowner to use a computer or smart phone app to modify codes, and lock or unlock the door.<\/li>\n<li><strong>Smart thermostats<\/strong> allow the homeowner to set and monitor the temperature of the home.\u00a0 Smart thermostats can be controlled via PC, or via a phone \/ tablet app.<\/li>\n<li>As the <strong>Internet of Things<\/strong> (IoT) emerges, smart appliances will continue to emerge.\u00a0 Smart appliances allow remote monitoring and configuration via PC, phone, or tablet.\u00a0 Appliances such as coffee makers, ovens, washers, dryers, and the like, that are &#8220;dumb&#8221; appliances today, will continue to evolve.<\/li>\n<li>Perhaps the worst threat, the so-called<strong> &#8220;Smart Grid&#8221;<\/strong>, allows the electrical grid to &#8220;throttle back&#8221; usage at peak times by controlling devices inside the home.\u00a0 If the &#8220;Smart Grid&#8221; could be subverted and manipulated, it would allow a hacker to control a wide variety of devices and services within the home.<\/li>\n<li><strong>Cars<\/strong> use computers for many tasks, including aspects of performance tuning and feature \/ function configuration.\u00a0 As vehicle integration continues to evolve, new opportunities will be created to affect someone&#8217;s gas mileage, shut down their car, control multimedia content, play an audio file remotely, and maybe even recalibrate the gauges, including the speedometer!<\/li>\n<\/ul>\n<p><strong>As technology evolves,\u00a0hackers\u00a0have ever-increasing\u00a0opportunities and ever-progressing capabilities to seemingly, &#8220;magically&#8221; control various smart devices.<\/strong><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"myth-hacking-in-to-%e2%80%9csmart%e2%80%9d-devices\"><\/span>Myth:\u00a0 Hacking in to &#8220;Smart&#8221; devices<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>As outlined above, many connected devices are evolving, and DO in fact have the necessary remote control interfaces and control link.\u00a0 <strong>However, subverting those control interfaces is not as easy as it sounds!<\/strong><\/p>\n<ul>\n<li><strong>Most devices require either an access code<\/strong>, or a username \/ password combination.\u00a0 Despite what you see in the movies, &#8220;brute force&#8221; password hacking, where the attacker tries successive (ordered or random) passwords in an attempt to break in, is more difficult and time consuming than it appears.\u00a0 Most software can detect these attempts, and have controls designed to lock the interface, or prevent subsequent login attempts for a certain period of time.<BR><BR>In the corporate environment, this type of activity would immediately trigger an alert, resulting in administrator intervention.\u00a0 In the home environment, there is no real framework for intrusion detection or alerting, meaning, that an attacker can perform a &#8220;low and slow&#8221; attack.\u00a0 Low and slow means that the attacker could take weeks or months, making only a few attempts at a time, until they break in. \u00a0But it isn&#8217;t going to happen quickly, like they show in the movies.<\/li>\n<li><strong>Remote access requires a control link!<\/strong>\u00a0 Typically, WiFi or Bluetooth would be used for this type of access.\u00a0 Early on, these technologies were configured as &#8220;wide-open&#8221; by default, allowing anonymous connectivity and access to virtually any network.\u00a0 Now, these technologies are deployed in a secure configuration by default, meaning, a hacker would either have to break the encryption (see below), or know the WiFi password to gain access.<\/li>\n<li><strong>Most home networks don&#8217;t allow remote access<\/strong>, necessitating that &#8220;smart devices&#8221; connect to an external command-and-control website.\u00a0 If either this connection, or the website itself could be compromised, then the device(s) being controlled could be compromised.\u00a0 Additionally, the legitimate user connects to the website, allowing the possibility for an attacker to forge or simulate the user&#8217;s access.\u00a0 <BR><BR>The difficulty in compromising the command-and-control website is that it requires advanced knowledge of the command and control protocols passed between the device and the website.\u00a0 Since there is no centralized standard (yet) for command and control of these types of devices, information on any given system depends on the number of units in use, the amount of information provided by the manufacturer and user community, and the amount of time available to the hacker.\u00a0 Over a long period of time, with plenty of internal information, a hacker could develop an exploit, or even an automated tool to perform the exploit.\u00a0 <BR><BR>Doing this &#8220;on the fly&#8221;, however, is virtually impossible.<\/li>\n<\/ul>\n<p><strong>Unlike what you see in the movies, and even though device-specific exploits may exist, most smart devices can&#8217;t easily be hacked.<\/strong><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"remotely-driving-cars-flying-planes\"><\/span>Remotely Driving Cars \/ Flying Planes<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><em>In the movie, the hero is driving his car, and the villain takes control.\u00a0 <\/em><\/p>\n<p><em>In another scenario, the &#8220;hacker&#8221; takes over the airplane, routing it to another destination.<\/em><\/p>\n<p><strong>Here are some facts about controlling vehicles:<\/strong><\/p>\n<ul>\n<li>Just as with any device, to be remotely controlled, a vehicle must have actuators or other automated control mechanisms, and a control interface and data link.\u00a0 <BR><BR>Most cars have <em><strong>manual<\/strong><\/em> controls, designed to allow the driver to actuate steering, braking, and acceleration.\u00a0 Without the automated controls, there is <strong>no way<\/strong> for a hacker to drive a car or other vehicle.<\/li>\n<li>Some newer vehicles provide automatic parking or automatic braking features, that, given the proper control interface and link, might be able to be exploited.\u00a0 For example, you could trigger the victim&#8217;s brakes at an unexpected time, such as when they are traveling down the freeway at 70 mph.<\/li>\n<li>Modern passenger aircraft, and some military aircraft have advanced control and autopilot systems, that might theoretically be compromised, but all conventional aircraft only have manual controls.<\/li>\n<li>Cruise missiles and flying drones explicitly operate via remote control, and can even be directed to a specific GPS destination.\u00a0 Any kind of remote administration interface could be hacker-bait.<\/li>\n<li>As smart cars and smart freeways continue to evolve, there will be ever-increasing opportunities for automation to be exploited.<\/li>\n<\/ul>\n<p><strong>Although controlling vehicles is largely a myth, automation continues to evolve, providing a growing attack surface for hackers to exploit.<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<h2><span class=\"ez-toc-section\" id=\"gps-tracking\"><\/span>GPS Tracking<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>GPS stands for &#8220;Global Positioning System&#8221;, and is a network of satellites that beam down a constant stream of information, that a GPS receiver can use to triangulate its own position.\u00a0 The urge to know the villain&#8217;s exact position is a tempting source for many tech myths!<\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"myth-tracking-a-gps-device\"><\/span>Myth: \u00a0Tracking a GPS Device<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><em>In the movies, the hero either &#8220;tracks&#8221; the villain&#8217;s GPS, or looks at the villain&#8217;s GPS history to track him down.<\/em><\/p>\n<p><strong>Here are the facts about GPS:<\/strong><\/p>\n<ul>\n<li>&#8220;GPS&#8221; or &#8220;GPS device&#8221; usually means &#8220;GPS receiver&#8221;. \u00a0A GPS receiver does just that &#8211; it RECEIVES a signal. \u00a0It&#8217;s not capable of transmitting a signal.<\/li>\n<li>The &#8220;GPS network&#8221; is not a communication network. \u00a0It&#8217;s a collection of GPS satellite signals that are constantly beamed down to Earth, so that GPS receivers can determine their own location. \u00a0The &#8220;GPS network&#8221; is therefore unaware of, and incapable of tracking individual GPS devices (GPS receivers). \u00a0<strong>You can&#8217;t \u00a0track the bad guy using the GPS network itself.<\/strong><\/li>\n<li>A GPS receiver does one thing: \u00a0It locates its own position. \u00a0In order for someone to REMOTELY know that location, a GPS has to be combined with some kind of transmitter, such as a radio or cell phone, that subsequently transmits the GPS coordinates once they have been determined by the GPS receiver. \u00a0<strong>The good guy can&#8217;t &#8220;tap in to&#8221; or &#8220;ping&#8221; a GPS receiver to find out where it&#8217;s located.<\/strong><\/li>\n<li>Most consumer GPS devices can be used in two ways: \u00a0It can simply display your current location on a map, or it can provide routing information (turn-by-turn instructions) between two locations on the map while it tracks your current location along the route.<\/li>\n<li>Most consumer GPS devices ONLY display your current location, unless you use the device&#8217;s search function to find a specific destination, and THEN the GPS provides routing information. \u00a0The &#8220;favorite&#8221; and &#8220;history&#8221; function of most GPS devices is tied to the search function, NOT the instantaneous display. \u00a0<strong>As a villain, who in their right mind would do an exact search on their personal GPS for their own &#8220;secret&#8221; hideout? \u00a0If the villain doesn&#8217;t perform this type of search, there is no &#8220;favorite&#8221; or &#8220;history&#8221; information that the hero can use to see where the villain has been.<\/strong><\/li>\n<\/ul>\n<p><strong>Just because the villain has a GPS, doesn&#8217;t mean the hero can use it to find him!<\/strong><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"myth-all-phones-have-gps\"><\/span>Myth: \u00a0All Phones Have GPS<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><em>In the movies, the hero uses GPS tracking to find the villain&#8217;s phone.<\/em><\/p>\n<p><strong>Although many phones today DO have a built-in GPS receiver, there are quite a few limitations and caveats:<\/strong><\/p>\n<ul>\n<li>Most smart phones DO have a GPS receiver, and DO run software that can report their location remotely &#8211; such as sending out a location &#8220;beacon&#8221; to the cell provider&#8217;s network, or via text message or web beacon to an external server.<BR><BR>For this to work properly, the GPS must be enabled, and must be able to receive a signal from the GPS satellites. \u00a0Many people turn the GPS function off, when not in use, to save battery. \u00a0In addition, the GPS satellite signals generally follow &#8220;line of sight&#8221;, meaning, if you go underneath a bridge, inside a house or building, or toss your phone in a briefcase or bag, it may not be able to &#8220;see&#8221; the GPS satellites, and therefore, can&#8217;t provide any location information.<\/li>\n<li>Smart phones, as well as older &#8220;dumb&#8221; phones, can use cell tower information to provide an approximation of GPS, called Location-Based Service (LBS). \u00a0At worst, LBS provides information as specific as a single cell tower, which could be several square miles. \u00a0At best LBS uses multiple cell towers to provide location data that&#8217;s as granular as about 300 feet.<\/li>\n<li>Smart phones use other terrestrial signals, such as WiFi (WiFi SSID name and signal strength), along with LBS and GPS to &#8220;remember&#8221; very specific location data, which acts like a geographical bookmark in place of\u00a0a GPS signal. \u00a0If you are in a place near a WiFi signal recognized by your phone, then it assumes that any GPS data it previously knew near that particular WiFi signal must still be valid. \u00a0Of course, this doesn&#8217;t work for Mobile WiFi (MiFi).<\/li>\n<li>Although the handset itself will provide the best location information available (GPS, LBS, or cached) when accessed by the provider or via remote access software installed on the phone, if the phone itself can&#8217;t be accessed, then the cell phone provider can only determine the cell tower to which the handset most recently connected.\u00a0 Depending on the geography of the cell network, which is typically deployed based on connection density, one tower could be a as small as part of a city block, or as large as several square miles.<\/li>\n<\/ul>\n<p><strong>Although Smart Phones do have GPS receivers, the GPS may not always work.\u00a0 Depending on the situation, only coarse location data might be available.<\/strong><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"real-world-gps-and-location-services-tactics\"><\/span>Real-World GPS and Location Services Tactics<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>There are some things that CAN really be done using GPS or Location Services:<\/p>\n<ul>\n<li><strong>GPS Tracker.<\/strong>\u00a0 A GPS Tracker works like a small cell phone with a GPS attached.\u00a0 The GPS receiver inside the tracking device periodically obtains a location fix, that is then transmitted via the cell phone circuitry, as a text message or beacon to a website.\u00a0 GPS Trackers are commercially-available, run for a very long time on disposable batteries due to low power requirements, and usually have a magnetic case that can be used to affix the device to a vehicle.\u00a0 Some GPS trackers don&#8217;t transmit &#8211; they simply write location fix data to a memory card or memory stick attached to the device.<\/li>\n<li><strong>Using a Smart Phone as a GPS Tracker.<\/strong>\u00a0 There are many apps that can run on a Smart Phone, that use location information, and periodically transmit the phone&#8217;s location via text or via a web beacon.\u00a0 <BR><BR>This approach can be used surreptitiously, either via software installed without the target user&#8217;s knowledge, or a &#8220;burner&#8221; Smart Phone can be preconfigured and hidden in the target&#8217;s vehicle, bag, briefcase, or other belongings.<\/li>\n<li><strong>Obtain geotracking metadata from Smart Phone apps.<\/strong>\u00a0 Anything uploaded to a website, such as photos, videos, status updates, and other content uploaded from various Smart Phone applications can be accessed via that website, even without access to the Smart Phone itself.\u00a0 Most social applications track the user&#8217;s location by default, either to allow &#8220;check-ins&#8221;, for friends to follow or locate each other, or just simply to gather and mine data about the user.\u00a0 <BR><BR>Most Smart Phones&#8217; camera applications (and high-end digital cameras) embed geolocation data, by default, in pictures and videos taken on the device.\u00a0 Applications such as Google and Facebook can be configured to automatically upload photos &#8211; a feature that can be used to find a stolen phone using picture metadata, or follow the target without their awareness.<\/li>\n<li><strong>Triangulation.<\/strong>\u00a0 Anything that transmits a signal &#8211; cell phone, WiFi, Bluetooth, can be triangulated using two or more directional receivers at known locations.\u00a0 By pointing both directional receivers at the highest signal strength for a given target transmitter, the target&#8217;s location can be plotted fairly accurately on a map.\u00a0 More directional receivers increases the accuracy.\u00a0 <BR><BR>The down side is that cell phones and bluetooth transmit using very little power, within a polluted signal space, and use frequency-hopping, all of which make triangulation extremely difficult.\u00a0 WiFi hot spots and cordless phones have about the same power output with less competition, and are therefore much easier to locate.\u00a0 &#8220;Family Radio Service&#8221; (FRS) handsets can transmit up to a mile, while Citizens&#8217; Band (CB) radio can transmit many miles.\u00a0 The stronger the signal, the easier it is to locate.<\/li>\n<\/ul>\n<p><strong>Although movies contain many GPS &#8220;tracking&#8221; myths, there are some realistic, high-tech tracking tactics that could and should be used more often.<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<h2><span class=\"ez-toc-section\" id=\"%e2%80%9chacking%e2%80%9d-passwords-and-%e2%80%9cbreaking%e2%80%9d-encryption\"><\/span>&#8220;Hacking&#8221; Passwords and &#8220;Breaking&#8221; Encryption<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>These two movie myths go hand-in-hand, as the\u00a0 stereotypical, really difficult objective, that hackers are somehow easily able to accomplish.\u00a0 In reality, with some advance planning, and a slightly above-average skill set, a typical &#8220;power user&#8221; can create an encrypted file or password that is so convoluted, that it would take hundreds of years to decrypt, even using the &#8220;supercomputer&#8221; resources you often see in movies.\u00a0 Nevertheless, we often see the gifted hacker liberate protected information in a matter of minutes.<\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"myth-%e2%80%9chacking%e2%80%9d-passwords\"><\/span>Myth:\u00a0 &#8220;Hacking&#8221; Passwords<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><em>In the movies, the hacker runs a brute-force password cracking algorithm.\u00a0 The program tries random combinations, until each digit or letter &#8220;locks on&#8221;, and eventually the password is revealed, and the hacker gains access to the target&#8217;s computer.<\/em><\/p>\n<p><strong>In reality, password cracking programs do exist, but let&#8217;s get the facts straight:<\/strong><\/p>\n<ul>\n<li>Passwords typically consist of uppercase and lowercase letters, numbers, and symbols.\u00a0 Each password letter or number, called a &#8220;<strong>character<\/strong>&#8220;, consists of a total set of 26 (lower) + 26 (upper) + 10 (digit) + 10 (symbol) = 72 symbols for each character position.<BR><BR>An eight character password has 72^8 possible combinations, meaning just over <strong>722 trillion<\/strong> combinations.<\/li>\n<li>Each password attempt takes a little bit of time to test whether the authentication is successful\u00a0 or not.\u00a0 If we say that each attempt takes 1 second, meaning 3,600 attempts per hour, it would take 22 million years to test every combination.\u00a0 If the password you seek is near the middle, 11 million years is still a very long time to wait!\u00a0 Most systems use a stand-off timeout to prevent this type of attack &#8211; meaning, you must wait a specified period of time, usually just a few seconds, before attempting the next password.<\/li>\n<li>Most people make least-optimum password decisions.\u00a0 They use birthday dates, anniversary dates, names of spouses, children, pets, sports teams, and even their ATM PIN as a password.\u00a0 They also often use the same password for multiple purposes, for example, using your ATM PIN as your voicemail password, or using your e-mail password for your bank account.\u00a0 Poor use of passwords creates a situation where compromising one system means that the password can be used to attack another, completely different system.<\/li>\n<li>Hackers use long lists of common words, called &#8220;dictionaries&#8221;, to attempt more likely combinations without having to try every possible combination.\u00a0 Knowing the subject&#8217;s personal information allows an attacker to build a more accurate dictionary containing details the subject is likely to be using as a password.<\/li>\n<li>A common method of constructing passwords is to take a word, name, or number, and then change some of its characters to numbers or symbols, switch upper and lowercase, and perhaps add some digits to the end.\u00a0 As an example, &#8220;baseball&#8221; might become &#8220;bA$3b4ll96&#8221;.\u00a0 A good password cracking program will try common number \/ symbol substitutions for every dictionary word.\u00a0 With a 100,000- word dictionary, that might add another 100 substitutions per word, for a total of 10,000,000 combinations.\u00a0 NOW, at one attempt per second, we are in the realm of 115 days!<\/li>\n<li>Passwords are typically stored internally as a cryptographic hash.\u00a0 For more information about password hashing, read this:<BR><a title=\"The Importance of Hashing Passwords\" href=\"https:\/\/justinparrtech.com\/JustinParr-Tech\/the-importance-of-hashing-passwords\/\" target=\"_blank\">https:\/\/justinparrtech.com\/JustinParr-Tech\/the-importance-of-hashing-passwords\/<\/a><BR>The password hacking process can be significantly accelerated by extracting the hash table from an application or operating system.\u00a0 The password hacking program can then simply attempt to take each password candidate, and obtain the hash code.\u00a0 If the resulting hash code matches the target&#8217;s entry in the hash table, then the candidate is the correct password.\u00a0 The advantage of having direct access to the hash table means that hundreds of attempts can be made at the same time.\u00a0 With access to the hash table, 115 days shrinks to <strong>27 hours<\/strong>, and simple passwords can be &#8220;cracked&#8221; in as little as a few minutes!<BR><BR>This might seem like a real benefit, but each operating system or application closely guards the password hash table.\u00a0 This means that the core operating system or application must be compromised in order to even <em>get<\/em> to the hash table!\u00a0 There is a significant amount of work involved, and it doesn&#8217;t happen quickly.\u00a0 The good news is that once a password hash is cracked, it will most likely be usable on other systems &#8211; most people use the same passwords for everything.<\/li>\n<li>People familiar with Information Security, which includes both the good guys AND the bad guys, can easily construct a password suitably complex, that even with access to the hash table, a brute-force attack (all combinations) would have to be attempted.\u00a0 It would be trivial to construct a non-dictionary 12 character password that exists as one possibility within 19 x 10^21 (19 sextillion, or billion-trillion) combinations, requiring a supercomputer <strong>running for hundreds of years<\/strong> to crack.<\/li>\n<li>In the movies, you often see password cracking programs &#8220;lock&#8221; one digit at a time.\u00a0 The concept is that each known digit exponentially reduces the number of remaining combinations.\u00a0 Because of hashing and other mechanisms in play, an attacker would have no way of knowing whether a specific digit value \/ position was correct or not &#8211; they will still have to try every combination.\u00a0 The concept of &#8220;locking a digit&#8221; probably originates from World War II-era code breaking, where, looking at both the input AND the output, you may be able to determine ONE letter at a time until all are correct.<\/li>\n<\/ul>\n<p><strong>Password hacking programs DO exist, and can be helpful for cracking simple passwords.\u00a0 Complex passwords might take too long to crack, for cracking to be feasible.<\/strong><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"real-world-tactics-for-password-compromise\"><\/span>Real-world Tactics for Password Compromise<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Although cracking someone&#8217;s password requires a lot of time and effort, there are several real-world password compromise tactics:<\/p>\n<ul>\n<li><strong>Social Engineering<\/strong>.\u00a0 Social engineering is the process of compromising people, who disclose information.\u00a0 This involves &#8220;pretexting&#8221; (lying about a convincing situation) and persuasion, where the target feels compelled to follow instructions, or tries to help out by providing the information.\u00a0 The classic example of social engineering is to call the target, claiming to be from their company&#8217;s IT department.\u00a0 The &#8220;fake&#8221; IT department can provide some basic details in order to sound convincing, claiming that there is a problem with the target&#8217;s computer.\u00a0 In the process of &#8220;fixing&#8221; the problem, the attacker asks for the targets password.\u00a0 Social engineering is most effective when the attacker has some knowledge of the organization as well as the target.<\/li>\n<li><strong>Fake password screen<\/strong>.\u00a0 Like social engineering, a familiar-looking web site or login screen can be developed, that simply stores username \/ password information, displays an error, and forwards the target to the real login page.\u00a0 If done well, the target never knows they just divulged their real user name and password.\u00a0 Many phishing e-mails take this approach, asking for credit card or bank account information.\u00a0 This seems really simple, but it can be quite effective.\u00a0 How many times have you failed to log in to e-mail, thinking &#8220;I KNOW I typed my password correctly&#8221;.\u00a0 Unfortunately, some level of compromise is usually required &#8211; anything from redirecting DNS (looks up names to find the IP address), to fake web sites, or running custom software that must be loaded on the target PC.<\/li>\n<li><strong>Packet capture<\/strong>.\u00a0 Information on any network is broken up in to small bundles, called &#8220;packets&#8221;, that must be transmitted individually, and then reassembled correctly.\u00a0 Special packet capture software, called &#8220;sniffer&#8221; software, can be used for wired or wireless networks to capture data packets as they are sent or received.\u00a0 When you log in to a website, your user name and password are transmitted, and can be captured UNLESS the website uses encryption.\u00a0 Although virtually every internet-facing application provides &#8220;secure&#8221; (encrypted) login capability, many corporate applications assume they are in a secure perimeter, and don&#8217;t require authentication to be encrypted!\u00a0 This means that, often, using sniffer software connected anywhere on a corporate network will probably yield some cleartext password information.<\/li>\n<\/ul>\n<p><strong>Although &#8220;cracking&#8221; a user&#8217;s password in realtime is just a myth, there are some real-world tools and tactics that can be used to compromise a user&#8217;s password.<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"myth-%e2%80%9cbreaking%e2%80%9d-encryption\"><\/span>Myth:\u00a0 &#8220;Breaking&#8221; Encryption<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Encryption is a way to protect data, by systematically scrambling it, in such a way that it can later be unscrambled.\u00a0 Encryption uses a cipher (the encryption algorithm), with the &#8220;cleartext&#8221;, or unencrypted data and an encryption key as input, resulting in &#8220;ciphertext&#8221;, or encrypted data.\u00a0 Depending on the cipher, either the same key may be required (symmetric encryption), or a different key may be required (asymmetric encryption) to reverse the encryption process, and reproduce the cleartext data.<\/p>\n<p>For more information regarding encryption, please read this article:<br \/>\n<a title=\"The Importance of Hashing Passwords\" href=\"https:\/\/justinparrtech.com\/JustinParr-Tech\/the-importance-of-hashing-passwords\/#What_is_Encryption?\" target=\"_blank\">https:\/\/justinparrtech.com\/JustinParr-Tech\/the-importance-of-hashing-passwords\/<\/a><\/p>\n<p><em>In the movies, the good guys obtain the villain&#8217;s files, outlining his master plan.\u00a0 The files are encrypted!\u00a0 The intrepid hacker starts to &#8220;decrypt&#8221; the files, and in just a few hours (or minutes!), the hero gets the critical information, just in the nick of time!<\/em><\/p>\n<p>Encryption strength is typically expressed in terms of the key length, such as &#8220;256-bit&#8221; encryption.\u00a0 From a hacker&#8217;s standpoint, encryption is expressed in terms of the amount of computing power required to break it.\u00a0 <a title=\"Gordon Moore\" href=\"https:\/\/justinparrtech.com\/JustinParr-Tech\/top-10-virtually-unknown-technology-computing-pioneers\/#Number_10:%C2%A0_Gordon_E._Moore\" target=\"_blank\">Moore&#8217;s Law<\/a> dictates that computing power doubles periodically, meaning that older encryption algorithms (called ciphers) can be broken via brute force using more modern computing capabilities, where many thousands (or millions) of combinations can be attempted every second.<\/p>\n<p>For this reason, encryption is a cat-and-mouse game, where increasingly-complex ciphers can be attacked by ever-increasing computing power, thus necessitating newer, more sophisticated ciphers, which in turn require more powerful computers to break, etc&#8230;<\/p>\n<p><strong>Here are some key points about encryption:<\/strong><\/p>\n<ul>\n<li>One of the oldest computer ciphers, called &#8220;DES&#8221; (US DoD <strong>Data Encryption Standard<\/strong>), was developed in the 1970&#8217;s, and was in common use from the late 70&#8217;s through the 90&#8217;s.\u00a0 DES has a symmetric key length of 56 bits, and was publicly cracked in 1997.\u00a0 By 1999, DES could be cracked in 22 hours, using massively-parallel computing.<\/li>\n<li>A complex form of DES, called <strong>Triple DES<\/strong> (also called <strong>3DES<\/strong>), uses three nested DES encryptions (two forward, one in reverse), for a total key length of 56 x 3 = 168 bits.\u00a0 Because each layer is encrypted, there is no clear indication that each outer layer is compromised, necessitating that all three layers must be cracked in parallel.\u00a0 Although this provided some level of security over DES, it highlighted the need for a newer standard.\u00a0 3DES was never publicly compromised in a reasonable amount of time.\u00a0 With the advent of AES in 2002, 3DES was officially deprecated in 2005.<\/li>\n<li><strong>AES, the &#8220;Advanced Encryption Standard&#8221;<\/strong>, was introduced as a standard in 2002 to replace the use of DES and 3DES.\u00a0 AES uses various key lengths, from 128 bits, up to 1024 bits, with the most common key length being 256 bits.\u00a0 When AES is used, it typically includes a reference to the key length used, such as AES-256 to indicate AES cipher, using a 256-bit symmetric key length.\u00a0 AES began as a contest hosted by the U.S. government to select a replacement cipher for DES.\u00a0 The winning algorithm, Rjindal, is now known as AES.\u00a0 Other AES candidates, such as <strong>Blowfish<\/strong>, and its successor <strong>Twofish<\/strong>, as well as <strong>Serpentine<\/strong> are in common use, although not officially recognized as standards.<\/li>\n<li>RSA owns the patents on the world&#8217;s most popular <strong>public-key cipher, RC4<\/strong>.\u00a0 Replacing RC2, RC4 uses large integer factors as separate parts of the encryption key, allowing &#8220;public key&#8221; encryption &#8211; the ability to openly publish the &#8220;public&#8221; key, without the ability to decrypt the data using the same key.\u00a0 This type of cipher is known as an <strong>asymmetric cipher<\/strong>, where a different (secret \/ private) key is used to decrypt the data.\u00a0\u00a0 Encrypting in reverse, where the secret key is used to encrypt data, allows anyone with the public key to decrypt the data, which is used as a digital signature mechanism.\u00a0 RSA algorithms, although no longer considered cryptographically-secure, are still used as the signature mechanism to exchange the &#8220;inner&#8221; symmetric key used by other ciphers, and to guaranty authenticity.<\/li>\n<li><strong>Salt data<\/strong> is a known, fixed value used to further randomize the source data before being encrypted.\u00a0 When decrypted, the salt data is removed and discarded.\u00a0 Using large, complex salt values makes statistical attacks more complex, and therefore increases the required computing power.<\/li>\n<li><strong>Entropy<\/strong>, a source of random data, is typically used to generate encryption keys.\u00a0 Examples of entropic sources are the instantaneous temperature measurement of a computer&#8217;s CPU, mouse movement, or the speed of the fan.\u00a0 If a pseudorandom sources is used in place of a true entropy source, the resulting keys can often be predictable.<\/li>\n<\/ul>\n<p>Under ideal conditions, with small key sizes and weak encryption keys, it could take months or years to &#8220;break&#8221; encryption using a brute force attack.<\/p>\n<p>Many ciphers have known weaknesses, and can be attacked using\u00a0 statistical analysis &#8211; such as using very small encryption keys, very small data values, or very large quantities of data, to analyze how the cipher behaves.\u00a0 This can often lead to a mathematical toolbox that can be used as a shortcut to breaking certain ciphers under certain conditions, reducing the time to hours or days required to deduce the key and obtain the underlying data.<\/p>\n<p><strong>When following best practices, even a simple cipher can be nearly unbreakable<\/strong>.\u00a0 Each software vendor implements encryption differently, even though the ciphers are standard.\u00a0 While taking shortcuts can lead to unintended vulnerabilities, following best practices ensures that even older ciphers can be used with relative security.\u00a0 Longer key lengths, longer salt data values, more encryption iterations, and using true entropy sources for key generation all help increase complexity, requiring increasing computing resources in order to mount a realistic attack.<\/p>\n<p><strong>Decrypting the villain&#8217;s files isn&#8217;t going to happen quickly.\u00a0 Any kind of realistic attack would require near-supercomputing capability, advanced mathematical knowledge outside of a &#8220;hacker&#8217;s&#8221; purview, and a tool set tailored to each cipher.<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"common-uses-of-encryption\"><\/span>Common Uses of Encryption<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Most movies or TV shows that use encryption as a plot device, also include a healthy dose of technobable to go along with it.<\/p>\n<p><strong>There are two basic modes of encryption:<\/strong><\/p>\n<ul>\n<li><strong>Storage encryption<\/strong> is used to encrypt data at rest, meaning, data stored on any kind of media.\u00a0 Modern computers are powerful enough to allow encryption \/ decryption to occur as the data is read or written, called real-time or &#8220;on the fly&#8221; encryption.\u00a0 Other forms of encryption explicitly perform the encryption \/ decryption process on a file, set of files, memory stick, data disc, or hard drive.\u00a0 Transformation (or &#8220;locker&#8221;) encryption is better suited for sharing data, or when the data needs to be accessed infrequently.<\/li>\n<li><strong>Transmission encryption<\/strong> is used to protect data being sent or received, by encrypting the network transmission or communication lines used to transmit the data.\u00a0 Transmission encryption usually happens in real-time, where each data block is encrypted, then transmitted, and immediately decrypted before being handed off to the receiving program or process.<\/li>\n<\/ul>\n<p><strong>Here are some common encryption uses and implementations:<\/strong><\/p>\n<ul>\n<li><strong>Whole-disk encryption<\/strong> uses real-time storage encryption to protect a computer&#8217;s hard drive.\u00a0 When the computer first starts, the user enters a password or other encryption key in to a small boot loader program, which then loads the main operating system from the encrypted drive.\u00a0 All of the user&#8217;s files and folders are explicitly encrypted, and the encryption program decrypts them on the fly as they are read or written.\u00a0 If someone steals the drive, they can&#8217;t access the files, but any process acting as the operating system or running within the operating system can effectively bypass the encryption!\u00a0 A carefully-crafted virus or script could slowly steal data from a whole-disk encrypted drive by running in the background and slowly siphoning files from the drive.<\/li>\n<li><strong>Locker-based encryption<\/strong> operates on a file or group of files \/ folders, where they are stored in a single archive or &#8220;locker&#8221; file.\u00a0 Using the file requires extracting it from the locker file, to the regular file system.\u00a0 If modified, the file must be added back to the encrypted locker.\u00a0 Opening the locker file, extracting or updating files prompts the user for a password, used as the encryption key.\u00a0 Examples of this, are ZIP and RAR files, which makes sharing encrypted files very easy &#8211; the recipient only needs commonly-available software and a password to access the files.<\/li>\n<li><strong>Media encryption<\/strong>, similar to whole-disk encryption, allows memory sticks, memory cards, data discs, data tapes, and removable hard drives to be encrypted in real-time, but like locker-based encryption, typically have some mechanism for sharing the media &#8211; for example, you could mail an encrypted memory stick to the recipient, who uses the memory stick&#8217;s encryption software plus a password to access the data.<\/li>\n<li><strong>Hardware encryption<\/strong> often uses a fingerprint scanner or pin pad on a computer or removable media device, that provides real-time encryption without requiring the computer to run special software.\u00a0 Each time the device is turned on or attached, the user must unlock it.\u00a0 Most hardware encryption devices are physically hardened, to prevent tampering or bypassing the encryption mechanism.\u00a0 Typically, these devices are filled with epoxy resin that requires enough force to remove it, that the force would damage the device in the process.<\/li>\n<li>An<strong> encrypted tunnel<\/strong> is a general-purpose method for encrypting a communication channel.\u00a0 Encrypted tunnels can be used to secure physical communication lines, or in conjunction with other protocols to provide an encrypted link over a private network.\u00a0 Encrypted tunnels can be nested two or more layers deep for increased security.<\/li>\n<li><strong>Virtual Private Network (VPN)<\/strong>, a type of transmission-based encryption, allows two computers to communicate securely over a public network, using encrypted tunnels.\u00a0 VPN allows you to access your company&#8217;s computer systems when you work from home, and makes it seem like your remote laptop is connected directly to your company&#8217;s network.<\/li>\n<li><strong>Secure Sockets Layer (SSL) \/ Transport Layer Security (TLS)<\/strong> create a single encrypted channel used by the TCP\/IP protocol.\u00a0 SSL\/TLS allows older, insecure protocols to be easily secured, and is the method by which most secure web traffic is encrypted.<\/li>\n<li><strong>Pretty Good Privacy (PGP)<\/strong> protects a single file, or specific text within a message.\u00a0 PGP allows encrypted text or an encrypted file to be sent through e-mail, or to be transmitted using File Transfer Protocol (FTP).\u00a0 PGP is typically used by power users and \/ or network administrators, rather than regular users.\u00a0 PGP can be used to further convolute or encrypt an already-encrypted file.\u00a0 Because PGP uses a public key scheme, it can also be used for digital signing and authenticity &#8211; you can &#8220;sign&#8221; a document using your PGP private key.<\/li>\n<li><strong>Digital Rights Management (DRM)<\/strong> is used by Blu Ray and DVD discs, as well as many digital-only distribution channels (portable video formats, MP3 audio), to ensure that only the valid subscriber has access to the content.\u00a0 A set of keys are maintained, to prevent other users from accessing the content.\u00a0 DRM-like technologies can also be used to create &#8220;erasable&#8221; e-mail and other ephemeral content, because deleting the key removes the user&#8217;s ability to view the content.<\/li>\n<\/ul>\n<p><strong>There are a variety of encryption technologies in common use, many of which, we might use every day without realizing it.<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"real-world-methods-for-attacking-encryption\"><\/span>Real-world Methods for Attacking Encryption<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Encryption can be a powerful tool to help protect information from falling in to the wrong (or right) hands!<\/p>\n<p><strong>All encryption technologies have several real-world weaknesses:<\/strong><\/p>\n<ul>\n<li><strong>The data must be used.<\/strong>\u00a0 All data is vulnerable at the point where the user views the encrypted content &#8211; you can always take a picture of a computer monitor, or steal text that&#8217;s been printed on a printer, AFTER the user has decrypted it.<\/li>\n<li><strong>People are easier to hack than encryption.\u00a0<\/strong> Social Engineering is the science of hacking people &#8211; tricking them in to doing something specific, or revealing specific information.\u00a0 People are often quite easier to hack than machines, meaning, if you have a copy of an encrypted file, you might be able to trick someone in to giving you the password.<\/li>\n<li><strong>Biometric keys can be faked.<\/strong>\u00a0 Hardware encryption that leverages a fingerprint reader, for example, can be tricked in to working by using a fake fingerprint.<\/li>\n<li><strong>Weak encryption CAN be &#8220;broken&#8221;.<\/strong>\u00a0 Using weak or non-standard ciphers puts the data at risk.\u00a0 Likewise, using weak, short, or predictable passwords makes the job of &#8220;breaking&#8221; encryption, simply a matter of hacking the password.<\/li>\n<li><strong>All well-known ciphers have weaknesses.<\/strong>\u00a0 Although a brute-force attack on encrypted data might require a cipher-specific tool set, and advanced mathematical knowledge to use the tools, it might still take weeks or months to actually be able to decrypt an actual data file, under some very specific assumptions.\u00a0 E.g. salt values must be obtained or known, and there must be a sufficient quantity of data to facilitate statistical analysis.\u00a0 If the data has a high enough value, throwing time and resources at decrypting it, might be fruitful.<\/li>\n<\/ul>\n<p><strong>Knowing your target, and knowing the data can facilitate an attack that does not require knowledge of the decryption key, nor decrypting the content.\u00a0 Unfortunately, &#8220;breaking&#8221; the villain&#8217;s encryption doesn&#8217;t happen in a few minutes, with a few simple keystrokes.<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<h2><span class=\"ez-toc-section\" id=\"%e2%80%9chacking%e2%80%9d-involves-writing-a-script-or-program\"><\/span>&#8220;Hacking&#8221; involves writing a script or program<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><em>In the movies, the intrepid hacker is given the task of &#8220;hacking in&#8221; to a bank or government system, to obtain some secret information.\u00a0 The hacker &#8220;writes&#8221; a script or program that hacks in to the target system.<\/em><\/p>\n<p><strong>Let&#8217;s start by making sure we have our facts straight, about what it means to &#8220;hack in&#8221; to a company:<\/strong><\/p>\n<ul>\n<li>Most companies and governments use similar security architectures.\u00a0 Actually, for banks and other entities that are regulated by the government, the government dictates the necessary security architecture, at a high level.<\/li>\n<li>A typical network security architecture consists of one or more firewalls separating the web servers from the internet, and then the web servers from the rest of the internal network.\u00a0 In addition to firewalls, most companies use Intrusion Detection Systems (IDS) or Intrusion Prevention Systems (IPS) to detect and \/ or directly stop a hacking attempt.\u00a0 On the internal network, critical systems, such as a credit card payment system, are further segregated by additional firewalls, or for highly-sensitive data, air gaps are used (an air gap is a physically-isolated network, accessible ONLY within the facility).<\/li>\n<li>A firewall is a hardened device, specifically designed to segregate a &#8220;trusted&#8221; network from an untrusted one.\u00a0 Each firewall has a set of rules defined, which allows legitimate traffic, while disallowing any other traffic.<\/li>\n<li>Bypassing a firewall consists of either scanning available ports to determine what services are available through the firewall, then transmitting malicious data to a server, or tricking a server \/ workstation inside the firewall to connect to a malicious website.<\/li>\n<li>Unlike governments and large companies, many small businesses don&#8217;t always follow best practices.\u00a0 One type of attack, called SQL injection, allows the attacker to run an arbitrary database query via the web server!<\/li>\n<li>Once a server is compromised, finding specific information, such as a document, or specific database, requires advanced knowledge of the company&#8217;s internal network.\u00a0 This process, called &#8220;scouting&#8221;, could take days or weeks.\u00a0 Once the target information is identified, and the servers hosting the information have been discovered, the hacker must have valid credentials in order to be able to log in to the server or database, to retrieve the information.<\/li>\n<li>The most successful type of attack, called a &#8220;low and slow&#8221; attack, consists of multiple steps taken over weeks or months, to scout the target&#8217;s network, find and execute an exploit, scout the internal network, obtain credentials, and finally, download the files.\u00a0 The final step is to upload, or push the information off of the target&#8217;s network to some external location &#8211; all of this has to be done in such a manner that it does not trigger suspicion, nor trigger an Intrusion Detection System (IDS) alert.\u00a0 For example:\u00a0 if, during this process, someone finds that their own password has been changed, that&#8217;s an automatic trigger to look for other suspicious activity.\u00a0 If someone finds confidential documents on a public-facing server, that&#8217;s going to trigger suspicion.\u00a0 If your attack gets detected by the IDS, or discovered by the network security folks,\u00a0 they might either shut you down completely, or call the Feds!<\/li>\n<\/ul>\n<p>Most &#8220;hacking&#8221; tools (commonly known as &#8220;network penetration&#8221; tools) are completely automated.\u00a0 There are a few tools that require special knowledge of the environment or servers, but most tools are generic enough that all someone has to do, is click &#8220;go&#8221;.\u00a0 Other, more detailed tools contain a suite of known exploits that can be focused on a specific target, once the scanning tools have identified a potential entry point.<\/p>\n<p>Most companies run these tools (vulnerability scanner) against their own network, to make sure they are protected!<\/p>\n<p><strong>Once again, the best approach is to compromise people, not systems.<\/strong><\/p>\n<ul>\n<li>People take data home with them, even if they&#8217;re not supposed to.<\/li>\n<li>People can be tricked in to resetting a password or divulging a system name.<\/li>\n<li>People can be tricked in to running malware \/ spyware, in order to create an exploitable weakness.<\/li>\n<li>People can be bribed or coerced in to stealing data &#8211; this can be done via memory stick, or even simply by uploading it to a public website.<\/li>\n<li>In one famous case, a telecom employee was tricked in to cross-connecting an isolated network to a public one!<\/li>\n<li>People often break policy by writing down passwords, or connecting insecure wireless routers to corporate networks.<\/li>\n<\/ul>\n<p>In addition to the above, careless administrators might be publishing more information than they intend.\u00a0 A marketing website might contain product specifications that should ONLY be available to current customers, but if external sites like Google CAN index that &#8220;private&#8221; content, they will!\u00a0 Often, a simple Google search will allow you to download a copy of the information you need.<\/p>\n<blockquote><p><em>Example:\u00a0 You are looking for the Deathstar plans.\u00a0 Try this Google search:<\/em><\/p>\n<p><a title=\"Deathstar plans!\" href=\"https:\/\/www.google.com\/search?q=filetype%3Apdf+deathstar+plans\" target=\"_blank\">filetype:PDF deathstar plans<\/a><\/p><\/blockquote>\n<p>Unfortunately, you can use this type of &#8220;Google attack&#8221; against many companies that don&#8217;t follow their own procedures for publishing content &#8211; often, internal or sensitive content will get published to an external server either inadvertently or for convenience.\u00a0 This type of search is easy to do, and no &#8220;hacking&#8221; or social engineering is required.<\/p>\n<p><strong>Even though showing lines of code scroll past the screen looks cool in movies, the reality is quite different.\u00a0 &#8220;Hacking in&#8221; to a company involves a lot of time and knowledge about the environment, while social engineering or Google attacks might be faster and more fruitful.<\/strong><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"real-world-scripts\"><\/span>Real-world Scripts<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Scripts are lightweight programs that don&#8217;t have to be compiled in order to run on the target system.\u00a0 They usually consist only of text, and therefore, a hacker can use cut and paste to install one, without having to install additional executable software that might cause suspicion.<\/p>\n<p><strong>Here are some things that CAN be done with scripts in the real world:<\/strong><\/p>\n<ul>\n<li><strong>Batch updates.<\/strong>\u00a0 If you have multiple servers, users, firewalls, or routers, and you want to make the same change to each one, you can script the change, and then have an &#8220;outer&#8221; script loop through each one, calling the &#8220;inner&#8221; script to actually perform the change.\u00a0 So let&#8217;s say the hacker did manage to gain access to SomeCompany&#8217;s network, and managed to obtain a privileged account.\u00a0 The hacker could write a small script to update everyone&#8217;s user profile to include &#8220;I am a dork&#8221; in the description field.\u00a0 He \/ she could also use a script to copy exploit code to a list of known servers.<\/li>\n<li><strong>Data normalization.<\/strong>\u00a0 When you get a raw dump of textual information, often, it needs to be formatted before you can do anything useful with it.\u00a0 I typically use command-line tools to make a first pass at the data, to eliminate things I clearly DON&#8217;T want, and to clean up the formatting as best I can.\u00a0 I then use higher-level tools like spreadsheets and databases to actually break the data in to fields and work with it.<\/li>\n<li><strong>Database queries.<\/strong>\u00a0 Most databases use a query language called SQL (Structured Query Language) to interact with and manipulate data.\u00a0 SQL can often be quite complex, and looks like a script.<\/li>\n<li><strong>Triggers.<\/strong>\u00a0 A script can be set up to stay hidden until a particular event occurs.\u00a0 When the desired event happens, the system can be configured to fire off a script &#8211; for example, to log when a user connects to the system, or alert an administrator when the system runs low on memory.\u00a0 Trigger scripts can be added by a hacker, for malicious purposes.\u00a0 For example, a hacker might trigger an alert when a specific user logs in, to try to watch what the user is accessing, or to attempt to hijack the user&#8217;s session.\u00a0 Another example is a trigger script that gives the hacker a user account with administrative access, when an administrative user logs in to the system.<\/li>\n<\/ul>\n<p><strong>Scripts are a valid tool in the hacker&#8217;s toolbox, but not commonly nor ubiquitously used<\/strong>.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<h2><span class=\"ez-toc-section\" id=\"bluejacking\"><\/span>Bluejacking<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Bluejacking means pairing a mobile device with the target&#8217;s cell phone, tablet or laptop, via the bluetooth protocol, without the user&#8217;s knowledge.<\/p>\n<p><em>In the movies, the hacker sits at the next table over, while the villain (or mark) sips his coffee at a cafe.\u00a0 With a few clicks, the hacker has &#8220;linked&#8221; their phones, allowing the hacker to listen to calls, access call logs, download pictures, and perform other types of movie magic.<\/em><\/p>\n<p>When bluetooth was first implemented on cell phones and mobile devices, it was turned on, by default, to discover (and possibly pair with) any device.\u00a0 When this vulnerability was discovered, manufacturers and vendors quickly adjusted the default settings to be much more secure.\u00a0 On a typical device with default settings, the user must hit a discover button, or make the device discoverable, in order to pair with another device.\u00a0 If an attacker tried to jump in at that exact time, the user would see the attacker&#8217;s device listed, and could simply decline the connection.\u00a0 Likewise, there is no way to remotely force the target&#8217;s cell phone to pair with a remote device &#8211; this must be initiated from the target&#8217;s device (not the other way around).<\/p>\n<p>Assuming that the attacker <em><strong>does<\/strong><\/em> manage to pair his phone with the target&#8217;s phone &#8211; let&#8217;s say he &#8220;borrows&#8221; the phone and pairs it manually, there are a few more logistical problems:<\/p>\n<ul>\n<li><strong>Most cell phones only support one audio channel at a time.<\/strong>\u00a0 For example, if you already have a bluetooth headset, and you add another, only one will be active.\u00a0 If you activate the second one, it will disable the first one.\u00a0 This makes it impossible to use your phone normally, while someone is spying on you using bluetooth, because only one of you would actually hear the conversation.<\/li>\n<li><strong>Bluetooth works within a range of about 30 feet.<\/strong>\u00a0 That&#8217;s about 15 steps.\u00a0 Or about 10 umbrella steps.\u00a0 Unless you practically\u00a0 walk around in someone&#8217;s shadow all day, the chances are high that you will lose the bluetooth connection at some point.<\/li>\n<li><strong>Bluetooth supports different capabilities for different devices<\/strong>.\u00a0 Not all devices support every capability.\u00a0 Not every phone can share contacts, intercept text messages, or share files via bluetooth.\u00a0 Assuming that the user&#8217;s phone supports advanced bluetooth features, invoking various functions usually prompts the user, so the chances of downloading information from the target&#8217;s phone undetected are slim!<\/li>\n<\/ul>\n<p>Bluejacking the target&#8217;s phone is not very realistic, nor very useful.<\/p>\n<p><strong>There are some real-world tactics to attack and exploit cell phones:<\/strong><\/p>\n<ul>\n<li><strong>WiFi evil twin.<\/strong>\u00a0 Unsecured wireless networks can be cloned, forcing all of the phone&#8217;s data access to flow through the &#8220;evil twin&#8221; access point.\u00a0 This can be used to surveil the target, or direct the user to a malicious website.\u00a0 In some cases, this type of connection will allow limited access to data on the target&#8217;s cell phone.\u00a0 Any cleartext voice-over-data communications can also be monitored &#8211; any Voice over IP (VoIP) applications that don&#8217;t use SSL \/ TLS encryption, send and receive voice data that can be intercepted, stored, and decoded.\u00a0 WiFi has a range of 100 feet to over 800 feet, depending upon several factors, including line of sight.<\/li>\n<li><strong>Malicious application.<\/strong>\u00a0 Either in the guise of a troubleshooting app, a game, or some other useful app, a malicious application can masquerade as a legitimate app while monitoring phone calls, text messages, call logs, web access, and even uploading the user&#8217;s files.\u00a0 Several &#8220;professional&#8221; grade spyware suites exist, to accomplish this very task.\u00a0 In most cases, the user must willingly download the app and accept the necessary permissions, allowing the user to at least contemplate whether to allow the application to continue.<\/li>\n<li><strong>Poisoned e-mail \/ text message.<\/strong>\u00a0 Used as a &#8220;phishing&#8221; tactic, the message might contain a link to a malicious website, disguised as a normal message.\u00a0 Alternately, an e-mail might directly contain a malicious payload, to infect or otherwise compromise the target&#8217;s phone.<\/li>\n<li><strong>Steal the phone.\u00a0<\/strong> Call logs, pictures, text messages, and contacts can generally be accessed by removing the memory card.\u00a0 Sometimes the direct approach is the best approach.<\/li>\n<li><strong>Malicious Barcode.<\/strong>\u00a0 Surely, you&#8217;ve seen the 2D barcodes next to a message that says something like, &#8220;scan here for a free coupon!&#8221; at your local deli, or on the back of your soft drink cup.\u00a0 These 2D barcodes are called QR codes, and can contain a short amount of data, such as a contact profile, or the link to a website.\u00a0 A malicious QR code could point the target&#8217;s phone to a malicious website.<\/li>\n<li><strong>Near-Field Communication (NFC).<\/strong>\u00a0 A recent development, this technology allows two devices to physically touch, in order to share information.\u00a0 Unlike bluetooth, Smart Phones that include NFC technology have it enabled by default &#8211; meaning, you can pass a malicious link or other malicious content just by bumping your phone against the target&#8217;s phone.<\/li>\n<\/ul>\n<p><strong>Bluejacking is unlikely to be successful, is inefficient, and not very fruitful.\u00a0 Other types of cell phone attacks are\u00a0 much more effective.<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<h2><span class=\"ez-toc-section\" id=\"virtual-reality\"><\/span>Virtual Reality<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><em>In the movies, accessing a computer system is visualized as a 3D virtual interface, with pipes and 2001-like visual effects connecting computers to each other, and browsing for information consists of &#8220;moving&#8221; through a virtual landscape of physical objects representing files or information, such as file cabinets.\u00a0 Firewalls and other security become &#8220;locked doors&#8221;, and the worst movie offenders anthropomorphize security controls as &#8220;guards&#8221;, attack dogs, or other pseudo-living creatures.<\/em><\/p>\n<p><strong>Virtual reality consists of these elements:<\/strong><\/p>\n<ul>\n<li><strong>Immersive visualization.<\/strong>\u00a0 Either in flat, two dimensions (2D), or with depth (3D), the visualization experience is completely immersive, meaning that you don&#8217;t see the real world, because you&#8217;re wearing goggles or looking at a room-sized display that completely fills the field of view.\u00a0 Most gaming rigs (high-end personal computers) don&#8217;t quite meet the definition of virtual reality, simply because the user is still staring at a monitor.<\/li>\n<li><strong>Motion tracking<\/strong>.\u00a0 Moving your head or hands moves your field of view.<\/li>\n<li><strong>Manual controls.\u00a0<\/strong> You use your hands (with motion tracking) to manipulate the environment.<\/li>\n<li><strong>Physical feedback<\/strong>.\u00a0 Bumps and vibration built in to the virtual gear provide feedback about events in the virtual environment.\u00a0 When you virtually touch something, moving your hand in the real world, your &#8220;virtual glove&#8221; vibrates to confirm the virtual event &#8211; to let you know that you have virtually connected with a virtual object.<\/li>\n<\/ul>\n<p><strong>Virtual reality is good for the following use cases:<\/strong><\/p>\n<ul>\n<li><strong>Visualizing complex structures.<\/strong>\u00a0 Things that can&#8217;t normally or efficiently be rendered in two dimensions can be visualized in 3d.\u00a0 Complex 3D structures, as well as upper-dimensional constructs may not be clear when rendered and displayed on a conventional monitor.<\/li>\n<li><strong>Telepresence and virtual workgroups.<\/strong>\u00a0 Bringing a user to the work, or multiple users together across multiple geographic locations.<\/li>\n<li><strong>Remote Control.<\/strong>\u00a0 Piloting drones or performing surgery requires an immersive experience and fast, precise, lifelike controls.<\/li>\n<li><strong>Gaming.<\/strong>\u00a0 As one of the original use cases for VR, and still a major driver, video games continue to become increasingly realistic and immersive.<\/li>\n<\/ul>\n<p>Originally, VR gear was heavy, bulky, crude, and power-hungry.\u00a0 Now, devices such as the <a title=\"Occulus Rift\" href=\"http:\/\/www.oculusvr.com\/\" target=\"_blank\">Occulus Rift<\/a> promise consumer-obtainable VR with good performance, low power requirements, and decent precision.\u00a0 Controller technology continues to improve, and there are many commercially-available 6DoF (6 Degrees of Freedom) controllers on the market.<\/p>\n<p><strong>Unlike what you see in the movies, outside of the use cases listed above, it&#8217;s often easier to use a conventional interface to access programs and information &#8211; this is the standard &#8220;windowed&#8221; interface used by most operating systems on the planet.<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<h2><span class=\"ez-toc-section\" id=\"camera-systems\"><\/span>Camera Systems<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Camera systems provide a way to monitor or view a specific area, and are a very visual tool.\u00a0 As a rich source of movie myths, we see a wide variety of visual effects, most of which have nothing to do with how camera systems actually work.<\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"mistake-security-camera-recording-follows-the-subject\"><\/span>Mistake:\u00a0 Security Camera Recording Follows the Subject<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Beyond being a myth, when you see this in TV shows or movies, it&#8217;s an outright mistake!<\/p>\n<p><em>In the movie, a crime has been committed.\u00a0 The team immediately goes to the security office to view the security camera recordings, and we cut to the camera&#8217;s point of view.\u00a0 As we watch the subject commit the crime, our point of view pans to follow the subject!<\/em><\/p>\n<p>Cameras absolutely can shift their point of view &#8211; these are known as &#8220;Pan-Tilt-Zoom&#8221; (PTZ) cameras.\u00a0 PTZ cameras must be directly controlled by someone, such as a security guard.\u00a0 Assuming no one was watching the camera at the time the crime was committed, who was controlling the camera?\u00a0 Answer:\u00a0 a healthy dose of Hollywood magic, designed to make the scene more dramatic or interesting.<\/p>\n<p>Some cameras and camera systems provide a small degree of motion tracking, but this is usually either a system using fixed cameras, where motion triggers the computer to &#8220;zoom in&#8221; to a specific region where the motion was detected, or parallax motion tracking systems employ ultrasonics or other means of detecting and following the subject.\u00a0 In both cases, the motion is not smooth, and often requires quite a bit of motion.\u00a0 The subject is rarely in the center of the frame.<\/p>\n<p><strong>Any movie scene showing previously-recorded, supposedly fixed camera that &#8220;magically&#8221; follows the subject is completely fabricated! <\/strong><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"myth-camera-zoom\"><\/span>Myth:\u00a0 Camera Zoom<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><em>In the movies, the good guys zoom in to a camera freeze-frame multiple times in order to enlarge the suspect, a license plate, or some other important detail.\u00a0 The camera shows the detail with perfect clarity.<\/em><\/p>\n<p>Any recording method, including tape, film, or digital, has a specific resolution &#8211; the density of pixels (dots) used to compose the image.\u00a0 A printed photograph can have a resolution of hundreds to thousands of pixels per inch, while a digital image, usually measured in megapixels, has a resolution of maybe a hundred pixels per inch.\u00a0 &#8220;Megapixels&#8221; refers to the total number of dots in the entire image.\u00a0 If an image is 1920 pixels wide by 1280 pixels tall (HD), the resulting image is 2,457,600 pixels, or about 2.5 megapixels.\u00a0 1920 x 1280 is the resolution of a High Definition camera image &#8211; each frame is 2.5 megapixels.<\/p>\n<p>To see any kind of usable detail, you need an image of about 100 pixels by 100 pixels &#8211; for example, if a person&#8217;s face or a license plate is composed of about 10,000 pixels, then you can see a decent level of detail.\u00a0 If an HD camera covers a 20 foot by 16 foot area, then each square foot of the image consists of about 96 pixels by 96 pixels &#8211; meaning you could zoom all the way in, and still see someone&#8217;s face or a license plate.<\/p>\n<p>Satellite images, especially from military satellites, are measured in gigapixels (billions of pixels), allowing you to take a picture that covers hundreds of square miles, and zoom in to the level of detail of a license plate.\u00a0 This type of image requires a tremendous amount of storage, and isn&#8217;t suitable for real-time recording.<\/p>\n<p>Most camera systems have a much lower resolution, because higher resolutions require more storage space.\u00a0 Most cameras are 640 x 480.\u00a0 The same area (20ft x 16ft) covered by a standard &#8220;VGA&#8221; camera yields only about 24 pixels per foot, or about 600 pixels per square foot &#8211; way too few pixels to view details with any clarity!<\/p>\n<p>Zooming in past the resolution of the camera results in a blurry or pixelated image.<\/p>\n<p><strong>Zooming in from a wide angle view to a very small detailed area is beyond the capability of most camera systems.<\/strong><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"myth-focus-and-image-enhancement\"><\/span>Myth:\u00a0 Focus and Image Enhancement<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><em>In the movies, the hero techie zooms in to try to see the villain&#8217;s face or license plate, but it&#8217;s blurry.\u00a0 A quick &#8220;focus&#8221; later, and you can see the villain clearly!\u00a0<\/em><\/p>\n<p><em>Alternate scenario:\u00a0 The hero has a picture of the villain&#8217;s face or license plate, but it&#8217;s highly-pixelated.\u00a0 The techie runs a quick &#8220;image enhancement&#8221; routine, and voila!\u00a0 A perfectly-clear picture.<\/em><\/p>\n<p><strong>These two myths are closely related, as they both deal with the same fundamental principles.<\/strong><\/p>\n<ul>\n<li><strong>Focus<\/strong> is the ability to bring sharpness to an object in the foreground (closer to the camera) vs. the background.<\/li>\n<li><strong>Most security cameras use pinhole focusing<\/strong>, so that the lens has no specific focal length, meaning, everything is in focus, all the time.\u00a0 For PTZ (Pan-Tilt-Zoom) security cameras, zooming in doesn&#8217;t result in a loss of focus.<\/li>\n<li><strong>Focus is only available PRIOR to recording<\/strong>, because it acts on the light entering the camera.\u00a0 Once the image is recorded, it has been written as a set of pixels, and no further manipulation of the light is possible.<\/li>\n<li><strong>Image enhancement<\/strong> is an algorithm (often called a &#8220;filter&#8221;) that attempts to estimate detail based on groups of pixels within an image.<\/li>\n<li>There are entire books written about image enhancement, and <strong>hundreds of different techniques<\/strong>.\u00a0 Governments develop proprietary image enhancement methods, that can sometimes be closely-guarded state secrets.<\/li>\n<li>Even the most sophisticated image enhancement filters are <strong>simply guessing<\/strong> about what was originally there &#8211; you will never be able to reproduce the original detail exactly as it was, if for example, the original detail was removed from the recorded image due to poor resolution.<\/li>\n<li><strong>Multiple image enhancement filters<\/strong> can be applied to the same image, to enhance different details or they may be applied in sequence, where the output of the first filter is the input of the second filter.<\/li>\n<li>The most sophisticated image enhancement processes (end to end, using any combination of filters) can ONLY produce an image that approximates <strong>2.5 times the original resolution<\/strong>.\u00a0 So if you have a poor quality picture, where the bad guy&#8217;s face is about 20 pixels by 20 pixels (400 pixels, or enough to get a vague likeness, but not enough to see detail), the output, at best would be 50 x 50 (2,500 pixels), meaning, SOME detail will be visible (if the enhancement process was successful), but still less than ideal.<\/li>\n<li>Image enhancement can be applied to an image <strong>prior to recording (&#8220;on the fly&#8221; enhancement) or afterward<\/strong>.<\/li>\n<\/ul>\n<p><strong>Focusing an image AFTER it has been recorded is a movie myth.\u00a0 Likewise, the ability to take about 10 pixels and reconstruct a perfectly-clear image is way beyond the capabilities of image enhancement as it exists today.<\/strong><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"myth-cameras-and-keyboards\"><\/span>Myth:\u00a0 Cameras and Keyboards<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><em>In the movie, a critical camera recording is being reviewed by a technician, while the hero watches over his shoulder.\u00a0 The hero, looking at a freeze frame says &#8220;zoom in on his face&#8221;.\u00a0 The techie types some commands in to the keyboard, and the image zooms in.\u00a0 The hero asks, &#8220;can you make it any clearer?&#8221;, to which the techie responds, let me focus.\u00a0 He types some commands, and the picture becomes somewhat clearer.\u00a0 The techie says, &#8220;let me run image enhancement&#8221;, types a few more commands, and&#8230;. BOOM!\u00a0 The villain&#8217;s face, clear as a bell, pops in to focus on the display.<\/em><\/p>\n<p>Unless you live in the 1980&#8217;s, no one uses a keyboard for this type of operation.\u00a0 Typing keystrokes probably gives the character more credibility than watching them fumble around with a mouse, but clicking and dragging is about a hundred times faster than typing.<\/p>\n<p>Early video editors used keyboards &#8211; a standard that is still in use today.\u00a0 Keyboards are a quick way to invoke a specific function using a specific key, such as play, stop, advance frame, fast forward, etc&#8230;\u00a0 When dealing with a specific portion of an image, one would have to know the approximate coordinates.\u00a0 So let&#8217;s say you have a VGA image (640 x 480 pixels), and the villain&#8217;s face is at the top, center of the frame.\u00a0 You would have to know what pixel coordinates constitute the rectangle where you want to zoom.\u00a0 Too much mental math!\u00a0 It&#8217;s much easier to click and drag with a mouse, visually selecting the area you want.<\/p>\n<p>Image enhancement routines CAN be external programs, but typically, they are built in to the main editing application.\u00a0 Any built-in function would simply appear on a menu, from which you could use a mouse to select it.\u00a0 Although you could configure hot keys, or perhaps a macro to run several filters in a specific order, this would not require &#8220;commands&#8221; that are typed in to the keyboard.<\/p>\n<p><strong>Typing looks cool, but real people use mice!<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<h2><span class=\"ez-toc-section\" id=\"summary\"><\/span>Summary<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Some technology myths are repeated so frequently, that the general public believes the myth itself, without understanding real technological limitations.<\/p>\n<p>For writers, it&#8217;s easy to stretch the technological capabilities of real-world systems, because it&#8217;s a way to quickly find the villain or resolve some other plot point.\u00a0 However, to accomplish this well, a solid working knowledge of the technology allows the writer to paint a more realistic scenario.\u00a0 Good writers and directors employ a technical consultant, who can bridge the knowledge \/ myth gap, ensuring that the use of technology is realistic and appropriate.\u00a0 When watching movies or TV shows that leverage technology as a plot point, it&#8217;s often painfully evident which ones have the technology right, and which ones don&#8217;t!<\/p>\n<p>Hopefully, this article has helped debunk those high-tech Hollywood cliches, where the writer simply took a short cut.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In the movies, technology is often depicted as a deus ex machina, a convenience for the writer to instantly solve a problem.\u00a0 It&#8217;s common for writers to stretch the truth a little bit, in order to facilitate flow or continuity, but with technology, writers can sometimes imbue nearly magical qualities.\u00a0 Rightly so, as Arthur C. [&hellip;]<\/p>\n","protected":false},"author":16,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[20,5],"tags":[],"class_list":["post-1079","post","type-post","status-publish","format-standard","hentry","category-science","category-the-light-side"],"_links":{"self":[{"href":"https:\/\/justinparrtech.com\/JustinParr-Tech\/wp-json\/wp\/v2\/posts\/1079","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/justinparrtech.com\/JustinParr-Tech\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/justinparrtech.com\/JustinParr-Tech\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/justinparrtech.com\/JustinParr-Tech\/wp-json\/wp\/v2\/users\/16"}],"replies":[{"embeddable":true,"href":"https:\/\/justinparrtech.com\/JustinParr-Tech\/wp-json\/wp\/v2\/comments?post=1079"}],"version-history":[{"count":10,"href":"https:\/\/justinparrtech.com\/JustinParr-Tech\/wp-json\/wp\/v2\/posts\/1079\/revisions"}],"predecessor-version":[{"id":1310,"href":"https:\/\/justinparrtech.com\/JustinParr-Tech\/wp-json\/wp\/v2\/posts\/1079\/revisions\/1310"}],"wp:attachment":[{"href":"https:\/\/justinparrtech.com\/JustinParr-Tech\/wp-json\/wp\/v2\/media?parent=1079"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/justinparrtech.com\/JustinParr-Tech\/wp-json\/wp\/v2\/categories?post=1079"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/justinparrtech.com\/JustinParr-Tech\/wp-json\/wp\/v2\/tags?post=1079"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}