Schneier on Security
A blog covering security and security technology.
« The More Things Change, the More They Stay the Same |
| Threat Modeling at Microsoft »
October 10, 2008
Friday Squid Blogging: Natural Squid Steganography
Squid can communicate with each other without any other fish noticing:
Squid and their relatives have eyes that are sensitive to polarised light and to them and are known to use it to signal to one another. Their predators on the other hand, like seals or whales, don't share this ability and cannot see the squids' signals.
Most of all, the polarised iridescent light, is not affected by the chromatophores and passes through unaltered. This means that camouflaged squid can have entire visual conversations while remaining invisible to passing predators. In the world of squid, conversations carry secrets wrapped in lies.
Posted on October 10, 2008 at 4:58 PM
• 16 Comments
To receive these entries once a month by e-mail, sign up for the Crypto-Gram Newsletter.
HOLY CRAP! This is a big breach:
World Bank Under Cyber Siege in 'Unprecedented Crisis'
The World Bank Group's computer network — one of the largest repositories of sensitive data about the economies of every nation — has been raided repeatedly by outsiders for more than a year, FOX News has learned.....
..."We're not talking about hackers playing games or messing up our website," insists a senior member of the bank's IT department at its Washington headquarters. "It's about the FBI coming last summer and saying, 'You should take a look at your systems because we think something weird is going on.' It's about the intruders knowing what information they wanted — and getting to it whenever they wanted to. They took our existing data stores and organized them in a way that they could be easily accessed at will."
In plainspeak: "They had access to everything," says the source. "They had the keys to every room at the bank. And we can't say whether they still do or don't until we fully and openly address what's happening here."
The data raids are not a matter of stealing inconsequential bits and bytes. The World Bank's data center is literally a treasure trove of vital financial information from around the globe. As a clearinghouse for financial data from both governments and companies, the bank's computers could provide intruders with both a financial and intelligence gold mine — from inside information on bids and contracts to the minutes of confidential board meetings.
Anybody else have more detailed information?
It could be that Bruce is just trying to write in encrypted way. Perhaps where he writes "squid" we should read "terrorist", or the other way around.
Previous blog entries could thus be, not "Data Mining for Terrorists Doesn't Work" or "Nonviolent Activists Are Now Terrorists", but "Data Mining for Squids Doesn't Work" or "Nonviolent Activists Are Now Squids". I think this would make everything clearer.
Clearly, one should never play poker with a squid...his invisible friend might be looking over your shoulder and signaling.
So can we modify RFC1149, train up some squid, and organize a secret ocean network? Too late, I guess, since the secret's out.
You may have blogged this in your Friday squid entry before, but the new Oceans Hall at the Smithsonian Museum of Natural History has one of these monsters on display.
It's in a case with preservative that's obviously keeping it frozen (or at least cold) and by the looks of it, may be some sort of pressurized container.
Worth a trip over if you're in DC and want to see this and some other new ocean-based stuff (like that prehistoric fish once thought to be extinct, etc.)
Schneier.com is a personal website. Opinions expressed are not necessarily those of Co3 Systems, Inc.