Posted by Nealeb on 20/06/2023 08:18:02:
…
It does raise an interesting question, though, of how you reliably authenticate two people who do not know each other over a phone without revealing any information that could be of use to a scammer. Back in my day job in IT security this was always a significant issue between computer systems – and still is – but in the real world it's one that doesn't seem to have a well-identified solution. …
Cryptography is the answer. Both sides share a secret, typically a password, a cypher, which need not be secret and a key, which is. The caller encrypts the password and rings the number. The receiver decrypts the password and only trusts the caller if there's a match. Possibly the receiver is required to respond with another encrypted password before the caller trusts the receiver.
Unfortunately the answer is hard to implement. There's a lot of admin and the key and password have to be changed regularly, which requires a secure channel. Unless the system is very simple, users either fail to comprehend it, or make too many mistakes. Security is perceived as a time-wasting faff, and users don't accept the need to follow the rules meticulously. The perception security is a time-wasting faff is correct until the balloon goes up!
Before computers became ubiquitous, encryption was only applied by organisations with trained staff. The military, diplomatic services, banks, and maybe organised crime. Crypto-systems can be attacked in many ways. How Nazi Germany's sophisticated Enigma system was unpicked during WW2 is well documented, and understanding the various methods used is an eye-opener.
Today, computer encryption is used by almost everybody. A program does most of the work, essentially setting up secure channels by exchanging encrypted tokens as described above. The cypher and key mechanism is strong and computer programs don't take the lazy ignorant shortcuts that humans believe are "common sense". And once connected to a secure service like a bank, the bank implements another layer of security before the connection is trusted. Trouble is, the mechanism is too complicated for humans to copy with paper and pencil. The consequence is that telephones are insecure, and their users have be alert, where both sides have to establish trust by asking the right questions. Not easy, especially when one side is up to no good, and they are armed with your personal information.
Anyone have their pension or payroll managed by Capita? Highly likely because many firms and organisations have outsourced payroll and pensions to specialists like Capita. In the distant past, I lost confidence in Capita, because they couldn't answer some rather basic questions about how they would protect data. This year Capita were comprehensively hacked by a Russian criminal organisation, and a large amount of private customer information is now in the wrong hands. Everything needed for convincing spam calls and much worse: names, addresses, phone numbers, email addresses, account numbers, and financial details galore. British Aerospace outsourced pensions to Capita, and now my aged mother has received a frank warning letter from BAe advising her to take a long list of precautions that she doesn't understand.
Be interesting to see how this develops. A firm of lawyers has already started a class action against Capita, and I'm wondering what Due Diligence BAe undertook before outsourcing pensions.
Capita's "Update on actions taken to resolve the cyber incident" does them no favours to my mind. The firms main concern appears to be reassuring investors, not the enormous problem the leak will cause the many individuals affected! Note they provide contact details for investors and the media, but not victims!
In my opinion the law doesn't punish sloppy security adequately, or pursue those responsible. Over the last 20 years, cyber-crime has become the largest category of crime in the UK and almost nothing has been done to prevent or prosecute it. The police need significant extra resources and either a major reorganisation of force boundaries, or a new national force. Not the sort of local basic policing that Sergeant Dixon dealt with in Dock Green manor, or a job for the Sweeny!
Whilst typing this, I received a phone call from Microsoft, asking for me by name. The caller-id was my sister's mobile phone number. This is the most well-informed phone spam I've received so far: despite my efforts to keep my identity private on the web, they've got hold of two different private facts that can be used to create trust. Having several private facts greatly increases the chance of pulling off of successful con trick. I'm afraid I told the young lady a lot of misleading untruths, but it underlined the rising risk. Let's be careful out there!
Dave