Massachusetts Bay Transportation Authority v. Anderson et al

Filing 20

EXHIBITS one thru eight re 2 MOTION for Temporary Restraining Order by Massachusetts Bay Transportation Authority. (Attachments: # 1 Exhibit Two, # 2 Exhibit Three, # 3 Exhibit Four, # 4 Exhibit Five, # 5 Exhibit Six, # 6 Exhibit Seven, # 7 Exhibit Eight)(Edge, Eugenia)

Download PDF
Massachusetts Bay Transportation Authority v. Anderson et al Doc. 20 EXHIBIT 1 Dockets.Justia.com Page 1 of2 From: Sent: To: Cc: Manuel Albers [manuel.albers@nxp.com] Wednesday, July 30, 2008 5:53 PM shenderson@mbta.com Fluegge.Wolfgang@Scheidt-Bachmann.de; bhoene@scheidt-bachmann-usa.com Subject: Boston Charlie Card Hack Demo subject at speach at upcoming Defcon conference in August Scott, FYI: Today we learned about a conference (Defcon) at which a team of MIT students intends to demo a Charlie Card Hack. Of special concern is the announced intent to release open source tools required to perform the attacks: http://defcon.org/html/defcon-16/dc-16-speakers.html#Anderson The Anatomy of a Subway Hack: Breaking Crypto RFID's and Magstripes of Ticketing Systems Zack Anderson Student, MIT RJ Ryan Student, MIT Alessandro Chiesa Student, MIT Want free subway rides for life? In this talk we go over weaknesses in common subway fare collection systems. We focus on the Boston T subway, and show how we reverse engineered the data on magstripe card, we present several attacks to completely break the CharlieCard, a MIFARE Classic smartcard used in many subways around the world, and we discuss physical security problems. We will discuss practical brute force attacks using FPGAs and how to use software-radio to read RFID cards. We go over social engineering attacks we executed on employees, and we present a novel new method of hacking WiFi: WARCARTING. We will release several open source tools we wrote to perform these attacks. With live demos, we will demonstrate how we broke these systems. Zack Anderson is studying electrical engineering and computer science at MIT. He is an avid hardware and software hacker, and has built several systems such as an autonomous vehicle for the DARPA Grand Challenge. Zack is especially interested in the security of embedded systems and wireless communications. He has experience building and breaking CDMA cellular systems and RFID. Zack has worked for a security/intelligence firm, and has multiple patents pending. He enjoys building systems as much as he enjoys breaking them. RJ Ryan is researcher at MIT. His longtime passion for security has resulted in a number of 7/31/2008 Page 2 of2 hacks and projects, including a steganographic cryptography protocol. RJ works on a number of technical projects ranging from computer security to operating systems, distributed computation, compilers, and computer graphics. He enjoys learning how things work, and how to make things work for him. Alessandro Chiesa is a Junior at MIT double majoring in Theoretical Mathematics and in Electrical Engineering and Computer Science. Born and raised in Varese,Italy, he came to MIT with interests in computational algebraic geometry, machine learning, cryptography, and systems security. He has authored papers such as "Generalizing Regev's Cryptosystem", which proposes a new cryptosystem based on shortest vector problems in cyclotomic fields. He is currently working with Oracle's Database Security group. Please let me know if we can support you in any way. Best regards, -Manuel Albers Director, Regional Marketing Americas & BU A&I - Sales & Marketing - Identification & NXP Semiconductors (P) +1.802.497.0888 & (C) +1.401.359.4999 & (F) +1 866.333.2976 & http://www.NXP.com & ( f o u n d e d by Philips) The information contained in this message is confidential and may be legally privileged. The message is intended solely for the addressee(s). If you are not the intended recipient, you are hereby notified that any use, dissemination, or reproduction is strictly prohibited and may be unlawful. If you are not the intended recipient, please contact the sender by return e-mail and destroy all copies of the original message. 7/31/2008

Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.


Why Is My Information Online?