Malicious USB devices, Past, Present and Future

Page created by Kyle Parker
 
CONTINUE READING
Malicious USB devices, Past, Present and Future
APRIL 2020
                        Automation and Control | Electronics | Measurement and instrumentation | Technology and IoT

Malicious USB devices,
Past, Present and Future
Working at home
navigating the scams

Photon entanglement
revolutionises secure
communication

The planetary
computer for a
healthier planet

Radar the car’s
visual eye

Beacons to study
tropo propagation

Reinventing the
internet for trust

ISSN 1991-5047
Malicious USB devices, Past, Present and Future
The Now Media Group is the new owner of the EngineerIT and Energize titles.

The Marsh family, owners of the Now Media Group, and the Yelland family,
  the previous owners of the titles, go back a generation when their
     parents ran their businesses out of London House in Loveday Street
        in the centre of Johannesburg some 50 years ago.

           That is where the coincidence ends. Yelland was in the electrical
            business and John H Marsh, a journalist and best-selling author
             of Skeleton Coast, was a magazine publisher.

              Now Media was founded in 1953 by John and
              continues to be run as a family business by Dave,
              chairman (2nd generation), and Anton, CEO
             (3rd generation).

            The company has taken an innovative approach to
publishing, whether it be establishing quick-read high frequency
trade newspapers or running its own printing works to ensure it
can be first with the news.

Before the internet was popularised it launched its first online B2B
service in 1989, Travelinfo, which changed the way the travel industry
in South Africa operates. It continues to flourish today with over 4 000 travel
   agents using it repeatedly throughout the day for their operations.

    It now has a strong internet presence with three daily news sites in the
     freight and travel sectors.

     Nico Maritz, who heads up a division that focuses on B2B monthlies and
     upmarket magazines for large residential estates, will manage Energize
         and EngineerIT.

             Most critically we believe in being effective for our clients.
              Through niche publications with highly engaged audiences
                we can provide solid, effective promotional solutions to the
                 industries and audiences we serve.

                    The Now Media Group is a level 2 B-BBEE company
                     based in Illovo, Johannesburg and employs around
                      100 staff across: 5 business magazines, 11 security estate
                     publications, 3 daily news and 3 twice-weekly trade
                   websites, a travel reference and training system, as well
                as its printing works.
Malicious USB devices, Past, Present and Future
FROM THE EDITOR
                    After Covid-19, will the world
                    return to normal?
         he simple answer is no, not for a long time.                   that conferences, product launches and customer

T        Maybe never!
         In 1965 for a special issue of the journal
Electronics, Gordon Moore, at the time heading up
                                                                        face-to-face events will not be possible. Companies
                                                                        must rethink the way they will be keeping and
                                                                        increasing their market presence.
Fairchild, was asked to predict developments of                             Research carried out by Kantar, the world’s leading
semiconductors over the next decade. Observing that                     data, insights and consulting company, shows that
the total number of components in these circuits had                    after the 2008/09 financial crash, stronger brands
roughly doubled each year, he blithely extrapolated                     recovered up to nine times faster in terms of stock
this annual doubling to the next decade, estimating                     market value than others. Several electronic device
that the microcircuits of 1975 would contain an                         and software companies in the US that kept their
astounding 65,000 components per chip. Today we                         operations and marketing intact were ready to go when
still refer to Moore’s law as an illustration of the rapid              the situation normalised, whereas others that had put
rate at which developments take place, and the                          everything on hold took months to get back to the new
changes in our world.                                                   normal and had to step up their marketing efforts to
      To come back to the question: will the world return               win back some of their customers.
to normal, it is impossible to answer this pertinent                        “Brand health becomes vulnerable when
question unless we can define what is normal. The                       companies stop advertising,” says Kantar Insights
problem is that the normal of today will change by                      global head of media, Jane Ostler. “If they do this for
tomorrow and then we will have a new normal. The                        too long, it destroys both short- and long-term health.”
1911 attack on the World Trade Centre in New York                       Instead, she advises brands to change their media,
changed the normal in less than a day. It turned the                    messaging and touchpoints to ensure they are
travel industry upside down and sent security                           reaching customers with communications that they are
agencies and governments into a frenzy. The world                       most interested in. Marketers should look at how
came out of this but with a very new normal. The                        budgets can be spent most effectively to maintain a
Covid-19 pandemic will do the same. We will return to                   presence and key brand metrics if spend does need to
normal, a very new normal.                                              be reduced.
      Recovering from the pandemic lockdown will be                         Lockdown put sales and marketing events on hold,
a long process. There is however a major difference                     but you still have a sales budget to meet. Why not
between lockdown and shutdown. In South Africa                          spend some of the budget on online advertising and
we have seen innovative ways in which some                              promotions? We at EngineerIT have vowed to keep
sectors of the industry have responded, and                             the technology stories flowing online and have created
overnight, working remotely online took off. We are                     online advertising space at economical rates.
no longer zooming on our highways, but rather                               Rework your promotions budgets and move into
Zooming along wireless connections.                                     the online world. Send your customers and would-be
      ICASA was quick to react by making large chunks                   customers a strong message: “We are alive and well
of spectrum available to the mobile industry to fast                    and ready to serve you!”
expand our wireless highways. For over 10 years,                            We cannot print our April edition at this time, and
government was unmoveable on the spectrum issues.                       we will review the position once the lockdown of our
This is just one example of how the normal has                          printing works and distribution channels is lifted. Right
changed and how in future, companies will take the                      now, the April edition of EngineerIT is available online.
new, enlightened view that working from home is not a                       Check your inbox for our Tuesday and Thursday
bad idea. Sure, there will be issues to overcome, but                   e-newsletters and if you have news and new products
we have learnt to adapt, overnight.                                     you wish to share with the market, send me an email.
      The way we are going to do business will be
different. The lockdown will only be lifted in stages,                  Happy reading
and for the foreseeable future, gatherings of large                     Hans van de Groenendaal
numbers of people will remain restricted, meaning                       hansv@nowmedia.co.za

                                          EngineerIT | April 2020 | 1
Malicious USB devices, Past, Present and Future
CONTENTS
                                                         APRIL 2020

                Automation and Control | Electronics | Measurement and instrumentation | Technology and IoT

                                          Technology can unfortunately also              EDITOR
                                          be used against us. Malicious uses             Hans van de Groenendaal -
                                          for USB devices have probably been             MIng Honoris Causa (Stellenbosch)
                                          around for as long as the USB                  Tel: 012 991 4662
                                          standard. One of the earliest                  Cell: 082 781 4631
                                          malicious uses of USB devices was              Email: hansv@nowmedia.co.za
                                          malware spreading on flash drives.
                                          Later, users would use unauthorised            ADVERTISING
network devices such as 3G modems to connect their corporate laptops to the              Merinda Lottering
Internet, in order to bypass restrictive firewall policies. The U3 implementation        Cell: 071 765 5702
of a CD-ROM drive combined with a flash disk was abused to automatically                 Email: merindal@nowmedia.co.za
execute commands as soon as the flash drive was plugged in. This was
commonly exploited by leaving malicious flash drives lying around, in the                DESIGNER
hope that someone would pick them up and plug them in to their computer,
                                                                                         Adéle Gouws
and the payload would automatically be run by the operating system.

And you believed that USB devices, USB cables and receivers were safe.                   PUBLISHED BY
Think again. In this explosive article, Rogan Dawes takes these devices apart            African Destination
and shows how vulnerable they can be.                                                    Publishing (Pty) Ltd
                                                                                         Tel: +27 (0)11 327 4062
                                                                                         Fax: +27 (0)11 327 4094
                                              A VOICE FOR
                                                                                         E-mail: engineerit@nowmedia.co.za
                                                                                         Physical address:
                                                                                         Now Media Centre
                                                                                         32 Fricker Rd, Illovo, Johannesburg
                                                                                         South Africa
                                                                                         Postal address:
                                                                                         PO Box 55251, Northlands, 2116

                                                                                         PUBLISHER
                                                                                         Nico Maritz
                                                                                         Email: nicom@nowmedia.co.za

                                                                                         PRINTED BY
                                                                                         JUKA

                                                                                         WEBSITE
                                                                                         www.engineerit.co.za

                                                     EngineerIT | April 2020 | 2
Malicious USB devices, Past, Present and Future
4
                                                                                          20
                                                                                                                                             28

                                      24                                                 26                                                  35
FROM THE EDITOR                                                                           1    Copyright
                                                                                               Copyright of all material appearing in EngineerIT
                                                                                               is vested in African Destination Publishing (Pty)
NEWS                                                                                      4    Ltd. In submitting any article for publication, the
                                                                                               authors confirm that they own the copyright to
ICT CYBER SECURITY                                                                             the said article, which is ceded to African
                                                                                               Destination Publishing (Pty) Ltd for publication.
Malicious USB devices, Past, Present and Future                                           8
                                                                                               The editor reserves the right to edit or shorten
                                                                                               articles submitted for publication. Editing and/or
ICT                                                                                            shortening is done with due dilligence, where
The difference between active and passive antennas                                       11    necessary in conjuction with the author(s).
                                                                                                     No part of this publication may be
Work at Home                                                                             12
                                                                                               reproduced, or stored in a retrieval system, or
Quantum leap for photon entanglement could revolutionise secure communications           14    transmitted in any form, or by any means,
Build data culture into the fabric of a digital business                                 16    except as described below, without the written
                                                                                               permission of African Destination Publishing
                                                                                               (Pty) Ltd. Copying of articles is not permitted
AMATEUR RADIO                                                                                  except for personal and internal use, to the
Beacons to study inland tropospheric propagation                                         18    extent permitted by South African law.
                                                                                               Permission is not required to make abstracts, on
SCIENCE                                                                                        condition that a full reference to the source is
                                                                                               shown. Requests for permission for other kinds
A healthy society requires a healthy planet                                              20
                                                                                               of copying should be addressed to African
                                                                                               Destination Publishing (Pty) Ltd.
AUTOMATION
The future of business lies in the combined power of man and machine                     22    Disclaimer
                                                                                               Articles published in EngineerIT do not
                                                                                               necessarily reflect the views of African
AUTOMATION AND CONTROL                                                                         Destination Publishing (Pty) Ltd or the editor.
Managing operational efficiency in food retail                                           24    In addition, views expressed by the editor do
                                                                                               not necessarily reflect the views of African
                                                                                               Destination Publishing (Pty) Ltd or any other
MEASUREMENT AND INSTRUMENTATION                                                                person or organisation associated with
Radar, the car’s virtual eye                                                             26    EngineerIT.
                                                                                                    It is a condition of publishing material in
                                                                                               EngineerIT that African Destination Publishing
TECHNOLOGY
                                                                                               (Pty) Ltd shall not be liable for any
The rise of conservation technology in Africa                                            28    consequential or other damages arising from
                                                                                               the publication in good faith of any article,
SPACE SCIENCES                                                                                 advertisement, picture, comment, view or
                                                                                               opinion. This applies to publishing, failing to
SANSA plans for SA to profit from space                                                  30
                                                                                               publish, late publishing or incorrectly publishing
                                                                                               any article, advertisement, insert, picture,
OPINION                                                                                        caption, etc.
Reinventing the internet for trust                                                       32         It is acknowledged that errors in transcript,
                                                                                               human and technical errors can and do occur,
                                                                                               but that reasonable effort will be made to
COMMENT AND OPINION                                                                            minimise their occurence, and to acknowledge
Start training the skills of the future, now!                                            34    and correct such errors when they are brought
                                                                                               to the attention of African Destination
                                                                                               Publishing (Pty) Ltd.
NEW PRODUCTS                                                                             35

                                                           EngineerIT | April 2020 | 3
Malicious USB devices, Past, Present and Future
NEWS

ICASA issues temporary radio frequency spectrum

  CASA has considered applications for temporary radio frequency

I spectrum to ensure connectivity for all during the National State of
  Disaster period. Seventeen applications were in line with the criteria
and conditions outlined in the regulations.

Radio frequency spectrum in the 700/800 MHz bands
Because analogue and digital television broadcasting services are still
operating in the 700 MHz and 800 MHz frequency bands, sharing and
co-existence in these frequency bands would have to be implemented
systematically through a geographic separation of International Mobile
Telecommunication (IMT) Systems and Broadcasting Services in affected
areas in accordance with the updated 2013 Terrestrial Broadcasting
Frequency Plan as published. Telkom, MTN and Vodacom have been granted
temporarily assignment of 40 MHz.

Assignment of the radio frequency spectrum in the
2300 MHz band
Telkom has been temporarily assigned 20 MHz in addition to the 60 MHz it already
has in this band. Vodacom has been temporarily assigned 20MHz.                        rate all COVID-19 sites as identified from
                                                                                      time to time by the Department of Health
Assignment of the radio frequency spectrum in the                                     and published in the Government Gazette.
2600 MHz band                                                                              The Authority exercised extreme care in
The total amount of available spectrum in this band is 170 MHz. The following         the assignment of this temporary spectrum
applicants were assigned spectrum in this band:                                       to existing licensees, in order to achieve
• Telkom has been temporarily assigned 40 MHz                                         the objectives of the COVID-19 Regulations
• Vodacom and MTN have been temporarily assigned 50 MHz                               which are aimed at alleviating network
• RAIN Networks has been temporarily assigned 30 MHz in addition to the 20            challenges, easing congestion and
   MHz it already has in this band.                                                   ensuring good quality of service for
                                                                                      consumers.
Assignment of the radio frequency spectrum in the                                          “I would really like to express my
3500 MHz band                                                                         deepest gratitude to all applicants and
The total amount of available spectrum in this band is 116 MHz. As in other bands,    licensees alike, and I believe the spectrum
the temporary assignments in the 3500 MHz band were made on the principles of         will be used efficiently as well as optimally
non-discrimination to all qualifying applicants. The following applicants were        for the benefit of all South Africans. This will
assigned temporary spectrum in this band:                                             indeed bridge the communications divide
• Telkom has been temporarily assigned 12 MHz out of the 32 MHz applied for. It       during this difficult period of our lifetime”,
    is important to note that Telkom is currently assigned 28 MHz in the 3500 MHz     said ICASA Acting Chairperson, Dr
    band and was assigned 12 MHz to afford it adequate capacity spectrum to meet      Keabetswe Modimoeng.                           n
    the demand occasioned by the pandemic during this period.
• Vodacom has been temporarily assigned 50 MHz as applied for.
• MTN has been temporarily assigned 50 MHz out of the 70 MHz applied for.
• Liquid Telecoms has been temporarily assigned 4 MHz, which adds to the 56
    MHz it already has in this band.

Authorisation to use TVWS during the National State of Disaster
The Authority received applications from Mthinte Communications, Levin Global
and Morai Solutions for the use of TVWS in the 470 – 694 MHz band.
   The authorisation for use of TVWS by these applicants was granted subject to a
number of conditions as set out in the regulations

Conditions associated with the temporary spectrum assignment
All successful licensees for temporary IMT radio frequency spectrum assignments
must ensure that they support and create virtual teaching and classrooms as
determined by the Department of Basic Education and the Department of
Communications and Digital Technologies in various districts during the National      ICASA Acting Chairperson,
State of Disaster. Furthermore, all radio frequency spectrum licensees must zero      Dr Keabetswe Modimoeng

                                                        EngineerIT | April 2020 | 4
Malicious USB devices, Past, Present and Future
NEWS

Government sets up Covid-19 situational awareness platform
    n response to the announcement by President Ramaphosa                hotels, lodges, boarding houses at schools, etc that can be

I   of a range of measures to deal with the Coronavirus
    pandemic, the Department of Science and Innovation (DSI)
in cooperation with the Council for Scientific and Industrial
                                                                         used in the fight against the pandemic. He thanked the data
                                                                         analysts and other workers, who have been working up to 16
                                                                         hours a day to collect data. He also welcomed the involvement
Research (CSIR), commissioned the set-up of a core                       of telecoms service provider Vodacom, which donated 20 000
situational awareness platform.                                          mobile devices to be used by the community health workers
     The centre, led by the Department of Health in partnership          deployed to conduct the household screening for the virus. The
with DSI and its entity, the CSIR, provides near real-time               mobile devices assist in digitising the screen time data which is
analytics and dashboards on the coronavirus outbreak per                 used for real-time reporting.
province, district, local municipality and ward.                             Dr Nzimande thanked the CSIR for the work it was doing on
     The centre is housed in a secure facility at the CSIR in            the data platform and noted that "behind this platform is a set of
Pretoria and provides a central situational awareness, giving            competencies that include epidemiological modelling, data
a single view of the reality of the spread of the coronavirus            analytics, high-performance computing and data visualisation.
across the country.                                                      These are important investments that the DSI has been making
     The Covid-19 Information Centre is one of several projects          over a number of years to ensure that we have an innovation-
the DSI is working on in support of the government's                     enabled developmental state."                                    n
response to the pandemic. Among the centre's capabilities is
the CMORE app, a mobile visualisation platform used by
community health workers to record screening data and
symptoms in the field and transmit the information to the
centre. The app enables a near-live display of the results of
the work being conducted by the government's Household
Screening and Testing Programme.
     The data and insights generated by the centre provide
significant input for decision-making by the National
Coronavirus Command Council.
     On Thursday 9 April the Minister of Higher Education,
Science and Innovation, Dr Blade Nzimande, hosted
President Cyril Ramaphosa at the centre. He was
accompanied by the Deputy Minister of Health, Dr Joe
Phaahla.
                                                                         President Cyril Ramaphosa being tested for a temperature as
     The President commended the work being done at the                  he arrives at the Covid-19 Information Centre accompanied
centre, as it produces detailed information not only on the              by the Minister of Higher Education, Science and Innovation,
spread of the virus but also on the availability of hospitals,           Dr Blade Nzimande.

                                                                                                     Established in 2017, iSERT may be
iSERT becomes first Sigfox accredited                                                            a fresh face in the market, but it has
                                                                                                  already made significant inroads into
test laboratory                                                                                   the industry. As one of the only labs in
                                                                                                  South Africa to offer a turnkey solution
                                                                                                  for EMC, RF and safety testing, it brings
    SERT, a company specialising in

i
                                                                                                  something crucial to the local
    turnkey testing solutions for EMC, RF                                                         electronics industry.
    and safety testing, has collaborated                                                              “With the advent of the Fourth
with SqwidNet, the only licensed Sigfox                                                           Industrial Revolution (4IR), we realised it
operator in South Africa, to become the                                                           was essential for a test lab to have the
first, and currently only, Sigfox                                                                 capabilities of testing products that
accredited test laboratory in the                                                                 incorporate the latest technology in one
southern hemisphere. The partnership                                                              convenient location,” says Riaan van den
allows iSERT to provide customers with                                                            Berg, managing director at iSERT. “Our
testing facilities to ensure they will not                                                        partnership with SqwidNet and Sigfox
degrade the Sigfox network. For                                                                   ensures that products are of good
SqwidNet, the partnership allows for                                                              quality and that they will not degrade the
further investment into South African                                                             Sigfox network. It’s similar to PTCRB
innovation and development.                                                                       testing for cellular networks.”          n

                                                        EngineerIT | April 2020 | 5
Malicious USB devices, Past, Present and Future
NEWS

Denel to manufacture ventilators and ambulances

          enel is mobilising its resources      current operations and technology to         investigate designs and produce a

D         and expertise towards a priority
          project for the local design and
development of medical ventilators.The
                                                assist the national efforts. This include
                                                the production of sanitisers and the
                                                conversion of Casspir mine-protected
                                                                                             prototype of a local medical ventilator.
                                                                                                  Du Toit says Denel employs some of
                                                                                             South Africa’s top engineers, researchers
company is also working on repurposing          vehicles into ambulances.                    and scientists who have worked on
its Casspir mine-protected vehicles into            “We are proud to respond                 sophisticated technology projects in the
ambulances.                                     immediately and positively to a request      past. This accumulated knowledge and
     Danie du Toit, Group Chief Executive       from the Department of Public                expertise will now be mobilised to work
of Denel says engineers from Denel              Enterprises to drive the ventilator          closely with medical scientists to produce
Dynamics and Denel Aeronautics are              project. As a state-owned company we         life-saving ventilators.
already working round the clock on              are committed to utilising our skills,            “Through Project Sabela we are now
Project Sabela – ‘we are heeding the            technology and experience in support of      focusing all our efforts on the current
call’ – in partnership with other state-        the national objectives to combat the        medical and humanitarian crisis facing
owned entities, research bodies and             scourge of the Covid-19 pandemic at          South Africa and the world,” says Du Toit.
medical technology companies.                   our doorstep”.                               “We are confident that we will soon make
     The defence and technology                     A task team has been formed              huge strides in the development of locally-
company is also considering other               consisting of experts from Denel, Armscor,   designed ventilators at a time when global
initiatives in which it can repurpose its       Eskom, the CSIR and other entities to        shortages are experienced.”              n

                                                                                             companies can more rapidly adapt their
                                                                                             supply chain to ship products and
 IoT will become the biggest user of                                                         services where there is the most demand
                                                                                             for it.
 edge computing amidst rising                                                                     “By performing all analysis at the
                                                                                             edge, companies can reduce the load on
 security concerns                                                                           their data centres, resulting in cost
                                                                                             efficiencies due to the reduced
        rom less than $1.5 billion in 2017      than earlier generations, but the

F
                                                                                             centralised processing needed. This can,
        to an anticipated $9 billion by 2024,   ubiquitous connectivity that 5G will bring   in turn, be enhanced with additional
        the worldwide edge computing            means that the capacity of what have         analysis at the data centre. Ultimately,
market is set to show significant growth in     essentially become mini-computers to         companies become more agile in meeting
the coming years. With expectations that        collect data across a myriad of              customer demand or receiving alerts
around 31 billion Internet of Things (IoT)      touchpoints will increase massively. Using   about factors that could impact
devices will be online by the end of this       the high computational power of the edge,    operations,” adds Bartsch.               n
year, businesses are on the cusp of an
exciting new era where they can unlock
more insights from their data.
     Gartner defines edge computing as
an “emerging topology-based computing
model that enables and optimises
extreme decentralisation, placing nodes
as close as possible to the sources of
data and content. The edge enables IoT
devices to process information right
there and then, without having to send
the raw data to data centres. “Accessing
data in real-time can even mean the
difference between life and death. For
example, getting alerts on the medical
condition of a patient or being notified
of a car-hijacking taking place,” says
Andreas Bartsch, Head of Service
Delivery at PBT Group.
     Not only have IoT devices become
significantly more sophisticated in design

                                                        EngineerIT | April 2020 | 6
Malicious USB devices, Past, Present and Future
NEWS

                                                                                             The obvious reason to outsource some
                                                                                             of this work is to reduce costs by
                                                                                             utilising a third-party expert to execute a
                                                                                             service when needed by the customer. In
                                                                                             the Middle East and Africa, O&G
                                                                                             companies started the outsourcing of
                                                                                             assets health and performance
                                                                                             monitoring decades ago. However,
                                                                                             companies have equipment from several
                                                                                             OEMs (for pumps, turbines, motors,
                                                                                             valves, etc), which makes it difficult to
                                                                                             manage these assets in a cost-effective
                                                                                             manner. This opens the doors for third-
                                                                                             party service companies to address the
                                                                                             scope of different OEM’s assets in a
                                                                                             single contract.
                                                                                                  Emerson, a global industrial
                                                                                             automation provider, is addressing the
                                                                                             need of the O&G industry by leveraging
Digital transformation, oil and gas                                                          the power of IIOT (Industrial Internet of
                                                                                             Things) to deliver the Plantweb Digital
industry opportunities                                                                       Ecosystem. Plantweb leverages data
                                                                                             generated by existing or new sensors in
                                                                                             a company’s facility and offers analytics
        igital transformation has created new opportunities for oil and gas companies

D
                                                                                             tools and secure connectivity to enable
        (O&G) to lower monitoring costs, improve safety and optimise asset                   scalable monitoring services such as:
        performance and availability by outsourcing to third party companies.                health monitoring, condition monitoring,
    Public sector industries such as hotels, banking and residential facilities have been    performance monitoring and providing a
leveraging third party services (i.e. maintenance, logistics, catering etc.) for decades.    full turn-key monitoring solution.        n

                                                                                             colleges direct network access to
   R7.5M Teraco grant for SABEN                                                              Platform Teraco, where the institutions
                                                                                             will benefit from highly secure and direct
                                                                                             interconnection to Africa’s largest digital
                                                                                             ecosystem.                                n
         outh African Broadband                 serving the public Technical and

S        Education Networks (SABEN)
         has received a R7,5 m grant
from Teraco via the Teraco Connect
                                                Vocational Education and Training
                                                (TVET) sector in South Africa. It is
                                                purpose-built to solve the digital
Foundation. Over the next five years,           requirements of this sector. Hnizdo
Teraco will partner with SABEN to               says that the Teraco Connect
support the national drive to end               Foundation grant will not only enable
bandwidth poverty among South                   these educational institutions to access
Africa’s schools and public TVET                content directly and grow their
colleges.                                       collective digital strategy, but will also
     Jan Hnizdo, CEO of Teraco, says            assist in laying essential foundations
that the grant will help to facilitate the      for future digital remote learning
changing landscape of education in              strategies: “To enable digital
South Africa. Digital infrastructure            transformation, SABEN’s need for
initiatives, including remote learning          direct access to a rich ecosystem of
and educational streaming will become           content and cloud providers can be
more efficient and easier to implement.         realised, enabling efficient connections
“The Teraco Connect Foundation sees             to education cloud services, streaming
the grant as an investment in the future        and remote learning possibilities.”
of this country at a time when all                   Technically, the grant provides
sectors are facing significant                  SABEN a physical presence in Teraco
challenges.”                                    data centres located in Durban, Cape
     SABEN is a non-profit company              Town and Johannesburg and gives

                                                         EngineerIT | April 2020 | 7
Malicious USB devices, Past, Present and Future
ICT CYBER SECURITY

Malicious USB devices, Past,
Present and Future
By Rogan Dawes, Researcher at Sensepost

And you believed that USB devices, USB cables and receivers were safe.
Think again. In this explosive article, Rogan Dawes takes these devices apart
and shows how vulnerable they can be.

        he Universal Serial Bus (USB)       drive was plugged in. This was            disabling the practise of executing

T       was a revolution when it was
        introduced, consolidating the
myriad of connectors previously
                                            commonly exploited by leaving malicious
                                            flash drives lying around, in the hope
                                            that someone would pick them up and
                                                                                      AutoRun programs by default, mitigating
                                                                                      this particular vulnerability, and
                                                                                      something that started as a simple
required for peripherals into a single      plug them in to their computer, and the   prank was quickly weaponised by
common standard, and enabling a             payload would automatically be run by     security researchers, and had probably
multitude of new technologies and           the operating system. That led to         been utilised as such by criminals for
devices that would otherwise have been      operating systems like Windows            much longer.
inconceivable. But apart from the
unified connector, one of the most
important changes brought about by the
introduction of USB was the ability to
make the peripheral self-describing, and
the development of common device
classes that peripherals could simply
implement. It is this change that largely
eliminated the “driver hell” previously
required, because the operating system
could simply implement a driver that
dealt with an entire class of devices at
once, and it could be automatically
loaded and applied to any peripherals
that described themselves as a member
of that class.

Technology is not always
friendly
Technology can unfortunately also be
used against us. Malicious uses for USB
devices have probably been around for
as long as the USB standard. One of the
earliest malicious uses of USB devices
was malware spreading on flash drives.
Later, users would use unauthorised
network devices such as 3G modems to
connect their corporate laptops to the
Internet, in order to bypass restrictive
firewall policies. The U3 implementation
of a CD-ROM drive combined with a
flash disk was abused to automatically
execute commands as soon as the flash

                                                   EngineerIT | April 2020 | 8
The Phantom Keystroker is a
device sold from around 2008 by
a novelty store as a way
to play tricks on
people. When
plugged into a
computer, it would
randomly emit mouse
movements and
keystrokes, intended to
confuse the user. A researcher
named Adrian Crenshaw saw
                                                                                                               USB devices, how
this device and recognised the                                                                                 safe are they?
potential for automated attacks, if the
keystrokes could be scripted rather
than randomly generated. This led to
the development of the “Programmable
Human Interface Device (HID) USB
Keystroke Dongle (PHUKD)”, which            This could then execute a                              subsequent communications
could type out a pre-determined             command prompt, and relay input                     channel was carried over the
payload under various circumstances,        and output over the Raw HID interface             Raw HID interface. It was also
for example, after a delay, or when         to allow the attacker to interact with it.    capable of executing PoisonTap-style
triggered by a sensor of some sort, for          A Raw HID interface was chosen,          attacks as well.
example, when the lights were turned        despite the problems actually
off. A variety of commercial                experienced using it, in order to avoid       Tricking wireless mouse and
implementations of this idea followed,      tools that check for unauthorised USB         keyboard receivers
including the USB Rubber Ducky.             devices. Most such tools are simply           But so far, all of these USB attacks have
     So-called Rubber Ducky attacks         blocking mass storage class devices           had one significant flaw; to carry out the
have been fairly successful since then,     (flash drives), and possibly network          attack, the attacker needs physical
but the majority of attacks required        interfaces such as WiFi cards, modems         proximity to the victim’s computer, at
network access to download and              and phone tethering, but are not              least long enough to plug the device in,
execute a more advanced malware than        blocking anything as simple as a              and hopefully not be noticed doing so.
could easily be typed out. Companies        keyboard or a mouse.                          This could potentially be avoided by
have been implementing more network              In the intervening time, several         targeting a USB device that is already
controls to detect and prevent malware,     more ingenious USB attacks have               plugged in to the victim’s computer. One
including intercepting and decrypting       been developed. Samy Kamkar                   such device is the receiver for wireless
requests to websites, and limiting          developed PoisonTap, which uses a             mice and keyboards. Being wireless,
access to sites based on reputation, or     Raspberry Pi Zero configured as a             the requirement for direct physical
subject matter. All of this made Rubber     network adapter; when plugged into a          proximity could be avoided.
Ducky attacks less likely to be             victim’s machine, it tricks it into routing        In 2016, a researcher named Marc
successful, and more likely to be           all of its network traffic over that          Newlin discovered that the receivers for
detected and prevented.                     interface. In this way, unencrypted           numerous models of wireless mice could
     In 2016, I presented a device called   network traffic can be captured and           be tricked into accepting keystrokes from
USaBUSe (Universal Serial aBUSe),           analysed, and the victim can be tricked       a remote attacker and passing those on
which extended the concept of Rubber        into sending password hashes to               to the operating system. Wireless
Duckies by adding an additional bi-         PoisonTap. These can then be cracked          keyboards typically encrypt keystrokes
directional communications channel          offline, or used in attacks against other     that they send to avoid eavesdroppers
between the victim’s PC and the             systems on the target network.                capturing sensitive information like
attacker. This was achieved by                   Another interesting attack,              passwords, and, as a result, an attacker
integrating a WiFi interface connecting     P4wnP1, was developed by Marcus               with no knowledge of the encryption key
to the attacker’s access point, and         Mengs, and runs on a Raspberry Pi             would be unable to encrypt their own
adding a Raw HID interface to the           Zero W. When connected to a victim’s          keystrokes. Newlin discovered that the
Rubber Ducky’s existing keyboard and        USB port, P4wnP1 can present a                wireless mice did not encrypt their
mouse. Data written to the Raw HID          variety of USB interfaces, from mass          messages, and that a keystroke
interface would be available on the WiFi    storage to network, but also as a             message could be sent through the
interface, and vice versa. A somewhat       keyboard and mouse, with a Raw HID            same path as the unencrypted mouse
larger than typical PowerShell payload      interface. In this way, the P4wnP1 was        messages and end up being passed to
was typed out, which opened the Raw         also capable of carrying out so-called        the operating system. This attack was
HID interface, and downloaded and           USaBUSe-style attacks, where the              called MouseJack, and a number of
executed a more advanced program.           initial payload was typed out and the         parallel implementations appeared.

                                                    EngineerIT | April 2020 | 9
ICT CYBER SECURITY

     Marcus Mengs subsequently               LOGITacker, as well as implementing
                                                                                              About the author
performed some in-depth research into        it for O.MG cable. Each of the current
                                                                                              Rogan Dawes is a senior researcher
the Logitech unifying receivers, which       implementations has significant
                                                                                              at SensePost and has been hacking
present a Raw HID interface as well as       limitations that I intend to address in
                                                                                              since 1998, which, coincidentally, is
the expected keyboard and mouse,             the near future. In the course of
                                                                                              also the time he settled on a final
and, in 2019, proved that it was indeed      doing so, I will unify the attacker’s
                                                                                              wardrobe. He used the time he saved
possible for an attacker to send             interface to the tools, as well as
                                                                                              on choosing outfits to live up to his
arbitrary binary data to a unifying          extending the capabilities of the
                                                                                              colleague’s frequent joke that he has
receiver, and have it presented to the       victim-side component.
                                                                                              an offline copy of the Internet in his
operating system via the Raw HID                  USaBUSe has significant
                                                                                              head. He spent many years building
interface. A Proof of Concept tool           complexity in actually setting up and
                                                                                              web application assessment tools
implementing this was released, called       carrying out an attack. There are a
                                                                                              and is credited as having built one of
LOGITacker, which implemented both           number of moving parts that need to be
                                                                                              the first and most widely used
simple MouseJack attacks, as well            precisely orchestrated in order to be
                                                                                              intercepting proxies - WebScarab. In
USaBUSe-style Command and Control            successful. The most significant change
                                                                                              recent years, he has turned his
(C2) over Raw HID. This means that an        to USaBUSe then will be to migrate
                                                                                              attentions towards hardware hacking,
attacker simply needs to identify a          those moving parts into the USaBUSe
                                                                                              and these days many suspect him to
target using a Logitech wireless mouse       firmware itself, dramatically simplifying
                                                                                              be at least part cyborg. A good
or keyboard with a unifying receiver,        the overall experience.
                                                                                              conversation starter is to ask him
and, with a few minutes of                        P4wnP1 implemented the covert
                                                                                              where he keeps his JTAG header. n
uninterrupted time with the computer         channel, but this was removed during
left unlocked, could compromise that         construction of the P4wnP1 ALOA (A
target without ever touching it. In fact,    Little Offensive Appliance) distribution.
the original MouseJack attacks could         I intend to reimplement the covert             attacker side program that allows for
be performed from up to 80m away,            channel in P4wnP1 ALOA, and                    full binary data transfer through the
given line of sight to the target!           integrate configuration and                    serial port of the Nordic dongle to the
                                             deployment of it with the existing             attacker’s computer.
USB cables with an attacker                  P4wnP1 user interface.                               As mentioned, O.MG cable has no
twist                                             LOGITacker has a functional               covert channel implementation at the
More recently, Mike Grover has been          covert channel implemented in the              moment. I am in the process of
working on embedding a WiFi                  firmware of the dongle itself, making          implementing this, and will integrate all
controller into the A-male connector of      it very easy and convenient to use,            the changes for USaBUSe into the
a USB cable, which appears as an             but the initial typed payload is               O.MG cable as well, as there could be a
innocuous cable when plugged in, and         excessively large, resulting in                substantial amount of shared code.
can even charge and transfer data to a       opportunities for that payload to be                 All in all, the work currently being
connected device. Only when the              corrupted by errant keystrokes.                undertaken will harmonise the attacker
attacker initiates his attack does the       LOGITacker also has no way for an              and victim-side implementations and
connected device disconnect, and the         attacker to transfer binary data               user experience, making these sorts of
cable itself appears as a keyboard and       between the victim and his own                 USB attacks more achievable, and
mouse, again able to attack the              computer, meaning that arbitrary file          more effective.
connected host operating system. This        transfer is impossible. I am in the                  From a user’s perspective, be
again does not necessarily require           process of developing a new multi-             cautious about what USB peripherals you
direct physical access to the target, as     stage client payload, which                    connect or allow to be connected to your
the idea is that the victim may plug it in   minimises the number of typed                  computer. In particular, Logitech’s non-
himself while charging his phone, for        keystrokes required, while allowing            Bluetooth wireless mice and keyboards
example. Or it could be used as a            more fully featured client executables         are an easily exploited avenue onto your
replacement cable between the host           to be transferred to covert channel            computer. But even a simple flash drive is
and a keyboard, particularly Apple           itself to upgrade the client’s                 still something to be wary of, if you are not
wireless keyboards that are charged          capabilities. I will also develop an           certain of its origin.                     n
using a lightning cable. These O.MG
cables are available as lightning, micro
USB and USB-C cables, and are                 About Sensepost
virtually indistinguishable from any          SensePost is SecureData’s independent elite consulting arm, renowned for its
other legitimate cable. The O.MG cable        expertise,19 year track record and innovation on the frontlines of cybersecurity.
does not yet support Raw HID                      With team members that include some of the world’s most pre-eminent
interfaces, however.                          cybersecurity experts, SensePost has helped governments and blue-chip companies
     Over the past several months, I          both review and protect their information security and stay ahead of evolving threats.
have been working on refining the                 SensePost is also a prolific publisher of leading research articles and tools on
covert channel implementations for            cybersecurity which are widely recognised and used throughout the industry and
USaBUSe, P4wnP1 and                           feature regularly at industry conferences including BlackHat and DefCon.             n

                                                    EngineerIT | April 2020 | 10
ICT

The difference
                                                                        beamforming depending on the technology employed to drive
                                                                        the AAS beamforming antenna array. Even more advanced
                                                                        AAS may include all of the antenna array, TRX,
                                                                        modulation/demodulation, digital-to-analogue conversion

between active and                                                      (DAC), analogue-to-digital conversion (ADC), digital
                                                                        processing, beamforming, MIMO, carrier aggregation (CA), and
                                                                        networking communication hardware in a single module, as is

passive antennas                                                        done with the latest 4G LTE AAS modules and is planned for
                                                                        5G infrastructure.
                                                                             Active antennas may also be part of a smart antenna, or
                                                                        cognitive radio, and include some awareness of the
By Peter McNeil, Pasternack                                             electromagnetic (EM) spectrum in their environment or include
                                                                        the ability to externally provide intelligence. In this way a smart
                                                                        antenna could reconfigure itself for best performance in its
        passive antenna is a radiating element composed entirely

A
                                                                        current environment. A cognitive radio system may even be able
        of passive components. Typically, this means that a             to learn about its environment and the dynamics of wireless
        passive antenna system is one with at least a passive           communications in its environment and develop strategies to
radiator (antenna element), passive impedance matching,                 enhance its service using active antenna technology or other
passive balun, passive tuning (capacitive or inductive), and            radio technology.
passive interconnect (commonly 50 ohm or 75 ohm impedance).                  Typically, active antennas are more expensive and complex
A circulator or isolator may also be considered part of a passive       than passive antennas, hence there are less available options for
antenna, depending on whether the antenna system is packaged            suppliers of active antennas. Also, active antennas may be more
as a unit or separate parts. Ambiguously, the term antenna may          difficult to troubleshoot and service than passive antennas,
be used to describe an antenna element or structure as well as          though some active antennas and AAS may also include built-in-
an antenna system, in some cases.                                       self test (BIST) and built-in-diagnostic (BID) technology that aids
    An active antenna system uses some method of active                 with the troubleshooting process. In many cases, an active
electrical enhancement or control to provide improved antenna           antenna or AAS is part of a much larger communications
performance for a given application. Active antenna                     infrastructure and must perform in a very specific manner, making
components may consist of amplifiers, such as low-noise                 the active antenna or AAS only useful for that given application.
amplifiers (LNAs) or power amplifiers (PAs), active filtering           With passive antenna, often a variety of different antenna may be
(tuneable filters or switched filter banks), or potentially even        used, given the need or changing requirements.                      n
switched antenna radiator sections. Active antennas enable
control and performance enhancement which can either be                 For more information email andrew@rfdesign.co.za
manually engaged/configured or can be enabled automatically
by software or analogue/digital control systems. Active
antennas are crucial for many applications that require                   5G and active antennas
additional degrees of freedom, tunability, increased signal
strength to/from the antenna radiator, or configurable antenna.           Active antennas (AAs) support a myriad of wireless use cases that are evolving
Active antenna can provide better rejection of unwanted signals,          with next generation 5G cellular service. AAs promise performance
lower signal-to-noise ratio (SNR) using LNAs close to the                 improvements of more than 2-3X over conventional base station antennas in
antenna, high transmit power, better impedance match to the               roughly the same form factor and at comparable costs.
antenna, and other performance benefits depending on the                       Conventional base station antennas are connected to a remote radio unit via
active antenna technology used.                                           coaxial cable and essentially transmit energy from high on a tower over a wide
    A more advanced version of an active antenna is an active             coverage area in horizontal beamwidths up to 120 degrees per sector. For 360-
antenna system (AAS) which may employ a complete                          degree coverage, antennas are installed in 3-sector arrays with one or more
transmit/receive (TRX) component along with phase and                     antennas per sector depending on the area and the number of active users. In
amplitude adjustment to enable beamforming. Other forms of                high-density applications, carriers use mechanical gear to point antennas
AAS include multi-input multi-output (MIMO) capability that               downwards to deliver more RF energy to a smaller coverage area on the ground.
includes digital processing that enables multiple spatial                      By contrast, active antennas incorporate the RF source, basically a radio-
streams from a multi-element antenna array. Antenna arrays                on-a-chip, that connects to an array of small antennas all mounted in the same
can use analogue beamforming, digital beamforming, or hybrid              shroud. Power and fibre optic cables connect directly to the AA, eliminating the
                                                                          remote radio unit. With integrated radios and antenna arrays under software
                                                                          control, AAs dynamically deliver high-speed signals wherever needed in a
                                                                          coverage area to enable a range of new applications not feasible before. With
                                                                          multiband operation, AAs can support new high-speed, low latency 5G use cases
                                                                          across many markets. This diversity of applications is creating a bandwidth-on-
                                                                          demand scenario that exceeds the limits of conventional base station antennas,
                                                                          but that AAs can handle.
                                                                               AAs designs achieve these capabilities with Massive MIMO and dynamic
                                                                          beamforming.                                                                     n

                                                       EngineerIT | April 2020 | 11
ICT WORKING REMOTE

        he whole country has been

T       sent to work from home.
        We are well into the
lockdown and for most
businesses, things appear to be
going well. I see new pieces each
day telling us about the ability to
derive greater productivity and
reduce emissions while still
getting the job done. Costs in
office space can be reduced and
everybody can simply go ahead
and thrive in the new normal
world of work.
     As I sit in the home office
with my work slipslops on, I’m
wondering if this is really true
and if we have we thought
through it all.
     With the possibility of being
another voice in the cacophony
surrounding the lockdown and the
massive security risks that come
with it, I hope to provide some

                                      Work at Home
practical points to ponder on -
now that your entire team is hard
at work in their pyjamas.
     From a cyber security
perspective, it is true that
                                      By J2 Software CEO John Mc Loughlin
attackers are using the COVID19
pandemic to spread their malware
and target previously office-bound
users to try and extract money or     Scams disguised as remote IT support
information from them.                We also see a rise in the number of scams done via telephone – remote support or phishing
     Tens of thousands of new         scams are flourishing because “Bob” from IT is on the phone to help connect to your machine
domains and ‘news sites’ have         and solve all your problems. Please do take care. Some key points to start with:
sprung up to spread fake news,        1. If you do not know the person on the other side of the call or have not sent a direct
malware and launch cyberattacks.          support request, do not give them any information or let them connect to you, your
They are working on people’s fear         meetings or your computer.
and uncertainty to get them to        2. Never ever give anybody your username, password or pin over the telephone.
click on their well-put-together      3. Do not click on links from people you do not know.
campaigns of utter rubbish.           4. When you do know the person, do not click on links if this not their normal way of
     Your users (people) are still        doing business.
the last line of defense and a        5. If documents, language, grammar and so on look different to the normal way you interact
critical layer to protect you from        with service providers, clients etc. do not download, open or click.
cyberattacks. The stats tell us       6. If you didn’t enter the competition you did not win it.
that most attacks start via email     7. If you do not know a relative that suddenly died in the UK, you did not receive an inheritance.
– this has not changed, but with      8. Be aware of fake sites, attackers are using the outbreak of COVID19 to spread their
the human migration homewards,            attacks – use only trusted sources of information.
people are interacting with a         9. Even with a layered security program in place for work-related items, several people are
plethora of new gadgets and               using things like Whatsapp Web, Gmail, Outlook.com and Zoom. The attacks can also
doo-hickeys.                              come through these systems. Please be vigilant.
     Virtual meetings are Zooming     10. If you are not sure on what security settings to use when hosting a virtual meeting, ask a
all around us, teams are                  professional. Passwords, non-public chats and similar measures can prevent being
gathering online and photos by            bombarded by links, videos or pornography in the next meeting.
the Gigabyte are being sent onto      11. If something does not seem right, please verify before acting. Speak to the person via
social media pages. All of this           telephone. Only use contact details you are sure of.
oversharing opens up more and         12. Ensure policy compliance and visibility. Just because the people are no longer in your office
more points of entry for the party        does not mean they should get away from basic cyber hygiene. User awareness training,
pooper cyber criminals.                   activity monitoring and patching/updates are still crucial.

                                                    EngineerIT | April 2020 | 12
ICT WORKING REMOTE

If you have any doubts, verify, and if       which can result in them downloading          and months will bring, but I am quite
you cannot do that – ask me or a             that payment file or clicking the link to     sure that working from home will be far
professional who can guide you in the        get the ‘invoice’ or read their new           more widely used. Think through all
right direction. Take advantage of           ‘payroll data’.                               applications and situations and
security capabilities on the platforms            Encourage your people to remain          incorporate these into your risk
of choice and use things like multi-         active and take a bit of time in the day to   discussions. It is important to adapt to
factor authentication.                       stand up. Walk around and even look at        the new normal, whatever that may be.
     I hear those at the back of the room,   the sun. Many people leave their desks            Things are forever different. Don’t
hiding behind the Twitter keyboards          to have lunch in the office, should this      believe me? Well, almost no business
telling me that this stuff is obvious.       change now?                                   had a 100% work from home
Maybe, but why do we keep seeing                  Do you share sensitive company           simulation in their risk strategies,
statistics of the growing number of          information with other businesses and         continuity and disaster recovery plans
successful attacks, loss of data and         organisations? You are very likely doing      three weeks ago.
spate of complete shutdowns due to           that now. The home migration now sees             Put on your work pajamas and get
ransomware attacks?                          different businesses sharing resources.       things done, and don’t forget to brush
     Now we have covered the obvious              Your significant other is likely at a    your teeth!
stuff. What about those topics that          different entity, but here we all are             Stay safe, stay at home.             n
businesses should be thinking about that     sharing resources for the internet, Wi-Fi,
might not be quite as obvious?               possibly computer time, USB devices,
                                             office space and online meetings.              About J2 Software
Increased productivity is great                   We need to be fully aware that            J2 Software is a security focused
but keep a balance                           things that are being said in open             African technology business founded
Our people are now always working,           meetings are now being shared with             in 2006 to address the need for
putting in the hours. This is ideal, they    people in different companies. Your            effective cybersecurity, governance,
roll out of bed and go directly to the       secured devices could be used by               risk and compliance solutions in
home office desk, or just stay in bed with   others in the household to access their        Africa. J2 Software delivers essential
the laptop. Our people are hitting the       company networks.                              tools that empower organisations to
mail before the bathroom and many are             How secure are those interactions         take control of their technology
brushing their keyboards before they         and what measures are in place to              spend. The company's hand-picked
have brushed their teeth.                    monitor for anomalous usage and                solutions provide complete visibility
     An increase in productivity is          access outside of your control?                over its customers' environment,
fantastic, but without the ability to             Make sure that your people are            while reducing risk and lowering
accurately monitor activity, are our         aware of these risks and if they are           costs. The company has provided
people doing the right things, keeping       part of the thousands of households            services and solutions to enterprise
within policy and ensuring data security     who share computing, office and WiFi           corporations with sites running in
compliance requirements?                     resources please do it safely. Enforce         South Africa, Angola, Botswana,
     Having your people ‘always working’     visibility on activity, monitor, secure        Kenya, Malawi, Mauritius,
is amazing, but tired people take            and encrypt.                                   Mozambique, Tanzania, Uganda,
shortcuts and miss the tell-tale signs            We do not know what the next weeks        Zambia, Australia, UK and Malta. n

      VISIT OUR WEBSITE FOR UP-TO-DATE NEWS

                            www.engineerit.co.za
                                                    EngineerIT | April 2020 | 13
ICT EMERGING TECHNOLOGIES

Quantum leap for photon
entanglement could revolutionise
secure communications
         breakthrough in the development           However, those wavelengths are

A        of quantum-enhanced optical
         systems could pave the way for
advances in encryption, communication
                                                   vulnerable to interference from the
                                                   sun’s light when they are transmitted
                                                   over open air, making them difficult to
and measurement, scientists say.                   use in applications such as secure
    In a new paper published in the                satellite-to-ground and satellite-to-
journal Science Advances, a group of               satellite communications.
researchers, led by Matteo Clerici at the               The Glasgow-led team’s new
University of Glasgow’s James Watt                 method of generating entangled
School of Engineering and colleagues               photons further into the infrared at
from the UK, Japan and Germany,                    two micrometres wavelength, could
demonstrate a new method of                        help overcome these problems for
generating and detecting quantum-                  the first time.
entangled photons at a wavelength of                    Dr Matteo Clerici, senior lecturer at
2.1 micrometres.                                   the University of Glasgow, said: “What
    The ability to generate and detect             we have been able to do for the first
the quantum state of light underpins the           time is carve out a band in the                       Dr Matteo Clerici
development of secure communication                electromagnetic spectrum where the
for both guided wave and free space                entangled particles we produce are less likely to be affected by background solar
systems. Free space quantum key                    radiation when they’re transmitted across free space.
distribution (QKD) has recently enabled                 “There is what we call a ‘transparency window’ in the atmosphere where there
quantum secured intercontinental                   aren’t many gases which can absorb light at a wavelength of two micrometres. Also,
communication as much as 7 600 km                  the sunlight is much less overwhelming in this region – it’s one-third the brightness
apart on Earth. Until now, on-satellite            that it has at standard telecommunication wavelengths around 1550 nm, for example.
based QKD was only possible during                      “Thus far, that has been one of the key stumbling blocks to advancing daylight
hours of darkness. A further reason for            quantum key distribution in free space - if the wavelength that the photon detector is
this research comes from the limitations           sensitive to is too close to the wavelength of the photons that are coming towards it
of guided wave optics. The current fibre           from the sun, the detector can easily be blinded.”
networks face a capacity crunch.                        This breakthrough has benefited from the cutting-edge expertise of UK photonics
Solutions such as novel hollow-core                companies. In partnership with Covesion Ltd, Dr Clerici and his team have engineered
photonic bandgap filters, working at two                                              a nonlinear crystal made from lithium niobite, suitable
micrometres with reduced optical non-                                                          for operating at 2.1 micrometres. The
linearities and lower losses, are currently                                                          entangled photon pairs are generated
under test for network implementation.
    The unique, non-classical
                                                          QUANTUM                                        when short pulses of light from a laser
                                                                                                            source, provided for this research
properties of entangled photons are                     STATE DEFINED                                         by Chromacity Ltd, pass through
used in applications including                                                                                  the crystal.
quantum key distribution, which                A quantum state is simply something that encodes the                   The entangled photons,
makes uncrackable                           state of a system. The special thing about quantum states is           which have half the energy of
communications between two                         that they allow the system to be in a few states                 their parent photon and
parties possible.                             simultaneously; this is called a "quantum superposition".              which are perfectly
    Methods of entangling                     A quantum state is a vector that contains all the information          correlated in polarisation,
photons at shorter                       about a system. However, generally you can only extract some of             are then sent towards a
wavelengths of between 700               that information from the quantum state. This is partly due to the          specially designed super-
and 1550 nanometres are                       uncertainty principle and mostly just due to the nature of             conducting nanowire
already well-established.                                    quantum mechanics itself. n                            single-photon detector.

                                                           EngineerIT | April 2020 | 14
You can also read