{"id":87,"date":"2023-02-08T20:15:28","date_gmt":"2023-02-08T20:15:28","guid":{"rendered":"https:\/\/www.hexkey.co.uk\/lee\/?p=87"},"modified":"2023-02-08T20:15:28","modified_gmt":"2023-02-08T20:15:28","slug":"person-of-interest-s1e13","status":"publish","type":"post","link":"https:\/\/www.hexkey.co.uk\/lee\/log\/2023\/02\/person-of-interest-s1e13\/","title":{"rendered":"Person of Interest S1E13"},"content":{"rendered":"\n<p>Notes for <a href=\"https:\/\/personofinterest.fandom.com\/wiki\/Root_Cause\" data-type=\"URL\" data-id=\"https:\/\/personofinterest.fandom.com\/wiki\/Root_Cause\">season 1 episode 13<\/a>, &#8220;Root Cause&#8221;<\/p>\n\n\n\n<p>02:51 Finch&#8217;s background searching includes a screenshot of what is clearly Facebook but without a logo, rather than some in-universe site.<\/p>\n\n\n\n<p>06:50 Finch constructs a waveguide antenna out of a tube of potato chips. &#8220;Its dimensions are perfect for capturing wifi radio waves.&#8221; <a href=\"https:\/\/web.archive.org\/web\/20050727235441\/http:\/\/www.oreillynet.com\/cs\/weblog\/view\/wlg\/448\">Pringles Cantennas<\/a> are one the more famous of the Wardriving hardware hacks that emerged in the early 2000s, and it&#8217;s a Pringles tube that gets used for this purpose in <a href=\"https:\/\/mrrobot.fandom.com\/wiki\/Eps2.8_h1dden_pr0cess.axx\" data-type=\"URL\" data-id=\"https:\/\/mrrobot.fandom.com\/wiki\/Eps2.8_h1dden_pr0cess.axx\">an episode of Mr Robot<\/a>.  You could, around 2005, buy commercial cantennas that were styled as erstaz Pringles tubes. (Ironically, Pringles tubes have a diameter of 72mm which is considered just <a href=\"https:\/\/www.wikarekare.org\/Antenna\/WaveguideCan.html\" data-type=\"URL\" data-id=\"https:\/\/www.wikarekare.org\/Antenna\/WaveguideCan.html\">slightly too small<\/a> to be ideal for user with 2.4GHz. But since Finch is using a different brand of chips, &#8220;SPUD&#8221;, maybe the can is slightly larger.)<\/p>\n\n\n\n<p>07:14 The neighbourhood has wifi names that look like Xbox gamertags. There are a variety of protection modes enabled WEP, WPA, WPA2. Finch cracks the WPA password instantly via an undisclosed method. There are more WEP networks than I&#8217;d have expected for 2012 &#8211; I&#8217;d given up on getting an internet connection on the Nintendo DS (which could only handle WEP) since everything seems to have switched to WPA by 2010. Firing up <a href=\"https:\/\/apps.apple.com\/gb\/app\/wifi-explorer\/id494803304\" data-type=\"URL\" data-id=\"https:\/\/apps.apple.com\/gb\/app\/wifi-explorer\/id494803304\">WiFi Explorer<\/a>, currently all the networks I can see in 2023 are either WPA2 Personal or open. I think I have yet to connect to a WPA3 network.<\/p>\n\n\n\n<p>07:22 We see more perpetual Warners domains for angry blogs (<code>takebackourunitedstates.com<\/code>, <code>keepwashingtonaccountable.com<\/code>, <code>therealamericanvoice.com<\/code>) but looks like they forgot\u00a0to register\u00a0<code>lifelibertyandpolitics.net<\/code> ?<\/p>\n\n\n\n<p>08:59 &#8220;&#8230;it was a PGP-encrypted anonymous email account.&#8221; So, I assume this means the file is an archive of downloaded mail that has been PGP encrypted, and then magically decrypted by Finch by some unknown method.<\/p>\n\n\n\n<p>12:15 &#8220;The IP addresses match, but there are big discrepancies in the TTL values and the headers are failing to authenticate.&#8221; The implication is that the mails have been planted, but this is a bit techobabble. TTL values aren&#8217;t really a thing that stored email has. DKIM headers can be used to authenticate headers, but this wasn&#8217;t in wide use by early 2012. (Yahoo had been using a precursor signing scheme, though. In fact the patents will expire later this year.) The trace headers (eg &#8220;<code>Received:<\/code>&#8220;) can contain timestamps and other elements which might indicate a forgery, which is probably what&#8217;s been alluded to here&#8230; but &#8220;outbox&#8221; mail doesn&#8217;t usually have them.<\/p>\n\n\n\n<p>14:42 &#8220;They spoofed his internet search history [&#8230;] so that he looked guilty to the police.&#8221; Ok, the search history makes sense &#8211; but the mails were &#8220;PGP-encrypted&#8221;, so the police would need to have the capacity to break PGP in order for this to be effective?<\/p>\n\n\n\n<p>16:10 Brennan Brown\u00a0portrays Agent Donnelly, but in the UK\u00a0he&#8217;s mostly known for spending previous years as head of the <a href=\"https:\/\/www.youtube.com\/watch?v=0M1y--OjE24&amp;list=PL-gg564EyxI1AshQqWR_3B1u1doY_6H6q&amp;index=1\" data-type=\"URL\" data-id=\"https:\/\/www.youtube.com\/watch?v=0M1y--OjE24&amp;list=PL-gg564EyxI1AshQqWR_3B1u1doY_6H6q&amp;index=1\">Orange Film Commission Board<\/a> (a series of commercials in which a film board, funded by a mobile phone company, will only commission projects in which mobile phone services can be featured).<\/p>\n\n\n\n<p>19:16 Finch&#8217;s technique of deliberately running malware in a &#8220;sandbox&#8221; is something that&#8217;s accessible for people to do online, sites such as <a href=\"https:\/\/www.joesandbox.com\/\" data-type=\"URL\" data-id=\"https:\/\/www.joesandbox.com\/\">joesandbox.com<\/a>.<\/p>\n\n\n\n<p>19:15 Finch&#8217;s screen shows a cool Visual Traceroute when locating the hacker&#8217;s server.<\/p>\n\n\n\n<p>19:32 You know it&#8217;s a legit movie hacker when they have Nmap open, <a href=\"https:\/\/nmap.org\/movies\/\" data-type=\"URL\" data-id=\"https:\/\/nmap.org\/movies\/\">as is traditional<\/a>. (In this case they&#8217;ve literally just included the Zenmap <a href=\"https:\/\/nmap.org\/zenmap\/\" data-type=\"URL\" data-id=\"https:\/\/nmap.org\/zenmap\/\">screenshot from 2007<\/a>.)<\/p>\n\n\n\n<p>20:09 Reese asks Finch for the most direct route from the police station to the court house, rather than use a maps app. Finch is basically Siri at this point.<\/p>\n\n\n\n<p>22:30 Ah, the classic &#8220;hit phone screen with hammer&#8221; response to malware. It&#8217;s so common in TV shows for devices to be &#8220;destroyed&#8221; by smashing the screen. It destroys the resale value, perhaps, but doesn&#8217;t necessarily prevent forensic examination.<\/p>\n\n\n\n<p>32:04 The radio-transmitter stuck to the shoe was disguised as an\u00a08-Pin DIP, for some reason?<\/p>\n\n\n\n<p>39:03 I can&#8217;t clearly make it out, but it looks like the YouTube-type site that Root leaks the audio to is <code>youlenz.com<\/code><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Notes for season 1 episode 13, &#8220;Root Cause&#8221; 02:51 Finch&#8217;s background searching includes a screenshot of what is clearly Facebook but without a logo, rather than some in-universe site. 06:50 Finch constructs a waveguide antenna out of a tube of potato chips. &#8220;Its dimensions are perfect for capturing wifi radio waves.&#8221; Pringles Cantennas are one [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[7],"class_list":["post-87","post","type-post","status-publish","format-standard","hentry","category-notes","tag-person-of-interest"],"_links":{"self":[{"href":"https:\/\/www.hexkey.co.uk\/lee\/wp-json\/wp\/v2\/posts\/87","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hexkey.co.uk\/lee\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.hexkey.co.uk\/lee\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.hexkey.co.uk\/lee\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hexkey.co.uk\/lee\/wp-json\/wp\/v2\/comments?post=87"}],"version-history":[{"count":1,"href":"https:\/\/www.hexkey.co.uk\/lee\/wp-json\/wp\/v2\/posts\/87\/revisions"}],"predecessor-version":[{"id":88,"href":"https:\/\/www.hexkey.co.uk\/lee\/wp-json\/wp\/v2\/posts\/87\/revisions\/88"}],"wp:attachment":[{"href":"https:\/\/www.hexkey.co.uk\/lee\/wp-json\/wp\/v2\/media?parent=87"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.hexkey.co.uk\/lee\/wp-json\/wp\/v2\/categories?post=87"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.hexkey.co.uk\/lee\/wp-json\/wp\/v2\/tags?post=87"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}