Feeds

Brazilian cleaner spots security hole in Heathrow e-borders

Steve McQueen fan, clearly...

Mobile application security vulnerability report

The arrest of yet another illegal immigrant working at the House of Commons has revealed an unexpected vulnerability in the Home Office's plan to secure the UK's borders. What if they arrive at Heathrow and just run for it?

Brazilian woman Elaine Chaves Aperecida appears to have hit on something akin to this splendidly old-tech plan when she was detained by immigration officials in December 2004. Then, reports the Telegraph, she ran way from immigration officials before she could be refused entry.

It's not something Register hacks had previously noted, but yes now you mention it, UK immigration officials generally don't look either heavily armed or particularly athletic. So just familiarise yourself with the terminal maps during the flight, sprint for it and - having donned the apron secreted in your hand luggage - lose yourself among London's cleaning staff.

Which is certainly the outcome Elaine achieved until two weeks ago, when she was detained "after a random check on her security pass." This appears to have belonged to someone else, but she is reported to have been working in Parliament since early December, presumably using the same pass. Or perhaps not - officials seem not to know where she got the pass or to whom it had been issued in the first place, so perhaps the cleaners have a bucket of them that they just share around.

Traditionally UK Parliamentary passes have been ludicrously insecure and uncontrolled, but as the Telegraph notes, a new entry system was introduced last year, and the fact that Chaves was able to work there anyway for two months suggests that it's just as hopeless as the last system. Which we think is what we said here. ®

Mobile application security vulnerability report

More from The Register

next story
UK government officially adopts Open Document Format
Microsoft insurgency fails, earns snarky remark from UK digital services head
Major problems beset UK ISP filth filters: But it's OK, nobody uses them
It's almost as though pr0n was actually rather popular
US Social Security 'wasted $300 million on an IT BOONDOGGLE'
Scrutiny committee bods probe derailed database project
HP, Microsoft prove it again: Big Business doesn't create jobs
SMEs get lip service - what they need is dinner at the Club
ITC: Seagate and LSI can infringe Realtek patents because Realtek isn't in the US
Land of the (get off scot) free, when it's a foreign owner
MPs wave through Blighty's 'EMERGENCY' surveillance laws
Only 49 politcos voted against DRIP bill
Help yourself to anyone's photos FOR FREE, suggests UK.gov
Copyright law reforms will keep m'learned friends busy
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.