{"id":66176,"date":"2025-08-28T12:11:17","date_gmt":"2025-08-28T19:11:17","guid":{"rendered":"http:\/\/www.enxmag.com\/twii\/?p=66176"},"modified":"2025-08-28T12:11:18","modified_gmt":"2025-08-28T19:11:18","slug":"printer-vulnerabilities-a-lesson-in-not-leaving-keys-in-the-car","status":"publish","type":"post","link":"http:\/\/www.enxmag.com\/twii\/the-week-in-imaging-twii\/editors-blog\/2025\/08\/printer-vulnerabilities-a-lesson-in-not-leaving-keys-in-the-car\/","title":{"rendered":"Printer Vulnerabilities: A Lesson in Not Leaving Keys in the Car"},"content":{"rendered":"\n<div class=\"wp-block-image\"><figure class=\"alignleft size-medium\"><img loading=\"lazy\" width=\"300\" height=\"250\" src=\"https:\/\/www.enxmag.com\/twii\/wp-content\/uploads\/2025\/08\/printer-300x250.png\" alt=\"\" class=\"wp-image-66177\" srcset=\"http:\/\/www.enxmag.com\/twii\/wp-content\/uploads\/2025\/08\/printer-300x250.png 300w, http:\/\/www.enxmag.com\/twii\/wp-content\/uploads\/2025\/08\/printer-1024x854.png 1024w, http:\/\/www.enxmag.com\/twii\/wp-content\/uploads\/2025\/08\/printer-768x640.png 768w, http:\/\/www.enxmag.com\/twii\/wp-content\/uploads\/2025\/08\/printer.png 1280w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/figure><\/div>\n\n\n\n<p>There\u2019s an old &#8220;Seinfeld&#8221; episode in which Jerry has his car stolen, but since he had a car phone (impressive tech back in the early 1990s) he decided to call the number to see if the thief would answer, which he did. After some joke-filled banter, Seinfeld asked the thief how he was able to hot-wire the car, as he was curious about the process.<\/p>\n\n\n\n<p>\u201cI didn\u2019t cross any wires,\u201d replied the crook, who was voiced by series co-creator and writer Larry David. \u201cThe keys were in it.\u201d<\/p>\n\n\n\n<p>Which brings us to this story about printer security vulnerability that grabbed headlines for all of about 30 seconds last week\u2014an eternity in today\u2019s news cycle. In general, legacy printers are cited as being especially vulnerable to security threats, unlike the more modern devices with robust, advanced features. But this week\u2019s example skirts around even the best defense available on the market, because there\u2019s no tech remedy against a printout being left sitting on an output tray for prying eyes to see.<\/p>\n\n\n\n<p>Printing\u2019s answer to Seinfeld leaving his keys in the car reportedly ensnared the State Department, and occurred during President Donald Trump\u2019s historic Anchorage summit with Russian President Vladimir Putin. A document printout marked &#8220;State Department&#8221; appears to have covered a number of housekeeping items\u2014a lunch menu, meeting times for the summit at Joint Base Elmendorf\u2013Richardson, and mundane reminders such as how to pronounce Putin\u2019s name and seating arrangements\u2014that were found on an Anchorage hotel printer, reportedly left behind by staffers.<\/p>\n\n\n\n<p>None of the information appears to have been confidential, with the possible exception of an event schedule that detailed what time President Trump would be entering given rooms. Generally, the comings and goings of the president and foreign leaders\/dignitaries are kept under wraps until after an event. In this case, the documents were discovered several hours prior to the meeting. The phone numbers of staffers in charge of organizing the event were also listed\u2014not quite to the level of national secrets.<\/p>\n\n\n\n<p>News of the gaffe was broken after hotel guests shared the pages with, of all news organizations, National Public Radio (NPR)\u2014the outlet perhaps most impacted by President Trump\u2019s decision to take away taxpayer support from public broadcasting. (Editor\u2019s note: NPR is also reeling from the loss of Ari Shapiro, longtime host of the outlet\u2019s signature program, \u201cAll Things Considered.)<\/p>\n\n\n\n<p>In the end, while the mistake was fairly reckless, the story was pretty much a nothing-burger. To top it off, the lunch never happened, despite a quality spread of filet mignon with brandy peppercorn sauce (yum) and halibut olympia, a green salad and cr\u00e8me br\u00fbl\u00e9e that was planned. And hotel guests who viewed the papers had advanced knowledge that President Trump was gifting President Putin an American Bald Eagle desk statue.<\/p>\n\n\n\n<p>As we all know, the cardinal rule is to never leave printouts on a shared device\u2014this always leads to a testy note being left on the printer by an irate team member. And the business center of a hotel? That\u2019s especially verboten.<\/p>\n\n\n\n<p>Security matters. Don&#8217;t be the reason the IT guys chug Red Bull.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>There\u2019s an old &#8220;Seinfeld&#8221; episode in which Jerry has his car stolen, but since he had a car phone (impressive tech back in the early 1990s) he decided to call the number to see if the thief would answer, which he did. After some joke-filled banter, Seinfeld asked the thief how he was able to hot-wire the car, as he was curious about the process. \u201cI didn\u2019t cross any wires,\u201d replied the crook, who was voiced by series co-creator and writer Larry David. \u201cThe keys were in it.\u201d Which brings us to this story about printer security vulnerability that grabbed headlines for all of about 30 seconds last week\u2014an eternity in today\u2019s news cycle. In general, legacy printers are cited as being especially vulnerable to security threats, unlike the more modern devices with robust, advanced features. But this week\u2019s example skirts around even the best defense available on the market, because there\u2019s no tech remedy against a printout being left sitting on an output tray for prying eyes to see. Printing\u2019s answer to Seinfeld leaving his keys in the car reportedly ensnared the State Department, and occurred during President Donald Trump\u2019s historic Anchorage summit with Russian President Vladimir Putin. A document printout marked &#8220;State Department&#8221; appears to have covered a number of housekeeping items\u2014a lunch menu, meeting times for the summit at Joint Base Elmendorf\u2013Richardson, and mundane reminders such as how to pronounce Putin\u2019s name and seating arrangements\u2014that were found on an Anchorage hotel printer, reportedly left behind by staffers. None of the information appears to have been confidential, with the possible exception of an event schedule that detailed what time President Trump would be entering given rooms. Generally, the comings and goings of the president and foreign leaders\/dignitaries are kept under wraps until after an event. In this case, the documents were discovered several hours prior to the meeting. The phone numbers of staffers in charge of organizing the event were also listed\u2014not quite to the level of national secrets. News of the gaffe was broken after hotel guests shared the pages with, of all news organizations, National Public Radio (NPR)\u2014the outlet perhaps most impacted by President Trump\u2019s decision to take away taxpayer support from public broadcasting. (Editor\u2019s note: NPR is also reeling from the loss of Ari Shapiro, longtime host of the outlet\u2019s signature program, \u201cAll Things Considered.) In the end, while the mistake was fairly reckless, the story was pretty much a nothing-burger. To top it off, the lunch never happened, despite a quality spread of filet mignon with brandy peppercorn sauce (yum) and halibut olympia, a green salad and cr\u00e8me br\u00fbl\u00e9e that was planned. And hotel guests who viewed the papers had advanced knowledge that President Trump was gifting President Putin an American Bald Eagle desk statue. As we all know, the cardinal rule is to never leave printouts on a shared device\u2014this always leads to a testy note being left on the printer by an irate team member. And the business center of a hotel? That\u2019s especially verboten. Security matters. Don&#8217;t be the reason the IT guys chug Red Bull.<\/p>\n","protected":false},"author":166,"featured_media":66177,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[80,1650,82,3371,1638],"tags":[4617],"_links":{"self":[{"href":"http:\/\/www.enxmag.com\/twii\/wp-json\/wp\/v2\/posts\/66176"}],"collection":[{"href":"http:\/\/www.enxmag.com\/twii\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.enxmag.com\/twii\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.enxmag.com\/twii\/wp-json\/wp\/v2\/users\/166"}],"replies":[{"embeddable":true,"href":"http:\/\/www.enxmag.com\/twii\/wp-json\/wp\/v2\/comments?post=66176"}],"version-history":[{"count":2,"href":"http:\/\/www.enxmag.com\/twii\/wp-json\/wp\/v2\/posts\/66176\/revisions"}],"predecessor-version":[{"id":66179,"href":"http:\/\/www.enxmag.com\/twii\/wp-json\/wp\/v2\/posts\/66176\/revisions\/66179"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/www.enxmag.com\/twii\/wp-json\/wp\/v2\/media\/66177"}],"wp:attachment":[{"href":"http:\/\/www.enxmag.com\/twii\/wp-json\/wp\/v2\/media?parent=66176"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.enxmag.com\/twii\/wp-json\/wp\/v2\/categories?post=66176"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.enxmag.com\/twii\/wp-json\/wp\/v2\/tags?post=66176"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}