Miata Turbo Forum - Boost cars, acquire cats.

Miata Turbo Forum - Boost cars, acquire cats. (https://www.miataturbo.net/)
-   Insert BS here (https://www.miataturbo.net/insert-bs-here-4/)
-   -   You have got to be kidding me... (https://www.miataturbo.net/insert-bs-here-4/you-have-got-kidding-me-60919/)

EO2K 10-07-2011 08:35 PM

You have got to be kidding me...
 
http://www.wired.com/dangerroom/2011...s-drone-fleet/


A computer virus has infected the cockpits of America’s Predator and Reaper drones, logging pilots’ every keystroke as they remotely fly missions over Afghanistan and other warzones.

The virus, first detected nearly two weeks ago by the military’s Host-Based Security System, has not prevented pilots at Creech Air Force Base in Nevada from flying their missions overseas. Nor have there been any confirmed incidents of classified information being lost or sent to an outside source. But the virus has resisted multiple efforts to remove it from Creech’s computers, network security specialists say. And the infection underscores the ongoing security risks in what has become the U.S. military’s most important weapons system.
http://images.memegenerator.net/inst...50/9467448.jpg

/facepalm

I really need to get DangerRoom off my RSS...

jacob300zx 10-07-2011 11:02 PM

Scary shit.

EO2K 10-08-2011 04:42 AM

The fact that the military has this shit connected to the public internet blows my fucking mind. I need to stop going to DefCon and reading InfoSec bullshit in my spare time.

If you really want to go for a ride, take a look at shit like nMap, WireShark and the MetaSploit project... and that's just the tip of the iceberg. The rabbit hole gets pretty damn deep.

Faeflora 10-08-2011 12:12 PM

What's the big deal about nmap and metasplooit?

EO2K 10-08-2011 01:10 PM

Its really just a starting point. Most people don't realize this stuff is out there, how easy it is to acquire and use, and how vulnerable they really are.

messiahx 10-08-2011 02:38 PM

I read about this earlier today on defensetech. While my job has nothing to do with network security, it's embarrassing to know that my fellow airmen elsewhere can't seem to get their shit straight.

MD323 10-08-2011 03:31 PM

I find it ironic the system they invented (the internet) is being used against them.

Joe Perez 10-11-2011 04:34 PM

Apparently the USAF isn't the only one.

This message was distributed company-wide within the Harris Corporation (whose primary business is in defense electronics, mostly encrypted comms and nav systems) today:
Harris Security Advisory - Be Alert for Unsolicited USB Thumb Drives!

Several Harris employees have recently received unsolicited USB thumb drives via mail and other delivery methods. Some of the envelopes included a brief note indicating the drive was “found” and being returned; others had no message or marking of any kind. Fortunately, these employees were vigilant enough to be suspicious and notified the Service Desk, who advised them how to send in the materials for investigation by Harris information security authorities.

In an increasing number of incidents, attackers use the convenience and portability of USB drives to trick unsuspecting victims into infecting their computers. Typically, a thumb drive pre-loaded with malware is either left in a public place for a random victim to find, or sent directly to a predetermined target. If plugged into a computer, the malware installs and gives the attacker access to harvest sensitive information, gain an entry to the network, or other malicious activities.

If you find or receive an unknown USB device, NEVER PLUG IT INTO YOUR COMPUTER to view the contents or attempt to identify the owner. If you find such a device at a Harris-related event or location, or receive one in the mail at a Harris address, keep the drive and all associated packaging (note, envelope, etc.) and notify the Service Desk immediately. They will engage the Incident Response security team, who will take appropriate action.

EO2K 10-11-2011 04:47 PM

Hehe, we used to do this with CDR's labeled "MP3s" back in the day. There was a little autorun program on the disc that installed a program we built to call home to an IRC chatroom, just to see how effective this distribution method was. IIRC the local community college had the best reply rate.

Also: State sponsored spyware!

http://www.wired.com/threatlevel/201...n-gov-spyware/

German Minister Wants Investigation of State Authorities’ Use of Spyware


Germany’s justice minister has called for an investigation after authorities in at least four German states acknowledged using computer spyware to conduct surveillance on citizens.

Authorities in the state of Bavaria admitted on Monday that a piece of spyware discovered on a citizen’s computer by the local Chaos Computer Club hacker group was designed for use by authorities to spy on suspects.

Under German law, authorities can use spyware to monitor criminals, but its use is supposed to be limited to the interception of internet telephony.

The so-called R2D2 keylogging Trojan CCC examined, however, does much more than this. In addition to monitoring Skype calls and recording keystrokes to monitor e-mail and instant messaging communications, the Trojan can take screenshots and activate a computer’s microphone and webcam to allow someone to remotely spy on activities in a room. Furthermore, the program includes a backdoor that would allow authorities to remotely update the program with additional functionality.
Sounds like a sample that would be REALLY fun to pull apart. Too bad its been years since I played with IDAPro

Joe Perez 10-11-2011 05:01 PM


Originally Posted by EO2K (Post 782347)

the Trojan can take screenshots and activate a computer’s microphone and webcam to allow someone to remotely spy on activities in a room.

You want to know what's funny? When they first started putting integrated webcams and microphones into laptops, I half-jokingly pointed out that I really didn't want my computer to be able to spy on me. And to this day, I have never owned a computer with a built-in webcam (admittedly, my laptops do all have microphones.)

Anybody remember the book / film 1984? Cliffs: Everybody's apartment has a "telescreen" in it, which is basically just a television set, except that Big Brother can also use it to see and hear what you are doing.

That was written in 1949.

rleete 10-11-2011 05:58 PM

There was a recent case of a school using laptops to spy on students at home.

Joe Perez 10-11-2011 06:16 PM


Originally Posted by rleete (Post 782378)
There was a recent case of a school using laptops to spy on students at home.

Now that doesn't surprise me. (Robbins v. Lower Merion School District). To be honest, any time you use a computing asset which is owned by a third party (be it a school laptop, a company PC on your desk, a web forum, a third-party email server, etc) you have no reasonable expectation of privacy, nor should you delude yourself into thinking otherwise.

Google scans the contents of your email for the purposes of targeted marketing. Your employer keeps tabs on what you are doing on your PC at work (and elsewhere, if you are using a company-issued laptop and/or VPN account.) And while it may be immoral and is almost certainly illegal, it does not surprise me in the least that a school board would active the built-in surveillance features of laptop it supplied to children, not because of any grand conspiracy, but just because people in positions of minor authority are like that.


But for a government to covertly slip spyware into the privately-owned computers of its own citizens? Well, +10 for creativity, but -several million for creepiness, even if local laws permit it.



I'm honestly surprised we haven't heard of something like this happening with smartphones. They can not only hear and see you, but they know where you are, ever place you have ever been, how fast you are moving, etc. My phone knows not just how often I go to Fry's, the freaky porn store, etc., but how fast I drive on the way there and back. With a bit of data-crunching, it could even tell you what specific people I tend to meet up with at various locations and when.

So a hypothetical person is busted for, let's say, possession of heroin, or creating child pornography, or some other thing that's easy to ram through both the courts and the Court of Public Opinion on the grounds of being inherently evil. It's not that big of a stretch to imagine pulling the location history from her phone for the past year, and running it through a database which also contains the location history for every other cell phone in the system, and figuring out that this individual tended to meet in person with two or three other individuals in a certain secluded location on a regular schedule, and always at night.

Did this violate anybody's rights? Did it constitute an unlawful search? All they did was take several sets of data which were lawfully (and consensually) gathered by a commercial third-party, and comparing them together.


All times are GMT -4. The time now is 05:59 AM.


© 2024 MH Sub I, LLC dba Internet Brands