Info War


Dark Reading reports:

JULY 19, 2006 | 9:32 AM — For years, the “card key” has been considered a reliable means of securing the enterprise from unauthorized visitors. In some cases, these cards also serve as identification, and when combined with smartcard technology, a form of network authentication. But if these cards are misconfigured or managed, they can be rendered useless — as my penetration testing company recently proved.
(more…)

Abstract from the United States Army Research Institute for the Behavioral and Social Sciences’
“Cooperative Interface Agents for Networked Command, Control, and Communications: Phase II Final Report”:

Report developed under a Small Business Innovation Research Program 2000.2 contract for topic A02-024. This Phase II research advanced the Phase I approach to enable improved human-system interaction of mixed human and robotic elements for a company-sized unit. The research reported here explored the utility of intelligent user interfaces for command and control tasks. A system prototype was developed using a virtual simulation environment, Soar-based intelligent agents, and a standards-based communications infrastructure. The prototype was evaluated by active duty Army officers using think aloud and situational awareness protocols conducted during a simulated urban mission. Results from the evaluation indicate that cooperative interface agents may be a practical technique for reducing command and control complexity, especially when manned and unmanned forces are integrated. Although this technique was demonstrated in a relatively simple simulation environment, further research is warranted to assess scalability and usability when applied to more knowledge-rich, real-world environments.

Cornell University, via /., reports:

Newswise — Members of Cornell’s Global Positioning System (GPS) Laboratory have cracked the so-called pseudo random number (PRN) codes of Europe’s first global navigation satellite, despite efforts to keep the codes secret. That means free access for consumers who use navigation devices — including handheld receivers and systems installed in vehicles — that need PRNs to listen to satellites.

The codes and the methods used to extract them were published in the June issue of GPS World.
(more…)

On /., LackThereof writes:

“An IT consultant for the FBI, hired to work on their new ‘Trilogy’ computer system, apparently got hold of the username and password hash databases for the FBI’s network. He then used a common dictionary attack to get usable passwords out of the hashes, including that of FBI director Robert Muller, making him able to access virtually any data stored electronically at the FBI, including Witness Protection program records. The consultant, Joseph Thomas Colon, claims he used the passwords to avoid bureaucratic obstacles, and that his actions were condoned by the FBI agents he was working with at the agency.”

“He has pleaded guilty to 4 counts of ‘intentionally accessing a computer while exceeding authorized access and obtaining information from any department of the United States.’ He initally gained access to the hash database by borrowing an agent’s username and password; he then re-downloaded and re-cracked it three more times to keep up with the FBI’s 90-day password expiration policy. Lesson: Your users are your biggest security hole. Don’t trust your users, especially if they’re government agents.”

Annalee Newitz, WIRED, reports:

James Van Bokkelen is about to be robbed. A wealthy software entrepreneur, Van Bokkelen will be the latest victim of some punk with a laptop. But this won’t be an email scam or bank account hack. A skinny 23-year-old named Jonathan Westhues plans to use a cheap, homemade USB device to swipe the office key out of Van Bokkelen’s back pocket.

“I just need to bump into James and get my hand within a few inches of him,” Westhues says. We’re shivering in the early spring air outside the offices of Sandstorm, the Internet security company Van Bokkelen runs north of Boston. As Van Bokkelen approaches from the parking lot, Westhues brushes past him. A coil of copper wire flashes briefly in Westhues’ palm, then disappears.

Van Bokkelen enters the building, and Westhues returns to me. “Let’s see if I’ve got his keys,” he says, meaning the signal from Van Bokkelen’s smartcard badge. The card contains an RFID sensor chip, which emits a short burst of radio waves when activated by the reader next to Sandstorm’s door. If the signal translates into an authorized ID number, the door unlocks.

The coil in Westhues’ hand is the antenna for the wallet-sized device he calls a cloner, which is currently shoved up his sleeve. The cloner can elicit, record, and mimic signals from smartcard RFID chips. Westhues takes out the device and, using a USB cable, connects it to his laptop and downloads the data from Van Bokkelen’s card for processing. Then, satisfied that he has retrieved the code, Westhues switches the cloner from Record mode to Emit. We head to the locked door.

“Want me to let you in?” Westhues asks. I nod.
(more…)

Bill Gurstelle, via BoingBoing, writes:
[..]
PINNACLE/NUCFLASH is the military communications code word designation that instructs all military communication personnel to stop whatever else they’re doing and transmit the message that immediately, because there’s some bad news, really, really bad news that you need to act on right now.

There is a set of instructions that describes exactly how information relating to military threats to the USA is designated, prioritized, and delivered. The rules are spelled out in precise military fashion in a document called OPREP-3, the US Military’s written guideline for operational reports relating to important events involving nuclear weapons.

“PINNACLE/NUCFLASH” are the flagwords or header that presages an electronic transmission through the U.S. military’s command and control structure that reports an actual or possible detonation of a nuclear weapon. Not only that, these code words mean that the explosion was not an accident and the risk of nuclear war is imminent.

As one might expect, “PINNACLE/NUCFLASH” has the highest precedence in the OPREP-3 reporting structure. Men and women train for months, years, in order to be able to coolly and efficiently handle the communications that follow an OPREP-3 PINNACLE level flagword. There are several OPREP-3 code word designators with a chilling cold war/Tom Clancy/John Lecarre ring to them. None of these foreshadow good news. I’ll write more on those later.

ERIC LICHTBLAU and JAMES RISEN, The New York Times, reports:

WASHINGTON - The National Security Agency first began to conduct warrantless eavesdropping on telephone calls and e-mail messages between the United States and Afghanistan months before President Bush officially authorized a broader version of the agency’s special domestic collection program, according to current and former government officials.
(more…)

JAMES RISEN and ERIC LICHTBLAU, The New York Times, reports:

WASHINGTON, Dec. 15 - Months after the Sept. 11 attacks, President Bush secretly authorized the National Security Agency to eavesdrop on Americans and others inside the United States to search for evidence of terrorist activity without the court-approved warrants ordinarily required for domestic spying, according to government officials.

Under a presidential order signed in 2002, the intelligence agency has monitored the international telephone calls and international e-mail messages of hundreds, perhaps thousands, of people inside the United States without warrants over the past three years in an effort to track possible “dirty numbers” linked to Al Qaeda, the officials said. The agency, they said, still seeks warrants to monitor entirely domestic communications.

The previously undisclosed decision to permit some eavesdropping inside the country without court approval was a major shift in American intelligence-gathering practices, particularly for the National Security Agency, whose mission is to spy on communications abroad. As a result, some officials familiar with the continuing operation have questioned whether the surveillance has stretched, if not crossed, constitutional limits on legal searches.
(more…)

AFP reports:

A systematic effort by hackers to penetrate US government and industry computer networks stems most likely from the Chinese military, the head of a leading security institute said.

The attacks have been traced to the Chinese province of Guangdong, and the techniques used make it appear unlikely to come from any other source than the military, said Alan Paller, the director of the SANS Institute, an education and research organization focusing on cybersecurity.
(more…)

Steve Coll and Susan B. Glasser, Washington Post Staff Writers, report:

In the snow-draped mountains near Jalalabad in November 2001, as the Taliban collapsed and al Qaeda lost its Afghan sanctuary, Osama bin Laden biographer Hamid Mir watched “every second al Qaeda member carrying a laptop computer along with a Kalashnikov” as they prepared to scatter into hiding and exile. On the screens were photographs of Sept. 11 hijacker Mohamed Atta.

Nearly four years later, al Qaeda has become the first guerrilla movement in history to migrate from physical space to cyberspace. With laptops and DVDs, in secret hideouts and at neighborhood Internet cafes, young code-writing jihadists have sought to replicate the training, communication, planning and preaching facilities they lost in Afghanistan with countless new locations on the Internet.
(more…)

The Electronic Frontier Foundation reports:

Washington, DC - Today the Federal Communications Commission (FCC) issued a release announcing its new rule expanding the reach of the Communications Assistance to Law Enforcement Act (CALEA). The ruling is a reinterpretation of the scope of CALEA and will force Internet broadband providers and certain voice-over-IP (VoIP) providers to build backdoors into their networks that make it easier for law enforcement to wiretap them. The Electronic Frontier Foundation (EFF) has argued against this expansion of CALEA in several rounds of comments to the FCC on its proposed rule.
(more…)

Cory Doctorow, BoingBoing, reports:

Michael Lynn is a security researcher who worked at the security firm ISS until yesterday. Now he’s under a restraining order from Cisco, arising from his disclosure of critical flaws in Cisco’s routers that threaten the world’s information infrastructure.

Lynn had found a buffer overflow exploit that lets an attacker take absolute control over Cisco routers. He sent the details to Cisco in April, but they still have not fully repaired the vulnerability. Since many of the world’s key routers are supplied by Cisco, this means Cisco’s foot-dragging places large parts of the world’s information infrastructure at grave risk of collapse.
(more…)

Brian Grow, with Jason Bush in Moscow, BusinessWeek, via Slashdot, reports:

In an unmarked building in downtown Washington, Brian K. Nagel and 15 other Secret Service agents manned a high-tech command center, poised for the largest-ever roundup of a cybercrime gang. A huge map of the U.S., spread across 12 digital screens, gave them a view of their prey, from Arizona to New Jersey. It was Tuesday, Oct. 26, 2004, and Operation Firewall was about to be unleashed. The target: the ShadowCrew, a gang whose members were schooled in identity theft, bank account pillage, and the fencing of ill-gotten wares on the Web, police say. For months, agents had been watching their every move through a clandestine gateway into their Web site, shadowcrew.com. To ensure the suspects were at home, a gang member-turned-informant had pressed his pals to go online for a group meeting.
(more…)

The BBC reports:

A spoof video of the song (Is This The Way To) Amarillo, performed by British soldiers in Iraq, has crashed Ministry of Defence computers.

Troops in the Royal Dragoon Guards shot a home video at their Al Faw base of their version of the video sung by Tony Christie and mimed by Peter Kay.

They e-mailed it to Army friends in London, but so many tried to download it that the MoD server could not cope.

The MoD said the spoof was “brilliant” and the crash did not cause problems.

A spokesman said: “The soldiers maintaining their morale on operations is always important.

“The fact that it proved so popular in the office and caused the system to crash is unfortunate, but this did not affect operations and the system is up and running again.”
(more…)

Photo: John Hering from Flexilis, with the new BlueSniper Rifle
John Hering from Flexilis, with the new BlueSniper Rifle

Tom’s Networking, via Slashdot, writes:

Introduction

Watching the news these past few weeks, you would think that hackers have taken over our cellphones. From the Paris Hilton phone hack (which was not Bluetooth-based), to the unintentional release of Fred Durst’s (from the band Limp Bizkit) sex video - Wireless security has been thrust into the limelight. The proliferation of Bluetooth devices has made wireless communications easy and the Bluetooth group wants you to believe that this technology is safe from hackers. However, the guys from Flexilis, a wireless think-tank based in Los Angeles, beg to differ and they have a big freakin gun to “voice” their opinions.

The gun, which is called the BlueSniper rifle, can scan and attack Bluetooth devices from more than a mile away. The first version of the gun showed up at Defcon 2004, a hacker/computer security convention held annually in Las Vegas. You can read about it in Tom’s Hardware show coverage report here.

While the early version was held together with tie-straps and rubber bands, this newest version has a much more professional look. The team at Flexilis learned a lot from making their previous gun, and have made many improvements. The gun is now bigger, stronger and more durable and the antenna is almost twice a powerful as the older model. It also has a small computer which eliminates the need for lugging around a heavy laptop just to gather data.

How hard was it to make this gun? John Hering, from Flexilis, says, “The parts are easily available for a few hundred dollars and you can make this gun in a long afternoon.” In fact, in this two-part article, we will show you how to build your very own Bluetooth sniper rifle. A complete parts list is provided and we will document each step of the manufacturing process. We’ll also report on our test “shoot” of some famous high-rise buildings in downtown L.A., namely the US Bank / Library Tower and the AON Tower.
(more…)

CARA RUBINSKY, Associated Press Writer, reports:

GROTON, Conn. — The USS Jimmy Carter entered the Navy’s fleet Saturday as the most heavily armed submarine ever built, and as the last of the Seawolf class of attack subs that the Pentagon ordered during the Cold War’s final years.

The 453-foot, 12,000-ton submarine has a 50-torpedo payload and eight torpedo tubes. And, according to intelligence experts, it can tap undersea cables and eavesdrop on the communications passing through them.

(more…)

Reuters, via CNN, via Slashdot:

WASHINGTON (Reuters) — The U.S. Air Force quietly has put into service a new weapon designed to jam enemy satellite communications, a significant step toward U.S. control of space.

The so-called Counter Communications System was declared operational late last month at Peterson Air Force Base in Colorado Springs, Colorado, the Air Force Space Command said Friday in e-mailed replies to questions from Reuters.

The ground-based jammer uses electromagnetic radio frequency energy to knock out transmissions on a temporary and reversible basis, without frying components, the command said.
(more…)

)'(