Sunday, December 20, 2009

America's Middle Eastern Foes Take the Battlefield into Cyberspace. Is it Safe to Tweet Yet?

December 17, 2009 3:25 AM

(CBS)Iraqi insurgents have reportedly intercepted live video feeds from the U.S. military's Predator drones using a $25.95 Windows application which allows them to track the pilotless aircraft undetected.

Hackers working with Iraqi militants were able to determine which areas of the country were under surveillance by the U.S. military, the Wall Street Journal reported on Thursday, adding that video feeds from drones in Afghanistan also appear to have been compromised.

This apparent security breach, which had been known in military and intelligence circles to be possible, arose because the Predator unmanned aerial vehicles do not use encryption in the final link to their operators on the ground. (By contrast, every time you log on to a bank or credit card Web site, or make a phone call on most modern cellular networks, your communications are protected by encryption technology.)

Meanwhile, a senior Air Force officer said Wednesday that a wave of new surveillance aircraft, both manned and unmanned, were being deployed to Afghanistan to bolster "eyes in the sky" protection for the influx of American troops ordered by President Obama.


(CBS)When a Predator unmanned aerial vehicle, or UAV, is far from its base, terrain prohibits it from transmitting directly to its operator. Instead, it switches to a satellite link. That means an enterprising hacker can use his own satellite dish, a satellite modem, and a copy of the SkyGrabber Windows utility sold by the Russian company SkySoftware to intercept and display the UAV's transmissions.

The Air Force became aware of the security vulnerability when copies of Predator video feeds were discovered on a laptop belonging to a Shiite militant late last year, and again in July on other militants' laptops, the Journal reported. The problem, though, is that the drones use proprietary technology created in the early 1990s, and adding encryption would be an expensive task.

The implications of the Predator's unencrypted transmissions have been known in military circles for a long time. An October 1999 presentation given at the Air Force's School of Advanced Airpower Studies in Alabama noted "the Predator UAV is designed to operate with unencrypted data links."

In 2002, a British engineer who enjoys scanning satellite signals for fun stumbled across a NATO video feed from the Kosovo war. CBS News correspondent Mark Phillips reported then on the apparent surveillance security shortfall, and the U.S. military's decision to essentially let it slide.

The Air Force had hoped to replace the Predator with a stealthier, high-altitude version nicknamed "Darkstar," and the 1999 presentation by then-Maj. Jeffrey Stephenson noted that the new "high altitude UAVs will be capable of encryption." But the Defense Department informed Lockheed Martin that year that the Darkstar program would be terminated.

Iraqi interest in intercepting U.S. military transmissions is not exactly new. A report prepared for the CIA director after the U.S. invasion and occupation noted that Saddam Hussein assigned a young relative with a master's degree in computer science to intercept transmissions from U.S. satellites. The relative, "Usama," was secretly given office space in the Baghdad Aerospace Research Center, which had access to satellite downlinks.

The 2005 CIA report compiled by special advisor Charles Duelfer quotes Abd al-Tawab Huwaysh, Saddam's minister of industry, as saying he was shown real-time overhead video supposedly of U.S. military installations in Turkey, Kuwait, and Qatar before the invasion. A likely explanation, the report concludes, is that "Usama located and downloaded the unencrypted satellite feed from U.S. military UAVs."

A 1996 briefing by Paul Kaminski, an undersecretary of defense for acquisition and technology, may offer a hint about how the Iraqi's interception was done. Kaminski said that the military had turned to commercial satellites -- "Hughes is the primary provider of direct (satellite) TV that you can buy in the United States, and that's the technology we're leveraging off of" -- to share feeds from Predator drones.

"What this does is it provides now a broader distribution path to anybody who's in that downward receiving beam, for example," Kaminski said.

So why, after the CIA publicly reported that Predator transmissions had probably been intercepted in Iraq, did the Air Force do so little? One explanation is that the contractor, General Atomics Aeronautical Systems of San Diego, built the system in the early 1990s before encryption was common and easier to include. (Computer scientists had warned at the time that the U.S. government's anti-encryption laws were counter-productive because they discouraged the development and routine use of that technology.)

Bureaucratic inertia is another. As CBSNews.com reported last month, messages from President Clinton's entourage were intercepted in 1997, but Secret Service agents continued to use unencrypted pagers to share sensitive information about threats to the president's life on September 11, 2001. Perhaps it takes a front-page story in the Wall Street Journal to prod government officials into rethinking their views on the desirability of encryption.

Update 1 p.m. ET: A spokesman for the Air Force, Maj. Cristin Marposon, sent us this statement: "The Department of Defense constantly evaluates and seeks to improve the performance and security of our various (intelligence, surveillance, and reconnaissance) systems and platforms. As we identify shortfalls, we correct them as part of a continuous process of seeking to improve capabilities and security. As a matter of policy, we don't comment on specific vulnerabilities or intelligence issues."


###


Another reason I don't join public networking sites.















".....is it safe to Tweet yet?"


December 17, 2009 10:40 PM PST
From cnet Security News

Twitter Hijacked by 'Iranian Cyber Army'


Twitter's home page before it went offline Thursday evening.



Updated at 11:15 p.m. PST to include comment from witness and reflect Twitter.com accessible again.
Updated at 11:50 p.m. PST with status update from Twitter.

Twitter.com was down Thursday evening, and it appears that the microblogging site may have been hacked or the victim of a DNS hijacking.

The site, which was inaccessible for about an hour starting around 10 p.m. PST, was defaced with the above image before it was taken offline.
The message at the bottom of the image appears to be written in Perso-Arabic script and when translated to English it read:

Iranian Cyber Army

THIS SITE HAS BEEN HACKED BY IRANIAN CYBER ARMY
iRANiAN.CYBER.ARMY@GMAIL.COM

U.S.A. Think They Controlling And Managing Internet By Their Access, But THey Don't, We Control And Manage Internet By Our Power, So Do Not Try To Stimulation Iranian Peoples To....

NOW WHICH COUNTRY IN EMBARGO LIST? IRAN? USA?

WE PUSH THEM IN EMBARGO LIST

Take Care.


Twitter's status blog was also inaccessible. CNET has inquiries out to Twitter and we will let you know more when we hear back.

Chris Hoare, a Flickr user in Leicester, England, captured the screenshot above and said his attempt to connect to Twitter bounced through a second Web-hosting server before the image was displayed but that he couldn't catch the address.

"The HTML was pretty basic, and everything that it showed was local on the server it was being sent from," Hoare told CNET News.

A Twitter update message posted at 11:28 p.m. said the site was "working to recovery from an unplanned downtime" and indicated that the incident was indeed a hijacking of Twitter's DNS records: Twitter's DNS records were temporarily compromised but have now been fixed. We are looking into the underlying cause and will update with more information soon.

Security has been a thorny issue for Twitter in the past. In January, a hacker hijacked CNN anchor Rick Sanchez's feed and proclaimed the journalist was "high on crack." Twitter users have also been the target of a password-stealing phishing scam. Disguising itself as a private message that led to a fake Twitter log-in screen, the scam was widespread enough for Twitter to put a warning message on all members' home pages alerting them of the issue.

Certainly, there is a contentious history between Twitter and Iran. In the wake of supposed results of that nation's presidential election in June, protesters in Iran used Twitter to skirt government filters to report events, express outrage, and get people out to opposition rallies.

Twitter even rescheduled some planned downtime in order to stay accessible for Iranian users in the midst of political upheaval at the request of the U.S. Department of State.

No comments:

Post a Comment

Labels

Absence of citizen online privacy protection by U S government (1) achievements of women (1) Africa human rights (1) africa political violence (1) African Muslims want peace (1) African politics (1) African refugee assisting homeland (1) African violence and corruption (1) African-American art (1) agriculture biotechnology industry (1) alQaida in Africa (1) American economic system (1) American education (1) American labor movement (2) American prison system (1) American racism (1) animals (1) Animals and humans (3) anti-American Middle Eastern cyber hijackers (1) apartheid 20 years gone (1) Arnold (1) Art by artists of African descent both continental (1) Atlanta (1) Avatar (1) Barack Obama (2) BeeSweet Lemonade (1) beneficial presence in the world (1) Bill Clinton (1) biogenetics (1) birthday (1) Black male role models (1) Black men unjustly incarcerated (1) Black people worldwide (1) busting American myths (1) buyer beware (1) Caribbean Literature Book Club 2010 reading list (1) champions (1) change for america world (1) charity (1) charter schools (2) China (1) classy artists (1) Congo (1) Consumer Rights (1) consumerism (1) Cornel West (1) Cosmos (1) coups in Africa (1) creativity built from our culture (1) credit game (1) Crenshaw community (1) cyberspace brought into wars (1) Dark Matter (1) David Bowie (1) Dedan Gills (1) delusions of the American masse (1) democracy in the world (1) destroying myths that no longer serve the good (1) Dialogue in America (1) diaspora (1) Disgust; Being our true selves (1) distribution of wealth (1) donating (1) earthworms (1) ecologically smart cars; green lifestyle (1) ecology (1) economic meltdown (1) economics (1) Edge intellectuals (1) Education in America (1) Egypt (1) elevating consciousness of American people (1) endangered Mountain Gorillas (1) European internet privacy (1) Excellent athletes (1) expanding consciousness (1) fear and greed of white people (1) female corporate/ multinational CEOs (1) first blog of the year (1) freedom of the press (1) French and Mali troops roust al-Qaida Islamist invaders (1) G-20 (1) gardeners (1) giving (1) global immigration issues; Israel (1) golf (1) Good works in Africa by her children in the diaspora (1) gospel music (1) Gratitude (1) Groups doing great work (1) Haitian Earthquake relief effort (2) helping others globally (1) History of issue of race in America (1) Homophobia (1) Human omniaction (1) ignorance (1) imperialism (1) indigenious people (1) influencing purchasing trends with priming (1) Iraqi drones compromised (1) Islam (1) Islamic extremests in African; Timbuktu (2) jokes (1) Kenya bloggers (1) latest scientific discoveries (1) law (1) Los Angeles life; architecture; African-Americans in Los Angeles (2) lost world cultures (1) Love (1) Malcolm X Civil Rights Leader (1) Mali (3) Mali 2013 (1) manipulating the food of the world (1) manuscripts of Africa's past (1) men of integrity (1) men standing strong (1) Mikhail Khodorkovsky (1) military power in Afrcia (1) military power in Africa (1) Monsanto (1) MTV (1) Mugabe (2) my travels (1) Natalie Cole (1) National Parks (1) Native Americans (1) Nature at It's Best File (3) Nelson Mandela (1) Neuromelanin (1) New Yorker Magazine (1) Nigerian terrorist (1) Nobel Peace Prize winners (1) Obama as a balm (1) Obama diplomacy (1) Obama foreign diplomacy (1) Obama in Europe (1) Obama nobel prize winner (1) Obama policies regarding average citizens (1) Obama's ability to control and steer his administration (1) Octavvia E. Butler (1) order (1) organic (1) outstanding Black authors (1) Pan-African authors (1) personal fulfillment (1) Pharonic sacred science (1) photography - wildlife (1) Plant sentience (1) policies that endanger animal welfare (2) politics (1) positive life lessons (1) post-neocolonialism in Africa (1) poverty field studies in India (1) prejudice (1) priming (1) professionals (1) public protest of economic policies (1) race (1) race and housing (2) race in America (1) Racism in Hollywood (1) religious bigotry (1) right wing christians (1) right-wing fundamentalism (1) Russia (1) Russian politics (1) Sarah Palin's politics (1) Science - intelligent creative bacteria (1) scientific ignorance perpetuated in 2012 (1) sibling rivalry (1) Snoop Dogg (2) soil science (1) Somalia (1) South Africa labor problems (1) South side Chicago (1) Spring poetry (1) Stanford University (1) successful women (1) Sudan (2) technology (1) tennis (2) Thanksgiving Day (1) The Bigs/multinational corporations (1) the failure of No Child Left Behind (1) the wealthy (1) things that make you go 'hhmmm' (1) Tiger Woods (1) Timbuktu libraries (1) time (1) Toni Morrison (1) true meaning of dogsledding. (1) Tuskegee Airmen (1) Twitter hijacked (1) U S History (1) vegan (1) vegetarianism (1) Virunga Park (1) ways to help Africa (1) weak results re: campaign promises (1) wealth in America (1) wholesome food sources (2) wildlife and their habitats (1) Williams sisters (2) Wimbledon (1) wolves (1) women leaders (1) world economy (1) writing (1) Xmas 2009 (1) yahoo (1) young Black entrepreneurs (1) Zimbabwe election (1)