Archive
Hackers say coming air traffic control system lets them hijack planes
Posted on January 11, 2013 by Akashma Online News
GPS Hijacking Catches Feds, Drone Makers Off Guard
Source CSOonline
UPDATED by Marivel Guzman
When Iran brought down the US drones, their specialist insisted that Iran had hijacked the GPS system of the drones making with this outmaneuvers easy to drive down the drone without damage the computer system. Now we started to understand how easy is to divert planes, to drive planes onto buildings, or simply to highjack their computer systems.
Some conspiracy theories circulated on the internet circles about the remote control of the planes that crashed the Twin towers in New York in 2011, now does not look that hard, does it?
If a teenager can hijack a Multi Billion dollars system, imagine what an specialist trained on software field for years can do?
Years earlier the Israeli Michael Goff working for PTech, an Arab owned software company that develops key enterprise software for many government institutions like NORAD and FAA, using his secure channel with another israeli Amit Yoran, somehow manages to give Israeli army computer programmers access to this critical computer code. It was due to this manipulation that the hijackings on 9/11 remained unnoticed by the flight controller of NORAD. Once this was in place the planes could be taken over by remote control and flown into the World Trade Center. How 911 was done
An ongoing multibillion-dollar overhaul of the nation’s air traffic control (ATC) system is designed to make commercial aviation more efficient, more environmentally friendly and safer by 2025.
But some white-hat hackers are questioning the safety part. The Next Generation Air Transportation System (NextGen) will rely on Global Positioning Systems (GPS) instead of radar. And so far, several hackers have said they were able to demonstrate the capability to hijack aircraft by spoofing their GPS components.
The Federal Aviation Administration (FAA) has declared that it already has multiple measures to detect fake signals. But it has so far not allowed any independent testing of the system.
On June 19, when University of Texas researchers successfully hijacked a drone by “spoofing” it — giving it bad GPS coordinates – they showed the Department of Homeland Security how civilian drones could fall into the wrong hands, exposing a potentially serious security flaw. It was exactly what Todd Humphreys, the lead researcher, anticipated in a TEDx talk in February: “You can scarcely imagine the kind of havoc you could cause if you knew what you were doing with a GPS spoofer.” July 20, 2012
The hacking exploits are not new. National Public Radio’s “All Tech Considered” reported last August that Brad Haines, a Canadian computer consultant known online as “RenderMan,” noted that the radio signals aircraft will send out to mark their identity and location under NextGen, called automatic dependent surveillance-broadcast (ADS-B), were both unencrypted and unauthenticated.
By spoofing those signals, Haines said he could create fake “ghost planes.”
“If I can inject 50 extra flights onto an air traffic controller’s screen, they are not going to know what is going on,” he told NPR. “If you could introduce enough chaos into the system – for even an hour – that hour will ripple though the entire world’s air traffic control.”
Haines presented his findings at the Defcon hacking conference in Las Vegas last summer
Then there is the group of researchers from the University of Texas that successfully hijacked a civilian drone at the White Sands Missile Range in New Mexico during a test organized by the Department of Homeland Security (DHS) last summer.
The system used to hijack the drone cost about $1,000. The NextGen program is expected to cost taxpayers $27 billion, plus another $10 billion spent by the commercial aviation industry.
In a third case, NPR reported that Andrei Costin, a Romanian graduate student in France, was able to build a software-defined radio hooked to a computer that created fake ADS-B signals in a lab. It cost him about $2,000. Costin made a presentation at last summer’s Black Hat conference.
Paul Rosenzweig, founder of Red Branch Law & Consulting and a former deputy assistant secretary for policy at DHS, wrote in a post last week on Lawfare that this amounts to the FAA continuing to dig itself into a deeper hole. One problem, he wrote, is that the eventual goal is to eliminate radar, which is inefficient because it requires planes to fly on designated radar routes.
“But the hardware for radar broadcasting and reception can’t (that I know of) be spoofed,” he wrote. “Today, when planes fly using GPS they ‘double check’ their location with radar. [But] the entire plan behind NextGen is to eventually get rid of the radar system — an expensive 20th century relic, I guess. But then we are completely dependent on GPS for control.”
[See also: Insecure industrial control systems, hacker trends prompt federal warnings]
The FAA told NPR that besides confirming ADS-B signals with radar, the NextGen system will automatically check to make sure the correct receivers are picking up the correct signals. If a “ghost plane” is sending a signal to the wrong receiver, it would be spotted as fake. Third, it will use a technique called “multilateration” to determine exactly where every ADS-B signal is sent from.
Nick Foster, a partner of Brad Haines, praised the use of multilateration. “But I still wonder if it would be possible to fool the system on the edges,” he told NPR. “I think the FAA should open it up and let us test it.”
The risks of GPS hacks extend beyond aviation. Logan Scott, a GPS industry consultant, told Wired magazine last year [http://www.wired.com/dangerroom/2012/07/drone-hijacking/2/] that GPS is also used to control the power grid, to power banking operations including ATMs and to keep oil platforms in position. The world’s cellular networks also rely on it.
And given that it is free, unauthenticated and unencrypted makes it vulnerable. “The core problem is that we’ve got a GPS infrastructure which is based on a security architecture out of the 1970s,” Scott said.
Not everybody sees the GPS vulnerability as a major safety problem, however. Martin Fisher is now director of information security at Wellstar Health System, but worked previously in commercial aviation for 14 years. He said radar will still be around, even when the transition to NextGen is complete.
“Don’t for a moment believe there won’t be radar anymore,” he said. “Commercial aircraft will still have anti-collision radar and proximity alarms.”
Beyond that, he said, “do not make the assumption that the pilots flying your aircraft simply follow the instructions of ATC like automatons. These are very highly trained men and women with years of experience flying day, night, good weather, bad weather.”
Paul Rosenzweig said he would still be much more comfortable if the FAA would allow the system to be “stress tested.”
Whatever bugs are in the system, there may be more than 12 years available to fix them. The Washington Post reported in September that Calvin L. Scovel III, inspector general for the Department of Transportation, told a House subcommittee that the program was “four years behind schedule and $330 million over budget.”
The Trojan Horse than landed in Iran – Drones are Spies on the air, steel birds that fly at low altitude and can pick up signals of conversations from cell phones, cordless phones, digital radios, digital TV’s sets and they have the capabilities to take images using infrared technology, and snap pictures as small a few pixels, this amazing and surprising disturbing technology that have taken away the peace of mind, sleep and every bit of privacy to the citizens of the world. These steel birds have the spies agencies and best reverse engineers (theives) of the world fighting each other for the software and hardware blue prints.
Cyber criminals could increasingly look to attack, hijack smartphones in 2013 (Yahoo Security) – Some cyber criminals who disseminate viruses and malware in attempts to hijack computers are beginning to shift their focus. Your smartphone may be their next target. PC users have learned to be constantly vigilant to the threat of viruses, which attack relentlessly, slow down computers and potentially put valuable personal information at risk. Windows computers will continue to be targeted going forward but cyber thieves are casting a wider net in the hunt for digital prey.
Read more about access control in CSOonline’s Access Control section.
Related Stories
Using a laptop, a small antenna and an electronic GPS “spoofer” built for $3,000, GPS expert Todd Humphreys and his team at the University of Texas took control of the sophisticated navigation system aboard an $80 million, 210-foot super-yacht in the Mediterranean Sea.
“We injected our spoofing signals into its GPS antennas and we’re basically able to control its navigation system with our spoofing signals,” Humphreys told Fox News. http://www.foxnews.com/tech/2013/07/26/exclusive-gps-flaw-could-let-terrorists-hijack-ships-planes/
Israel Web Sites Hacked by Anonynous
Posted on November 20, 2012 by Akashma Online News
Source Fox News
UPDATED
As a favor to Fox News I will publish their article in AON. Just in case they want to take down the article I will publish it in here for save keeping!. In case Israel ever want to read about in an outlet other that their buddies Propaganda Outlets. This article was published on their Propaganda News Fox News “Fair and Balance” on November 19, 2012 with the following title:
“Hackers target Israel with millions of attacks as Hamas rockets continue to fall”
Even as Israel fends off relentless rocket attacks from Gaza, government and private websites are under siege from hackers, who have mounted 44 million cyberattacks in less than a week, the government said. (I feel sorry for poor Israel that have to go thru the bother on keeping their ingrained propaganda machine oiled with millions of dollars, dollars that could easily be used to buy more weapons 😦 ..)
The international hacker collective Anonymous, which has broken into websites of international banks, governments and even the CIA, said it mounted #OpIsrael to protest Israel’s “Operation Pillar of Defense” against rocket attacks launched from the Gaza Strip.
‘The ministry’s computer division will continue to block the millions of cyberattacks.’
– Israeli Finance Minister Yuval Steinitz
“The reasons for Anonymous intervention through #OpIsrael should be abundantly clear: What is happening in Palestine is oppression,” Anonymous declared. They have no navy, no army, or air force. There is no war in Gaza.”
Another web attack came Monday from a Pakistani group, which shut down the Israeli Groupon site. Visitors to the site found as expletive-laden screed against Israel and Jews. Groupon assured customers that no security breach occurred.
“The database and the transactions and users’ information are hosted on Groupon servers secured in Germany,” Groupon said in a statement. “It’s important to stress that there is no link between the networks and … no concerns about data security.”
Only one of the millions of hacking attempts on Israeli government websites was successful, Finance Minister Yuval Steinitz told The Jerusalem Post. But the sheer volume of tries demonstrates the stress being put on the country’s web infrastructure. Steinitz did not name the site that was hacked, but said it was back up within minutes.
Sites related to the Defense Ministry, Prime Minister Benjamin Netanyahu and the Foreign Ministry have been targeted, as well as sites of local government and private businesses. Most sites that were successfully attacked were simply taken down, though many were left displaying pro-Palestinian images and messages. The Finance Ministry told the paper that there are typically a few hundred hacking attempts on Israeli sites per day.
“The ministry’s computer division will continue to block the millions of cyberattacks,” Steinitz said. “We are enjoying the fruits of our investment in recent years in developing computerized defense systems.”
One site’s homepage was replaced with an image of a man wearing a Palestinian keffiyeh and the message: “This attack is in response to the injustice against the Palestinian people.”
Among the other targets were the websites of the Kadima Party, Bank of Jerusalem, a jeep tour company, a locksmith company, allbiz.co.il, fashion accessory companies and even a blog. One target Anonymous took credit for attempting to hack was the Israeli Foreign Ministry’s international development program, Mashav.
While it is not clear what other independent or affiliated hackers may be going after Israel, Anonymous put out a press release last week which blamed the Israeli government for the long-running strife with Palestinians.
“For far too long, Anonymous has stood by with the rest of the world and watched in despair the barbaric, brutal and despicable treatment of the Palestinian people in the so called ‘Occupied Territories’ by the Israel Defense Forces,” the release said.
Unlike the Pakistani hackers, Anonymous sought to preempt accusations of anti-Semitism by noting that their campaign steered clear of bigoted language.
“Nor have we vocalized any support for Palestinian military operations or resistance groups,” Anonymous said in a statement. The attack’s goals, the statement continued, was to “protect the rights of the Palestinian people.”
Anonymous claimed to have taken down the municipal website of Tel Aviv, which has been posting directions to bomb shelters. But the site was back up at the time of this report.
Israel’s offensive to stop a daily barrage of Hamas rockets – some fired from launch sites adjacent to hospitals, schools and playgrounds – has been moving closer to an all-out ground war in recent days. Israeli planes, tanks and gunboats have pounded militant positions in Gaza, and Israel has authorized calling up reservists for what could be a pending ground invasion. Some 90 Palestinians, including senior leaders of Hamas, have reportedly been killed in Israeli airstrikes.
President Obama over the weekend said Israel has the right to defend itself, but expressed hope that the conflict would not escalate into a ground war. Egypt, under a Muslim Brotherhood government that has aligned itself with Hamas, has blasted Israel for the operation and pledged to help meet the “urgent needs” of Gaza residents.
But Israeli officials say hundreds of Hamas rockets have been launched since the operation began, and scores have been intercepted by Israel’s Iron Dome missile defense system or fallen back onto Palestinian territory, at least three Israelis have been killed. The nation last week declared a state of emergency in the southern part of the country, telling residents to remain close to fortified areas.
“The U.S. House of Representatives included report language in its FY-2013 Defense Authorization Act supporting Iron Dome with $680 million but also instructing that the Director of the U.S. Missile Defense Agency, Lt. Gen. Patrick O’Reilly, “should explore any opportunity to enter into co-production of the Iron Dome system with Israel, in light of the significant U.S. investment in this system.
2012 Iron Dome budget was already in Production so they needed to use the almost 1 billion of 2012. So Hamas Rockets needed to be raining in Israel to used up that money or it will have to be rolled to 2013 budget. US and Israel working partners war criminals. Israel went out of its way to facilitate rockets to Gaza specially those grad rockets. How other way Israel can used up those 680 millions already invested on intercepting missiles, batteries for the dome and the radar. All it is a package deal that can not be brake up in pieces. Maybe from all the arsenal that Israel buys with America money, the Iron Dome will be the only one that it falls in the legal weapon technology that is not used to kill Palestinians, which by our congress act it is illegal to give money for weapons that are going to be used against innocent unarmed population. ” Akashma Online News