12.07.2015 Views

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

190 10. INFORMATION THEFT ON THE TACTICAL BATTLEFIELDThe broadcast model offered by SATCOM communications allows multiple users <strong>to</strong> “tunein” <strong>to</strong> view the feeds. For example, during the Bosnia campaign, Preda<strong>to</strong>r feeds were viewedby the control station (the pilot), the Trojan Spirit communication terminal supporting theAmerican forward-deployed headquarters conducting operations, and a communication stationin Britain where the signal was then sent <strong>to</strong> Washing<strong>to</strong>n, DC and <strong>to</strong> the U.S. military’snetworks. 11 The Preda<strong>to</strong>r video feeds that were transmitted using the commercial K u -bandSATCOM were not encrypted, so that anyone capable of receiving the signal could potentiallyview it. Though the identification of the precise frequencies was not public knowledge, discoverywas still possible. The practice of relying on little known, but discoverable pieces ofinformation as a means of security is known as “security by obscurity.” In such practice, thereis no real access control—no software making decisions on whether <strong>to</strong> permit or deny access.Instead, an administra<strong>to</strong>r relies on somehow hiding the access point <strong>to</strong> the system. However,once this access point is discovered, the system is essentially open <strong>to</strong> all users who can discoverthe access point. This is exactly what happened in the case of the Preda<strong>to</strong>r-systemthrough the use of a piece of Russian hobbyist software known as “SkyGrabber.” This typeof eavesdropping is illustrated in Figure 10.4.SkyGrabber is a piece of software designed <strong>to</strong> grant a computer admission <strong>to</strong> a wirelessnetwork using SATCOM switched <strong>to</strong> promiscuous mode—thus intercepting or “sniffing”TV tunerLegimate militaryusersEavesdropperFIGURE 10.4 The Preda<strong>to</strong>r UAV collection intelligence information (in the above figure, its sensors detect an enemytank). When using beyond-line-of-sight communication, the UAV broadcasts its data <strong>to</strong> a satellite. The satellite,in turn, broadcasts the data <strong>to</strong> the users. While normal military users can obtain the signal and decode it <strong>to</strong> view whatthe UAV sees, the information can potentially be viewed by a third-part eavesdropper. The use of the Skygrabbersoftware, coupled with a television tuner card allowed a British hobbyist as well as KH insurgents in Iraq <strong>to</strong> interceptthe feed of the Preda<strong>to</strong>r from commercial satellites in this manner.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!