Showing posts sorted by relevance for query Drone. Sort by date Show all posts
Showing posts sorted by relevance for query Drone. Sort by date Show all posts

‘Pervasive Vulnerability’ Found in The Robotic Aircraft of Drone Fleet

 ‘Pervasive Vulnerability’ Found in  The Robotic Aircraft of Drone Fleet

Unmanned aerial vehicle (UAV), widely known as a drone has always been gone through with several controversies in case of both defense and cyber security. Yet again several question arises regarding the security system and the control algorithms of drone. According to the Pentagon’s premier science and technology division a a “pervasive vulnerability” have been found in the robotic aircraft of drone. The control algorithms for these crucial machines are written in a fundamentally insecure manner, says Dr. Kathleen Fisher, a Tufts University computer scientist and a program manager at the Defense Advanced Research Projects Agency. There’s simply no systematic way for programmers to check for vulnerabilities as they put together the software that runs our drones, our trucks or our pacemakers.
In our homes and our offices, this weakness is only a medium-sized deal: developers can release a patched version of Safari or Microsoft Word whenever they find a hole; anti-virus and intrusion-detection systems can handle many other threats. But updating the control software on a drone means practically re-certifying the entire aircraft. And those security programs often introduce all sorts of new vulnerabilities. “The traditional approaches to security won’t work,” Fisher tells Danger Room.
Fisher is spearheading a far-flung, $60 million, four-year effort to try to develop a new, secure way of coding and then run that software on a series of drones and ground robots. It’s called High-Assurance Cyber Military Systems, or HACMS. For detailed information about this story click Here

While talking about drone and its security we would like to give you reminder that in 2011 we came to know that a stealthy key-logger has hit the U.S. Drone logging pilots’ every keystroke as they remotely fly missions over Afghanistan and other war zones. Later Iran took responsibility of that cyber attack. Also in 2012 drone was in controversy where researcher have figured out that drone fleets are vulnerable to GPS spoofing and it can be hijacked by any malicious attacker or terrorist. 





SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Drone Fleets Are Vulnerable to GPS Spoofing & Can Be Hijacked By Terrorist

Drone Fleets Are Vulnerable to GPS Spoofing & Can Be Hijacked By Terrorist

Spying drones have always gone through with several controversies along with a lots of technical & security issues. Yet again a team at the University of Texas has managed to find a vulnerability in drones that allows an attacker to gain control of the unmanned vehicle and change its course. Professor Todd Humphreys and the team spoof GPS receivers in order to take control of the drones
According to an exclusive report of Fox News - A small surveillance drone flies over an Austin stadium, diligently following a series of GPS waypoints that have been programmed into its flight computer. By all appearances, the mission is routine. Suddenly, the drone veers dramatically off course, careering eastward from its intended flight path. A few moments later, it is clear something is seriously wrong as the drone makes a hard right turn, streaking toward the south. Then, as if some phantom has given the drone a self-destruct order, it hurtles toward the ground. Just a few feet from certain catastrophe, a safety pilot with a radio control saves the drone from crashing into the field.

Last year we came to know that a stealthy key-logger has hit the U.S. Drone logging pilots’ every keystroke as they remotely fly missions over Afghanistan and other war zones. Later Iran took responsibility of that cyber attack. But spoofers are a new problem for GPS-guided drones, allowing hackers to trick navigation systems with false information. Humphreys and the team have designed a device costing less than $1,000 that sends out a GPS signal stronger than the ones coming down from orbiting satellites. At first, the rogue signal mimics the official one in order to trick the drone, and once it’s accepted new commands can be sent to the UAV. US government says its aware of the potential dangers of spoofing, and officials from the FAA and Department of Homeland Security have seen Humphreys’ demonstration first hand. The Department of Homeland Security reportedly has a program in place to try and solve the problem of GPS interference, but it’s aimed at trying to deal with jammed signals, not spoofed ones.


-Source (FOX News, Slashgear)



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Iran Took Responsibility of Hacking into U.S. Spy Drone

Iran Took Responsibility of Hacking into U.S. Spy Drone 

Last year we came to know that a stealthy key-logger has hit the U.S. Drone logging pilots’ every keystroke as they remotely fly missions over Afghanistan and other warzones. The key-logger was was capable of capturing data and transfer that to the attacker.  Now its come to know that Iran has reportedly hacked the software of an advanced US spy drone, which came down its territory last year and has started building its own copies of the aircraft. Commander of Iran's Islamic Revolution Guards Corps Brig General Amir Ali Hajizadeh gave details of the aircraft's operational history as proof that their engineers had successfully probed its records. "Had we not accessed the plane's soft wares and hard discs, we wouldn't have been able to achieve these facts. We have decoded all this [information] and we now have an infinite amount of intelligence," said Hajizadeh.
The state media report also said that Iran had 'started manufacturing models of the captured US spy plane'. The unarmed drone was shown on Iranian state television, apparently looking intact, after coming down 140 miles inside Iranian territory in December. Iran claimed it brought down the drone by an electronic attack after it took off from an American base inside Afghanistan, but US officials said the aircraft crashed due to a malfunction.



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Aafia Siddiqui Court Case Leaked, US Government Exposed ByTeaMp0isoN


There is a terrorist Network that stretches the length and breadth of this very ill earth of ours - That Terrorist Network belongs to the Terrorist Empire that is The United States Of America!
In Dr. Afia Siddique, this Terrorist Empire has decided that the very 'small' and 'slight' mother, Dr. Afia Siddique, is a Jihadist! A Threat to their 'peace', a threat to their 'way of life' and lest we forget the incredulous mantra 'a threat to their freedom' - Such was the fear of the Terrorist Empire of Dr Afia Siddique, they decided to do as all criminals against humanity do; they fabricated evidence, planted bogus witnesses, and with the help of the shameful 'free press', they chose to demonize her - demonize her so much that people of conscious did not even ask 'why was it necessary to murder her baby in prison?'

The human tragedy of Dr. Afia Siddique will not be in vain! Justice will be demanded and Justice will prevail! America will pay for its crimes against Dr Afia Siddque and its crimes against humanity!
The Terrorist Empire refuses to listen, educate, and learn from the mistakes of Terrorist Empires of history - in the indomitable words of Malcolm X - 'The Chickens are coming home to roost'
"Let no man deceive you by any means: for that day shall not come, except there come a falling away first, and that man of sin be revealed......“

Americans who read this; it is the epitome of Patriotism to resist the crimes of ones nation - do not let your children pay for the sins of their fathers!

Apparently she fired a rifle at the US nationals & the US Army yet there was no fingerprints found on the rifle, furthermore aafia was the only person on the scene who suffered from bullet wounds when allegedly she was the one holding the gun - the main questions till date are "why was she captured? "why has she been given 85years?" and "why has she been tortured" - all these questions will be answered.

Firstly we need to know why the US Government wanted her and what she knew that made her special, i have compiled a series of screenshots from the official US Court Case related to this case:

- Peace between the taliban and American
- AIDS Vaccine
- Cure for aging
If this idea worked it would have been implemented right across the middle-east and asia especially in Palestine and Pakistan where drone attacks are increasing yet the USA Government stopped this idea from spreading by capturing aafia. 
Now we know of some of the things she was capable of but the next question we must ask ourselves is why would USA stop her from expanding her ideas and studies? her ideas would clearly make the world a better place right?
1. Why would the US Government not want a AIDS vaccine? Because the US Government created AIDS, its all over the internet, google it.
2. Why would the US Government not want peace with the Taliban? The US Government created Taliban, they funded them with money and weapons and trained them them to fight the Soviet Union.
2. Why would Zionist Jews of Israel want to get rid of African Americans and Hispanics living in the US?
Israel is the puppeteer and the US is the puppet, Israel uses USA for security & money, deep down Israel hates everyone and anyone who is not apart of their state, but why would they target African Americans and Hispanics living in america? prisons in America are private businesses, The US Government gets paid 50,000 per year for every inmate in prison, now who are the stereotypical races that represent American prisons? African Americans and Hispanics - therefore if Zionist Jews were to affect African Americans and hispanics in anyway America would be loosing a lot of money.
We know now why she was a threat to the US Government, now i will show you what they done to her to ensure that she wouldn't be able spread her findings & knowledge :
- They tortured her, they raped her, they stripped and put images and videos of her naked on the internet, they tortured her children, they told her she was a psycho and that she was crazy, they used illegal torture methods to obtain information from her, they abused her right to practice religion by breaking her fast/Ramadan. - for what? for outsmarting the suit wearing power hungry faggots of the United States government, for wanting to make the world a better place, for wanting to protect her country and religion from corruption, from wanting to save lives, for wanting to stop diseases and viruses. 

To Download The official Case Click HERE
For More Info About Aafia Click Here

-News Source (ZHC & Team Poison)


SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

President Obama & Congress Will Issue Long Awaited Executive Cyber Security Order

President ObamaCongress Will Issue Long Awaited Executive Cyber Security Order 

Last week we reported that Pentagon has declared that they are moving toward a major expansion of its cyber security force to counter increasing attacks on the nation’s computer networks, as well as to expand offensive computer operations on foreign adversaries. Just one week after this declaration another crucial movement came from the U.S. government.  A secret legal review on the use of America’s growing arsenal of cyber weapons has concluded that President Obama has the broad power to order a pre-emptive strike if the United States detects credible evidence of a major digital attack looming from abroad. According to sources President Barack Obama will issue a long-awaited cyber security executive order this week. Two former White House officials told the publication that the order is expected to be released after Tuesday night's State of the Union address. 
Given his status as commander-in-chief, Obama seems to be the clear choice, but since cyber warfare is such a new and unknown thing, the government hasn't actually figured out the rules of engagement yet. In the past couple of decades, the power to use America's cyber weapons has been shared between the Pentagon and the various intelligence agencies. With the exception of a series of strikes on the computer systems that run Iran's nuclear enrichment facilities an attack that Obama ordered himself the U.S. hasn't launched any major cyber attacks in recent memory, however. This probably won't be the case in the future. So the government is working on new rules of engagement, as it realizes that the capabilities of cyber weapons are evolving at a startling rate. The rules will be not unlike the set that governs how drone attacks are ordered and who orders them. Cyber warfare certainly stands to affect the average American more, though.  On Capitol Hill this week, Rep. Dutch Ruppersberger (D-Md.) and Rep. Mike Rodgers (R-Mich.) are set to reintroduce the Cyber Intelligence Sharing and Protection Act (CISPA) during a speech at the Center for Strategic and International Studies.
According to an exclusive report the bill would allow the government to share classified cyber threats with the private sector so that those companies can then protect their systems from cyber attacks. The bill was killed last year due to privacy concerns. Civil-liberty groups argued that the bill allows companies to exchange too much personal information back and forth without regulation. 







SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

19 Million+ UK Households Being Used As Cyber Weapon (Botnets)


You are also a cyber criminal. Don't get panic, we are sorry to say this for that is truth. An exclusive report is saying that more than a million households of UK is either used or misused as cyber weapons meainly Botnets.
Dutch researchers investigating ways to curtail the hijacking of domestic computers for criminal use, found that more than one million UK households’ PCs are linked to criminal networks known as ‘botnets’, which are groups of Internet-connected computers that have been compromised by a third party and put to malicious use. With around 6% of the UK’s 19m Internet households thought to be part of a botnet, this helps criminals spread spam around the Web more effectively, whilst it can also be used to attack websites and even garner bank details from the unsuspecting public.
The data was gathered from a number of different sources, though most emanated from what is known as ‘spam traps’, which are fake email addresses set up for the sole purpose of receiving junk mail. It’s thought that more than 90% of spam is sent through botnets, and it’s the Internet addresses on these botnets which are a good indicator of where the so-called ‘drone’ machines are located. The researchers then used the IP addresses of the machines that were sending the spam, and traced each one to an Internet Service Provider (ISP). And feeding into this was data about the Conficker botnet, which is thought to be one of the biggest examples of such a network, and incident reports from a computer security company called DShield. The UK figure is placed at number 19 in the top 20 nations with the biggest botnet problem, but it’s roughly in-line with the global average which sits at around 5-10% of domestic computers that are thought to be linked to botnets. Greece and Israel were way out on top, though, with around a fifth of all broadband subscribers thought to be unwittingly recruited into botnets. 
It goes without saying that the biggest ISPs have the biggest botnet problem. It has been figured out that the level of spam on BT’s network peaked at the end of July 2010, at which point more than 30m junk email messages were being sent each week.  

Here is a Statistic:- 


The good news, however, is that these figures have fallen sharply since then with a number of anti-cyber crime groups helping to bring down some of the biggest botnets. One takedown earlier this year saw spam fall massively overnight, when just an entire network, called Rustock, stopped sending junk.




SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

U.S. Navy With American Defense Contractor Raytheon Will install Linux on its Drones

U.S. Navy With American Defense Contractor Raytheon Will Install Linux on its Drones

Last year we came to know that a stealthy key-logger has hit the U.S. Drone logging pilots’ every keystroke as they remotely fly missions over Afghanistan and other war zones. Later Iran took responsibility of that cyber attack. So keeping those attack in mind now U.S. govt is enhancing more security, as per resources U.S. Navy has signed a reported $28 million deal with major American defense contractor Raytheon to install the Linux operating system on its vertical take off and landing drones. The U.S. Navy’s contract with Raytheon will call for a Linux transition on the tactical control system software of the MQ-8B Fire Scout. The Navy’s MQ-8B Fire Scout has already been deployed in the Caribbean to detect illegal drug shipments. The Navy reportedly has plans of duplicating the Fire Scout to a fleet of around 168 drones. The Navy also said that the drones has also be fitted with 70mm rockets for special missions.




SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

730 Websites, 4 Facebook Groups & 9 Facebook Pages Hacked By ZHC


Well known hackers groups ZCompany Hacking Crew (ZHC) issued a statistic where they shown the damages done by them on the month of October (1-15th), 2011.
Summary Of the Statistic:- 

Total Web Sites Hacked:- 730
US:- 383
Indian:- 329
UK:- 13
Canadian:- 3
Israeli:- 2
4 Faceboook Groups Hacked
9 Facebook Pages Hacked


Message from ZHC Officials:-
"...Reason we hack Websites,Facebook groups/pages, Orkut communities..
because we care..
because we cant just sit back and watch them killing our brothers and sisters..
because we deny to be cowards and watch racists making pages about islam ..
because we want to raise an awareness about whats going wrong around us..
because we know what we are doing is the right thing ..

we have achieved much
many people joined us.. ,
many support us in what we are doing
and many hate us,including our own brothers...

we know
our hacking pages and defacing websites..
wont get freedom for Palestine and Kashmir
or even stop drone attacks in Pakistan,
or stop US from Invading Iraq,Afghanistan and Libya everyday..

BUT
this is our way to show support to our people ..
to be voice for the voiceless..
This is our world and YOU will have to listen to us
ZHC -UNITED WE STAND DIVIDED WE FALL..."


For more information and to see the full report Click Here




SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Association Of American Feed Control Officials Website Hacked By ZHC


Association Of American Feed Control Officials Website Hacked By ZHC (ZHC MONGOOSE & ZHC TOSHIRO). They Send Message of Peace to US Authorities to stop drone attacks and killings of Muslims!

Hacked Sites:-


Mirror Links:- 
The Message OF the ZHC:-

"...> A Message to all USA net users , website owners and website visitors!

Just Waste 5 minutes of your life and judge urself who should be pointed as guilty....

The insidious evil of Zionism from the standpoint of US lies in inspiring the alliance of US Zionists and Neocons. These political factions have joined in a commitment to maintain a racist Jewish colony in Palestine by means of the brutal oppression and suppression of the natives.

- Wake up American's! The Palestinians; Pakistani's; Muslims in general are not your enemy! Your enemy walks in the corridors of your administration! The ones sending your son's to kill Muslim Children and to be killed - for Israel; for The NWO Globalist agenda; for greed!

- You may be inspired by misguided feelings of guilt and a confused need for atonement - but how much guilt do you wish to pass onto your children as surely every empire weakens and America is weakening - what will they answer when asked ' why did your forefathers kill so many of our children and rape so many of our women' - What atonement will they receive?

- You burn the Holy Quran, You use drones to kill innocent muslims in Pakistan, You cause controversy in the arab lands for oil, You ban the niqab, You kill innocent muslims in palestine, You torture innocent muslims in guantanamo bay, You rape & torture muslim women(aafia siddiqui), yet we are the terrorists. . . . . . . .

- We Will not backoff until you wont stop this war on us we will not Leave hacking your sites and we will not stop exposing you and your realities ...

-Stop killing innocent muslims, we are humans too, islam is a religion of peace, Stop demonising islam,Stop meddling in the affairs of other nation states such as Pakistan. The world does not belong to the USA - The world is fighting back!!

-Every Child has its own aim and every aim is being stopped by cold war by USA or UNO where shall our coming generation go - do we get just one way out which is suicide ? why do our home countries like palestine and kashmir gets conquered for no reason - what did the kids ,womens and olds do to so called UNO where is UNO when we are beaten up to death ?

> We Are ZCompany Hacking Crew [ZHC]: Hawk - Don - Zolo - Sniper - TriCk aka Saywhat? - XtreMiSt - HardHunter - Zology - Tazii - MongoOse - Toshiro - Milan Milo - RoCk - Pak Jaguars - Madni - Chf Code - Hothead - Unknown Hax - BOZZERROR - Zulfi

and every one who supports us >

Here are some Sites and Mirrors ( proves ) which shows our anger towards USA and your Government, which includes The Association of American Feed Control Officials (AAFCO)..."








SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Stealthy Keylogger Malware Infected U.S. Drone Fleet & Gained Remote Access on Their Flying Missions



A computer virus has infected the cockpits of America’s Predator and Reaper drones, logging pilots’ every keystroke as they remotely fly missions over Afghanistan and other warzones.
The virus, first detected nearly two weeks ago by the military’s Host-Based Security System, has not prevented pilots at Creech Air Force Base in Nevada from flying their missions overseas. Nor have there been any confirmed incidents of classified information being lost or sent to an outside source. But the virus has resisted multiple efforts to remove it from Creech’s computers, network security specialists say. And the infection underscores the ongoing security risks in what has become the U.S. military’s most important weapons system.
“We keep wiping it off, and it keeps coming back,” says a source familiar with the network infection, one of three that told Danger Room about the virus. “We think it’s benign. But we just don’t know.”
Military network security specialists aren’t sure whether the virus and its so-called “keylogger” payload were introduced intentionally or by accident; it may be a common piece of malware that just happened to make its way into these sensitive networks. The specialists don’t know exactly how far the virus has spread. But they’re sure that the infection has hit both classified and unclassified machines at Creech. That raises the possibility, at least, that secret data may have been captured by the keylogger, and then transmitted over the public internet to someone outside the military chain of command.


-News Source (Wired)

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Related Posts Plugin for WordPress, Blogger...