Dominant NATO Member's Countries Websites Hacked By Hitcher

Security Experts Are Saying: Project 25 Mobile Radios Are Vulnerable


Many users don’t know how to use encryption, and radios can be jammed with a child’s toy. A paper presented at this year’s APCO conference showed the vulnerability of some new and expensive encrypted digital mobile radios, particularly those used by federal law enforcement agencies. The researchers from the University of Pennsylvania found that it was very easy to monitor sensitive law enforcement operations, that users either didn’t turn on their encryption or thought their transmissions were encrypted when they weren’t, and that a $30 child’s toy could corrupt the radios’ signals enough to make them useless. They also found a way to make the radios transmit at will, so that direction-finding equipment could be used to determine their location.
The radios with the identified problems operate on a relatively new protocol called Project 25 (P25). P25 is an initiative of the Association of Public Safety Communications Officers (APCO) and both users and manufacturers of radio equipment. P25 radios use digital transmissions on channels spaced 12.5KHz apart in the UHF and VHF bands. One of the objectives of P25 is to expand the number of channels available for use in the crowded radio spectrum. Presently, federal law enforcement agencies are the biggest users of P25 equipment, but other public safety organizations are adopting the standard as they replace their “legacy” radios. Eventually, all users in the VHF and UHF bands will be required to go to P25 equipment, as their licenses to operate on the broader channels and with analog equipment won’t be renewed by the FCC.
Traffic over P25 equipment is transmitted in digital form, as bits of ones and zeros, rather than as an analog waveform as with older radios. The body of voice or data traffic is preceded and followed by several data frames of different lengths that identify the source, the type of information (voice or data) that follows, and when the traffic is encrypted, encryption keys that prevent the transmission from being heard by a radio which doesn’t have the matching codes. The authors of the paper found that the markings on the radios that turned the encryption on or off were so cryptic themselves that many of them thought they were transmitting encrypted, when they were actually sending “in the clear.” The knobs and indicators for encryption were poorly located, making it easy to turn encryption on and off while adjusting the volume or changing radio channels.

There are blocks of frequencies allocated for the exclusive use of federal law enforcement agencies. These are allocated by the National Telecommunications and Information Administration, and are not published, as are FCC-allocated channels. The allocation is made by both region and user agency, so that a channel used by the FBI in New York might be the one used by the U.S. Forest Service in Boise. Even though the assignments are confidential, the researchers were able to scan the federal bands in two large U.S. cities and monitor ongoing operations at length. The encryption problem became obvious, as users openly discussed names and descriptions of informants, appearance and vehicles of undercover agents and surveillance operators, and plans for raids and arrests. The researchers used a $1000 bench-type receiver, but indicated that the same task could be accomplished with gear from Radio Shack.
Techies are familiar with the acronym “RTFM,” or “Read the [Bleeping] Manual.” The manual for a P25 radio from one well-known manufacturer is 150 pages long. On top of that, most P25 radios are user-configurable, so that combinations of button presses and switch settings set the radio to work in specific ways the owner agency thinks is appropriate. The net effect is that — in addition to the 150-page manual — each agency has to publish their own user manual if they want their users to understand all the functions of the radio and how to use them. Of course, getting the users to read those manuals is another matter.

Digital communications has several advantages over analog, one being that if a portion of a transmission is not received or corrupted in sending, an error-correction protocol identifies it and sends a request for a re-send. The University of Pennsylvania researchers found they could manipulate this mechanism and send a string of renegade error messages to a radio, triggering a string of retransmit requests. There would be no retransmit, as the messages pointed to a nonexistent message stream, but the nearly continuous transmission could be used with a direction finder to pinpoint the location of the radio. Someone who was running countersurveillance on law enforcement users would be able to tell by this method when officers were active, and where they were.

A variation on the data packet manipulation worked to disable the radios entirely. The researchers purchased a toy text messaging device called an IM-Me http://uk.girltech.com/electronics-imMe.aspx , which sends and receives text messages between a computer and the toy, which looks like a text pager. By loading some custom firmware onto the device, it could be set to transmit corrupted data packets to P25 radios and confound their reception. The device had to transmit these packets for milliseconds at a time, making it very difficult to locate and identify.
The authors of this paper are all “good guys” who have no agenda for compromising public safety communications, but if they can produce the hardware and software necessary to manipulate P25 radios, you can bet someone with less honorable motives can, as well. These new P25 radios are expensive; one available from Midland costs $3295. Hopefully, that custom-configuration capacity can be used to modify the radio firmware and close some of these security gaps. In the meantime, if your agency is using or contemplating a purchase of P25 radios, you should revisit your security procedures and contact your vendor to determine how vulnerable your communications may be.

-News Source (Tim Dees & Police One)

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

A 22 Years Old Guy (Member Of Anonymous) Busted by Scotland Yard


A 22-year old student Peter David Gibson allegedly associated with the hacking group “Anonymous” has been arrested and charged in the United Kingdom.
Scotland Yard Said:-

"Peter David Gibson, 22, a student, of Castleton Road, Hartlepool, Cleveland, has today, Thursday 25 August, been charged with conspiracy to do an unauthorised act in relation to a computer, with intent to impair the operation of any computer or prevent or hinder access to any programme or data held in a computer or to impair the operation of any such programme or the reliability of such data - contrary to Sec 1(1) of the Criminal Law Act 1977.
He is due to appear on bail at City of Westminster Magistrates' Court on 7 September.
Gibson was arrested by officers from the Met's Police Central e-Crime Unit in connection with an investigation into Anonymous, following allegations of DDOS attacks by the group against several companies."

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Apple's Education & Seminar Events Website Defaced By HodLum


Apple Education & Seminar Events Website defaced by HodLum (Turkish Hacker). The hacker uploaded an image which is clearly stating that he was inside that site and then uploaded an image named "Ownz.jpg" by this he defaced the site. 

Hacked Site:-
http://edseminars.apple.com/seminars/eventfiles/668/0wnz.jpg

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Happy Birthday Windows XP (Microsoft is Celebrating the 10th Anniversary of XP)


Many Many happy returns of the day, wish you a very very happy birthday dear  Windows XP. Microsoft shipped the first copies of Windows XP to PC manufacturers 10 years ago today. Short for “eXPerience”, the successor to Windows 2000 and Windows Me eventually became the most popular operating system of all time. Windows XP is the first consumer-oriented OS built on the Windows NT kernel. The OS had a long run despite a rocky launch and has sustained two subsequent releases, the dreaded Windows Vista and the much-improved Windows 7.
Just one month before the official retail release of XP, a group by the name of devils0wn released a volume license key used to bypass product activation. This allowed potentially millions of users to install the operating system without paying for it. Furthermore, the events of September 11, 2001 put a damper on Microsoft’s retail launch plans and the company decided to scale back worldwide launch parties accordingly.
OEM and retail sales of XP ceased in June 2008, although Microsoft continued to offer the OS to system builders through early 2009. Support will be offered for systems running Service Pack 3 through April 8, 2014. As of last month, Windows XP finally fell below the 50 percent mark among all Windows Internet users. The slow decline is partially due to the success of Windows 7, which now accounts for nearly 30 percent of the market.
Microsoft has been urging customers to upgrade from XP since Vista arrived in 2006 and again when 7 debuted in 2009. According to free antivirus software provider Avast, XP is home to 74 percent of their customers' rookit infections.

-News Source (TECHSPOT)

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Vulnerability Found on UK Direct Telecom Website By Kheshav


Vulnerability found on UK Direct Telecom Website by kheshav. UK Direct Telecom provides Services like wireless-communication, rent of communication equipments.

Vulnerable Website:-
http://www.direct-telecom-svs.co.uk/index.php 

Vulnerable Link:-
http://www.direct-telecom-svs.co.uk/products.php?id=604

Database Back-end: MySQL 5.0.11
Web Technology: IIS6.0, ASP.NET, PHP 5.2.6
OS: Windows Server 2003
Database name: cmsdirect

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

SpyEye is Becoming A Big Threat For Cyber Security


SpyEye, a potentially dangerous hacking tool, has become widely available for anyone to buy, giving rise to concerns about the threat posed by cyber attacks.
According to an article on USA Today, security researchers have predicted a large rise in the number of attacks orchestrated using SpyEye for the rest of the year.
The toolkit, which is far more dangerous and sophisticated than ZeuS, was previously used by a group of elite hackers and was sold for as much as $10,000.
However, after a group of French security researchers managed to crack the toolkit’s activation key, its entire source code has been laid bare for hackers to replicate and sell for as low as $95, making it available for virtual anyone with malicious intent. "SpyEye is very dynamic and versatile," Amit Klein, chief technical officer of Trusteer warns.
“Every level of criminal, from the lowest to the highest rungs, can now use one of the deadliest Swiss Army knife hacking toolkits in the world,"  Sean Bodmer, senior threat intelligence analyst at network security firm Damballa, told USA Today.
Ever since the toolkit was released online, 14 cyber gangs have taken advantage of it, sending commands to thousands of botnet PCs in the United States.

-News Source (ITPro Portal)

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Related Posts Plugin for WordPress, Blogger...