Subscribe free to our newsletters via your
. 24/7 Space News .




CYBER WARS
Uneasy detente between Def Con hackers, 'feds'
By Glenn CHAPMAN
Las Vegas (AFP) Aug 8, 2015


Heists go Hollywood with DefCon hacks
Las Vegas (AFP) Aug 9, 2015 - Hollywood-style heists took on real-world potential Saturday as hackers at a Def Con gathering showed how to crack safes in full view of security cameras without ever being seen.

Independent computer researchers Eric Van Albert and Zach Banks found a way to pull off the movie-script ploy of intercepting surveillance camera streams and then looping back video of nothing amiss while, ostensibly, safes or vaults are being emptied.

"We set out to create our own device as close to the movies as possible," Van Albert said as the pair demonstrated their work to an overflow crowd.

"To see how possible this kind of attack actually is."

They spent about $500 to build a device they could splice into an ethernet cable carrying imagery from surveillance cameras to screens being watched by guards.

The creation, a box of electronics, re-routes incoming video feeds to their computer, where software tends to the job of creating harmless looking footage that is then fed to guards to mask a heist.

As in films, a team planning a theft would need to get access to the cable handling surveillance video. After that, a video signal intercept could be controlled from a far off location, according to the hackers.

Once a safe or vault was emptied and the team is safely away, the device could be removed with a victim being none-the-wiser.

Or it could be left in place to taunt guards by routing messages to their video screens or even playing back the heist.

"So, now they go and try to chase you down and stop the robbery, while you are 100 miles away and they are wondering what is going on," Banks said.

- Cracking a smart safe -

The looping video hack came just hours after researchers for security firm Bishop Fox showed how to hack open a smart safe made by Brinks using a computer thumb drive.

A key to cracking the computerized safe was plugging into a USB port built into one side to allow technicians to fix problems, such as it refusing to open.

The safe cracked by Daniel Petro and Oscar Salazar was designed to scan currency to track how much money was put in by merchants and use the Internet to credit bank accounts accordingly.

The safe has touch screen controls that could have also worked for the hack, but opting for the USB port was much faster because a more powerful computer could be used, according to the researchers.

"You need physical access to do the hack," Petro said. "But you need physical access to carry away the cash, so it is required either way."

Looping video from surveillance cameras might help with that but it could be too late. Petro and Salazar said they shared their research with Brinks, which came up with a fix.

There was some bridge-building, but a real rift remained on Saturday between US spy agencies and the world's most infamous hacker gathering.

Scandalous revelations about sweeping online snooping by intelligence agents caused fury in the Def Con hacker community two years ago. That led founder Jeff Moss to call for a "cooling off period" during which "feds" avoided coming near the annual conference in Las Vegas.

The chill has given way to uneasy detente in which the door could be open to US spy or law enforcement agencies to take part in panels or presentations, if they are ready to be honest about what is going on and face hostile questioning by wary hackers.

"They could come back and explain themselves, but nobody has had the guts to do that yet," Moss told AFP.

"I would say that we are in a 'trust, but verify' stage. If it is a national security thing, they need to have a real good story and be ready for hard questions."

Deputy Secretary of Homeland Security Alejandro Mayorkas braved Def Con on Friday to give a presentation centered on the need to work together to fight cyber threats - a theme hit often by government agencies welcomed here prior to cyber spying scandals triggered by one-time intelligence contractor Edward Snowden and former US Army soldier Bradley Manning.

- Whiskey and back doors -

Mayorkas accepted the traditional shot of whiskey given to first-time Def Con speakers, but sidestepped a hacker's request that he take a stand against building "back doors" for intelligence agencies to slip into encryption used to scramble email or other data traversing the Internet.

"I can not say 'yes' and I can not say 'no'," Mayorkas said, noting that it was the only time during his talk that the audience applauded. "I know what the problem is, and I don't know what the solution is."

The problem, he maintained, was tapping into digital communications that could expose threats by terrorists or others.

Moss said Mayorkas made the Def Con stage because DHS hasn't been implicated in leaks about online spying. He noted that at last year's Def Con, the Federal Trade Commission gave a presentation about zapping annoying 'robo-calls' and there was no drama.

The DHS also runs the Computer Emergency Readiness Team (CERT) that alerts companies to cyber threats.

The US Department of Defense research agency DARPA, which was involved in the creation of the Internet, is at Def Con to talk about a Cyber Grand Challenge that will pit computers against one another in a hacker version of the game Capture the Flag.

The final round of the Challenge will take place next year at Def Con, which has long had teams of human hackers playing the game, and boasts nearly $4 million in prize money.

- Booting spies -

"If the FBI or the NSA or the CIA wanted to try to give a speech, I think there would be some problems," Moss said.

"If other agencies want to come and try to repair relations, I counsel them to really think through how they are going to repair trust."

Moss had little doubt that members of intelligence groups from a variety of countries were at Def Con for either work or personal reasons, paying the $230 cash entry fee and walking in no questions asked.

"They are still here; you can see them," Moss said.

"For a while, it was growing to be kind of cool to have them in the community, but they were never really open about what was going on."

He said Def Con volunteers working as "goons" at the conference have booted out agents of foreign intelligence groups secretly recording goings on at the gathering.

"They have backpacks with small holes cut in them and they walk around recording everything," Moss said.

"If we find them, we kick them out."

Tesla courts hackers to defend high-tech cars
Las Vegas (AFP) Aug 9, 2015 - Hackers swarmed a Tesla sedan in a 'hacking village' at the infamous Def Con conference on Saturday as the high-tech electric car maker recruited talent to protect against cyber attacks.

It was the second year in a row the California-based company was at the world's largest gathering of hackers in Las Vegas, and came on the heels of a massive recall of Fiat Chrysler Automobiles vehicles to patch a flaw that could let them be remotely commandeered.

"Hackers are a crowd that is really important to us," Tesla's Khobi Brooklyn told AFP while Def Con attendees took turns inside a black Model S sedan parked inside a casino convention area.

"It is a community that we want to be part of, and collaborate with, as well as recruit from."

Tesla recruiters were on hand, along with members of the California-based company's security team.

Tesla cars are highly computerized. New features as well as software updates are pushed out to vehicles over wireless Internet connections.

"They are not messing with our software," Brooklyn said with only a hint of hesitation.

She knew of no cyber attacks aimed at Tesla cars, at Def Con or anywhere else.

Tesla has worked with Lookout Mobile Security to find and patch software vulnerabilities in sedans, according to Brooklyn.

- Data centers on wheels -

Lookout co-founder and chief technology officer Kevin Mahaffey and Marc Rogers of CloudFlare online security firm took part in a Def Con presentation on Tesla software defense flaws that were discovered and then shared with the company.

They referred to Tesla sedans as data centers on wheels, and urged great care when trying to hack vehicles that could be racing along at 100 mph (160 km) or so.

"As cars become more connected, we need to think about them a lot more like smartphones where you are constantly testing and improving products to make they as secure as you can," Brooklyn said.

Fiat Chrysler Automobiles issued a safety recall for 1.4 million US cars and trucks last month after hackers demonstrated that they could remotely control their systems while they are in operation.

The recall came after cybersecurity experts Charlie Miller and Chris Valasek remotely commandeered a Jeep Cherokee, made by Chrysler, to demonstrate the vulnerability of the vehicles' electronic systems.

Miller and Valasek presented details of the hack at a Def Con session on Saturday.

The recall involves a broad range of Dodge, Jeep, Ram and Chrysler cars and trucks produced between 2013 and 2015 that have radios vulnerable to hacking.


Thanks for being here;
We need your help. The SpaceDaily news network continues to grow but revenues have never been harder to maintain.

With the rise of Ad Blockers, and Facebook - our traditional revenue sources via quality network advertising continues to decline. And unlike so many other news sites, we don't have a paywall - with those annoying usernames and passwords.

Our news coverage takes time and effort to publish 365 days a year.

If you find our news sites informative and useful then please consider becoming a regular supporter or for now make a one off contribution.
SpaceDaily Contributor
$5 Billed Once


credit card or paypal
SpaceDaily Monthly Supporter
$5 Billed Monthly


paypal only


.


Related Links
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle




Memory Foam Mattress Review
Newsletters :: SpaceDaily :: SpaceWar :: TerraDaily :: Energy Daily
XML Feeds :: Space News :: Earth News :: War News :: Solar Energy News





CYBER WARS
New hacks strike at heart of mobile innovations
Las Vegas (AFP) Aug 7, 2015
As fierce competition leads to rapid innovation in the smartphone market, hackers have pounced on cracks in defenses of developments on devices at the heart of modern lifestyles, experts say. Smartphones have become increasingly targets for cyber criminals as people cram the gadgets with troves of personal information and go on to use them for work. "Mobile devices are taking a bigger pl ... read more


CYBER WARS
NASA Could Return Humans to the Moon by 2021

Smithsonian embraces crowdfunding to preserve lunar spacesuit

NASA Sets Sights on Robot-Built Moon Colony

Technique may reveal the age of moon rocks during spaceflight

CYBER WARS
Buckingham astrobiologists to look for life on Mars

NASA Mars Orbiter Preparing for Mars Lander's 2016 Arrival

New Website Gathering Public Input on NASA Mars Images

Antarctic Offers Insights Into Life on Mars

CYBER WARS
Third spaceflight for astronaut Paolo Nespoli

New rocket could one day launch flight to Europa

ISU Educates Future Space Leaders

Domes Arrive for CST-100 Test Article Assembly

CYBER WARS
Chinese earth station is for exclusively scientific and civilian purposes

Cooperation in satellite technology put Belgium, China to forefront

China set to bolster space, polar security

China's super "eye" to speed up space rendezvous

CYBER WARS
Space Kombucha in the search for life and its origin

Political Tensions Have No Impact on Space Cooperation- Roscosmos

RED epic dragon camera captures riveting images on space station

Launch, docking returns ISS crew to full strength

CYBER WARS
India to launch 9 US satellites in 2015, 2016

Payload checkout is advancing for Arianespace's September Soyuz flight

Payload fit-check for next Ariane 5 mission

SMC goes "2-for-2" on weather delayed launch

CYBER WARS
Exoplanets 20/20: Looking Back to the Future

An exceptional planetary system discovered in Cassiopeia

Microlensing used to find distant Uranus-sized planet

NASA's Spitzer Confirms Closest Rocky Exoplanet

CYBER WARS
A droplet's pancake bounce

NYU scientists bring order, and color, to microparticles

Cooking up altered states

Satcoms Linking Rural Schools in South Africa and Italy




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement All images and articles appearing on Space Media Network have been edited or digitally altered in some way. Any requests to remove copyright material will be acted upon in a timely and appropriate manner. Any attempt to extort money from Space Media Network will be ignored and reported to Australian Law Enforcement Agencies as a potential case of financial fraud involving the use of a telephonic carriage device or postal service.