XIAM007

Making Unique Observations in a Very Cluttered World

Friday 18 January 2013

US Department of Defense Tactical Electromagnetic Cyber Warfare: Plant Malware Through the Air -


US Department of Defense Tactical Electromagnetic Cyber Warfare: Plant Malware Through the Air - 

It was right around that time that scientists began to turn their attention to another project: trying to access these protected networks remotely, through the air, by reading activity via electromagnetic field distortions and inserting code via radio frequencies. Accessing these networks — networks that don’t have wireless routers and aren’t connected to the Internet — became something of a holy grail, dubbed “jumping the gap.”

The science has progressed significantly, and now the Army is looking at demonstrating technology that can be deployed on aircraft and ground vehicles that can wage this kind of cyber warfare.


Iran’s uranium enrichment facility at Natanz may have had one of the most secure computer systems in the world. The building housing the nuclear program’s equipment is underground, protected by a combination of concrete walls, earth and military guards.

And it was a “closed” network, sealed off from the Internet and unsusceptible to vulnerabilities in the system’s Windows-based software.

All those precautions, however, didn’t stop the Stuxnet worm from infecting the system, disrupting the delicate balance of uranium-enriching centrifuges and rendering them useless. Stuxnet, part of a broader U.S./Israeli cyberwarfare campaign against Iran’s nuclear program called “Olympic Games,” was carried in on a small flash drive. Someone, either a spy or an unwitting accomplice, plugged it into a USB port on a computer inside the complex and let loose into the “secure” Iranian system the most devastating cyber weapon ever known.

Without smuggling that cyber weapon physically into the plant, the operation never would have worked, which underscores the problem: No matter how high-tech the cyber tool, the glaring weak link has been the ability to reach out and touch a system. A breach of physical security was required, either secretly getting hold of an employee’s thumb drive and infecting it, or working with someone on the inside to covertly plug the device into the network.

With thumb drives now a known vulnerability, most countries have banned their use on sensitive systems. Iran forbade them at Natanz shortly after the Stuxnet worm began to work its magic; the Pentagon banned their use in 2008.

It was right around that time that scientists began to turn their attention to another project: trying to access these protected networks remotely, through the air, by reading activity via electromagnetic field distortions and inserting code via radio frequencies. Accessing these networks — networks that don’t have wireless routers and aren’t connected to the Internet — became something of a holy grail, dubbed “jumping the gap.”

The science has progressed significantly, and now the Army is looking at demonstrating technology that can be deployed on aircraft and ground vehicles that can wage this kind of cyber warfare.

The Army’s Intelligence and Information Warfare Directorate, known as I2WD, hosted a classified planning day Nov. 28. Representatives from 60 companies and labs attended to discuss what can be done in the realm of electronic warfare and cyber, according to a source familiar with the program.

The roughly half-dozen objectives of the Tactical Electromagnetic Cyber Warfare Demonstrator program are classified. (The TECWD program is pronounced “techwood” by participants.) The source said the program is designed to demonstrate ready-made systems, dubbed “boxes,” that can perform a variety of tasks. Some are somewhat typical fare, like systems aimed at the improvised explosive device threat.

But among the objectives are these: inserting and extracting data from sealed, wired networks. The possibilities are remarkable. Imagine being able to roll a vehicle near a facility, sit for a short period while inserting a worm, and leave without having to buy off any employee or sneak anything past an attentive guard. Better yet, a stealthy unmanned aerial vehicle could be quietly flown far above a facility to insert code even in contested airspace. With that kind of tactical deployment, cyber could become a critical part of a wide variety of operations, as localized effects could be integrated with kinetic activities.

The Army program is designed specifically to test capabilities for air and ground platforms, according to an invitation to an information day on the program released by I2WD.

“The TECWD demonstration effort will serve as a technology demonstrator for offensive electronic attack, defensive electronic attack, electronic protection, and electronic support, and EW enabled cyber on ground and air platforms,” the invitation read. “TECWD will help the Army assess technologies and capabilities for potential applicability in the Army’s next generation EW and beyond.”

The program, which will consist of a series of demonstrations roughly every three months for the next two years, will test a variety of electronic warfare, or EW, capabilities, said Moses Mingle, branch chief of the EW systems ground branch at I2WD.

“It’s not a system; it’s a demonstration platform,” Mingle said. “Basically, we’re vetting systems concepts: tactical EW cyber scenarios that could be deployed in the future.”

Asked if one of the objectives is to demonstrate a system that could jump the gap and access systems remotely, Mingle declined to go into detail, citing classification issues, but said, “That’s a part of it, but not all of it.”

U.S. intelligence agencies began to worry about distortions to the electromagnetic fields around computer systems, and the potential that they would provide unique signatures that could tip off network activity, in the 1980s. The principle behind it is based on simple physics. Electronics in even a closed network emit an electromagnetic signal, however faint and accidental.

So at the time, a series of research efforts was undertaken to study these distortions, known as compromise emanations, under the code name “Tempest.” Could these the emanations be exploited in any reliable way? Researchers found that keystrokes could be detected from signals sent from keyboards to computer units, as well as information on a monitor. The ability to detect these disturbances has become increasingly sophisticated, with systems able to pick out signals from greater distances with greater clarity.

More recently, scientists have been paying special attention to the inverse of reading these emanations: insertion of data using radio frequencies. Again, in theory, since a wire can act as an antenna, an electromagnetic signal can be engineered and potentially transmitted to that wire.

The precision required is tremendous. Popular culture has introduced much of the world to the concept of the electromagnetic pulse, as featured in the George Clooney movie “Ocean’s Eleven.” (Don Cheadle’s character, quite implausibly, fries the electrical grid of Las Vegas.) The pulses are typically created by extraordinarily large systems supported by tremendous supplies of energy or as a side effect of nuclear detonations. They work as blunt-force instruments, frying a system and rendering the electronics useless.

The TECWD challenge would be a technique that would transmit not a destructive pulse but a signal finessed to a specific network. It’s more scalpel than sledgehammer.

The technology does exist, but the ability to add data still has limitations, mainly proximity and bandwidth, experts said. The “transmission” system has to get quite close to the targeted network. And at current levels, complex data can take extended periods to insert. Experts declined to provide full specifics on data transfer rates and range for data insertion using radio frequencies, citing the classified status of the capabilities and national security issues.

The actual power usage is far less than you’d expect: One expert said systems as small as man-packable radios could serve as the forward entry point for these types of cyber penetrations.

The recognition that electronic warfare methods can be critical for future cyber applications is clearly making its way up the leadership chain.

At a recent event at the Naval Surface Warfare Center’s Crane Division in Crane, Ind., Adm. Jon Greenert, chief of naval operations, made the case.

“We have to understand better the electromagnetic spectrum,” he said. “Cyber, our radar and communication, everything. If you control the electromagnetic spectrum, you control the fight.”

The cryptic remarks reflect the classified nature of nearly everything in the cyber realm, and particularly in regards to offensive cyber EW capabilities.

But the possibilities are being explored as the U.S. military increasingly recognizes the potential of cyber weapons in operations.

The actual technology that allows for the insertion of data — transmitting cyber into a closed system — isn’t novel, said retired Air Force Maj. Gen. Dale Meyerrose, former associate director of national intelligence.

“This is old technology,” he said. “The technology itself isn’t new, but the application of the technology is new, and the software running the technology on some of these devices is new.”

Meyerrose, who runs the Meyerrose Group, said connecting to closed networks using radio frequencies is about five years old, but some of the complications of cyber, including legal authority, have slowed progress. “This could be used to drop a Trojan into a system,” he said. “Like everything else in cyber, there are not a lot of legal parameters. Like everything else in cyber, our legal system is about 20 years behind.”

But if the legal questions and technical limitations are worked out, a new era of integrated cyberwarfare may be dawning.

Read more - 
http://www.phantomreport.com/us-department-of-defense-tactical-electromagnetic-cyber-warfare-plant-malware-through-the-air

Insane picture of Boeing 787 plane rechargeable lithium-ion batteries - ummm, Houston, I think we have a problem... -


Insane picture of Boeing 787 plane rechargeable lithium-ion batteries - ummm, Houston, I think we have a problem... - 


BoeingFireBattery.jpg

Boeing is reportedly proposing a "complete health check" on the batteries in its 787 Dreamliner jets amid an investigation by Japanese and U.S. authorities into its troubled, technologically advanced aircraft.
The Seattle Times reports Boeing suggested the battery check and procedural changes for pilots as possible interim ways to get the planes flying again in intensive talks with FAA officials. The Dreamliner has been grounded by multiple countries' aviation authorities, including the FAA. 
However, sources tell the Times the options proposed by Boeing may not be enough to convince officials the Dreamliner should fly again after the plane's several reported woes, including an emergency landing of a Japanese airline's 787 Wednesday. 
A Japanese investigator said Friday the burned insides of a battery in that plane indicate it operated at a voltage above its design limit. 
The All Nippon Airways plane made an emergency landing in western Japan after its pilots smelled something burning and received a cockpit warning of battery problems. Nearly all 50 of the 787s in use around the world have since been grounded.
Photos provided by the Japan Transport Safety Board of the lithium ion battery that was located beneath the 787's cockpit show a blackened mass of wires and other components within a distorted blue casing.
Japan transport ministry investigator Hideyo Kosugi said the state of the battery indicated "voltage exceeding the design limit was applied" to it.
He said the similarity of the burned insides of the battery from the ANA flight to the battery in a Japan Airlines 787 that caught fire Jan. 7 while the jet was parked at Boston's Logan International Airport suggested a common cause.
"If we compare data from the latest case here and that in the U.S., we can pretty much figure out what happened," Kosugi said.
The 787 relies more than any other modern airliner on electrical signals to help power nearly everything the plane does. It's also the first Boeing plane to use rechargeable lithium-ion batteries for its main electrical system. Such batteries are prone to overheating and have additional safeguards installed that are meant to control the problem and prevent fires.
GS Yuasa Corp., the maker of the lithium-ion batteries used in the 787s, said Thursday it was helping with the investigation but that the cause of the problem was unclear. It said the problem could be the battery, the power source or the electronics system.
U.S. safety officials and Boeing inspectors joined the Japan Transport Safety Board investigation Friday.
The American investigators -- one each from the Federal Aviation Administration and the National Transportation Safety Board and two from Boeing Co. -- inspected the ANA jet on the tarmac at Takamatsu airport in western Japan.
An initial inspection by Japanese officials of the 787 found that a flammable battery fluid known as electrolyte had leaked from the plane's main lithium-ion battery beneath the cockpit. It also found burn marks around the battery.
Aviation authorities in Japan have directed ANA, which owns 17 of the planes, and Japan Airlines, with seven, not to fly the jets until questions over their safety have been resolved.
The 787, known as the Dreamliner, is Boeing's newest jet, and the company is counting heavily on its success. Since its launch after delays of more than three years, the plane has been plagued by a series of problems.
The FAA has required U.S. carriers to stop flying 787s until the batteries are demonstrated to be safe. United Airlines has six of the jets and is the only U.S. carrier flying the model.
Aviation authorities in other countries usually follow the lead of the country where the manufacturer is based.


Read more: - 
http://www.foxnews.com/world/2013/01/18/us-investigators-boeing-staff-arrive-in-western-japan-to-inspect-troubled-787/