Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

It’s unbelievable that any military allows its soldiers to deploy carrying consumer technology equipped with GPS tracking.


I have a close friend with the US military, who was deployed to Germany in 2017. Their brigade was moving various equipment from base to base.

Their only means of communication with superiors was a bog-standard cell phone with a US-number SIM-card.

Forget the tracking implications: orders were texted, often via SMS.


Yeah people on HN and elsewhere really have this warped view about how secure things are. They don’t understand that militaries and intelligence agencies are run by normal people with normal beauracies and dumb rules and shortsights. Look at the Snowden leaks, these people are not magical space wizards.


No, we understand that. We're just continually surprised that world's largest and most expensive army keeps shooting itself in the foot like this.


It's a trade-off, I think. I doubt there's much actionable intel for an enemy to be found in logistics orders of a base in Germany.


Use your imagination. Having a scrap of inside knowledge is a great asset for recruitment. You establish yourself as an insider and the target is more likely to spill some beans.

“Yeah, getting all those Foo widgets to that secret storage place was a real pain, I know! It was bunker X9, I think.. that’s the worst, am I right?"


Why do you say that? They are/have been a major reconnaissance/aggressive drone hub.


More importantly, it's a bit harder to find (or operate) a reliable fully secure US owned communication system in Germany. Especially when compared to reliability and scale of the civilian GSM system.


Maybe not now, but in a war there definitely is.


The same way people believe that crypto-exchanges holding hundred of millions of dollars in coins must have James Bond movie kind of security, when in fact many times they just store the coins online on a computer connected to the internet.


There's people who are smart enough to design TEMPEST standards and a private global network, you'd think they could design something sufficiently idiot-proof to send military orders with ease. For fuck's sake, a basic messaging app hosted on military servers would do the trick, and it would be no different for users (rather than the Messages app, use the military app).


I respectfully disagree. For most troops, deploying with your personal device is a huge morale boost. Blocking GPS on these devices is not practical, and might actually help when it comes to innovation in the field (helicopter pilots using iPads to innovate routing, for example) - not to mention just basic morale (movies / music / what have you).

These tools also go a long way toward operational readiness / fitness. They incentivize these things and are used for a reason. There are trade-offs with all these things, not to mention the practical issues of blocking them.

I would expect, however, that identifying this as a huge security problem is relatively easy. "HEY DO NOT UPLOAD YOUR RUN WHILE DEPLOYED OR YOU MAY GET MORTARED" is likely a better option here, just below "MAKE SURE YOU WEAR YOUR NEON BELT" on every sign.


> "HEY DO NOT UPLOAD YOUR RUN WHILE DEPLOYED OR YOU MAY GET MORTARED" is likely a better option here, just below "MAKE SURE YOU WEAR YOUR NEON BELT" on every sign.

I take the whole lesson here to be: information can leak in unexpected ways. So solving this particular issue does nothing to help the larger problem. I'd imagine there are countless similar side channel leaks that already exist... and then even more that don't exist yet but will retroactively exist with a future phone or app update. The fox is in henhouse.


Agreed, but many times you need to be super explicit about the main channels, otherwise people just...forget and/or can't keep it all in their brain because some folks are bad with checklists.

It's stupid easy to leave an Apple Watch or FitBit on your wrist walking around a secure location (as evidence suggests). Big signs required to avoid these kinds of risks.

The signage required just to get people to leave their bloody phones outside a room is incredible - and they still err. Social Network training is already provided as well to avoid these kinds of social engineering risks, and yet... well, just search LinkedIn I'd imagine.


> basic morale (movies / music / what have you).

Communication with family and friends would be my first thought. Many historical accounts put a lot of emphasise on the mail delivery and what the news from home was. It must be/have been a significant problem dealing with the mail when you had a lot of troops in the field.


Totally Agree. I was not assuming broadband capability / cell service for my hypothetical (also traditional comms may be limited in remote / classified environments) but that's definitely another reason to have a personal device. Comms with family would be critical if they are possible.


There are troves of historically important photographs from various wars taken by soldiers with forbidden personal cameras. [0]

In some ways this is similar however the immediacy of the data in an active conflict is more troubling.

[0] https://www.amazon.com/Lens-Infantryman-Memoir-Photographs-H...


By now we all should have realized that all but a tiny fraction of people is illiterate about computers, the internet and their possibilities and dangers.


Let me piggyback on my own comment.

Because there are only so few people who have factually so much power, I urge every hacker, everybody who understands the digital world, to act in the best faith of everybody. This technological revolution is too important to serve only a few.

Luckily, many hackers do the right thing and don't do everything they could to maximize their immediate benefit. I sincerely hope for humanity, for the people of poor countries, for people suffering from corrupted governments, for people who weren't as fortunate as we were, that we provide them with the technology they need. But we must not maintain control over it to have control over them. Free and just software and hardware must prevail.


I'm not surprised at all.

If you look at GPS watches like Garmin tactix Bravo. It has a feature set, where some of the features, really only makes sense in a military/hunting setting. Although I wonder what kind of animal you are hunting if you start your hunting trip by doing a HALO parachute jump.

Garmin is not the only one making those kind of GPS watches either. I believe that Suunto has similar watches as well.

Obviously the soldiers should not be uploading their GPS tracks to Strava. But banning your non special forces soldiers from buying the same "civilian" watches that your special forces soldiers use. Sounds like a morale killer.


The US military is ass-backwards when it comes to dealing with technology.

Want to transfer files between computers? Can't use a thumb drive! You need to burn a disk (for real).


If you look deeper into the security issues of USB and it’s less surprising: beyond the risk of basic malware, the devices are usually hackable which makes really hard to be certain about anything. Cutting out whole classes of attack makes sense when you know you have highly-skilled, well-funded adversaries and the budget to simply write off the extra overhead. Remember that their threat model doesn’t end at “my dirty picture collection leaked” but “we lost a war” or “we have to ask Congress for 10e9+ dollars for repairs/replacements”.

This got a lot of attention a couple years ago:

https://www.blackhat.com/us-14/briefings.html#badusb-on-acce...

This kind of problem is endemic to small cheap devices, too – for example:

https://www.bunniestudios.com/blog/?p=3554


I'm intrigued.

Around here a lot of places don't allow USB drives, but .. I think that's mostly a "Do Not Steal Our Data" policy.

Not, my real question is: Does that make sense? People talk about USB HID things, but .. I would expect that most keyboards and mice these days are using USB. So if you find a way to block USB drives for mass storage aka "Do Not Steal Data" uses, are you still open for all the "I type in exploits because I'm not really a USB drive, I can be a keyboard too" things?


At least 15 years ago I was told that the standard fix was epoxy: they’d pay a tech to chisel it off if the keyboard needed replacing rather than take the risk of unknown devices being plugged in.


Do these places typically let you bring a mouse/keyboard from home?


They don't, but I'm confused how that matters.

Say you're in a "secure" place, where I'm not allowed to do stuff. You probably have keyboard/mouse connected via USB, right?

I can easily unplug them and insert my own, if you don't glue them in place. I did that in a number of internet cafes in the past.


> I can easily unplug them and insert my own, if you don't glue them in place.

Correct. If you're doing it right, you've blocked all unused ports, and you've glued in all used ports. Ideally having testing that the devices you're plugging in aren't already compromised first.

USB device fails and needs replacing? One place I worked disposed of the whole unit and bought a new computer to replace it, rather than dealing with glue removal. It's difficult to distinguish between legit and illegit tampering, so better to have no signs of tampering.


>They don't, but I'm confused how that matters.

>I can easily unplug them and insert my own [keyboard/mouse]

Can you see where the problem lies? For you to be able to insert your own kb/mouse, you'd need to bring it from home in the first place. And while it might work if you're at an Internet cafe which isn't super strictly controlled, in an office with more stringent security requirements and checks you'd at least raise some eyebrows.


I was talking about the risks of having a USB device (not a keyboard, nor a mouse) being able to _act_ as one, delivering payloads. It can look like a normal usb drive or be tiny like a yubico key.

My subthread started as a reply to "Want to transfer files between computers? Can't use a thumb drive" and I wondered if that on its own - disallowing data transfers by say blocking USB mass storage device drivers or something - is useful or enough, when anything I can connect via USB can _act_ as a keyboard for example.

At no point did I talk about bringing an actual keyboard or mouse anywhere.


Could this be taken care of at the computer end instead, having the computer not automatically run things from a drive? It seems to me like the natural way to resolve the problem.


The drive itself can be running code. That could hide malware until some trigger event, allow you to write a file which will be concealed, etc.


The drive might not be a drive but actually a program presenting as a keyboard that waits for a sufficient period of inactivity before performing a series of keypresses that runs arbitrary code and exfiltrates data off the back of that.

Not to mention lower level exploits that exist for USB.


USB devices get to move the mouse pointer, click, and send keystrokes.


It's up to the host to heed such commands, right?


How do you "pair" a bluethooth keyboard if you haven't plugged in a normal keyboard?


Install OS, plug in keyboard and mouse, turn off the automatic acceptance of any new such devices.

Alternatively, have the driver require that keyboards verify themselves with a digital signature from a trusted source.


That does't sound like terrible infosec.

Flash drives are a huge security vulnerability. With more secure workstations you can't plug in any USB peripherals, because they're such big risk.

Write only media is a lot safer, despite the waste it causes.


I'm pretty sure SD cards have a lot less vulnerabilities than USB sticks. Especially because they cannot pretend to be a keyboard.


There's WiFi enabled SD cards[0]. I had one of those and it was running Linux, you could SSH into it. Maybe the attack-surface to the host computer is smaller (I'm not sure about that either). But there's certainly enough bad stuff an SD card could do.

[0] https://hackaday.com/2016/06/30/transcend-wifi-sd-card-is-a-...


They can still pretend to have / not have files so it’s hard to say that you’ve verified nothing sensitive is leaving or that no malware is coming in.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: