Air Cyber Power and ADS-B Vulnerabilities

Dynamic Radar Map from Flightradar24.com

Exploring Potential ADS-B Vulnerabilities in The FAA NEXTGEN Air Transportation System
The Fog of a “Cyber” War

“It is late fall 2025; Al Qaeda sleeper cells target the disruption of airline traffic into multiple East coast airports during the busy travel season from Thanksgiving through Christmas.
ADS-B IN/OUT has been fully implemented by the FAA; all commercial airlines have invested heavily to comply with the mandate. Oil prices are at an all time high and flights are carrying minimal fuel loads to save money and offset the cost of avionics.

The goal: force multiple airplanes to divert; pilots, FAA controllers and passengers to lose faith in the system; and possibly cause enough chaos to the NAS system that a few lives are lost.

The plan: exploit the U.S. dependency on ADS-B IN/OUT and GPS for arrivals into busy airports, especially during low visibility conditions.

The teams: five two man teams have been put into play for the mission. They are provided with all the commercially available technology they will need, along with a few modified laptop computers, antennas and transmitters.

The targets: Regan National, Dulles, La Guardia, JFK and Philadelphia International airports. The terrorists have been tasked to park minivans with computers containing modified software that are coupled to ADS-B OUT transmitters. The software is designed to be remotely activated and controlled over an Internet connection. Each computer is programmed specifically for the targeted airport, and transmits 978MHz and 1090MHz signals out a boosted transmitter.

As a result, airlines on final approach will receive false targets on their displays. The terrorists ghost target injects also propagate to the FAA controller’s screens. The terrorists intended these spoofed targets, programmed at conflicting arrival and departure corridors as well as in runway incursion situations, to cause multiple airports to become temporarily unusable. The resulting domino effect causes aircraft diversions and delays that will lead to chaos.”

DONALD L. McCALLIE
Major, USAF
Degree of Master of Cyber Warfare
Air Force Institute of Technology
Wright-Patterson Air Force Base, Ohio, USA

Download Exploring Potential ADS-B Vulnerabilities in The FAA's Nextgen Air Transportation System

Malware: Sobig.F, Computerwurm, Computervirus, Trojanisches Pferd, Backdoor, Conficker, Schadprogramm, GhostNet, Mydoom, Rootkit, Code Red (German Edition)

Malware: Sobig.F, Computerwurm, Computervirus, Trojanisches Pferd, Backdoor, Conficker, Schadprogramm, GhostNet, Mydoom, Rootkit, Code Red (German Edition)Der Erwerb des Buches enthält gleichzeitig die kostenlose Mitgliedschaft im Buchklub des Verlags zum Ausprobieren – dort können Sie von über einer Million Bücher ohne weitere Kosten auswählen. Das Buch besteht aus Wikipedia-Artikeln: Sobig.F, Computerwurm, Computervirus, Trojanisches Pferd, Backdoor, Conficker, Schadprogramm, GhostNet, Mydoom, Rootkit, Code Red, Spyware, Witty-Wurm, Stoned, XCP, Ransomware, Loveletter, (c)Brain, Michelangelo, Drive-by-Download, Tequila, Sasser, Slowloris, Waledac, W32.Blaster, Optix Pro, DLL-Injection, Ramen-Wurm, Vienna-Virus, Bootvirus, 29A, Bagle, Handymalware, Scareware, Archivbombe, Russian Business Network, EICAR-Testdatei, CIH-Virus, Call Home, Back Orifice, NetBus, Lamer Exterminator, Makrovirus, SQL Slammer, Bliss, SubSeven, Look2Me, XM/Compat, Form-Virus, Staog, Kernelvirus, Network Admission Control, TSR-Virus, Rogue-Software, Elk Cloner, Creeper-Virus, Virensignatur, Parity Boot, Bootkit, Browser-Hijacker, Dropper, CommWarrior, Common Malware Enumeration, Linkvirus, Nepenthes, OsxTrojan/1a, MTE, In-the-wild, Malicious Code, Riskware, Netsky, Reaper-Programm,. Online finden Sie die kostenlose Aktualisierung der Bücher. Nicht dargestellt. Auszug: Ein Computerwurm (im Computerkontext kurz Wurm) ist ein Computerprogramm oder Skript mit der Eigenschaft, sich selbst zu vervielfältigen, nachdem er ausgeführt wurde. In Abgrenzung zum Computervirus verbreitet sich der Wurm ohne fremde Dateien oder Bootsektoren mit seinem Code zu infizieren. Würmer verbreiten sich über Netzwerke oder über Wechselmedien wie USB-Sticks. Dafür benötigen sie gewöhnlich (aber nicht zwingend) ein Hilfsprogramm, wie einen Netzwerkdienst oder eine Anwendungssoftware als Schnittstelle zum Netz; für Wechselmedien benötigen sie meist einen Dienst, der nach dem Anschluss des belasteten Mediums den automatischen Start des Wurms ermöglicht (wie Autorun, mitunter auch den aktiven Desktop von Windows). French Navy Rafales planes were unable to take off after military computers were infected by Conficker. Royal Navy and RAF were attacked by a version of Conficker that infected some 24 RAF bases, 75% of the Royal Navy fleet and the Ark Royal aircraft carrier.

Price: $35.44

Click here to buy from Amazon

Network Warfare Squadrons of the United States Air Force

Network Warfare Squadrons of the United States Air Force, 91st Network Warfare SquadronNetwork Warfare Squadrons of the United States Air Force, 91st Network Warfare Squadron, 33d Network Warfare Squadron, 315th Network Warfare Squadron, 426th Network Warfare Squadron, 68th Network Warfare Squadron. Excerpt: The 91st Network Warfare Squadron is an active United States Air Force unit, currently assigned to the 67th Network Warfare Wing at Kelly Annex, part of Lackland Air Force Base, Texas. The DUI is a white Knight on horseback chasing a red Devil within a Blue circle, formerly a diamond. Redesignated: 91st Squadron on 14 March 1921Redesignated: 91st Observation Squadron on 25 January 1923Redesignated: 91st Observation Squadron (Medium) on 13 January 1942Redesignated: 91st Observation Squadron on 4 July 1942Redesignated: 91st Reconnaissance Squadron (Bomber) on 2 April 1943Redesignated: 91st Tactical Reconnaissance Squadron on ii August 1943Redesignated: 91st Photographic Mapping Squadron on 9 October 1943Redesignated: 91st Photo¬graphic Charting Squadron on 17 October 1944Redesignated: 91st Reconnaissance Squadron (Long Range, Photographic) on 15 June 1945Redesignated: 91st Strategic Reconnaissance Squadron (Photographic) on 25 March 1949Redesignated: 91st Strategic Reconnaissance Squadron (Medium, Photographic) on 6 July 1950Redesignated: 91st Strategic Reconnaissance Squadron (Fighter) on 20 December 1954Inactivated on 1 July 1957 Redesignated: 91st Intelligence Squadron on 1 October 1993Inactivated on 5 May 2005 Attached to Ninth Corps Area, 1 October 1930 Flight attached to Joint Brazil-US Military Commission to 30 June 1947 Attached to Antilles Air Division Attached to 91st Strategic Reconnaissance Wing Attached to Far East Air Forces Attached to 407th Strategic Fighter Wing to 15 July 1955

Price: $14.14

Click here to buy from Amazon

Instituto Sagres does lecture on Cyber Intelligence

Instituto Sagres gave the lecture “The Intelligence and Cyber Power”. The event occurred on 19 September 2012 and was part of the Cyber Intelligence Symposium, organized by the Brazilian Army Intelligence School (EsIMEx).

The approach is an analogy with the rise of Air Power and its Theories, as well as Air Forces, from the invention of the balloon, by priest Bartolomeu de Gusmão, to the present day, under the focus of Intelligence for military use. Examines aspects of the emergence of Air Power Theories and as in its early days the air vector was seen only as a tool for Intelligence, without any military value as stated by Marshal Foch in 1910, notably with use only for the (Aerial) Reconnaissance, replacing the cavalry and later seen as a replacement to the high spots on the ground, as the Military Doctrine of the time. In this analogy, we have uncovered a probable metric for chronology of emergent Cyber Power in function of the use of the Fifth Dimension: Cyberspace; until then only seen as a source of Intelligence, without any military value. The author leads the audience to question at what timeline point, in the use of Cyberspace, we would be: at the time of the Duque de Caxias balloons (or American Civil War) or UAV? The speaker brings to reflect the questioning of how far away we are from what could be Cyber Power Theories and Cyber Forces (the next Force among Armed Forces) and how Intelligence has and will have a key role in this evolution.

View the original article here

Conficker, Mydoom, Iloveyou, Anna Kournikova and Blaster – Windows Viruses

Conficker, Mydoom, Iloveyou, Anna Kournikova, Blaster - Windows VirusesChapters: Conficker, Mydoom, Iloveyou, Anna Kournikova, Blaster. Source: Wikipedia. Pages: 43. Not illustrated. Free updates online. Purchase includes a free trial membership in the publisher's book club where you can select from more than a million books without charge. Excerpt: Conficker, also known as Downup, Downadup and Kido, is a computer worm targeting the Microsoft Windows operating system that was first detected in November 2008. It uses flaws in Windows software and Dictionary attacks on administrator passwords to co-opt machines and link them into a virtual computer that can be commanded remotely by its authors. Conficker has since spread rapidly into what is now believed to be the largest computer worm infection since the 2003 SQL Slammer, with more than seven million government, business and home computers in over 200 countries now under its control. The worm has been unusually difficult to counter because of its combined use of many advanced malware techniques. The origin of the name Conficker is thought to be a portmanteau of the English term “configure” and the German word Ficker, which translates as “fucker”. Microsoft analyst Joshua Phillips gives an alternate interpretation of the name, describing it as a rearrangement of portions of the domain name trafficconverter.biz, which was used by early versions of Conficker to download updates. The first variant of Conficker, discovered in early November 2008, propagated through the Internet by exploiting a vulnerability in a network service (MS08-067) on Windows 2000, Windows XP, Windows Vista, Windows Server 2003, Windows Server 2008, and Windows Server 2008 R2 Beta. While Windows 7 may have been affected by this vulnerability, the Windows 7 Beta was not publicly available until January 2009. Although Microsoft released an emergency out-of-band patch on October 23, 2008 to close the vulnerability, a large number of Windows PCs (estimated at 30%) remained unpatched. French Navy Rafales planes were unable to take off after military computers were infected by Conficker. Royal Navy and RAF were attacked by a version of Conficker that infected some 24 RAF bases, 75% of the Royal Navy fleet and the Ark Royal aircraft carrier.

Price: $14.14

Click here to buy from Amazon