Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
The Military Government Security The Internet News

Obama Helicopter Security Breached By File Sharing 408

Hugh Pickens writes "A company that monitors peer-to-peer file-sharing networks has discovered a potentially serious security breach involving President Barack Obama's helicopter. 'We found a file containing entire blueprints and avionics package for Marine One, which is the president's helicopter,' says Bob Boback, CEO of Tiversa, a security company that specializes in peer-to-peer technology. Tiversa was able to track the file, discovered at an IP address in Tehran, Iran, back to its original source. 'What appears to be a defense contractor in Bethesda, Md., had a file-sharing program on one of their systems that also contained highly sensitive blueprints for Marine One,' says Boback, adding that someone from the company most likely downloaded a file-sharing program, typically used to exchange music, without realizing the potential problems. 'I'm sure that person is embarrassed and may even lose their job, but we know where it came from and we know where it went.' Iran is not the only country that appears to be accessing this type of information through file-sharing programs. 'We've noticed it out of Pakistan, Yemen, Qatar and China. They are actively searching for information that is disclosed in this fashion because it is a great source of intelligence.'"
This discussion has been archived. No new comments can be posted.

Obama Helicopter Security Breached By File Sharing

Comments Filter:
  • What a coincidence! (Score:1, Informative)

    by Anonymous Coward on Sunday March 01, 2009 @11:32AM (#27029913)

    What a coincidence that a security breach on the president's current Marine One became known right after he nixed the multi-billion dollar plan to get new ones.

    http://www.nytimes.com/2009/02/24/us/politics/24chopper.html?ref=politics

  • Re:takes 2 to tango (Score:1, Informative)

    by Anonymous Coward on Sunday March 01, 2009 @11:36AM (#27029943)

    What you described is how they handle "Top Secret" and sometimes "Secret" data. "Classified" data security is much more open. Pretty much anyone can have Classified data laying around.

  • My Experience... (Score:1, Informative)

    by Anonymous Coward on Sunday March 01, 2009 @11:38AM (#27029953)

    I was on my ship-won't say which one-processing our morning traffic, and we'd recently switched over to using Outlook on the secure lan. There was an airgap between the SIPR and NIPR side of the house, so there were no worries, or at least there shouldn't have been.

    Well, I'm processing the UNCLASS traffic, and what should come into the ship's inbox but an email from outside email address. I clicked on it, and Norton went berzerk, locking it down and freezing it before it could do anything. I forget which virus it was, but this was back in the late 90's.

    Since it was safe to look at using notepad, I dug into it and found out the email itself was what we call a "MOVEREP", or ship's movement report. Those are classified, usually confidential. You don't want the enemy to know where you are going to be, after all.

    It turns out the captain had carried the moverep home on a floppy (sneakernet ftw) to work on it, and had inserted it into his home machine. BIG no-no. And the machine-which was infected-dutifully grabbed the message and sent it out as a virus-infected file to everyone in the captain's private email list. Based on the TO: field, I'd say there were some 75 people that got a slightly jumbled moverep mixed in with private email and porn, and a serious case of "WTF-itis"

    The captain didn't get in too much trouble, since it was later learned that sneakernet editing of movereps was actually quite common in those days. LOTS of work got taken home, and officers were already kind of lax about security. But it still highlighted a serious security risk and that hole was quickly plugged. All the officers got additional training, and ship's captains got private lines installed at home if they needed it.

    One of the less painful "lessons learned" I've had the chance to witness.

  • by Dun Malg ( 230075 ) on Sunday March 01, 2009 @11:40AM (#27029965) Homepage
    That's not even the real issue. They should be asking what a contractor is doing putting classified information on his "walking around" laptop. When I was in military intelligence, we had machines with classified information, but they were either dedicated hardened devices (for in the field) or they were fairly standard windows machines kept inside some sort of secure perimeter. The P2P aspect of this is really irrelevant, other than it gives both the "dastardly towelheads of Eastasia*" and the DoD an easy way to spot the information in the wild. This contractor likely already broke the rules enough to lose his job by having the files there in the first place.

    * we've always been at war with Eastasia, right?
  • by Dun Malg ( 230075 ) on Sunday March 01, 2009 @11:53AM (#27030053) Homepage
    You know, I'm usually one to go with Hanlon's Razor (never attribute to malice what can adequately be explained by stupidity), but with the VH-71 [wikipedia.org] Marine One replacement program getting the stinkeye [washingtonpost.com] for it's ridiculous cost overruns, for once the conspiracy thing has me suspicious. It's likely the plans being on P2P part is entirely coincidence, and the publicity of the incident is the conspiracy, but I can see it happening. The question now is, which Marine One plans are they? Are they the plans for the helicopters currently in service, and the conspiracy is trying to save the VH-71 program, or were they the VH-71 plans and the conspiracy is trying to kill the VH-71 program?

    Really though, it's probably just unrelated coincidence. Most things like this are completely unplanned. Conspiracies require competence, and you just don't find that in government much.
  • by rpillala ( 583965 ) on Sunday March 01, 2009 @12:13PM (#27030197)

    I don't know how long ago you were in military intelligence, but these days people leave their agency and then come back on Monday as a contractor with Booz Allen Hamilton or SAIC. If you haven't already, read Spies for Hire by Tim Shorrock.

  • by YrWrstNtmr ( 564987 ) on Sunday March 01, 2009 @12:24PM (#27030307)
    1b. the idiot admin that had not removed user ability to install random software on a work computer...

    AKA #3 above.
  • by urbanriot ( 924981 ) on Sunday March 01, 2009 @01:02PM (#27030605)
    Windows is not difficult to secure for appropriately trained IT staff. The Department of Defense releases papers that walk people through creating extremely secure Windows environments, arguably more secure than many out of the box linux distros.
  • Re:OH ..Well... (Score:4, Informative)

    by OeLeWaPpErKe ( 412765 ) on Sunday March 01, 2009 @02:47PM (#27031535) Homepage

    It's a custom helicopter (just like air force 1 is a custom plane). You could for example get some sort of unique radar response from the plane, telling you the location of the helicopter, or worse, giving you something to program a sidewinder with.

    Same goes for air force 1. If you had the specs of it's fof tranceiver you could wait until it's crossing the atlantic, then launch a rocket towards it which they have no chance to evade.

    Basically it would reduce the problem of killing the president of the USA from successfully attacking a wide range of security forces, just to make sure you cover all angles, to the problem of making 1 tiny pinpoint strike. With the blueprints or a location indicator you'd could execute a pinpoint strike that would take involve almost no risk for the perpetrators and would sure as hell kill the prsident.

  • by Anonymous Coward on Sunday March 01, 2009 @03:13PM (#27031751)

    Having worked on classified projects, I really have to question the story's veracity. Computers with highly classified data are NOT connected to the internet.

    My experience was 15 years ago, but I find it hard to believe it would change that much. I remember having to certify that a brand new blank tape didn't have classified data on it, so I could take it out of the building to an unsecured area to get a file emailed from an unclassified contractor.

    Hell, we couldn't even bring in a CD player if we ever wanted to take it back out again.

  • Re:Insecure systems (Score:5, Informative)

    by ZiakII ( 829432 ) on Monday March 02, 2009 @12:17AM (#27036359)
    Except that Windows has such a cult following that it's likely the authorities will turn a blind eye to the incident. Take the case where Windows somehow got onto base computers in Afghanistan [usnews.com] and were subsequently owned by malware letting still more outsiders into the network. No one's been prosecuted publicly despite there certainly being a paper trail leading to the culprits.

    You apparently have no clue how DOD classified networks work such as SIPRnet [wikipedia.org] or JWICs [wikipedia.org]. Anything classified has no connection to the unclassified internet. The SIPRnet and JWICS system passes though a KG-175 [jproc.ca], which in turns encrypts the traffic, to go though the normal network. If for example a windows SIPRnet, or JWICs system gets comprised with spyware. The only one who could touch these systems is people on the SIPRnet or JWICS. Just because the machine is comprised doesn't make the computer decide to send unencrypted data or open holes in the network, since any traffic leaving the network has to go though the KG-175. Now if some idiot user decides to connect a classified system to network, that's a much bigger issue that they call data spillage.

    Any computer not classified is essentially on the NIPRnet (or unclassified network) for example, but the only data that is allowed on it is up to sensitive information such as SSNs, random forms, and TPS reports. Even flight schedules are not supposed to be NIPRnet.

"If you want to know what happens to you when you die, go look at some dead stuff." -- Dave Enyeart

Working...