DEFCON

The French Disconnection: Radio Gun Stops Smart Cars In Their Tracks

You could call it “The Death of the Car Chase.” According to the BBC, a UK company, E2V is demonstrating the RF Safe-Stop, a 350 KG (770 lb) device that can shoot RF (radio frequency) pulses at moving vehicles,  “confusing” the vehicle’s electronic systems and causing its engine to shut off, stranding both vehicle and driver. E2V’s Safe-Stop product is intended for use as a non-lethal weapon for the military and law enforcement and is marketed as a tool for “checkpoint enhancement,” “convoy protection” and “vehicle immobilisation” (sp). According to this BBC report, the device acts like a small radar transmitter, directing a beam of radio pulses (identified elsewhere as L and S-Band RF pulses) that saturate the wiring that connects the vehicles on board systems. Those pulses confuse the engine control unit and cause it to reset, stopping the vehicle. Safe-Stop sends a continuous stream of pulses to keep the ECU confused […]

Identity Management’s Next Frontier: The Interstate

Factory-installed and even aftermarket identity management applications may soon be standard components on automobiles, as the federal government looks for ways to leverage automation and collision avoidance technology to make the country’s highways and roadways safer.   That’s the conclusion of a new report from the Government Accountability Office (GAO), which finds that vehicle to vehicle communications are poised to take off, but that significant security and privacy challenges must first be met, identity management top among them. The report, GAO 14-13 (PDF available here) takes the measure of what the GAO calls “Intelligent Transportation Systems,” including vehicle-to-vehicle (or V2V) technology. The GAO found that V2V technology that allows automobiles to communicate with each other in ways that can prevent accidents has advanced considerably in recent years. Automakers, working with the Department of Transportation, are testing the technology in real-world scenarios. However, the deployment of V2V technologies faces a number […]

Social Engineering Behind Syrian Hack Of NYT, Twitter?

How do you take some of the world’s largest online brands offline in a matter of minutes? If yesterday’s events are any guide, you do it by finding a gullible employee at vulnerable, downstream partner that those companies didn’t even know they had. That’s the lesson that appears to be emerging in the aftermath of yesterday’s chaotic tug of war between hackers who claim affiliation with The Syrian Electronic Army and some of the world’s leading online brands, including The New York Times, Twitter and Huffingtonpost.com. The attacks on Tuesday saw traffic to sites owned by those firms directed to web servers controlled by the attackers which displayed messages in support of the regime of embattled President Bashar al-Assad. According to a story in The New York Times, the attackers were able to compromise systems operated by Melbourne IT, an Australian domain registrar used by many prominent firms. With access to […]