5 Ways to Stop National Security Leaks (But Do You Really Want To?)

Photo: Harry Wood/Flickr

To listen to Washington politicians, leaks of secret national security programs are among the biggest threats to America. Over the past several months, they’ve outdone themselves in declaiming media disclosures about President Obama’s “kill list” for terrorists; cyber-attacks against Iran; and a possible Saudi infiltration of al-Qaida’s Yemeni branch.

“This is getting way out of hand,” Rep. Buck McKeon, the chairman of the House Armed Services Committee, told reporters last month.

And it’s not just legislators: The Justice Department has opened two investigations to hunt the leakers, consistent with Obama’s record of prosecuting more officials for leaking than any previous administration. But the politicians don’t want to wait for the prosecutors to finish their inquiries. The leaders of the House and Senate intelligence committees propose to make administration officials inform Congress before holding background briefings for reporters; and to consolidate the press shops within the spy agencies. Those moves may be contained in the annual intelligence funding bill that Congress will soon consider

Just one problem: they won’t do a thing to stop leaks. They’ll make it harder for regular reporters to do their jobs. And, not coincidentally, they’ll ignore a big source of the leaks — Congress itself.

Take it from a reporter who occasionally finds himself on the receiving end of a leak. In Washington, leaks both profound and innocuous spout forth from offices both famous (the White House) and obscure (the principal deputy assistant secretary of whatever), regardless of how the officeholder proclaims to be angered and horrified by the leaking. There are, however, ways to sharply limit the leaks. But politicians, appointees, journalists and citizens might not like their implications.

There are many questions to ask about how much damage leaks pose to national security and how that balances with the need for an informed citizenry in a democratic society. For the sake of consistency, I’m going to ask none of them. One person’s leak is another’s enterprising journalism; one person’s damage to national security is another’s policy preference. This is merely an exploration of what is probably necessary to force Washington professionals to shut up. Decide for yourself if it’s worth it.

Continue Reading “5 Ways to Stop National Security Leaks (But Do You Really Want To?)” »

Pages: 1 2 3 4 5 6 View All

Giddyup, Robot Doggies! Autonomous Soldiers Square Off at Army Robotics Rodeo

All photos and video: David Axe/Wired

Drone Hijacking? That’s Just the Start of GPS Troubles

The University of Texas Radionavigation Laboratory drone, an Adaptive Flight Hornet Mini. Photo: Courtesy Todd Humphreys

On the evening of June 19, a group of researchers from the University of Texas successfully hijacked a civilian drone at the White Sands Missile Range in New Mexico during a test organized by the Department of Homeland Security.

The drone, an Adaptive Flight Hornet Mini, was hovering at around 60 feet, locked into a predetermined position guided by GPS. Then, with a device that cost around $1,000 and the help of sophisticated software that took four years to develop, the researchers sent a radio signal from a hilltop one kilometer away. In security lingo, they carried out a spoofing attack.

“We fooled the UAV (Unmanned Aerial Vehicle) into thinking that it was rising straight up,” says Todd Humphreys, assistant professor at the Radionavigation Laboratory at the University of Texas.

Deceiving the drone’s GPS receiver, they changed its perceived coordinates. To compensate, the small copter dove straight down, thinking it was returning to its programmed position. If not for a safety pilot intervening before the drone hit the ground, it would have crashed.

But for Humphreys playing the part of an evil genius in a thriller movie, everything worked exactly to plan. “It was beautiful,” he tells Danger Room.

The rogue takeover exploited a vulnerability in GPS to take control of the drone. It was, by Humphreys’ accounting, the first time somebody proved a civilian drone could be hijacked. Last year, when the CIA lost a drone in Iran, there were reports indicating the Iranians might have launched a spoofing attack and tricked it into landing, but we’ll never know for sure. Also, in September 2011, North Korea reportedly forced a U.S. spy plane to land with a jamming attack.

With the planned integration of civilian drones in the American airspace, these problems might be coming to the U.S. The FAA must come up with new rules to allow for a freer use of drones in America by 2015 and, apart from worrying about possible collisions between manned and unmanned aircrafts, now the FAA might have to worry about people hijacking drones with spoofing devices.

What’s worse, the experiment at White Sands shows that drone-jacking is “just the tip of the iceberg of a much bigger security issue we have in this country,” according to Logan Scott, a GPS industry consultant who has worked for defense giants like Lockheed Martin.

In other words, it’s not only about drones, it’s GPS in general that is not safe.

The Global Positioning System, commonly referred to as GPS, is a space-based satellite navigation system. It’s what allows you to get turn-by-turn directions to the mini-mart in your automobile. But most people don’t know that it also has countless other crucial applications. Among others, it’s the backbone of the global air traffic system. It is also used to control the power grid, to power banking operations (for instance, ATMs depend on it) and to keep oil platforms in position. And virtually all communications systems, like the world’s cellular networks, rely on it.

“It’s a stealth utility,” says Scott, “meaning that we don’t necessarily know it’s even in the system until something is wrong.”

GPS is also free, unauthenticated and unencrypted. Its open nature has been its biggest strength. Now, it could be its biggest flaw.

“The core problem is that we’ve got a GPS infrastructure which is based on a security architecture out of the 1970s,” Scott tells Danger Room. “From a security point of view, if you look at GPS’s current status, is more or less equivalent to operating computers without firewalls, with no basic checks.”

Continue Reading “Drone Hijacking? That’s Just the Start of GPS Troubles” »

Pages: 1 2 View All

Air Force Wants Apps for Training Flyboys

An Air Force cadet checks out a video of a refueling operation on his smartphone during a visit to McConnell Air Force Base. Photo: U.S. Air Force

Manuals are so analog. The Air Force is thinking about turning some of its training programs into apps for reservists’ smartphones.

According to a recent call for industry input, the Air Force Reserve Command’s Development and Training Flights want to “obtain a smartphone application that allows all participating Reserve members the opportunity to engage in training and gaming activities with other members.”

It doesn’t look like full training manuals would be digitized. Suggested functionality includes apps to teach “Air Force Core Values,” and “Fitness and Nutrition Principles,” as well as games to memorize M-16 components and military songs (“Name that Military Tune”). Another suggestion is an location app to help reservists carpool. There’s even a call for “Siri-like” tools to “motivate” airmen during their workouts. But the effort is reminiscent of the Army’s efforts to make its training materials accessible to any soldier with a smartphone.

That said, this is something of a tentative step for the Air Force. Unlike the Army’s 2010 “Apps for the Army” contest, the Air Force isn’t looking for airmen who moonlight as app developers. Instead, it’s seeking industry feedback on “industry technical capabilities, common industry standards, the latest technological advances, timelines for adaptation and/or integration, and any other common commercial terms and conditions related to mobile application.”

Continue Reading “Air Force Wants Apps for Training Flyboys” »

Missile Defense Chief Accused of Being a Toxic Boss

Army Lt. Gen. Patrick O’Reilly, director of the Missile Defense Agency, briefs reporters at the Pentagon, December 2008. Photo: DVIDSHUB


A Defense Department investigation has recommended disciplinary action against the head of the U.S. Missile Defense Agency for verbally harassing his subordinates.

The Pentagon’s inspector general has found that Army Lt. Gen. Patrick O’Reilly’s behavior as the military’s missile defense chief was “inconsistent with standards expected of senior army leaders,” according to Danger Room pal Josh Rogin of Foreign Policy.

O’Reilly would unleash a hailstorm of expletives on his staff for even minor infractions. When an unnamed staffer booked the general’s retinue in a hotel with “resort” in its title, O’Reilly profanely yelled in the lobby for at least 10 minutes, demanding the staffer admit s/he “fucked up.” The general was concerned that the media would portray the Missile Defense Agency as profligate.

He might have been more concerned about hemorrhaging staff. In his nearly four years as director, numerous staff members quit the agency because of his management style, a fact O’Reilly did not dispute to investigators even as he defended himself. O’Reilly would “berate you, make you feel like you’re the dirt beneath his feet,” a witness told the inspector general. Another said O’Reilly once threatened to “fucking choke me” in frustration.

Continue Reading “Missile Defense Chief Accused of Being a Toxic Boss” »