Connect with us

Technology

Meet the team breaking into top-secret HQ’s

Published

on

Meet the team breaking into top-secret HQ's
Getty Images Perimeter sign at Dover Air Force BaseGetty Images

Red Teams try to break into high security facilities

A crack team assembles and breaks into a top secret military base or corporate headquarters – you’ve probably seen it in a film or on TV a dozen times.

But such teams exist in the real world and can be hired to test the tightest security.

Plenty of firms offer to test computer systems by attempting to remotely hack into them. That’s called White Hat Hacking.

But the skills involved in breaching physical security, known as Red Teaming, are rare.

Advertisement

Companies that offer the Red Team service have to assemble staff with very particular skills.

Often using former military and intelligence personnel, Red Teams are asked one question.

“How can you break into this top-secret project?”

Leonardo, the giant defence company, offers such a service.

Advertisement

It says hostile states seeking disruption and chaos are a real threat and sells its Red Team capability to government, critical infrastructure, and defence sector clients.

Its Red Team agreed to speak to the BBC under pseudonyms.

Greg, the team leader, served in the engineering and intelligence arms of the British Army, studying the digital capabilities of potential enemies.

“I spent a decade learning how to exploit enemy communications,” he says of his background.

Advertisement

Now he co-ordinates the five-strong team.

The attack is about gaining access. The objective might be to stop a process from working, such as the core of a nuclear power plant.

The first step for Greg and his team is called passive reconnaissance.

Using an anonymous device, perhaps a smartphone only identifiable by its sim card, the team build a picture of the target.

Advertisement

“We must avoid raising suspicions, so the target doesn’t know we’re looking at them,” Greg says.

Any technology they employ is not linked to a business by its internet address and is bought with cash.

Getty Images The back of a security gaurdGetty Images

Red Teams will look for demotivated security gaurds

Charlie spent 12 years in military intelligence, his techniques include studying commercial satellite imagery of a site, and scanning job ads to work out what type of people work there.

“We start from the edges of the target, staying away. Then we start to move into the target area, even looking at how people who work there dress.”

Advertisement

This is known as hostile reconnaissance. They are getting close to the site, but keeping their exposure low, wearing different clothes every time they show up, and swapping out team members, so security people don’t spot the same person walking past the gates.

Technology is devised by people and the human factor is the weakest point in any security set-up. This is where Emma, who served in the RAF, comes in.

With a background in psychology Emma happily calls herself “a bit of a nosy people watcher”.

“People take shortcuts past security protocols. So, we look for disgruntled people at the site.”

Advertisement

She listens in to conversations at adjacent cafes and pubs to hear where dissatisfaction with an employer surfaces.

“Every organisation has its quirks. We see what the likelihood of people falling for a suspicious email due to workload and fatigue is.”

An unhappy security guard may get lazy at work. “We’re looking at access, slipping in with a delivery for instance.”

A high turnover rate evidenced by frequently advertised vacancies also flags up dissatisfaction and a lack of engagement with security responsibilities. Tailgating, spotting people who are likely to hold an access door open for a follower, is another technique.

Advertisement

Using that intelligence, plus a little subterfuge, security passes can be copied, and the Red Team can enter the premises posing as an employee.

Katsuhiko TOKUNAGA Eurofighter Typhoon aircraft under constructionKatsuhiko TOKUNAGA

Leonardo is best known for its work on big defence projects like the Eurofighter

Once inside the site Dan knows how to open doors, filing cabinets and desk drawers. He’s armed with lock pick keys known as jigglers, with multiple contours that can spring a lock open.

He’s searching for passwords written down, or will use a plug-in smart USB adaptor to simulate a computer keyboard, breaking into a network.

The final step in the so-called kill chain, is in the hands of Stanley.

Advertisement

A cyber security expert, Stanley knows how to penetrate the most secure computer systems, working on the reconnaissance report from his colleagues.

“In the movies it takes a hacker seconds to break into a system, but the reality is different.”

He prefers his own “escalatory approach”, working through a system via an administrator’s access and searching for a “confluence”, a collection of information shared in one place, such as a workplace intranet.

He can roam through files and data using the administrator’s access. One way a kill chain concludes is when Stanley sends an email impersonating the chief executive of the business via the internal, hence trusted, network.

Advertisement

Even though they operate with the approval of the target customer they are breaking into a site as complete strangers. How does this feel?

“If you’ve gained access to a server room that is quite nerve-wracking,” says Dan, “but it gets easier the more times you do it.”

There is someone at the target site who knows what’s going on. “We stay in touch with them, so they can issue an instruction ‘don’t shoot these people,’” Charlie adds.

More Technology of Business

Source link

Advertisement
Continue Reading
Advertisement
Click to comment

You must be logged in to post a comment Login

Leave a Reply

Servers computers

DellEMC PowerEdge Rack & Tower Server.

Published

on

DellEMC PowerEdge Rack & Tower Server.



Dell Latitude 3000 & 5000 series Ci5 Ci7 Laptop.

Available Dell Latitude Stock LIST PRICE

Dell Latitude 3000 Series,
LATITUDE 3410 i3 10110u 4GB 1TB BAG
LATITUDE 3410 i5 10210u 4GB 1TB BAG
LATITUDE 3410 i5 10210u 8GB 1TB BAG
LATITUDE 3510 i5 10210u 4GB 1TB BAG
LATITUDE 3410 i5 10210u 8GB 1TB BAG

Dell Latitude 5000 Series,
LATITUDE 5410 i5 10210u 8GB 512 BAG
LATITUDE 5410 i7 10610u 8GB 256 BAG
LATITUDE 5510 i5 10210u 8GB 256 BAG
LATITUDE 5510 i5 10210u 8GB 512 BAG
LATITUDE 5510 i7 10610u 8GB 512 BAG

Advertisement

Contact us,
Cell +92 335 2849235,
Email: sales1endeavor@gmail.com

source

Continue Reading

Technology

Shield AI’s founder on death, drones in Ukraine, and the AI weapon ‘no one wants’

Published

on

Shield AI cofounder Brandon Tseng

About two months ago, Shield AI co-founder Brandon Tseng and one of his employees were in an Uber weaving through Kyiv, Ukraine. They were headed to a meeting with military officials to sell them on their AI pilot systems and drones, when suddenly his employee showed him a warning on his phone. Russian bombs were incoming. Tseng met his potential demise with a shrug. “If it’s your time to go,” he said, “then it’s your time to go.” 

If anything, Tseng, a former Navy SEAL, was itching for more action. Shield AI employees had previously been to much more dangerous areas in Ukraine, training troops on its software and drones. “I’m quite jealous of where they got to go,” Tseng said. “Just from an adventure standpoint.”

Tseng embodies that quiet macho-ness that pervades most defense tech founders. When I met him last month at the company’s Arlington office, he showed off a knife displayed in his office engraved with the SEAL slogan “Suffer in silence.” The white walls, whose tops glowed with fluorescent lights (to look like a spaceship, Tseng said), were covered with slogans like “Do what honor dictates” and “Earn your shield every day.” I pointed out they were pretty intense. “Are they?” Tseng replied.  

In 2015, Tseng founded Shield AI alongside his brother, Ryan Tseng, a patent-awarded electrical engineer, with a clear mission: “We built the world’s best AI pilot,” he said. “I want to put a million AI pilots in customers’ hands.” 

Advertisement

To that end, he and his brother have raised over $1 billion from investors like Riot Ventures and the U.S. Innovative Technology Fund. The company develops AI software to make air vehicles autonomous, although Tseng said they want Shield AI’s software in underwater and surface systems as well. It also has hardware products, like its drone V-BAT. 

Shield AI is also part of a rare class of defense tech startups: one that’s actually landed decently sized government contracts, like its $198 million contract from the Coast Guard this year. As if trying to position themselves for an even bigger future, the founders chose a new office surrounded by three floors of Raytheon, one of the major defense contractors. 

Ukraine: The lab for U.S. defense tech startups

September 16 was a sign of the changing times: Instead of making defense tech founders fly to the Capitol, put on their suits, and grovel to politicians, Washington, D.C., came to them. 

Members of the U.S. House Armed Services Committee gathered with Palantir CTO Shyam Sankar, Brandon Tseng, and executives from Skydio, Applied Intuition, and Saildrone at UC Santa Cruz’s Silicon Valley campus. They discussed U.S. Department of Defense (DoD) acquisition reform and, inevitably, the role of U.S. technology in Ukraine. It was the first public hearing the committee has held outside of Washington, D.C., since 2006.

Advertisement

Ukraine has “been a great laboratory,” Tseng told the policymakers. “What I think the Ukrainians have discovered is that they’re not going to use anything that doesn’t work on the battlefield, period.”

Defense tech founders, like Anduril co-founder Palmer Luckey and Skydio co-founder Adam Bry, have all flocked to the embattled country to sell relatively new technology for a rapidly deteriorating battlefield. Unfortunately, not all U.S. tech is working. According to a Wall Street Journal report, drones from U.S. startups have almost universally failed to operate through electronic warfare in Ukraine, meaning the drones cease to work under Russia’s GPS blackout technology.

“Ukraine is at war and people are being killed. But … you want to take those lessons learned,” Tseng told me a week later, reflecting on the hearing. “You don’t want to have to relearn any of those lessons. The United States should not want to relearn any of those lessons.”

Naturally, he’s confident that Shield AI’s drones have fared better in Ukraine than others because, he says, they can operate without relying on GPS. “We are working to get more drones over there based on the successes that we’ve had,” he said, although he declined to name specifics of how many drones Shield AI has sent over. 

Advertisement

Terminator-like AI killers? Or ‘Ender’s Game’?

Tseng’s corner office is bare besides a framed copy of the Declaration of Independence, hanging crooked on the wall. He listed it as one of his biggest inspirations. “It’s not because we’re perfect, but because we aspire to these values that I would claim are perfect values,” he said. “That’s what matters most. We’re always marching in that direction.” 

He straightened out the frame before brushing through an abbreviated history of warfare. Deterrence, he said, tends to happen when a radical new technology emerges, like the atom bomb, or stealth technology and GPS. AI, he said, will usher in the new era of deterrence — assuming the DoD funds it properly. “Private companies are putting more money towards AI and autonomy than any aggregate amount in the defense budget,” he said. 

The potential value of AI-related federal contracts ballooned to $4.6 billion in 2023 from $335 million in 2022, according to a report by the Brookings Institution. But that’s still a fraction of the over $70 billion that VCs invested in defense tech in roughly the same period, according to PitchBook.

Still, the biggest question of military AI use is not budget — it’s ethics. Founders and policymakers alike grapple with whether to allow completely autonomous weapons, meaning the AI itself decides when to kill. Lately, some founders’ rhetoric appears to be on the side of building such weapons.

Advertisement

A few days ago, for instance, Anduril’s Luckey claimed there was “a shadow campaign being waged in the United Nations right now by many of our adversaries” to trick Western countries into not aggressively pursuing AI. He implied that fully autonomous AI was no worse than land mines. He didn’t mention, however, that the U.S. is among over 160 nations that agreed to ban the use of anti-personnel land mines in the vast majority of places.

Tseng is firmly opposed to fully autonomous weapons. “I’ve had to make the moral decision about utilizing lethal force on the battlefield,” he said. “That is a human decision and it will always be a human decision. That is Shield AI’s standpoint. That is also the U.S. military’s standpoint.” 

He’s right that the U.S. military does not currently purchase fully autonomous weapons, although it does not ban companies from developing them. What if the U.S. changed its standpoint? “I think it’s a crazy hypothetical,” he answered. “Congress doesn’t want that. No one wants that.” 

So if he doesn’t foresee an army of Terminator-like killers, what does he envision? “A single person could command and control a million drones,” Tseng said. “There’s not a technological limitation on how much a single person could command effectively on the battlefield.”

Advertisement

It’s going to be akin to “Ender’s Game,” he said, referencing the 1985 sci-fi classic where a child military officer can release legions of space armies with the wave of a hand. 

“Except instead of actual humans that he was commanding, it’ll be f—ing robots,” Tseng said.

Source link

Advertisement
Continue Reading

Technology

Tesla’s “We, Robot” robotaxi event: the biggest news and announcements

Published

on

Tesla’s “We, Robot” robotaxi event: the biggest news and announcements
Photo illustration of a rider attempting to hail a Tesla Robotaxi.
Image: Cath Virginia / The Verge, Turbosquid

Tesla is revealing its long anticipated robotaxi in Burbank, California and here’s everything they announced.

Continue reading…

Source link

Continue Reading

Servers computers

42U rack cable management #subscribe #tech #youtube

Published

on

42U rack cable management  #subscribe #tech #youtube

source

Continue Reading

Technology

Uber is plugging ChatGPT into EVs

Published

on

Uber OpenAI Assistant

Uber is turning to OpenAI and ChatGPT to help push the adoption of electric vehicles (EV) by its drivers. The ride-share company announced the new AI assistant at the Go Get Zero sustainability conference in London among several other green initiatives. Uber will employ OpenAI’s GPT-4o model, the same one undergirding ChatGPT, to create a guide for drivers along the road toward where they are confident and comfortable behind the wheel of an EV.

The idea of AI as a personal automotive concierge makes sense, considering the complexities of switching away from gas cars. That means the AI will adapt to the user, tailoring its answers around how to buy and take care of an EV to who is asking. The AI will come packed with data about purchase prices, how to charge and maintain the car, and other useful information unique to EVs. 

Source link

Advertisement
Continue Reading

Servers computers

【ANNSO】15" 8U Rack Mount Workstation Chassis

Published

on

【ANNSO】15" 8U Rack Mount Workstation Chassis



➥Features ➥
• Die-cast aluminum front panel with integrated 15 inch LCD screen
• Compact 8U height, rack mount workstation chassis
• Front panel, membrane keys and drive-bay enclosure meet IP 64 standard for tough environment (IP54 for mouse pad)
• Full function membrane keypad (USB interface) and front OSD controller
• Advanced thermal and air-flow design
• Analog VGA interface supports all CPU boards (DVI option)

➥Website ➥
www.annso.com

➥For corporation➥
fandy@annso.com.tw
andy@annso.com.tw
sales@annso.com.tw

➥Facebook➥
https://www.facebook.com/Annsotec/

source

Advertisement
Continue Reading

Trending

Copyright © 2024 WordupNews.com