Welcome to the 5th Dimension of Warfare gents. We know about Sea, Air, Land and Space, now we get to truly be one of the first Generations to see how War plays out in the 5th Cyber Arena….Scary? You Bet your Ass. But if you take only one thing away from this article, don’t let it be fear, but this: Make it a point, RIGHT NOW in your life and your training to STOP depending on technology..it’s OK for it to supplement things and to be an aid, but we can never let it take the place of good ole fashioned human skill-set’s! For example, ditch the GPS and learn old school compass and map reading and oh yeah..NEVER depend on a “Smart” scope to make that accurate shot; put the time in and learn to shoot without it. If you don’t Depend on it, you can’t be manipulated by it, and the advantage stays in your court. -SF
PUT A COMPUTER on a sniper rifle, and it can turn the most amateur shooter into a world-class marksman. But add a wireless connection to that computer-aided weapon, and you may find that your smart gun suddenly seems to have a mind of its own—and a very different idea of the target.
At the Black Hat hacker conference in two weeks, security researchers Runa Sandvik and Michael Auger plan to present the results of a year of work hacking a pair of $13,000 TrackingPoint self-aiming rifles. The married hacker couple have developed a set of techniques that could allow an attacker to compromise the rifle via its Wi-Fi connection and exploit vulnerabilities in its software. Their tricks can change variables in the scope’s calculations that make the rifle inexplicably miss its target, permanently disable the scope’s computer, or even prevent the gun from firing. In a demonstration for WIRED (shown in the video above), the researchers were able to dial in their changes to the scope’s targeting system so precisely that they could cause a bullet to hit a bullseye of the hacker’s choosing rather than the one chosen by the shooter.
“You can make it lie constantly to the user so they’ll always miss their shot,” says Sandvik, a former developer for the anonymity software Tor. Or the attacker can just as easily lock out the user or erase the gun’s entire file system. “If the scope is bricked, you have a six to seven thousand dollar computer you can’t use on top of a rifle that you still have to aim yourself.”
Read the Remainder at Wired
Reblogged this on Brittius.
Reblogged this on oogenhand and commented:
Very interesting, very important…
Thanks. Please subscribe for email alerts and have all your friends do as well!!