Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×
Space

Code for Running GPS Satellites Stolen 193

twivel was one of many to send this in: "According to this article a hacker has obtained top secret space codes that could yield access to guiding ships, rockets and satellites. Why launch your own spy satellite when you can just borrow ours?" The funny thing is that the code was stolen only a couple of days after it was deployed.
This discussion has been archived. No new comments can be posted.

Code for Running GPS Satellites Stolen

Comments Filter:
  • I thought the party line was something about not being able to steal code, 'cause it's just information....

    --
  • by rsteele19 ( 150541 ) on Friday March 02, 2001 @11:26AM (#388714) Homepage
    The wording of the headline is a little deceptive... if you read carefully, you will see that it was actually the source code that was stolen, not "secret codes" for accessing the system. Of course, the source code might give someone some insight into how the system works which may allow them to hack in, but it's not like someone has stolen the launch codes for the Army's fleet of ICBM's...
  • Generally speaking, these kinds of leeks (if it's even true) come from the gov't
    The government is going into the produce market? How is this relevant? Are they going to cost $2,000 a pound? Will they be GPL'd (yeah right)

    Ben^3 (in a whimsical mood)

  • An unidentified computer hacker has got hold of top secret U.S. computer system codes for guiding space ships, rockets and satellites, a lawyer in Sweden said Friday.

    So they got the source code for guiding the systems. If the system is properly engineered, it shouldn't matter if you know how to guide it, you still need access to the system. If the system is poorly engineered, I'm going to buy some pillows like that TV guy in Willabong Australia or wherever.

  • I wonder if the "computer experts" checked to know if the company wrote the software... hence, their posession of the source code.

    The way things have been going lately, being in posession of source code makes any individual look like a 'hacker' (in th media sense).
  • GPS is not typically used on board aircraft for altitude determination.

    They typically broadcast local radio signals that aircraft use in addition to more traditional altimeters.
  • Whilst this code may tell you something about the way the GPS satelites actually work, that probably doesn't hold any great suprises, anyone can get hold of the underlying basis of GPS (and quite a lot of the detail). Whilst the nitty gritty of some of the corrections done to the GPS signal are complex the basic description is simple enough.

    In terms of security, I would bet that the actually commanding of the spacecraft, and quite possibly telemetry from it, are secured by hardware encryption devices, the details of which have not been revealed (including their keys). This will not allow any hacker (who just happens to have a suitable ground station) to access or disrupt the GPS system.
    --
  • That's patently untrue. If there is a bug in the code, and a method of access, there may well be a way for people to affect the software without the keys. "Your use of the old, broken, sendmail source is fine, as long as no one has the password to your system." Danger.

    -Puk
  • by BarefootClown ( 267581 ) on Friday March 02, 2001 @12:54PM (#388721) Homepage

    Actually, you are talking about two different things. Selective Availability, the degredation of the general-use signal, was turned off last January. However, you seem to have confused SA with the different codes available.

    There are two (three, actually) codes transmitted by the GPS satellites. The C/A-code (coarse/acquisition) is the "general use" code, available to all, and (formerly) subject to SA. The P-code (precision code) is the "military" code; it requires special receivers, and you have to have a DoD license to get said receivers. The third code is the Y-code, and is used in conjunction with the P-code, and is not relevant for this discussion.

    There is no way to get to the P-code from the C/A-code; the P-code is approximately 1 millisecond in length (1,024 bits, transmitted at 1.023 MHz); the P-code is a week long, even transmitted at ten times the rate (10.23 MHz).

    The C/A- and P-codes are not "encrypted" in the classical sense of the word, they are just signal formats. (The P-code is encrypted to form the Y-code, but that's another matter.) SA does not perform any "encryption" on the C/A-code, it blurs the timing slightly between satellites, so your receiver doesn't know the precise length of time the signal took to arrive from the satellite. This causes the receiver to have a certain amount of ambiguity, and degrades the accuracy of the signal.

    For more information on the system, check out the Naval Observatory's site [navy.mil] on GPS.

  • Allchin: I want to know what happened to the source code they sent you!
    ESR: I don't know what your talking about. I am a member of the Imperial Senate on a diplomatic mission to Redmond.
    Allchin: You're part of the Open Source movement, and traitor! Take him away!!!

    Microserf: Holding him is dangerous. If word were to get back to....
    Allchin: He is of no moment. His stock holdings have plummeted. A company or employee who is not bringing profit to the Empire is un-American....

    --
  • correct me if I'm wrong, I'm sure some one will, but I thought ICBM was a purly Russian weapon, similar to the Mig*. anyone, Beuler, Beuler, Beuler?

    mark
  • That becomes just another weapon :
    once everybody relies on high-accuracy data from civilian receivers, just turn encryption on again and watch the ensuing chaos.
  • Yes, I got the source code to the engine management of my BMW. Wow, now I can hack every Bimmer that is out there. Me superhacker, I will rule the world. Uh, now, what was I going to do with this? Uh, perhaps soup up my Beetle? What good is some code without the accompanying systems? No news here, besides that it is a B&E case.
  • Agent X119G, you have said too much. You must now be eliminated in accordance with Section 98.2 of Operations Manual 22A.1.

    -- Agent TZ254

    --

  • ...and send a military satellite to Pluto in place of the cancelled NASA mission.

    Asikaa
  • The story implies that the "codes" were stolen, but the code that was stolen was source, not encryption keys.

    It implies that a lone hacker in a foreign land got through a high-security installation to steal sensitive data. A team of hackers broken into what was probably a semi-secured system and got something that's probably been superseded by code changes already.

    It states that the source code stolen is Top Secret. OS/Comet is not Top Secret. It's not Secret. It's not even Confidential/NOFORN. It might be used by some installations for Top Secret stuff, but I doubt it, and if they did it would be like saying "swedish teen-aged janitor steals Top Secret floor buffer!" When did Reuters become the Weekly World News?

    It implies that the script kiddies can use it to control satellites. Well, yes, but only if they happened to steal the OTP, too. And if they did it's really easy to confound them by replacing the OTP. They can't control anything.

    Someone else here posted that Exigent had "just deployed" OS/Comet. Huh. Heh. I've seen the insides of Comet, years ago, and baby, there's stuff in there that's older than most people here.

    Now, that's not to say that Exigent should blow them off. It's proprietary software, and they make millions per year off of it. Mostly by selling consulting support to wedge the elephant into whatever hatbox it's being bought to drive, but still.

    --Blair
  • According to Exigent's web page on OS/COMET [sticomet.com], the software has a wide range of uses besides military, such as Iridium. Installed base of over 1000. So, not only is the GPS system at risk, but probably a great deal of our communication systems. Way to go security via obscurity.

    --
    /. should ban the "See hot sexy women..." ad
  • This could make a hella update to Tradewars 2000? [classic-games.com] :)
  • After re-reading the article, I got the impression that the source code, not "password" codes, were taken.

    It effectivly open-sourced the space program...
  • I had thought about a writing a fiction book about someone taking over the satellites and holding them hostage, didn't know if it was feasable, I guess it is :) Truth is stranger than fiction.
  • Yeah but it wouldn't take much knowledge to screw things up so that it gives false data. No need to be 'precise'.

    --

  • Oh of course, we could all debug the code using our development GPS satellites, before moving the code to the production GPS satellites.
  • This provides even more support for the government moving to open source. If an open source model was adopted for this type of project then the system would have sufficient security that examination of the source ideally would not be an issue of national security. Who knows what backdoors the hacker has uncovered?


    ---
  • This is just more proof that hackers are trying to destroy the world by stealing secret codes that could be used by TERRORISTS to crash GPS sattelites and make thousands of campers get lost! We need stricter computer crime laws. There needs to be a ten year minimum penalty for anyone who owns an access device or any computer part that the police don't understand. Let's put them in jail before they can give us software for free!
  • Just what I always wanted, my own nuclear submarine. All I need to do is control the data feeds for their GPS... ;-)
  • Cringe as I take over your mail server. Oh wait....
  • OS/COMET is a commercial command and control software application. They got the source code for a commercial application! Oh no!
  • Guess who just got Die Hard II on DVD? :)

    Asikaa
  • Nah, fuck it.

    ICBMs are worthless anyway. Look at it this way. If We first strike, then they retaliate, we all die. A first strike would be wrong anyway - we have no need for that ability - right? RIGHT?!?

    Now, if "they" (they being whoever is todays bad guy) strike first. Well, fuck, we are dead anyway. ALL our ICBMs do i s make sure that noone survives.

    Quite frankly, if they strike and I die... They can have the land, I don't give a shit if we kill them too. At that point, it doesn't matter anymore.

    -Steve
  • According to Swedish press they had hired some external IT consultants to aid on the raid.
    The raid was not conducted by the police but by the Enforcement agency.
    The software company they raided has some free services like webspace and email, sorta like hotmail, freebox.com [freebox.com].The hacker/cracker had supposedly put up a copy of the files somewhere on freebox.com. The hacker/cracker goes under the 'hacker alias' LEEIF says the press too.
    This info from an article in the Swedish newspaper 'Expressen [expressen.se]' (in Swedish).
  • Very few missiles (read: almost none) are GPS guided. They tend to use inertial guidance, active/passive radar, or ground maps rather than GPS because a GPS signal can be replicated (or blocked) as easily as any remote-control signal.

    Plus, in any major conflict, the first thing to go down would be the GPS satellites, hence the military teaches alternate navigation skills (celestial, map reading for pilots, etc). Damage to the GPS system would mostly affect merchant shipping and just sort of annoy any military organization worth its salt.

    Geoff

  • by Anonymous Coward
    In space-based races, all the bases are satellites. Satellites now belong to the bad guys. SOooooo, theoretically, someone might legitimately state: well, you fill in the rest...
  • I've wondered for a long time how much active control is needed to keep the GPS constellation on station. Do they need to be tweaked every day? week? once a year? If we lost command control of the GPS sattelites, how long would they remain useful?

    curiously, -dB

  • I thought the haiku was:

    Yesterday it worked
    Today it is not working
    Windows is like that

    No? At least that way it is actually following the haiku syllable pattern.

    Jordan
  • I have to agree here.

    Comming up with protocols for such things that are secure even when the protocol is known is really not too hard. Certainly not too hard for organizations who can drop a million dollars here and there without even noticing.

    If they are stupid enough to use "Security through obscurity" when it would be nearly trivial for them to do it otherwise (I mean come on, does anyone think that the code hasn't been security audited by the NSA?) is silly and irresponsible.

    So yea, if they did it that way, they do DESERVE to have whatever happens, happen.

    -Steve
  • But you don't need to be super accurate for a large enough nuke. If the accuracy is still within 1K or so, KABLOOIE!! If it isn't, Joe User won't be finding the way outta his campsite with beer in hand anytime soon. http://www.geocities.com/TimesSquare/Ring/3478/nuc lear.html

    Also, the last time I checked SCUD's had a hard enough time taking off, never mind hitting something within range ;)

    Of course, trying to find valid nuke blast radius information on the net that isn't "3D10 + (50% radius for air burst) - (50% damage for air burst)" is quite difficult :) http://www.algonet.se/~ellebell/rules/nukes.html
    http://www.gamersorb.com/ut/ut_weps_redeemer.shtml

    Pardon the "unofficial" links but google is fulla shit.

    --Clay

  • by bdoliver ( 221092 ) on Friday March 02, 2001 @12:09PM (#388749) Homepage
    Cool! Now maybe we will start seeing shirts with the GPS source on them.
  • Khadaffi | Saddam | Osama Bin Laden | Joe Militia just needs a unit from Garmin | Magellan | Trimble, and they can pick off anything in range. This has been the case for quite a while, as even with SA in use, the accuracy was about 100 FT. A good large bomb/missile has a blast radius larger than that.

    One Minor Point:

    a Small to Medium Nuke blast a km or two away is survivable, even if in a mine shaft or a moderately deep underground bunker. Much closer, especially a bomb dropped into the mine shaft where someone is hiding is much nastier. Even with a long mine shaft.

  • Quick! Someone find Rupert Murdoch and frisk him!
    --
    Non-meta-modded "Overrated" mods are killing Slashdot
  • Here's a good GPS info page, for those who aren't sure about things like selective availability, P/Y vs CA codes, the differnet bands, etc. Some people have mentioned some of this already, but this covers a decent amount without going to in depth. At the bottom it even mentions differential GPS, which is the concept behind the Wide Area Augmentation System (WAAS). Interesting stuff.

    http://www.colorado.edu/geography/gcraft/notes/gps /gps_f.html [colorado.edu]
  • All your GPS satellites are belong to us!
  • If you've ever worked with classified computer systems, you understand the following:
    • A computer system containing any classified information can
    • NEVER legally be connected to an unclassified computer system (e.g. the internet). Of course, sometimes this rule is broken [cnn.com] by people like our former CIA director.
    Thus, I very seriously doubt that someone was able to secure "top secret" information over the internet.
  • by Raetsel ( 34442 ) on Friday March 02, 2001 @12:11PM (#388755)
    Selective Availability (SA) has been turned off. You don't need the software controlling the satelites to get max accuracy out of them, it's already there.

    For those that don't know, SA is a set of two different time signals broadcast by the satelites. The military time signal is pure, but the civilian one had some noise injected into it to degrade the accuracy. Now that the signal degradation is no longer being done, your commercial receiver is just as accurate as the military versions.

    Khadaffi | Saddam | Osama Bin Laden | Joe Militia just needs a unit from Garmin [garmin.com] | Magellan [magellangps.com] | Trimble [trimble.com], and they can pick off anything in range. This has been the case for quite a while, as even with SA in use, the accuracy was about 100 FT. A good large bomb/missile has a blast radius larger than that.

  • by Pru ( 201238 )
    If that post right there isant enought for GW Bush to increase federal computer security I dont know what will be.
  • by stille ( 213453 )
    This reminds me og a James Bond movie.
    Any one else?
  • Well, like or not, GPS is open source! Anyone install Linux on that thing yet :-) ??

  • I hope people still know how to read a compass ;-)

    -----

  • isn't this soooo superman III?

    Where's Richard Pryor when we need him!!!

    E.
    www.randomdrivel.com [randomdrivel.com] -- All that is NOT fit to link to
  • Imagine a Beowulf cluster of these ;-P
  • But your off topic.
  • Chop Chop Master Onion would have them all hanged. :\
  • Wasn't there any authentication or encryption in this software? I can't believe that just stealing the source code to a piece of software like this would give someone full reign of the satellite system. With a system like this you ought to be able to hand the source code out on the streets and not have it affect the security or the stability of any production systems.
  • RTFA... the investigation was led by the FBI. I'm sure the raid was under the authority of the Swiss law enforcement. The "computer experts" were probably just added to the team to search the hard drives. Also, all they did was raid the damn ISP.
  • Now this is interesting. If I recall correctly, the GPS system is designed so that the civilian devices are deliberately less accurate then the military devices. It has something to do with the satellites introducing a deliberate error, and simultaneously transmitting an encrypted data stream with the corrections for the error.

    Now if the source code for the satellites has escaped, it's possible that someone could study the program and figure out how to crack the data-correction information, and the result could be "bootleg" GPS receivers with military-grade accuracy.

  • by Anonymous Coward
    Check out this article on Iraq jamming GPS guided missles:

    http://www.theherald.co.uk/news/archive/28-2-19101 -0-24-33.html [theherald.co.uk]

    Very interesting eh?
  • I've noticed that newspaper writers often slap the "top secret" label on things just for dramatic effect and don't seem to realize that it has a fairly specific meaning, at least to the government. As you imply, it would be highly improbable that a top secret computer system would be accessible via the internet.
  • The article clearly says "Source Code" not "access codes"

    Exactly... Not if they had "passwords" for the signal generators or attitude control systems then there might be an issue. Except that the passwords would probably have been changed immediatly.
    The only way the source code might be an issue is if it contains embedded back doors.
  • by segfaultcoredump ( 226031 ) on Friday March 02, 2001 @12:14PM (#388777)
    Actually, they turned off the encryption during the gulf war due to the lack of military grade gps receivers. Many troops were using standard commercial off the shelf receivers that could not decrypt anything no matter what they key was.

    As for the ability to rekey, if the NSA is involved, there is always a way to rekey in the event of the disclosure of the key (they also have rather strict policies for the lenght of time that a key can be in use. The best thing is that the keys are typically distributed on paper tape because it is so easy to destroy).

    What I really want to know is who attached a 'top secret' system to the internet (or any other non classified system). Having worked in that industry before, doing so was a very quick way to getting not only fired but thrown in jail.
  • No, the satellites have a KG-xx device inside. It handles Key generation/decryption and is linked with another device with a similar name for commands decryption and analysis (found that on the web somewhere.)
    This system uses the TS crypto called "baton", thought to be somehow related to skipjack
  • Sweden and Norway (since you mentioned Johansen), are not totalitatian police states, and people there have similar rights as in the US. You have to keep in mind that police agencies/departments *do* cooperate over international borders, and there are such things as extradition treaties. Why dont you ask yourself how the #1 on the FBI's most wanted list (Bin Ladin) is not a US citizen? In short: they would have needed a warrant. Everything is not a conspiracy. And Before you get to it; I have lived in all 3 of the above mentioned countries.
  • the codes were more dangerous than once thought. Not only was the hackers rendered the GPS system useless, they've also reset every digital clock on the planet (causing mass panic amoung morons and elderly people), screwed up the tracking on everyone's VCR and demagnitized the strips of millions of ATM cards.

    Damn these hackers, damn them all to hell!!

  • Someone marked me flamebait????

    That was clearly offtopic.
  • GPS satellites do not determine your position. They basically just broadcast a very accurate time signal. The receiver looks to see how far out of phase the time signal from several satellites is to determine your position. At no point do the satellites ever even know that your receiver exists, much less know where it is.
  • I could be wrong here, but the documentation for the GPS I got for my Palm Pilot said that it was a receive only protocol, so I receive telemetry data but am not sending any. Given the range of Cell phones, wouldnt a GPS have to be much larger to send data back into orbit???

    http://www.matthewmiller.net [matthewmiller.net]
  • So they got the source code for guiding the systems. If the system is properly engineered, it shouldn't matter if you know how to guide it, you still need access to the system. If the system is poorly engineered, I'm going to buy some pillows like that TV guy in Willabong Australia or wherever.


    Don't be silly. Some hacker didn't steal system codes to route satellites or missiles.

    Some hacker stole system codes to sell them to Putin in Russia. For a LOT of money. Putin is the former head of international intelligence - ie: Russia's spy chief. This hacker will be very generously compensated for his efforts, and the US will need to re-tool EVERYTHING.

  • I'd like to take this opportunity to tell the world that the first thing Swedes and Swiss talk about when they meet in the US, is the Americans annoying incapability of telling our countries apart. It's good for a few laughs.

    Not that Swedes are any better at telling Idaho and Iowa apart.
  • Generally speaking, these kinds of leeks (if it's even true) come from the gov't.

    Although Gov't work does pay off, software companies get screwed all the time. Basically, the gov't doesn't have to have any accountibility to with these types of products. They can even go so far as to call tech support and when questions on who and where they are refuse to answer and demand support. Not a lot you can do if you want to keep your contract. This fosters some pretty lax standards.

    Again, this story has a 50-50 chance of ending up in the Hoax category like the "spy satilite" taken over bit last year.
  • by david614 ( 10051 ) on Friday March 02, 2001 @11:37AM (#388812) Journal
    "Selective Availability" - the US government's policy of degrading the GPS signal available to commercial and civilian receiver operators was ended last year.

    Selective regional or local denial of GPS signals (through the equivalent of jamming) is possible, howvever.

    Just some hopefully useful background information.

    D
  • by jd ( 1658 )
    I mis-read that, and thought it said "GPL Rockets".

    Mind you, with NASA up the proverbial creek, that's probably what we'll end up with. :)

  • Servo: You don't know how to fly. Mike: Sure I do! I'm fully instrument-rated for Microsoft Flight Simulator. Crow: Well, then you fly the Satellite of Love! Servo: Yeah. Mike: What, this thing? No, I can't do that, see, 'cause it's not the same. There's no air-foil, so there's no ability to turn when you're up in the... Oh, alright, alright. Fine, you two. Spread out, spread out! Gypsy: What would you do on the drunken sea, early in the morning? Hey, hey... Mike: Okay. Out, baby. Out, out, out, out, out. Gypsy: Well, don't come crying to me when you get us all killed. Mike: Alright, okay. Let's see here... Well hey, this is going to be easier than I thought! Hehehe. ...Oh! Servo: The hell? Crow: Hey Mike, you hit something! It's the Hubble! You killed the Hubble! Mike: Gypsy, could you please maybe help... Gypsy: Uh-uh! No way! This is your dishwashing liquid, you soak in it! Mike: Ah, ah! The Manipulator Arm! The, the Manipulator Arm. Servo: Carefully, carefully... There Wait, wait. It's only $6 billion, remember. Crow: Hope you're insured, Mike. Servo: It's just the most expensive satellite ever built. Crow: It's very fragile... Well, was very fragile. Servo: Better leave a note on the windshield, Mike. Crow: Yeah. Just back away slowly, and... Aah! Servo: Don't do that! Mike: Oh! I'm sorry. I'll just... Now, I'll just release it gently like a sparrow into the night's sky. Crow: Good night, sweet Hubble, and a flight of angels sing thee to thy rest. Mike, Crow and Servo: Aah! Crow: Oh, good one, Mike. cryptochrome
  • what are the odds of someone like saddam or khadaffi being able to have super accurate missiles?

    Access to - a significant portion of the GPS satelites, and the code for how a GPS satalite actually determines your position, would probably increase odds emensely...
  • by eddy ( 18759 ) on Friday March 02, 2001 @11:49AM (#388821) Homepage Journal

    Since when are 'computer experts' policemen?

    Actually, it would be the other way around. Police men can be computer experts. However, what I've read in the local news is that police hired five computer consultants to help them in the raid

    Did they have a warrant?

    The police had one, yes.

    The mystery here is.. why the raid? Obviously they must have figured someone at the company being an accomplice in the crime, or they would simply had asked for access. Of course now they know they look stupid for raiding the place (which is not commonplace over here), and so they're doing damage control in the media by saying how pleased they were with the company being open and helpful during and after the raid.

    Apparantly the company, whose name I forgot, runs a webhotel-ish service, and the alleged criminal simply used them for free space. That got them raided.

    So yes, it's fishy. Local police probably relied heavily on information only coming from the FBI. Bleeech.

  • You are close but not as close as you could be. To be more exact there will be no Internet as we know it. All ATM and SONET equipment uses external GPS based synchronization sources. Which means that a considerable fraction of high speed lines (above 45M) will die miserably. ATM dies for sure. Sonet - it depends ;-)
  • Why isn't there a mod category for, "Wrong?"

    Because I'm afraid we'd have to mod you down as well.

    GPS signals contain two separate codes for position locating: C/A (Coarse Acquisition) and P (Precise). C/A was indeed degraded by Selective Availability, and SA was turned off by order of the President in May of last year. However, the way it works is that the C/A code only modulates the L1 carrier (1545.72 MHz) at a 1MHz rate, while the P code modulates both the L1 and L2 carriers at a 10MHz rate. Furthermore, the P code is encrypted (which is then referred to as the "Y" code.) The military GPS recievers typically acquire the easier L1 code first and from there scan for the P code.

    The C/A code is still good only to a few meters, while the combination of the two carriers carrying the P code is able to detect and compensate for atmospheric disturbances yielding an accuracy of 10cm or less.

    For a much better explanation, see Trimble's [trimble.com] How GPS works [trimble.com] article.

    John

  • Repeat after me, until it gets through the tinfoil helmet.

    One. Way. Transmission.

    GPS receivers are no more able to send back YOUR location as your Walkman is of telling the radio station that you've tuned in.
  • So many of the comments on this article appear to be either off-topic or wrong.

    For more information about the system itself, please see: http://biz.yahoo.com/prnews/001220/fl_exigent.html [yahoo.com]

    Note also that GPS is merely a method for determining your position and as such even if "Evil people" have control over GPS, then the wrong signal still will not control anything...okay, some stuff, but very little is solely controlled by GPS.

    Also, please note that this was merely the source code for the programs that allow communication with the GPS satellites, not access codes (not necessarily easy to determine) nor even the communication signal frequency(ies) (although that would probably be pretty easy to determine).

    Is it me or is the HYPE here at Slashdot getting out of control?

  • by Frogisis ( 318039 ) on Friday March 02, 2001 @11:40AM (#388840) Homepage
    "This is your captain speaking. We're having trouble with our ETA due to the fact O'Hare International keeps moving around..."

    --Later, friends--

  • somebody know just a little too much here. I mean, how convenient is this???

    I hope that I am not being redundant..
  • I for one have already have too many flaming aircraft parts fall on my house.

    Seriously? How many flaming aircraft parts have fallen on your house? I suppose 1 would count as "too many". But I'd be interested in hearing your tale...
    ________________________________________________

  • by Bonker ( 243350 ) on Friday March 02, 2001 @11:19AM (#388858)
    Accordiing to the article: Computer experts raided the offices of an information technology company in Stockholm last month and found a copy of the source codes for the software program OS/COMET Since when are 'computer experts' policemen? Did they have a warrant? This reminds me of Jon Johansen's statement wondering about why the police in his country arrested him for a 'crime' theoretically committed in the U.S..
  • by stealie72 ( 246899 ) on Friday March 02, 2001 @11:19AM (#388861)
    I can see it now. 10 thousand slightly confused 40-something yuppies all the sudden completely unable to get anywhere because they've learned to rely on their fancy On Star GPS in their DeVilles. Break out the map and compass.
  • How would you manage the development of an Open Source rocket guidance system? How many people would you find who would test it? Part of the reason Linux has grown the way it has is because anyone can set up their own test system (Assuming sufficient technical skill). How does Joe Blow hacker set up a test environment for Rocket Guidance?????

    http://www.matthewmiller.net [matthewmiller.net]
  • Ooops, didn't notice that the link I provided is already in the article. RTFA (read the fucking article), right?

    This does not appear to highly classified, if they are putting out stuff like this [slashdot.org] and this article [bcentral.com], the company is looking for many other uses for this software. Doesn't sound secret to me

  • This article [about.com] was one of many explaining that the US government has decided to end its policy of deliberately introducing errors to degrade the accuracy of civilian GPS devices, which are now accurate to within 10-20 meter (that's 35-65 feet to all you Yanks out there).

    However, if the source code does exist, and does give sufficient information to allow the decoding of the data-correction information, it means that, for anyone with a hacked GPS receiver, they can still get an accurate signal even if the US government turns the scrambling back on.

  • Russia should beg the US to make a missile defense system, knowing our history with weak networks, they can just break in and take it over whenever they need it.
  • by Speare ( 84249 ) on Friday March 02, 2001 @11:45AM (#388870) Homepage Journal

    The noise perturbation function was turned off (set to introduce an error of zero) about a year ago. This feature of the system is called 'Selective Availability'. This can still be adjusted for military purposes, even on a regional basis, but SA is a dying feature.

    Too many of our (western) armed forces rely on non-milspec GPS units. If the milspec receivers are in short supply, Magellan and Garmin civilian units are often used in the field instead.

    The error introduced is variable, but still smaller than the inherent error in a non-modern missile system such as Iraqi/Russian SCUD. More modern weapons would hit a target by video or uv laser seeking reckoning, not by onboard GPS receipt.

    Civilian uses for SA=0 are the official reason it was shut off. An ambulance called to a location given by an OnStar GPS would potentially know which side of the road it's talking about; important where a highway has long tall medians. Also, civil pilots rely on GPS heavily for lesser-mapped airstrips.

  • Why do that when you can just set one satalite's perception of ground to -500 feet around LAX, Dulles, Cape Canaveral, Hethro, and/or Logan? It may not be much to planes taking off, but those landing might get big a surprise 500 feet earlier.

    ...This is of course assuming that they have complete control over those kinds of operating parameters and can access and change sepecific fields of a satalite (the whole "access codes" vs. "software code" discussion in another thread).

    The terrorist action against PANAM in 1988 (Lockerbie, Scotland) would be nothing in comparrision to 4 or 5 planes smacking into the ground within 15 minutes of eachother at various airports worldwide.
  • by jd ( 1658 ) <imipak@ y a hoo.com> on Friday March 02, 2001 @11:45AM (#388872) Homepage Journal
    Check Freshmeat II for any suspicious copies of Missile Commander. :)
  • Seeing as the only reason that Khadaffi is alive is because of a GPS mis-calcualtion!
  • Good point, well Valdez X5 with no Alcoholic Skippers then....
  • Why isn't there a mod category for, "Wrong?"

    The American GPS system is used by both the military and civilians. Up until a few years ago, the civilian users only had access to signals degraded by "Selective Availability," and were only good to +/- 300 meters or so.

    Of late, SA has been turned off, and now both civilian and military users have the high-accuracy signal. This was in part due to the FAA's efforts to "undo" SA though their WAAS, Wide Area Augmentation System. WAAS stations near major airports would provide additional resolution to SA-crippled GPS so that precision approaches based on GPS could be created. Currently GPS approaches are non-precision (lateral guidance only, no altitude guidance), and usually are overlays of existing VOR or NDB approaches.

  • I don't usually consider myself an open source zealot, although I'm generally in favor of it. However, it seems like this case could be used as a great argument for it -- or at least, an illustration of where it might be good or bad.

    First of all, as has been mentioned, the article says the the source code, not the security codes, was stolen. If, however, the source code was open to public scrutiny, any holes which the thieves might make use of would more likely have been found by now. Since everyone could get the source, there would be no advantage to stealing it.

    Mind you, there's a flip side to this. If the source code was open, it would be easier for Random Joe l33t, if he managed to find a security hole first, to break in -- since he didn't have to go through the trouble to steal the source in the first case. Which brings us back to square one -- security through obscurity.

    I don't have an answer to this -- just a thought.

    -Puk
  • by Stavr0 ( 35032 ) on Friday March 02, 2001 @11:22AM (#388881) Homepage Journal
    All your GPS are....ahh never mind.
    ---
  • by HuskyDog ( 143220 ) on Friday March 02, 2001 @04:37PM (#388882) Homepage
    Now that the signal degradation is no longer being done, your commercial receiver is just as accurate as the military versions

    Rubbish! Civilian receivers are much more accurate now that SA is switched off, but they are still not as good as military receivers (at least not without the use of differential GPS). Civilian receivers only receive the C/A code broadcast on the L1 frequency (1575 MHz). Military receivers also receive the P & Y codes broadcast on the L2 frequency (1228 MHz). The Y code is encrypted and yes, the codes are changed regularly.

    There are several reasons why access to the L2 transmissions improved accuracy, but the most significant is probably ionopheric distortion. Essentialy, the signals from the satellited refract as they enter the atmosphere, thus they follow a path which is slightly longer than a straight line. The navigation codes attempt to allow for this, but the ionosphere is not static and civilian receivers only compensate for average conditions.

    Now, you will remember from your physics classes that different wavelengths (or frequencies) refract by different amounts (thus a prism generates a spectrum). By measuring the difference in arrival time of the L1 and L2 channels from the same satellite one can determine more accurately the state of the ionosphere between the receiver and the satellite. By using this knowledge when deriving the nav solution the received can further increase its accuracy.

  • The OS/COMET source code could be used by terrorists to disturb computer systems guiding various space programs or it could have been stolen in industrial espionage for commercial advantage, the Swedish tabloid Expressen reported.

    Looks like you would still have to be a rocket scientist, or more exactly, a satellite scientist, to know how to precisely use it.

    but of course, they could do a rewrite of the protocols, but that could take a while.

  • by jovlinger ( 55075 ) on Friday March 02, 2001 @12:00PM (#388898) Homepage
    There seems to be a bit of confusion about this.

    I know GPS was encrypted with a perturbation signal, which if you could decrypt it allowed you to determine your position more precisely. Now that they've turned off those codes, that is no longer the case.

    There was one perturbation code for all the GPS satelites; the behavior shown during the gulf war (turning the encryption off rather than distributing secure receivers to troops) indicates that the satelites cannot be re-keyed.

    I imagine that many of the secret keys are hardcoded into the programs, thus mudding the line between the two. Is a program partially evaluated over a key secure or obscure or both?

    Hopefully there is significant redundant security in the system. You know that the NSA aint that stupid. They realise that obscurity != security, but they DO know that obscurity AND security is better than either of the alternatives alone.

    Hopefully the cipher codes remain secret, while the algorithms and protocols have been exposed.
  • Damn that's funny.

    I'm an American who worked for a month in Sweden in January. Believe me, I would find it impossible to confuse Sweden and Switzerland.

    Switzerland is the country where my frozen nuts are currently NOT located in.

  • ...the systems people were told by their bosses, "don't worry, what do we have that anyone would be interested in stealing?" like all the rest of us have heard? :)
    --
    Remove the rocks to send email
  • That being said, what are the odds of someone like saddam or khadaffi being able to have super accurate missiles? there is a lot more to it than it first appears.
  • by coolgeek ( 140561 ) on Friday March 02, 2001 @11:25AM (#388905) Homepage
    The article clearly says "Source Code" not "access codes". All this means is the military (and Exigent) will getting their first lesson is Systems Security 101: Obscurity != Security.

I tell them to turn to the study of mathematics, for it is only there that they might escape the lusts of the flesh. -- Thomas Mann, "The Magic Mountain"

Working...