Code for Running GPS Satellites Stolen 193
twivel was one of many to send this in: "According to this article a hacker has obtained top secret space codes that could yield access to guiding ships, rockets and satellites. Why launch your own spy satellite when you can just borrow ours?" The funny thing is that the code was stolen only a couple of days after it was deployed.
stolen? (Score:1)
--
The SOURCE CODE was stolen... (Score:3)
Re:Inside Job (Score:1)
Ben^3 (in a whimsical mood)
They got the source code, so what? (Score:5)
So they got the source code for guiding the systems. If the system is properly engineered, it shouldn't matter if you know how to guide it, you still need access to the system. If the system is poorly engineered, I'm going to buy some pillows like that TV guy in Willabong Australia or wherever.
I wonder if they checked first.... (Score:1)
The way things have been going lately, being in posession of source code makes any individual look like a 'hacker' (in th media sense).
Re:What you can use it for... (Score:1)
They typically broadcast local radio signals that aircraft use in addition to more traditional altimeters.
Not really relevant to the security (Score:1)
In terms of security, I would bet that the actually commanding of the spacecraft, and quite possibly telemetry from it, are secured by hardware encryption devices, the details of which have not been revealed (including their keys). This will not allow any hacker (who just happens to have a suitable ground station) to access or disrupt the GPS system.
--
Re:In Favor of Open Source? (Score:1)
-Puk
GPS Signals (Score:5)
Actually, you are talking about two different things. Selective Availability, the degredation of the general-use signal, was turned off last January. However, you seem to have confused SA with the different codes available.
There are two (three, actually) codes transmitted by the GPS satellites. The C/A-code (coarse/acquisition) is the "general use" code, available to all, and (formerly) subject to SA. The P-code (precision code) is the "military" code; it requires special receivers, and you have to have a DoD license to get said receivers. The third code is the Y-code, and is used in conjunction with the P-code, and is not relevant for this discussion.
There is no way to get to the P-code from the C/A-code; the P-code is approximately 1 millisecond in length (1,024 bits, transmitted at 1.023 MHz); the P-code is a week long, even transmitted at ten times the rate (10.23 MHz).
The C/A- and P-codes are not "encrypted" in the classical sense of the word, they are just signal formats. (The P-code is encrypted to form the Y-code, but that's another matter.) SA does not perform any "encryption" on the C/A-code, it blurs the timing slightly between satellites, so your receiver doesn't know the precise length of time the signal took to arrive from the satellite. This causes the receiver to have a certain amount of ambiguity, and degrades the accuracy of the signal.
For more information on the system, check out the Naval Observatory's site [navy.mil] on GPS.
This is a consular ship (Score:1)
ESR: I don't know what your talking about. I am a member of the Imperial Senate on a diplomatic mission to Redmond.
Allchin: You're part of the Open Source movement, and traitor! Take him away!!!
Microserf: Holding him is dangerous. If word were to get back to....
Allchin: He is of no moment. His stock holdings have plummeted. A company or employee who is not bringing profit to the Empire is un-American....
--
Re:The SOURCE CODE was stolen... (Score:1)
mark
Re:Military GPS accuracy (Score:1)
once everybody relies on high-accuracy data from civilian receivers, just turn encryption on again and watch the ensuing chaos.
Re:They got the source code, so what? (Score:1)
Re:This is a non-event - Details! (Score:1)
-- Agent TZ254
--
Hijack... (Score:1)
Asikaa
This is all messed up. (Score:2)
It implies that a lone hacker in a foreign land got through a high-security installation to steal sensitive data. A team of hackers broken into what was probably a semi-secured system and got something that's probably been superseded by code changes already.
It states that the source code stolen is Top Secret. OS/Comet is not Top Secret. It's not Secret. It's not even Confidential/NOFORN. It might be used by some installations for Top Secret stuff, but I doubt it, and if they did it would be like saying "swedish teen-aged janitor steals Top Secret floor buffer!" When did Reuters become the Weekly World News?
It implies that the script kiddies can use it to control satellites. Well, yes, but only if they happened to steal the OTP, too. And if they did it's really easy to confound them by replacing the OTP. They can't control anything.
Someone else here posted that Exigent had "just deployed" OS/Comet. Huh. Heh. I've seen the insides of Comet, years ago, and baby, there's stuff in there that's older than most people here.
Now, that's not to say that Exigent should blow them off. It's proprietary software, and they make millions per year off of it. Mostly by selling consulting support to wedge the elephant into whatever hatbox it's being bought to drive, but still.
--Blair
More than just the military (Score:1)
--
/. should ban the "See hot sexy women..." ad
WWIV Door (Score:1)
source code, not "codes" (Score:1)
It effectivly open-sourced the space program...
Why am I not surprised? (Score:1)
Re:What you can use it for... (Score:2)
--
Re:More reason to use open source (Score:1)
More reason to use open source (Score:5)
This provides even more support for the government moving to open source. If an open source model was adopted for this type of project then the system would have sufficient security that examination of the source ideally would not be an issue of national security. Who knows what backdoors the hacker has uncovered?
---
Hackers are bad. (Score:1)
Cool! (Score:1)
I have the source code to Sendmail (Score:1)
please (Score:1)
Re:What you can use it for... (Score:1)
Asikaa
Re:And this is a good thing? (Score:1)
ICBMs are worthless anyway. Look at it this way. If We first strike, then they retaliate, we all die. A first strike would be wrong anyway - we have no need for that ability - right? RIGHT?!?
Now, if "they" (they being whoever is todays bad guy) strike first. Well, fuck, we are dead anyway. ALL our ICBMs do i s make sure that noone survives.
Quite frankly, if they strike and I die... They can have the land, I don't give a shit if we kill them too. At that point, it doesn't matter anymore.
-Steve
Re:Overstepping Authority... (Score:1)
The raid was not conducted by the police but by the Enforcement agency.
The software company they raided has some free services like webspace and email, sorta like hotmail, freebox.com [freebox.com].The hacker/cracker had supposedly put up a copy of the files somewhere on freebox.com. The hacker/cracker goes under the 'hacker alias' LEEIF says the press too.
This info from an article in the Swedish newspaper 'Expressen [expressen.se]' (in Swedish).
Doesn't affect missiles, either (Score:2)
Plus, in any major conflict, the first thing to go down would be the GPS satellites, hence the military teaches alternate navigation skills (celestial, map reading for pilots, etc). Damage to the GPS system would mostly affect merchant shipping and just sort of annoy any military organization worth its salt.
Geoff
You know what this means, gentlemen? (Score:1)
How much control do GPS satellites need? (Score:1)
curiously, -dB
Re:What will people do.... (Score:1)
Yesterday it worked
Today it is not working
Windows is like that
No? At least that way it is actually following the haiku syllable pattern.
Jordan
Re:Codes? (Score:1)
Comming up with protocols for such things that are secure even when the protocol is known is really not too hard. Certainly not too hard for organizations who can drop a million dollars here and there without even noticing.
If they are stupid enough to use "Security through obscurity" when it would be nearly trivial for them to do it otherwise (I mean come on, does anyone think that the code hasn't been security audited by the NSA?) is silly and irresponsible.
So yea, if they did it that way, they do DESERVE to have whatever happens, happen.
-Steve
Re:What you can use it for... (Score:1)
Also, the last time I checked SCUD's had a hard enough time taking off, never mind hitting something within range ;)
Of course, trying to find valid nuke blast radius information on the net that isn't "3D10 + (50% radius for air burst) - (50% damage for air burst)" is quite difficult :) http://www.algonet.se/~ellebell/rules/nukes.html
l
http://www.gamersorb.com/ut/ut_weps_redeemer.shtm
Pardon the "unofficial" links but google is fulla shit.
--Clay
GPS code shirts (Score:3)
Re:GPS Accuracy (Score:2)
One Minor Point:
a Small to Medium Nuke blast a km or two away is survivable, even if in a mine shaft or a moderately deep underground bunker. Much closer, especially a bomb dropped into the mine shaft where someone is hiding is much nastier. Even with a long mine shaft.
Golden Eye Lives! (Score:1)
--
Non-meta-modded "Overrated" mods are killing Slashdot
Good GPS info page (Score:2)
Here's a good GPS info page, for those who aren't sure about things like selective availability, P/Y vs CA codes, the differnet bands, etc. Some people have mentioned some of this already, but this covers a decent amount without going to in depth. At the bottom it even mentions differential GPS, which is the concept behind the Wide Area Augmentation System (WAAS). Interesting stuff.
http://www.colorado.edu/geography/gcraft/notes/gpHow are you Gentleman!! (Score:1)
Top Secret - NOT (Score:1)
GPS Accuracy (Score:3)
For those that don't know, SA is a set of two different time signals broadcast by the satelites. The military time signal is pure, but the civilian one had some noise injected into it to degrade the accuracy. Now that the signal degradation is no longer being done, your commercial receiver is just as accurate as the military versions.
Khadaffi | Saddam | Osama Bin Laden | Joe Militia just needs a unit from Garmin [garmin.com] | Magellan [magellangps.com] | Trimble [trimble.com], and they can pick off anything in range. This has been the case for quite a while, as even with SA in use, the accuracy was about 100 FT. A good large bomb/missile has a blast radius larger than that.
Hello (Score:2)
Bond (Score:1)
Any one else?
Open Source! (Score:1)
Uh-oh! (Score:1)
-----
Superman III (Score:1)
Where's Richard Pryor when we need him!!!
E.
www.randomdrivel.com [randomdrivel.com] -- All that is NOT fit to link to
Re:Open Source! (Score:1)
Re:Go Away Trolls! (Score:1)
"a source code"? (Score:1)
Security??? (Score:1)
Re:Overstepping Authority... (Score:2)
Military GPS accuracy (Score:1)
Now if the source code for the satellites has escaped, it's possible that someone could study the program and figure out how to crack the data-correction information, and the result could be "bootleg" GPS receivers with military-grade accuracy.
Re:Hello (Score:1)
http://www.theherald.co.uk/news/archive/28-2-1910
Very interesting eh?
Re:Codes? (Score:1)
Re:Codes? (Score:2)
Exactly... Not if they had "passwords" for the signal generators or attitude control systems then there might be an issue. Except that the passwords would probably have been changed immediatly.
The only way the source code might be an issue is if it contains embedded back doors.
Re:Codes? (Score:4)
As for the ability to rekey, if the NSA is involved, there is always a way to rekey in the event of the disclosure of the key (they also have rather strict policies for the lenght of time that a key can be in use. The best thing is that the keys are typically distributed on paper tape because it is so easy to destroy).
What I really want to know is who attached a 'top secret' system to the internet (or any other non classified system). Having worked in that industry before, doing so was a very quick way to getting not only fired but thrown in jail.
Re:Codes? (Score:2)
This system uses the TS crypto called "baton", thought to be somehow related to skipjack
Re:Overstepping Authority... (Score:2)
What will people do.... (Score:2)
Damn these hackers, damn them all to hell!!
Re:Sorry... Someone has to say it (Score:2)
That was clearly offtopic.
Re:comments on accuracy (Score:2)
Re:GPS is inherently evil. (Score:2)
http://www.matthewmiller.net [matthewmiller.net]
Re:They got the source code, so what? (Score:2)
Don't be silly. Some hacker didn't steal system codes to route satellites or missiles.
Some hacker stole system codes to sell them to Putin in Russia. For a LOT of money. Putin is the former head of international intelligence - ie: Russia's spy chief. This hacker will be very generously compensated for his efforts, and the US will need to re-tool EVERYTHING.
On behalf of all Swedes and Swiss, (Score:2)
Not that Swedes are any better at telling Idaho and Iowa apart.
Inside Job (Score:2)
Although Gov't work does pay off, software companies get screwed all the time. Basically, the gov't doesn't have to have any accountibility to with these types of products. They can even go so far as to call tech support and when questions on who and where they are refuse to answer and demand support. Not a lot you can do if you want to keep your contract. This fosters some pretty lax standards.
Again, this story has a 50-50 chance of ending up in the Hoax category like the "spy satilite" taken over bit last year.
Re:Military GPS accuracy (Score:4)
Selective regional or local denial of GPS signals (through the equivalent of jamming) is possible, howvever.
Just some hopefully useful background information.
D
Phew!!! (Score:2)
Mind you, with NASA up the proverbial creek, that's probably what we'll end up with. :)
MST3K quote seems appropriate... (Score:2)
comments on accuracy (Score:2)
Access to - a significant portion of the GPS satelites, and the code for how a GPS satalite actually determines your position, would probably increase odds emensely...
Re:Overstepping Authority... (Score:5)
Since when are 'computer experts' policemen?
Actually, it would be the other way around. Police men can be computer experts. However, what I've read in the local news is that police hired five computer consultants to help them in the raid
Did they have a warrant?
The police had one, yes.
The mystery here is.. why the raid? Obviously they must have figured someone at the company being an accomplice in the crime, or they would simply had asked for access. Of course now they know they look stupid for raiding the place (which is not commonplace over here), and so they're doing damage control in the media by saying how pleased they were with the company being open and helpful during and after the raid.
Apparantly the company, whose name I forgot, runs a webhotel-ish service, and the alleged criminal simply used them for free space. That got them raided.
So yes, it's fishy. Local police probably relied heavily on information only coming from the FBI. Bleeech.
Re:What will people do.... (Score:2)
Re:Military has its own GPS system (Score:2)
Because I'm afraid we'd have to mod you down as well.
GPS signals contain two separate codes for position locating: C/A (Coarse Acquisition) and P (Precise). C/A was indeed degraded by Selective Availability, and SA was turned off by order of the President in May of last year. However, the way it works is that the C/A code only modulates the L1 carrier (1545.72 MHz) at a 1MHz rate, while the P code modulates both the L1 and L2 carriers at a 10MHz rate. Furthermore, the P code is encrypted (which is then referred to as the "Y" code.) The military GPS recievers typically acquire the easier L1 code first and from there scan for the P code.
The C/A code is still good only to a few meters, while the combination of the two carriers carrying the P code is able to detect and compensate for atmospheric disturbances yielding an accuracy of 10cm or less.
For a much better explanation, see Trimble's [trimble.com] How GPS works [trimble.com] article.
John
Re:GPS is inherently evil. (Score:2)
One. Way. Transmission.
GPS receivers are no more able to send back YOUR location as your Walkman is of telling the radio station that you've tuned in.
Wow (Score:2)
So many of the comments on this article appear to be either off-topic or wrong.
For more information about the system itself, please see: http://biz.yahoo.com/prnews/001220/fl_exigent.html [yahoo.com]
Note also that GPS is merely a method for determining your position and as such even if "Evil people" have control over GPS, then the wrong signal still will not control anything...okay, some stuff, but very little is solely controlled by GPS.
Also, please note that this was merely the source code for the programs that allow communication with the GPS satellites, not access codes (not necessarily easy to determine) nor even the communication signal frequency(ies) (although that would probably be pretty easy to determine).
Is it me or is the HYPE here at Slashdot getting out of control?
Eep. (Score:5)
--Later, friends--
I am sure it was an inside job... (Score:2)
I hope that I am not being redundant..
Re:And this is a good thing? (Score:2)
Seriously? How many flaming aircraft parts have fallen on your house? I suppose 1 would count as "too many". But I'd be interested in hearing your tale...
________________________________________________
Overstepping Authority... (Score:4)
On Star (Score:3)
Open Source is probably not an option here (Score:2)
http://www.matthewmiller.net [matthewmiller.net]
Re:Wow (Score:2)
Ooops, didn't notice that the link I provided is already in the article. RTFA (read the fucking article), right?
This does not appear to highly classified, if they are putting out stuff like this [slashdot.org] and this article [bcentral.com], the company is looking for many other uses for this software. Doesn't sound secret to me
No longer quite true (Score:2)
However, if the source code does exist, and does give sufficient information to allow the decoding of the data-correction information, it means that, for anyone with a hacked GPS receiver, they can still get an accurate signal even if the US government turns the scrambling back on.
Missile Defense (Score:2)
SA is currently ZERO (Score:4)
The noise perturbation function was turned off (set to introduce an error of zero) about a year ago. This feature of the system is called 'Selective Availability'. This can still be adjusted for military purposes, even on a regional basis, but SA is a dying feature.
Too many of our (western) armed forces rely on non-milspec GPS units. If the milspec receivers are in short supply, Magellan and Garmin civilian units are often used in the field instead.
The error introduced is variable, but still smaller than the inherent error in a non-modern missile system such as Iraqi/Russian SCUD. More modern weapons would hit a target by video or uv laser seeking reckoning, not by onboard GPS receipt.
Civilian uses for SA=0 are the official reason it was shut off. An ambulance called to a location given by an OnStar GPS would potentially know which side of the road it's talking about; important where a highway has long tall medians. Also, civil pilots rely on GPS heavily for lesser-mapped airstrips.
Re:What you can use it for... (Score:2)
...This is of course assuming that they have complete control over those kinds of operating parameters and can access and change sepecific fields of a satalite (the whole "access codes" vs. "software code" discussion in another thread).
The terrorist action against PANAM in 1988 (Lockerbie, Scotland) would be nothing in comparrision to 4 or 5 planes smacking into the ground within 15 minutes of eachother at various airports worldwide.
Hmmmm.... (Score:5)
The irony of it all (Score:2)
Re:What you can use it for... (Score:2)
Re:Military has its own GPS system (Score:4)
The American GPS system is used by both the military and civilians. Up until a few years ago, the civilian users only had access to signals degraded by "Selective Availability," and were only good to +/- 300 meters or so.
Of late, SA has been turned off, and now both civilian and military users have the high-accuracy signal. This was in part due to the FAA's efforts to "undo" SA though their WAAS, Wide Area Augmentation System. WAAS stations near major airports would provide additional resolution to SA-crippled GPS so that precision approaches based on GPS could be created. Currently GPS approaches are non-precision (lateral guidance only, no altitude guidance), and usually are overlays of existing VOR or NDB approaches.
In Favor of Open Source? (Score:2)
First of all, as has been mentioned, the article says the the source code, not the security codes, was stolen. If, however, the source code was open to public scrutiny, any holes which the thieves might make use of would more likely have been found by now. Since everyone could get the source, there would be no advantage to stealing it.
Mind you, there's a flip side to this. If the source code was open, it would be easier for Random Joe l33t, if he managed to find a security hole first, to break in -- since he didn't have to go through the trouble to steal the source in the first case. Which brings us back to square one -- security through obscurity.
I don't have an answer to this -- just a thought.
-Puk
Ha! (Score:4)
---
Re:GPS Accuracy (Score:5)
Rubbish! Civilian receivers are much more accurate now that SA is switched off, but they are still not as good as military receivers (at least not without the use of differential GPS). Civilian receivers only receive the C/A code broadcast on the L1 frequency (1575 MHz). Military receivers also receive the P & Y codes broadcast on the L2 frequency (1228 MHz). The Y code is encrypted and yes, the codes are changed regularly.
There are several reasons why access to the L2 transmissions improved accuracy, but the most significant is probably ionopheric distortion. Essentialy, the signals from the satellited refract as they enter the atmosphere, thus they follow a path which is slightly longer than a straight line. The navigation codes attempt to allow for this, but the ionosphere is not static and civilian receivers only compensate for average conditions.
Now, you will remember from your physics classes that different wavelengths (or frequencies) refract by different amounts (thus a prism generates a spectrum). By measuring the difference in arrival time of the L1 and L2 channels from the same satellite one can determine more accurately the state of the ionosphere between the receiver and the satellite. By using this knowledge when deriving the nav solution the received can further increase its accuracy.
What you can use it for... (Score:2)
Looks like you would still have to be a rocket scientist, or more exactly, a satellite scientist, to know how to precisely use it.
but of course, they could do a rewrite of the protocols, but that could take a while.
Re:Codes? (Score:5)
I know GPS was encrypted with a perturbation signal, which if you could decrypt it allowed you to determine your position more precisely. Now that they've turned off those codes, that is no longer the case.
There was one perturbation code for all the GPS satelites; the behavior shown during the gulf war (turning the encryption off rather than distributing secure receivers to troops) indicates that the satelites cannot be re-keyed.
I imagine that many of the secret keys are hardcoded into the programs, thus mudding the line between the two. Is a program partially evaluated over a key secure or obscure or both?
Hopefully there is significant redundant security in the system. You know that the NSA aint that stupid. They realise that obscurity != security, but they DO know that obscurity AND security is better than either of the alternatives alone.
Hopefully the cipher codes remain secret, while the algorithms and protocols have been exposed.
Re:GO BACK TO HELSINKI YOU DAMN SWEDE (Score:2)
I'm an American who worked for a month in Sweden in January. Believe me, I would find it impossible to confuse Sweden and Switzerland.
Switzerland is the country where my frozen nuts are currently NOT located in.
I wonder if the day before.... (Score:2)
--
Remove the rocks to send email
Re:What you can use it for... (Score:2)
Codes? (Score:5)