It looks like you're using an Ad Blocker.

Please white-list or disable AboveTopSecret.com in your ad-blocking tool.

Thank you.

 

Some features of ATS will be disabled while you continue to use an ad-blocker.

 

Someone’s Been Siphoning Data Through a Huge Security Hole in the Internet

page: 1
13
<<   2 >>

log in

join
share:

posted on Dec, 7 2013 @ 07:46 AM
link   
I don't really know too much about this subject, but having had some education in computer programming, particularly COBOL, I'm well aware that any system can be hacked into and I have always had an adversion to internet banking as a result.

So perhaps my paranoia is unfounded, but this article makes me think twice


In 2008, two security researchers at the DefCon hacker conference demonstrated a massive security vulnerability in the worldwide internet traffic-routing system — a vulnerability so severe that it could allow intelligence agencies, corporate spies or criminals to intercept massive amounts of data, or even tamper with it on the fly. The traffic hijack, they showed, could be done in such a way that no one would notice because the attackers could simply re-route the traffic to a router they controlled, then forward it to its intended destination once they were done with it, leaving no one the wiser about what had occurred. Now, five years later, this is exactly what has happened.


"The stakes are potentially enormous, since once data is hijacked, the perpetrator can copy and then comb through any unencrypted data freely — reading email and spreadsheets, extracting credit card numbers, and capturing vast amounts of sensitive information."


Hijacked traffic went all the way to Iceland, where it may have been copied before being released to its intended destination. The green arrows show the path the traffic should have traveled; the red arrows show the path it took.

Full story:
www.wired.com...



Map showing the long and winding path taken by traffic headed from Chicago to Iran. The green route represents the normal route the traffic takes; the red route is the hijacked route it took through Belarus.



posted on Dec, 7 2013 @ 07:56 AM
link   
Classic man in the middle attack. The only way around it would be to have known routes and not to accept packets from unknown origin/ routes.

Any data that's sent over the internet can be intercepted and relayed to its intended origin.

Save a copy of the packets intercepted and decode at your will.


Anything made by man can be re engineered.
The internet will never be 100% secure.

Vpn is the only way to secure your traffic, and then your sill at the mercy of the endpoints security.


Also, Defcon is not a hacker conference per say. Its a network analysis and security conference.
edit on 12/7/2013 by shaneslaughta because: (no reason given)



posted on Dec, 7 2013 @ 08:02 AM
link   
reply to post by pandersway
 


I saw this on Digg the other day. Without any knowledge.. I am thinking it was China, Russia or Isreal. Clearly America just steals data without the complex run a round. If I had to bet money.. I bet it was Russia. Followed by China. I don't believe it was someone. It was somebody. It was a state security apparatus.
edit on 7-12-2013 by GArnold because: (no reason given)



posted on Dec, 7 2013 @ 08:09 AM
link   
As soon as i read it i knew it was a BGP (Border Gateway Protocol) exploit, a lot of internet protocols are not designed with any form of security by default which is why IP V6 is designed with some basic security more from the ground up than the traditions V4 and changes in BGP propegate to other core routers with no checking by default IIRC so its one of those things that could very easily be abused to cause a real internet clusterf---

One of the things about the internet is the fact the packets could some from anywhere as its designed to be a resilient network , obviously for secure communications you would want to do more checking but generally thats going to be at the higher levels

I do remember where the Chinese mucked up the BGP settings on one of their routers and loads of stuff including US DOD stuff went through their routers for about 30 mins or so and that caused a right stink at the time



posted on Dec, 7 2013 @ 08:11 AM
link   
reply to post by GArnold
 


It could be anyone, anywhere. Thus is the downfall of the internet. The inter-connectivity of the net, and how it routes data through nodes. Its also how the net is so stable, routing the data through endpoint nodes that respond fastest.

The whole system is flawed from a security standpoint.



posted on Dec, 7 2013 @ 08:13 AM
link   

Maxatoria


I do remember where the Chinese mucked up the BGP settings on one of their routers and loads of stuff including US DOD stuff went through their routers for about 30 mins or so and that caused a right stink at the time


Do you know why the DOD and other agencies use the public internet? Why dont they use a network controlled wholly by them? Maybe one that's isolated from the WEB?



posted on Dec, 7 2013 @ 08:14 AM
link   

shaneslaughta
reply to post by GArnold
 


It could be anyone, anywhere. Thus is the downfall of the internet. The inter-connectivity of the net, and how it routes data through nodes. Its also how the net is so stable, routing the data through endpoint nodes that respond fastest.

The whole system is flawed from a security standpoint.


I tend to disagree. It had to be someone with vast resources as well as the ability to do it. It almost had to be a state actor in my opinion..I could be wrong about who it was but I would as I said bet money on Russia or China.

For that matter it could have been any of the five eyes partners. I tend to rule out the US they were acting with impunity and never for a second thought a Snowden would appear. It could have been GCHQ. Austrailia. New Zealand of even Canada. I would not rule out Isreal either. They were an important part of Stuxnet and Olympic Games.
edit on 7-12-2013 by GArnold because: (no reason given)



posted on Dec, 7 2013 @ 08:19 AM
link   
reply to post by GArnold
 


It can be anyone with a good broadband internet connection that can throughput enormous amounts of data.

Anytime data is routed through nodes its subject to being misused. The internet is only as secure as the nodes and endpoints that pass the data lets say from Facebook to yourself.
You may have a dozen route hops or more before you receive your page.

Every hop to a different node is another chance someone can DATA LOG you.



posted on Dec, 7 2013 @ 08:24 AM
link   
For those curious about routes your data takes between sites and yourself please check this link out.

TracRoute

Feel free to run a trace on any site url or ip you use.

You can see how your data is routed through nodes.

You can take the nodes ip and check out who owns it.



posted on Dec, 7 2013 @ 08:24 AM
link   
reply to post by shaneslaughta
 


found the article here

it affected .gov and .mil domains and basically all emails/webtraffic to the sites would of been routed through China so while it would not have had any traffic for classified stuff any and all emails into the us goverment would of been read by china before the intended recipient and who knows what could of been read in those 18 mins? and theres always a chance of some idiot sending themselves an email of a classified document after working on it from home



posted on Dec, 7 2013 @ 08:26 AM
link   
read the wired story...this was around the 2008 collapse...seems more than coincidental....remember that most of the 2008 problem came from the entirely unregulated derivative market, with untold trillions of dollars in deals coursing around the globe...someone made money, or someone covered their ass.



posted on Dec, 7 2013 @ 08:27 AM
link   

jimmyx
2nd post wrong

edit on 7-12-2013 by jimmyx because: (no reason given)



posted on Dec, 7 2013 @ 08:28 AM
link   
reply to post by Maxatoria
 


Thanks for the link.



posted on Dec, 7 2013 @ 08:57 AM
link   

shaneslaughta
reply to post by GArnold
 


It could be anyone, anywhere. Thus is the downfall of the internet. The inter-connectivity of the net, and how it routes data through nodes. Its also how the net is so stable, routing the data through endpoint nodes that respond fastest.

The whole system is flawed from a security standpoint.


Sort of exactly..

It is designed this way so that there would always be a connection between point A and point B. It's designed to find a stable route, not necessarily the fastest.

It was very good back in the 60's & 70's.

What is more worrying to me is the amount of unencrypted stuff people are sending willy nilly over the net thinking they have an iota of privacy and wondering why there are people snaffling up terabytes of it..



posted on Dec, 7 2013 @ 09:05 AM
link   
reply to post by winofiend
 


By fastest i mean the lowest latency, not speed of the host.

The truly scary part is that the packets that hold even secure data have a hash that holds the decryption key.
While the packet can not be tampered with in route, it can be copied and then unencrypted.

The quieter you are, the more your able to hear.



posted on Dec, 7 2013 @ 11:24 AM
link   
reply to post by shaneslaughta
 


I still tend to think evidence will end up proving it was a state actor. I cannot believe this is joe blow anonymous or a similar group behind this. In my opinion it had to be someone with funds behind them and the actual ability to do this for so long without being caught.

The US has been tapping data since 2001 at leeast. Other countries with or without Snowden had to suspect we could do it. They have to had plans to deal with it and apparatus in place to make it happen.


The Chinese have been breaking into American systems for a long time. I suspect if they can do it... So can Russia. China has 1.4 Billion People. They have the highest percentage of people born who turn out with Genius IQs on the planet. When you combine the population and the rate of genius in my mind that makes for a very dynamic opponent who most likely has a vastly superior number of IT types than the US has at its disposal.




edit on 7-12-2013 by GArnold because: (no reason given)

edit on 7-12-2013 by GArnold because: (no reason given)



posted on Dec, 7 2013 @ 01:32 PM
link   
reply to post by shaneslaughta
 


When I did network maintenance at a small non-profit 10 years ago, I always received secure packets through FTP methods, but maybe that was then. And isn't it FTP that is being used by global members of the nuclear community to exchange information and questions about nuclear power plants? At any rate, the global nuclear community does seem to have a secure internet communication protocol, whatever it is.

Such "gaping holes" in the internet may be how security problems have arisen with the ownership of bitcoins. Some say that bitcoins are a DARPA scheme, tht every large holder of bitcoins has been robbed. The idea is to get people to use bitcoins then take them from so many people that the people demand a chip implant to facilitate safe bitcoins transactions. Etc. etc., you can see where that theory is going.

edit on 12/7/2013 by Uphill because: (no reason given)



posted on Dec, 7 2013 @ 02:48 PM
link   
reply to post by pandersway
 


These are all thought-provoking comments and they have given me quite an insight into the workings of the net I wasn't completely aware of.



posted on Dec, 7 2013 @ 02:57 PM
link   
reply to post by pandersway
 




I have always had an adversion to internet banking as a result. So perhaps my paranoia is unfounded


No it isn't... Your computer is very vulnerable especially if you aren't using an open source OS you have no clue or control of what it going on in your machine. In any case I share your distrust and it seems to be the only rational outcome. I also do not do banking from my computer and even if I take steps to secure it I think of it as being fully accessible to external access and so act accordingly.



posted on Dec, 7 2013 @ 03:13 PM
link   
reply to post by Panic2k11
 


Just about everyone I know does internet banking and uses their credit cards over the net....I've been the odd ball because I just know that if the security pgms, encryption coding etc is man-made, it can be hacked into. It's good to read others who share my concerns.




top topics



 
13
<<   2 >>

log in

join