690
Comments (16)
sorted by:
9
deleted 9 points ago +9 / -0
7
Sun_Tzu 7 points ago +7 / -0

This is my explanation every time someone in the military complains about not being able to use USB drives. Sucks...but there is a good reason!

3
deleted 3 points ago +3 / -0
3
deleted 3 points ago +3 / -0
2
deleted 2 points ago +2 / -0
2
deleted 2 points ago +2 / -0
2
deleted 2 points ago +2 / -0
2
PlateOwner 2 points ago +2 / -0

The security expert colonel today said they disable all USB ports.

2
rusty_spittoon 2 points ago +2 / -0

rubber duckies are all in USB form, if you think you need more than 1 second to hack a machine that someone does via the interface that takes minutes you are mistaken.

A rubber duckie will do it in a second and would not look suspicious at all.

For those who think im crazy talking about rubber duckies over here its basically a USB you plug in and it runs a pre-programmed macro that takes a second, these are grade 1 to any hacker and not uncommonly owned

1
rusty_spittoon 1 point ago +1 / -0

replying to myself because editing posts is always fucky, I even own one myself and I am by no means a "1337 h4x0r" just a blue collar working stiff

1
kono_hito_wa 1 point ago +1 / -0

If a system has any way of getting data into/out of the system, it can be compromised. How exactly would you get the vote tallies and audit trail without I/O?

1
jcpapillon [S] 1 point ago +1 / -0

There are ways, but they are not as easy.

Not hard. Not a new technology, only not off the shelf stuff a kid could put together and sell to counties for big markups.

2
kono_hito_wa 2 points ago +2 / -0

My point is there's nothing inherently insecure about USB. Having a Windows machine running on a secure network with autorun enabled is the problem. It could have just as easily happened with a CD or DVD or floppy.

2
IndyTrumper 2 points ago +2 / -0

LOL he said "Floppy" man I am old.. sigh

1
jcpapillon [S] 1 point ago +1 / -0

Yes, CD and DVD are same problem.

Problem is also that even with autorun off, it only takes one person to inert a USB and run something on the network.

Even if Biden got such a big margin that he actually won and there was no cheating -- the chaos of this election is a BIG win for China which has been telling its population for decades that "democracy is bad, and elections are chaos."

I think you have to be naive to think they were not trying to mess things up. It is also pretty clear that we made it easy for them.

1
jcpapillon [S] 1 point ago +1 / -0

Image from the following article:

https://spectrum.ieee.org/telecom/security/the-real-story-of-stuxnet

Stuxnet, if you are not aware, was a worm created by ??someone?? and was designed to destroy centrifuges used in the Iranian nuclear program b making the displayed RPM not match the physical RPM so they would not notice the problem. It was said to be distributed by infecting random computers and USB in the city where it was needed, and waiting for a worker to walk it into the air gapped facilty and plug it in to use.

This was in 2010.

Some older examples of using cyberwar from this article:

https://isssource.com/stuxnet-loaded-by-iran-double-agents/

It is interesting to note Stuxnet was not the first virus used by the U.S. military intelligence to try and disable opponents. In the 1980s, the United States had considerable success at planting viruses inside Soviet military-industrial structure that could be activated in time of war, a process still continuing with China. “We put in bugs inside the Soviet computers to feed back satellite information that had been ‘leeched’ off hard drives, in the Soviet Defense Ministry and others,” said a former U.S. intelligence official.