advertising information
   personal technology

 custom news
 Headline News brief
 daily almanac
 CNN networks
 CNN programs
 on-air transcripts
 news quiz

CNN Websites
 video on demand
 video archive
 audio on demand
 news email services
 free email accounts
 desktop headlines

 message boards




Hackers can turn network cameras, microphones on you

April 16, 1999
Web posted at: 12:02 p.m. EDT (1602 GMT)

by Bob Brewin

Federal Computer Week
hacker graphic

   Insurgency on the Internet

   For more computing stories


(IDG) -- Do you have a microphone or video camera connected to your computer or network? If you value your privacy, turn those devices off, a top Army computer protection official warned today.

Philip Loranger, chief of the Command and Control Protect Division in the Army's Information Assurance Office, demonstrated how anyone can attack a network and turn on any camera or microphones connected to that network with what he called "not very sophisticated hacker tools" downloaded from the Internet.

Loranger, who conducted an attack on a dial-up military network in Columbia, Md., from an Association of U.S. Army Information Assurance symposium in Falls Church, Va., said the .mil system he managed to penetrate -- and whose identity he would not disclose -- did not have any intrusion-detection system despite the spurt of recent publicity about an increase in hacker attacks. Using "point and click" hacker tools, Loranger said he cracked three out of seven passwords on the system.

  Federal Computer Week home page
  Federal Computer Week's Y2K resource page
 Reviews & in-depth info at's personal news page's products pages
  Questions about computers? Let's editors help you
  Subscribe to's free daily newsletters
  Search in 12 languages
 News Radio
 * Fusion audio primers
 * Computerworld Minute

Once inside the network, Loranger said he then probed the network and discovered a "read/write password file" that allowed him to delete the "super-user" password, allowing him to create a super-user password for himself, giving him free reign over the system. Loranger said this then allowed him to search the system for any microphones or cameras connected to it and then turned them on. "I can capture conversations and bring them back to my own computer," Loranger said, "and I can turn on video cameras and bring pictures back."

The Army conducted this "white-hat attack" after warning the target facility to expect it, Loranger explained, but the lack of intrusion-detection devices did not provide the system's users with any warning "until I launched a denial-of-service attack and brought the system down."

Loranger said he conducted the demonstration to emphasize that hackers use information warfare attacks to do more than just cripple computers or steal information located on the network. The networks also can serve as real-time windows into the physical world outside the network.

How do you define a hacker?

Canadian hackers attack 13 major corporate sites
April 8, 1999
Infamous computer hacker pleads guilty in deal with government
March 26, 1999
Disgruntled employees are newest kind of hacker
March 15, 1999
DOD confirms cyberattack 'something new'
March 6, 1999
Computer hacking in Russia cheap and widespread
March 5, 1999

DOD adds attack capability to cyberwar
White-hat hacking: Separating the hype from the reality
New devices to foil PC snoops
(PC World Online)
Hackers spar over cyberwar on Iraq, China
(The Industry Standard)
Hacker lessons
Want security? See what hacker does with a cookie
You've been hacked
(The Industry Standard)

Note: Pages will open in a new browser window
External sites are not endorsed by CNN Interactive.

U.S. Army
ICSA Information Security Magazine
AntiOnline - Computer Security - Hacking and Hackers
Telstra Corporation: Computer and Network Security Reference Index

Note: Pages will open in a new browser window
External sites are not endorsed by CNN Interactive.

Enter keyword(s)   go    help

Back to the top   © 2001 Cable News Network. All Rights Reserved.
Terms under which this service is provided to you.
Read our privacy guidelines.