advertising information

CNN.com
 MAIN PAGE
 WORLD
 ASIANOW
 U.S.
 LOCAL
 POLITICS
 WEATHER
 BUSINESS
 SPORTS
 TECHNOLOGY
   computing
   personal technology
   space
 NATURE
 ENTERTAINMENT
 BOOKS
 TRAVEL
 FOOD
 HEALTH
 STYLE
 IN-DEPTH

 custom news
 Headline News brief
 daily almanac
 CNN networks
 CNN programs
 on-air transcripts
 news quiz

  CNN WEB SITES:
CNN Websites
 TIME INC. SITES:
 MORE SERVICES:
 video on demand
 video archive
 audio on demand
 news email services
 free email accounts
 desktop headlines
 pointcast
 pagenet

 DISCUSSION:
 message boards
 chat
 feedback

 SITE GUIDES:
 help
 contents
 search

 FASTER ACCESS:
 europe
 japan

 WEB SERVICES:
COMPUTING

Hackers can turn network cameras, microphones on you

April 16, 1999
Web posted at: 12:02 p.m. EDT (1602 GMT)

by Bob Brewin

From...
Federal Computer Week
hacker graphic

 ALSO:
   Insurgency on the Internet

   For more computing stories

  

(IDG) -- Do you have a microphone or video camera connected to your computer or network? If you value your privacy, turn those devices off, a top Army computer protection official warned today.

Philip Loranger, chief of the Command and Control Protect Division in the Army's Information Assurance Office, demonstrated how anyone can attack a network and turn on any camera or microphones connected to that network with what he called "not very sophisticated hacker tools" downloaded from the Internet.

Loranger, who conducted an attack on a dial-up military network in Columbia, Md., from an Association of U.S. Army Information Assurance symposium in Falls Church, Va., said the .mil system he managed to penetrate -- and whose identity he would not disclose -- did not have any intrusion-detection system despite the spurt of recent publicity about an increase in hacker attacks. Using "point and click" hacker tools, Loranger said he cracked three out of seven passwords on the system.

MORE COMPUTING INTELLIGENCE
IDG.net   IDG.net home page
  Federal Computer Week home page
  Federal Computer Week's Y2K resource page
 Reviews & in-depth info at IDG.net
  IDG.net's personal news page
  IDG.net's products pages
  Questions about computers? Let IDG.net's editors help you
  Subscribe to IDG.net's free daily newsletters
  Search IDG.net in 12 languages
 News Radio
 * Fusion audio primers
 * Computerworld Minute
   

Once inside the network, Loranger said he then probed the network and discovered a "read/write password file" that allowed him to delete the "super-user" password, allowing him to create a super-user password for himself, giving him free reign over the system. Loranger said this then allowed him to search the system for any microphones or cameras connected to it and then turned them on. "I can capture conversations and bring them back to my own computer," Loranger said, "and I can turn on video cameras and bring pictures back."

The Army conducted this "white-hat attack" after warning the target facility to expect it, Loranger explained, but the lack of intrusion-detection devices did not provide the system's users with any warning "until I launched a denial-of-service attack and brought the system down."

Loranger said he conducted the demonstration to emphasize that hackers use information warfare attacks to do more than just cripple computers or steal information located on the network. The networks also can serve as real-time windows into the physical world outside the network.



MESSAGE BOARD:
How do you define a hacker?

RELATED STORIES:
Canadian hackers attack 13 major corporate sites
April 8, 1999
Infamous computer hacker pleads guilty in deal with government
March 26, 1999
Disgruntled employees are newest kind of hacker
March 15, 1999
DOD confirms cyberattack 'something new'
March 6, 1999
Computer hacking in Russia cheap and widespread
March 5, 1999

RELATED IDG.net STORIES:
DOD adds attack capability to cyberwar
(FCW)
White-hat hacking: Separating the hype from the reality
(InfoWorld)
New devices to foil PC snoops
(PC World Online)
Hackers spar over cyberwar on Iraq, China
(The Industry Standard)
Hacker lessons
(Computerworld)
Want security? See what hacker does with a cookie
(Computerworld)
You've been hacked
(The Industry Standard)

Note: Pages will open in a new browser window
External sites are not endorsed by CNN Interactive.


RELATED SITES:
U.S. Army
hackerz.com
ICSA Information Security Magazine
AntiOnline - Computer Security - Hacking and Hackers
Telstra Corporation: Computer and Network Security Reference Index

Note: Pages will open in a new browser window
External sites are not endorsed by CNN Interactive.

 LATEST HEADLINES:
SEARCH CNN.com
Enter keyword(s)   go    help

Back to the top   © 2001 Cable News Network. All Rights Reserved.
Terms under which this service is provided to you.
Read our privacy guidelines.