Go Back  PPRuNe Forums > Aircrew Forums > Military Aviation
Reload this Page >

USAF COMSEC Breach

Wikiposts
Search
Military Aviation A forum for the professionals who fly military hardware. Also for the backroom boys and girls who support the flying and maintain the equipment, and without whom nothing would ever leave the ground. All armies, navies and air forces of the world equally welcome here.

USAF COMSEC Breach

Thread Tools
 
Search this Thread
 
Old 29th Jul 2023, 23:24
  #1 (permalink)  
Ecce Homo! Loquitur...
Thread Starter
 
Join Date: Jul 2000
Location: Peripatetic
Posts: 17,545
Received 1,678 Likes on 773 Posts
USAF COMSEC Breach

Possibly related to this? https://www.pprune.org/jet-blast/653...-backdoor.html

Just secure real time radios from the look of it - not intel data or access to secure internet data?

https://www.theguardian.com/us-news/...cal-compromise

Pentagon hit by ‘critical compromise’ of US air force communications – report

The Pentagon is investigating a “critical compromise” of communications across 17 US air force facilities, according to reports.

The US department of defense’s investigation comes amid a tip from a base contractor that a 48-year-old engineer at the Arnold air force base in Tennessee had taken home various government radio technologies, Forbes first reported Friday.

According to a search warrant obtained by investigators and reviewed by Forbes, the equipment allegedly taken by the engineer cost nearly $90,000. It also added that when law enforcement agents searched his home, they found that he had “unauthorized administrator access” to radio communication technology used by the Air Education and Training Command (AETC), which is one of the nine major commands of the air force and in turn affected 17 defense department installations.

Investigators also found an open computer screen that showed the engineer running a Motorola radio programming software. According to the warrant, the software “contained the entire Arnold air force base (AAFB) communications system,” Forbes reported.

The outlet also reported that, according to the warrant, a document detailing the forensics on technologies seized from the engineer’s home revealed that he had a USB which contained “administrative passwords and electronic system keys” for the AETC radio network.

Other items seized included flash drives that contained “local law enforcement radio programming files” and “Motorola radio programming files” which presented a warning banner that indicated they were government property.

Installer files which were recovered in the search opened with a “CONFIDENTIAL RESTRICTED” pop-up, according to Forbes.

The warrant also recounted how witnesses and co-workers informed investigators that the engineer had allegedly “sold radios and radio equipment, worked odd hours, was arrogant, frequently lied, displayed inappropriate workplace behavior and sexual harassment, had financial problems, and possessed [Arnold air force base land mobile radio] equipment”.

It added that a colleague had reported him twice due to “insider threat indicators” as well as unauthorized possession of air force equipment, according to investigators.

Investigators also reported to have found evidence which indicated that the searched contractor had possible access to FBI communications, as well as Tennessee state agencies, Forbes reported. The FBI is working alongside the air force on the investigation, according to the outlet.

Forbes has not yet disclosed the engineer’s name as he has not been charged. However, the outlet reported that according to his LinkedIn page, the engineer has an extensive history in cybersecurity and radio communications.

“He claims to have carried out numerous tests of the Arnold air force base’s security, improved protection of radio communications on the site and had knowledge of the encryption used on government data,” Forbes reported.

The Forbes report comes only three months after one of the worst leaks in US intelligence in over a decade. In that case, 21-year-old Jack Teixeira, an air national guardsman at the time, was arrested on suspicion of leaking hundreds of Pentagon documents.

He has since been charged under the Espionage Act.…
ORAC is offline  
Old 30th Jul 2023, 06:58
  #2 (permalink)  
 
Join Date: Oct 2018
Location: Ferrara
Posts: 8,549
Received 374 Likes on 220 Posts
Jeez - a guy does some work at home in his own time and this is the thanks he gets..............
Asturias56 is offline  
The following users liked this post:
Old 30th Jul 2023, 09:46
  #3 (permalink)  
 
Join Date: Dec 2004
Location: Cluedo
Posts: 259
Received 35 Likes on 14 Posts
Puts a whole different slant to “working from home”!
Professor Plum is offline  
Old 30th Jul 2023, 10:56
  #4 (permalink)  
 
Join Date: Oct 2007
Location: York
Posts: 627
Received 23 Likes on 14 Posts
Talking of COMSEC these days what are the RAF rules regarding mobile phones? People cannot seem to do without the by their side in this day and age. Even switched off they seem able the give out information as to a person’s whereabouts.
dctyke is offline  
Old 30th Jul 2023, 11:00
  #5 (permalink)  
 
Join Date: May 2006
Location: Around
Posts: 1,210
Received 118 Likes on 54 Posts
Originally Posted by dctyke
Talking of COMSEC these days what are the RAF rules regarding mobile phones? People cannot seem to do without the by their side in this day and age. Even switched off they seem able the give out information as to a person’s whereabouts.
Not allowed in sensitive areas.
downsizer is offline  
Old 30th Jul 2023, 11:58
  #6 (permalink)  
 
Join Date: Feb 2006
Location: The Alps
Posts: 3,168
Received 101 Likes on 54 Posts
Never heard of Arnold AFB, initially thought it was a Guard or Reserve base, till googled it... Arnold Engineering Development Centre ....engine and rocket propulsion test facility that falls under Air Force Material Command

https://www.arnold.af.mil/About-Us/

https://media.defense.gov/2021/Jun/2...ES%20GUIDE.PDF

It is also interesting in the article that AETC was the main subject of his hacks

cheers


chopper2004 is offline  
Old 31st Jul 2023, 02:50
  #7 (permalink)  
 
Join Date: Mar 2014
Location: Oviedo Florida
Posts: 21
Likes: 0
Received 0 Likes on 0 Posts
Originally Posted by Asturias56
Jeez - a guy does some work at home in his own time and this is the thanks he gets..............
And he was ratted out by another contractor. Probably the radio vendor. It would not be the first time. Unless he had access to the encryption key management facility, the radios would hear nothing encrypted. Even more doubtful any FBI commos were compromised. I would guess the "equipment" was actually software valued at $90K. Very similar thing happened in Canada a couple years ago. The target was the communications manager for a major city. He had some software on a USB, also ratted out by a co worker. The major vendor pressed charges. To date no criminal indictment.
JamaicaJoe is offline  
Old 31st Jul 2023, 07:17
  #8 (permalink)  
 
Join Date: Oct 2018
Location: Ferrara
Posts: 8,549
Received 374 Likes on 220 Posts
"It also added that when law enforcement agents searched his home, they found that he had “unauthorized administrator access” to radio communication technology used by the Air Education and Training Command (AETC)"

So who gave him that? No doubt someone at ATEC who couldn't be bothered to have to come over and type in an access code every time a small time contractor needed access?
Asturias56 is offline  
Old 31st Jul 2023, 08:39
  #9 (permalink)  
 
Join Date: Apr 2006
Location: East Anglia
Posts: 759
Received 1 Like on 1 Post
Talking of COMSEC these days what are the RAF rules regarding mobile phones?
IMHO As all/most of the telephones have been withdrawn from offices etc. personnel rely on their mobiles/zoom for everything, there appears to be zero control.
FantomZorbin is offline  
Old 31st Jul 2023, 13:43
  #10 (permalink)  
 
Join Date: Aug 2007
Location: not scotland
Posts: 359
Received 60 Likes on 28 Posts
Originally Posted by FantomZorbin
IMHO As all/most of the telephones have been withdrawn from offices etc. personnel rely on their mobiles/zoom for everything, there appears to be zero control.
Incorrect. Offices do still have phones but most routine business is conducted using Teams or Skype For Business. Especially for those who work remotely.
All areas are colour coded and those which are amber or red do not allow mobile phones. All mobiles are kept outside these rooms.
Toadstool is offline  

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are Off
Pingbacks are Off
Refbacks are Off



Contact Us - Archive - Advertising - Cookie Policy - Privacy Statement - Terms of Service

Copyright © 2024 MH Sub I, LLC dba Internet Brands. All rights reserved. Use of this site indicates your consent to the Terms of Use.