Tag Archive for: origin

Origin Of Wireless Security: The Marconi Radio Hack Of 1903


The place is the historic lecture theater of the Royal Institution in London. The date is the 4th of June 1903, and the inventor, Guglielmo Marconi, is about to demonstrate his new wireless system, which he claims can securely send messages over a long distance, without interference by tuning the signal.

The inventor himself was over 300 miles away in Cornwall, preparing to send the messages to his colleague Professor Fleming in the theater. Towards the end of Professor Flemings lecture, the receiver sparks into life, and the morse code printer started printing out one word repeatedly: “Rats”. It then spelled out an insulting limerick: “There was a young man from Italy, who diddled the public quite prettily”. Marconi’s supposedly secure system had been hacked.

Nevil Maskelyne, circa 1903. Wikipedia.
Nevil Maskelyne, circa 1903. From the Royal Institution.

The person behind this hack was Nevil Maskelyne, an inventor, magician, and general troublemaker who was a long-time rival of Marconi. He was the manager of a rival wireless company and had been involved in a number of disputes with Marconi over the patents that covered wireless telegraphy systems. He decided that the most effective way to show that Marconi’s claims were hollow was a practical demonstration.

In the trade journal The Electrician (the Hackaday of its time) he detailed how he hacked the system. One of the fundamental claims of Marconi was that because his system used a tuned signal, other signals would not interfere unless they were tuned to the same frequency. This, however, had not been proven to the satisfaction of Maskelyne, and he didn’t accept that the system was really secure. So, he set out to demonstrate this. But how could you prove this? In his account in The Electrican, he wrote that:

“When, however, it was pointed out to me that the practical demonstrations accompanying the lecture rendered independent tests possible, I at once grasped the fact that the opportunity was too good to be missed…The only hope, then, was to interpolate messages calculated to anger and “draw” somebody at the receiving end. If that could be done, there would be proof positive.”

His plan involved setting up a transmitter not far…

Source…

FBI, NSA say ongoing hacks at US federal agencies ‘likely Russian in origin’ – TechCrunch


The U.S. government says hackers “likely Russian in origin” are responsible for breaching the networks of at least 10 U.S. federal agencies and several major tech companies, including FireEye and Microsoft.

In a joint statement published Tuesday, the FBI, the NSA and Homeland Security’s cybersecurity advisory unit, CISA, said that the government was “still working to understand the scope” of the breach, but that the breaches are likely an “intelligence gathering effort.”

The compromises are “ongoing,” the statement said.

The statement didn’t name the breached agencies, but the Treasury, State and the Department of Energy are among those reported to be affected.

“This is a serious compromise that will require a sustained and dedicated effort to remediate,” the statement said. “The [joint agency effort] will continue taking every necessary action to investigate, remediate, and share information with our partners and the American people,”

News of the widespread espionage campaign emerged in early December after cybersecurity giant FireEye, normally the first company that cyberattack victims call, discovered its own network had been breached. Soon after, it was reported that several government agencies had also been infiltrated.

All of the victims are customers of U.S. software firm SolarWinds, whose Orion network management tools are used across the U.S. government and Fortune 500 companies. FireEye said that hackers broke into SolarWinds’ network and pushed a tainted software update to its customers, allowing the hackers to easily break into any one of thousands of companies and agencies that installed the backdoored update.

Some 18,000 customers downloaded the backdoored software update, but the government’s joint statement said that it believes only a “much smaller number have been compromised by follow-on activity on their systems.”

Several news outlets have previously reported that the hacks were carried out by a Russian intelligence group known as APT 29, or Cozy Bear, which has been linked to several espionage-driven attacks, including attempting to steal coronavirus vaccine research.

Tuesday’s joint statement would be the first…

Source…

Activating validation services for route origin, TWNIC continues to safeguard Internet routing security with RPKI

People are growingly reliant on the Internet for work, school and daily activities. The impact to people’s life will be unthinkable should the Internet suddenly stop working. Border Gateway Protocol …
internet security – read more