News in Brief

Israeli breakthrough and special ops RFI

Multiple Mobile Devices (Shutterstock)

Researchers at Ben-Gurion University have discovered a way that hackers could access secure computers via a mobile phone without a cellular connection.

Israelis unveil off-line access 'breakthrough'

Researchers in the cybersecurity labs at Israel's Ben-Gurion University have found what they're calling a breakthrough method that can be used to remotely access critical infrastructure and federal computers without going online.

The method, dubbed AirHopper by researchers in a paper prepared for a conference on malware sponsored by the Institute of Electrical and Electronics Engineers, can access small sets of data from an isolated computer via a mobile phone without using a cellular or Wi-Fi network.

In other words, the technique circumvents the "air gap" isolation that some critical infrastructure providers and federal network operators rely on to protect sensitive information.

The technique takes advantage of radio frequencies generated by a computer's display screen to transmit data from the computer to a mobile phone, said Dudu Mimran, chief technology officer at Ben Gurion's cybersecurity labs. Mobile phones usually come equipped with FM radio receivers, and software can intentionally create radio emissions from the screen.

Mimran said AirHopper shows that textual and binary data can be taken from a physically isolated computer and moved to a mobile phone from as close as nine to as far as 20 feet away. Researchers said they revealed the technique at the conference because they wanted to start a discussion of how to mitigate the risk.

Special ops wants next-gen device-cracking tools

Special operations forces are looking for the next generation of devices that will allow them to quickly crack into computing devices retrieved on the battlefield, Defense Systems reports.

In a request for information, the Special Operations Command said it and other organizations within the Defense Department and intelligence community want to evaluate the latest tactical document and media exploitation tools and set strict time frames for what those tools can accomplish.

About the Author

Connect with the FCW staff on Twitter @FCWnow.

Featured

  • Defense
    Ryan D. McCarthy being sworn in as Army Secretary Oct. 10, 2019. (Photo credit: Sgt. Dana Clarke/U.S. Army)

    Army wants to spend nearly $1B on cloud, data by 2025

    Army Secretary Ryan McCarthy said lack of funding or a potential delay in the JEDI cloud bid "strikes to the heart of our concern."

  • Congress
    Rep. Jim Langevin (D-R.I.) at the Hack the Capitol conference Sept. 20, 2018

    Jim Langevin's view from the Hill

    As chairman of of the Intelligence and Emerging Threats and Capabilities subcommittee of the House Armed Services Committe and a member of the House Homeland Security Committee, Rhode Island Democrat Jim Langevin is one of the most influential voices on cybersecurity in Congress.

Stay Connected

FCW INSIDER

Sign up for our newsletter.

I agree to this site's Privacy Policy.