08/28/13

Tor Usage goes UP PirateBay, Iran-Syria and Google-play Orbot

USCyberLabs Stats of the Tor Network Aug-27

USCyberLabs Stats of the Tor Network

gAtO hEaR _UPDATE-

Sudden rise in direct Tor users



On Tuesday 27th, Roger Dingledine drew attention to the huge increase of Tor clients running [14]. It seems that their number has doubled since August 19th according to the count of directly connecting users [15]. According to Roger this is not just a fluke in the metrics data. The extra load on the directory authorities is clearly visible [16], but it does not look that the overall network performance are affected so far [17]. The cause is still unknown, but there are already speculations about the Pirate Browser [18] or the new “anti-piracy” law in Russia which is in force since August, 1st [19]. As Roger pointed out, ?some good solid facts would sure be useful.?

[14] https://lists.torproject.org/pipermail/tor-talk/2013-August/029582.html

[15] https://metrics.torproject.org/users.html?graph=direct-users&start=2013-05-29&end=2013-08-27&country=all&events=off#direct-users

[16] https://metrics.torproject.org/network.html#dirbytes

[17] https://metrics.torproject.org/performance.html

[18] https://lists.torproject.org/pipermail/tor-talk/2013-August/029584.html

[19] https://lists.torproject.org/pipermail/tor-talk/2013-August/029583.html



Ever since the the NSA Prism program came out something else is going on in Tor. People want privacy and they will use anything they can to get it. Tor is one solution that a lot of people know about but there are other factors about the increase.

Piratebay.sx and it’s users are doing a lot more stuff with the new browser - There has not been a sustained increase in search traffic for the Pirate Browser on Google. Tor and “Tor browser” haven’t shown a spike in search, either. Could it be from users in Syria?  Also note that the Google Play Store has been unblocked in Iran, allowing distribution of Orbot/Orweb in that country to phones with the Play Store app installed (partial bootstrapping problem).

Syria had a spike from 1000 to 4000 but that’s a tiny fraction of the recent increase. Iran doubled from 4000 to 8000 which is also only a part of the increase. Is there a page listing each graph by country or overlapping them all?

The Tor Project also pushed out Orbot v12 to Google Play in the last few weeks – 2 separate updates. That would not account for all of the increase, but it could have prodded enough existing users who had not used Orbot in awhile to start the app up again. We have also seen about 75,000 new installs over the last 3 months.

So we have a lot of factors as the Tor network grows larger everyday- gATo oUt

 

06/12/13

Government use of Cyber Weaponized Exploits

gAtO rEaD- The government is buying hackers exploits – not to stop these sophisticated cyber exploits but to use these tools against it’s own people- they are using the tools to infiltrate computer networks worldwide, leaving behind spy programs and cyber-weapons that can disrupt data or damage systems.network

The core problem: Spy tools and cyber-weapons rely on vulnerabilities in existing software programs, and these hacks would be much less useful to the government if the flaws were exposed through public warnings. So the more the government spends on offensive techniques, the greater its interest in making sure that security holes in widely used software remain unrepaired. So your computer is vulnerable and the governments knows it and will not disclose this information, but use it against you to place cookies,RAT’s or other spyware into your computer -maybe- I trust our government don’t you?

If you got nothing to hide, you should not be worried… right????

So our Tax dollars are going to Hackers and cyber criminals that sell these exploits all over the world. As a tax payer I don’t like this part at all. But the worst part is by us taking the lead of cyber offensive cyber tools -example.. Stuxnet – it is a plan book for other countries to do the same. So what we do in cyberspace has become socially acceptable to do in cyberspace and then we bitch about China. I don’t get it – mEoW

Officials have never publicly acknowledged engaging in offensive cyber-warfare, though the one case that has beenmost widely reported – the use of a virus known as Stuxnet to disrupt Iran’s nuclear-research program – was lauded in Washington. Officials confirmed to Reuters previously that the U.S. government drove Stuxnet’s development, and the Pentagon is expanding its offensive capability through the nascent Cyber Command.

Then you have the Prism disclosure and PoW- US Cyber Agents Disrupt Publication of Popular Al Qaeda Magazine – This means that Obama’s cyber military is potentially capable of more targeted attacks, specified at damaging particular pieces of information or infrastructure. I wonder where they got those vulnerabilities? maybe some bad guys—/Nato_cyber_plat

What worries me is as the U.S engages in these attacks our enemies are learning what is acceptable in cyberwar. So we must be careful not to lose the fact that everyone is watching what we do and how we treat cyberspace and others governments will follow, defensive and offensive, they are learning from the best the U.S. Government -gAtO oUt

ref: http://www.reuters.com/article/2013/05/10/us-usa-cyberweapons-specialreport-idUSBRE9490EL20130510

 

http://www.businessinsider.com/us-cyber-agents-disrupt-inspire-magazine-2013-6

 

 

03/24/13

Tor is NOT the ONLY Anonymous Network

gAtO fOuNd – this very interesting and wanted to share -

Tor does some things good, but other anonymous networks do other things better. Only when used together do they work best. And of course you want to already know how to use them should something happen to Tor and you are forced to move to another network.fin_07

Try them! You may even find something interesting you cannot find on Tor!

Anonymous networks

These are well known and widely deployed anonymous networks that offer strong anonymity and high security. They are all open source, in active development, have been online for many years and resisted attack attempts. They run on multiple operating systems and are safe to use with default settings. All are well regarded.

  • Tor – Fast anonymous internet access, hidden websites, most well known.
  • I2P – Hidden websites, anonymous bittorrent, mail, out-proxy to internet, other services.
  • Freenet – Static website hosting, distributed file storage for large files, decentralized forums.

Less well known

Also anonymous networks, but less used and possibly more limited in functionality.

  • GnuNet – Anonymous distributed file storage.
  • OneSwarm – Bittorrent, has a non-anonymous mode, requires friends for anonymity.
  • RetroShare – File-sharing, chat, forums, mail. Requires friends, and not anonymous to those friends, only the rest of the network.
  • Omemo – Distributed social storage platform. Uncertain to what extent it is anonymous.

Non-free networks

These are anonymous networks, but are not open source. Therefore their security and anonymity properties is hard to impossible to verify, and though the applications are legit, they may have serious weaknesses. Do not rely on them for strong anonymity.

  • Osiris – Serverless portal system, does not claim to provide any real anonymity.

In development

  • Phantom – Hidden Services, native IPv6 transport.
  • GlobaLeaks – Open Source Whistleblowing Framework.
  • FreedomBox – Project to create personal servers for distributed social networking, email and audio/video communications.
  • Telex – A new way to circumvent Internet censorship.
  • Project Byzantium – Bootable live distribution of Linux to set up wireless mesh nodes with commonly available hardware.
  • Hyperboria A distributed meshnet built on cjdns.

Routing Platforms

These are internets overlaid on the internet. They provide security via encryption, but only provides weak to none anonymity on their own. Only standard tools such as OpenVPN and Quagga are required to connect. Responsibility for a sufficiently anonymous setup is placed on the user and their advertised routes. More suited for private groups as things out in the open can be firewalled by other participants. Can be layered above or below other anonymity nets for more security and fun.

  • Anonet – AnoNet2, a more open replacement for AnoNet1.
  • dn42 – Another highly technical routing community.
  • CJDNS, an IPV6 overlay network that provides end to end encryption. It is not anonymous by itself.

Alternative Internet

  • Netsukuku – A project that aims to build a global P2P online network completely independent from the Internet by using Wi-Fi. The software is still in active development, although the site is no longer updated. A new site is in progress of being built.
  • Many other wireless communities building mesh networks as an alternative to the Internet, e.g. Freifunk, http://guifi.net and many more around the globe. see also

Alternative domain name systems

  • Namecoin – Cryptocurrency with the added ability to support a decentralised domain name system currently as a .bit.
  • OpenNIC – A user controlled Network Information Center offering a democratic, non-national, alternative to the traditional Top-Level Domain registries.
  • Dot-P2P – Another decentralized DNS service without centralized registry operators (at July 18, 2012 page is not accessible and has not known anything about the status of project from February 2011).

See Also

02/3/13

Offensive Cyber Capabilities

Companies Need Offensive Cyber Capabilities

gAtO hEaR - about banks seek U.S Help on Iran Cyberattack’s. We hear about cyber attacks in the financial sector, the oil and energy sectors, then Leon Panetta warned perpetrators to cease hacking the US while we have all kinds of sanctions against Iran -/ this is insanity. Your telling unknown hackers (we suspected Iran) to  just stop, or what. What can we do to prevent them from launching cyber attacks against America.

So Iran has only 3 NAT-access points and 1 submarine cable (Al-Faw, Iraq submarine cable)

 

Then you have all these security people putting up defenses without building a firewall so bad-ass that they cannot do business. If we keep building these defenses it will get to a point where it defeats the purpose of the Internet. So what is the logical next move, offensive cyber weapons and capabilities. We can find these attacks and pinpoint the IP of where they are coming from then all we need is offensive tools to find them and do a seal-team 6 extraction of something like that and get the word out that we will find you and hunt you down.

One little hacker can keep a bank tied up for days in the middle of the desert. They could go after our traffic system, our rail system we know that SCADA is so messed up and in some cases open with defaults passwords. So we beat our chest like some mad gorilla and hope to scare these hackers.

My friends we must take initiative and find ways to counter these attacks no more just defense and I don’t mean a Ddos attack that can be circumvented. We need to plant Bot-nets on these people’s machines and monitor them and if we have to go physical and bring them to justice. Forget about Iran and let’s just talk about Chinese hacker attacks of our intellectual property. They just denied it and go about planning the next attack. We seen Skynet were thousands of computers were given a disk wipe and the blue screen of death. Why don’t we do the same to these hackers going after our infrastructure.

We must change our tactics and be a little more aggressive and become real cyber warriors not just defenders but attacking them and destroying their machines, their servers and routers. How about we just monitor the 1 submarine cable and 3 access points in Iran that should lead us to some of these people. The US monitors our own people then we stand by and allow other hostile countries to go and hack us. This is cyber insanity - gAtO OuT

 

09/24/12

Dark Heart botnet ToR-C2 BULLET proof server collector

gAtO fOuNd - this –// it’s crook selling to crooks take it at face value -/ but it does have some interesting ideas on what is out there in criminals hands and what is going on in the dark web. Now these are 10,000 yes 10k botnets can work in the clearWeb as well as Tor and i2p anonymized networks should cause some concern because normally we don’t monitor them.  Tor Domain-flux for both clearWeb and Tor – ( Tor Domain-flux- this is so easy to do but it’s a big feature) – VPN then Tor that will make this harder to find the botMaster. But the coolest feature is the i2p connection. Sorry boy’s and Ladies but Tor is getting old, i2p is beginning to glow and it’s a little different but very safe. It goes after (scanning)  WiFi and GPS tracking – So people sync your phone data to your computers data please…C&C and // one- BULLET proof server collector -

It not very hard to do this but – C&C and // one- BULLET proof server collector – is the sales pitch anyway I have obfuscated some links and names -find it your self – I know gAtO can build this so anyone can with some light reading – that comes out to .80 cents per bot for 10,000 bots -0ne c&c panel for $8,000 bucks – pretty cheap – oh yeah the readme comes in english too.

This modified Dark Heart bots and c&c in Tor ?12p ? 256-EAS encryption- We already have reports of it by different names but this was posted around Aug 7 2012.   Here is the –/ poor mans –Tor Domain-flux is so easy when you generate a hidden service it produces a key for your address in Tor onion land / just move the key to another directory and generate your new net key and so on and so on… Some of this is really well though out —/ but I don’t trust anyone and it’s so easy to build from scratch- gAtO oUt

—— – EDUCATIONAL – ONLY – ————— – EDUCATIONAL – ONLY – ————— – EDUCATIONAL – ONLY – ———

Dark Heart botnet— NOT – for sale $8000

Run on windows clients – I need 3 C&C server IP addresses to hardcode and obfuscate

bot coded in assembly no dependencies

Each build has maximum of 10k bots to ovoid widespread av detection.

Basic bot uses socks5.

built in ssh client

(fast-flux)

Bot is built with 30k pre generated 256 bit AES keys.

1 256 bit AES key for logs

1 256 bit AES key ssh

1 256 bit AES key socks 5

hwid it selects a pre-generated key 256 bit AES key.

Bot writes encrypted data into common file using stenography process injection

Download/Upload Socks5

Bot sends data to a collector bot via socks5 through ipv6 which makes NAT traversal a trivial matter.

Using ipv6 in ipv4 tunnel.

Collector bot assembly /tor and i2p Plug-ins C++ /Assuming 10k bots

Bots will be assigned into small groups of 25. And are assigned 400 collectors bots which is evenly 200 tor and 200 i2p.

Collector packages the encrypted logs and imports them into a .zip or rar archive and uses sftp to upload through tor to a bullet proof server Note the Ukraine is best know.

(Domain-flux .onion panel can be easily moved)

Using a Ubuntu Server on bullet proof server.  / Using tor and Privoxy. Panel can be routed through multiple cracked computers using proxychains and ssh.  / Server uses a simple .onion panel with php5 and apache2 and mysql. You might ask what happens if bullet proof server is down. The collector bots can be loaded with 5 .onion panels. If panel fails for 24 hours its removed from all Collectors and bot will go to the next one and so forth. A python Daemon runs and unzip the data and Imports it into a mysql database were it remains encrypted.

The bot master uses my Dark Umbrella.net panel to connect to the remote Bullet Proof server through a vpn and then through tor using ssh to run remote commands on server and sftp to upload and download. Running tor through a log less vpn through with a trusted exit node on the tor network. .net panel connects to mysql database database is decrypted on .NET panel (Note must real Bullet Proof hosting is not trust worthy this solves that issue) and imported into a local .mdb database. Then later the bot Master should encrypt database folder on true crypt. Commands are sent to bots individually rather then corporately like most bot nets. This allows for greater anonymity It will be possible to send commands corporately but strongly discouraged. Collector bots download and upload large files through i2p.

1.Connects remotely to rpc daemon through backconect and simplifying metasploit (Working)

2.Social network cracker. (Beta)

3.Statics. (Working)

4.Anonymity status. (Working)

5.Decrypt-er. Decryption codes in highly obfuscated.net limiting each build to 10k bots. (Working)

6.Daemon status (Working)

7.logs (Working)

8.Metasploit connects via rpc. (working)

9. GPS tracked Assets by Google maps and using net-book with a high powered external usb wifi attenas.

Starts an automatic attack if wep if wpa2 grabes handshake. If open starts basic arp spoofing attack. Common browser exploits. (alpha)

10.Teensy spread. (in development)

11.vnc back connect. (working)

12. Advanced Persistent threat. Fake Firefox, Fake Internet Explorer, Fake Chrome. Fake Windows Security Essentials. (in development allows for excellent custom Bot-master defined keyloging)

13. Dark search bot index file is downloaded allowing easy searching of hard drives. (Working)

14. voip logic bomb. bot computer is sent via a voip call file once played through voip the microphone hears mp3 file and the dormant payload is activated in bot that is the logic bomb. (Extra- Alpha)

Each Panel is hwid

1 unique build per Copy embedded into panel.

Everything is provided in English only manuals for setup: you need 3 servers for C&C and // one- BULLET proof server collector for -/ everything is working and can be setup within hours: Only serious players -  for sale $8000 -bitcoin – (obfuscated )1A9nBLgdhf4NJadXiBppqqU96AhbMBQrgV -

—— – EDUCATIONAL – ONLY – ————— – EDUCATIONAL – ONLY – ————— – EDUCATIONAL – ONLY – ————— – EDUCATIONAL – ONLY – ———

 

07/11/12

CyberPeace -not- CyberWar

gAtO sEe - In the last couple of days Gen. Keith Alexander has been pushing the Cyber War agenda. -The issues around warfare are very different in cyberspace than in the physical world, and the United States is looking into “alternative strategies,” said Alexander, while not offering further details. In another place he was telling us that the CIA will not use the new cyber laws to spy on our email. Ok so you gonna be a sheep and follow the word of the government. We won’t spy on you.

Alexander said “civil liberties and privacy can work harmoniously with cybersecurity”. Come on General your a nice guy, gAtO met you —/ you have a passion but every time you bring out —/ Oops there went the Power Grid, Oops.. there went the financial sector, scare me, scare me. I know it’s your job to secure our country to protect our nation cyber infrastructure. Don’t trample on our cyber right any more please.

Hay here is a solution for you use a Tor-.onion network-(any anonymized network) to tie your power grid, and/or your financial services. If you can’t close down Silk Road in onion-land your C&C for your power grid and financial services should be invisible to everyone except on a need to know. gAtO just save you 14 trillion in R&D…//

gAtO has not heard one word about Cyber Peace from any responsible government in the world. Everyone is looking for their own cyber posture, their own cyber weapons/ budget/ programs/ money// , but not one has said let’s work together to make it better for peace, guess there is no money in Cyber Peace. Espionage, spying is the job of governments why would they destroy their own tools, weapons and just tweak our cyber-rights a wee bit, for our cyber freedoms and safety, to protect our government and you -lol.

Here is a simple idea crowd-source our problems. The one major resource in cyber-space is number of people that can see the same message. In crowd-source we can give the facts and ask anyone to help solve city budgets, ways to harvest more vegetable/per vertical/ sq.ft. Ask people how would you protect our electric grid // you be surprised by the creative answers you get, OK some may be crazy but…//. It may not be the right solution, but the power of the minds of people collaborating is what this new technology is built for. FaceBook is about ME- Twitter is about the rest of the world- but the new winner is —/ Comments /— have become more important than the article-subject itself because the conversation within in the comments shows social communication and problem solving by the masses.

Let’s change the message to CyberPeace, everyone has a solution, but remember that all your comments are the new gold so watch what you say to that troll on huffpost— gAtO oUt

 

Read more: Alexander: U.S. looking for offensive alternatives in cyberspace – FierceGovernmentIT http://www.fiercegovernmentit.com/story/alexander-us-looking-offensive-alternatives-cyberspace/2012-07-11#ixzz20KW1Lcf2

05/31/12

Monitoring Cyber Iran and Syria in the ToR network

gAtO wAs mOnItOrInG – bad ToR-Relays and found that during this unrest in Iran and Syria. We have 17 bad ToR-Relays 95% in Iran and Syria. This is how the shut down the network to suppress information communication securely to the outside world. Time stamp is 05-31-2012 00:52:05 MET.
Tor Network Status – http://torstatus.blutmagie.de/index.php you can find all kinds of information about the .onion relays that make up the networks.
While back in cyber world —:Stuxnet – Flame – I can tell you that lot’s of Iranian site use older web apps , cms, jommla and they have vulnerabilities.
http://uscyberlabs.com/blog/2012/02/10/1890/
But they are educated and everyone learns from being attacked. When you underestimate your enemy you are going to lose.
Example :-gAtO been working on a ToR project and last night I was monitoring the ToR-Relays for bad ones and 15 out of 17 -ToR-Relays all doing exit node were Iranian and Syrians all bad and compromised. With the unrest in the news with Iran and Syria these two countries were playing with Tor-Relay nodes to extract exit information on dissidents. If they catch some dissident posting anti-Iran, anti-syria online and they will find their IP and kill them. In the middle-east hacktivist may pay the ultimate price and the CIA and others are communicating with the rebels using the ToR-.onion network the invisible web takes on a new importance during crisis time.

All goes underground under the radar but it show’s that they have an active cyber policy, with countermeasure and surveillance. These guy are fighting back anyway they can.

Cyber and culture must be understood, the more you invest in your infrastructure the more vulnerable you will become and how a society integrates the technology into it’s culture will make changes, trust me business will love it but in the middle east religion is very important geo-political tool and propaganda is the number one thing I see while surfing the Iran. Syria websites.

Today I see “cyber ambiguity” from Israel –On Tuesday, a day after a Moscowbased security company revealed that a new cyber weapon called “Flame” had struck Iran, Vice Premier and Minister of Strategic Affairs Moshe Ya’alon fueled speculation of Israeli involvement by praising Israeli technological prowess in response to a radio interview on the issue.

Israel, he said, was blessed with superior technology. “These achievements of ours open all kinds of possibilities for us,” he said.

Prime Minister Binyamin Netanyahu said when he spoke that evening that when it comes to cyberspace, the size of a country is insignificant – but that there is great significance to a country’s “scientific strength, and with that Israel is blessed.”
http://www.jpost.com/Features/FrontLines/Article.aspx?id=272264
As all these state actor play cyber games with cyber war, gATo will keep monitoring the ToR network to look and see and learn about societies in cyberspace -gATO oUt

05/20/12

Cyber Warrior Drones of War

 gAtO wAs – looking into the modern Air/Sea cyber warfare and came across these pictures from - cryptome.org this is really some cool shot and we can only imagine the future. In 5 to 10 years these cyber warriors may well be autonomous air warriors not just guided by man but under computers control. From Nato to the U.S everyone is getting into the remote killing machines. I think of SkyNet in the Terminator movie and we are not far off the mark.

Now add state actors hackers to terrorist hackers if they get their hands on these babies well the mayhem and destruction they will cause will make your head spin. The sad fact is as more and more of these remote killers are used, we will become more desensitize to the horror of war. The only reason gATo hates war is because I been at the killing field, I was in it and did my share and after the battle and the buzz wears off , the horror that I had just committed will haunt me forever. These machines will not. When it’s all a video game we will just go for the high score and go to the next level– gAtO oUt

Drone Photos

[Image]In this March, 28, 2012, photo, an Arcti Copter 5 drone flies over a waterfront
park in Berkeley, Calif. Interest in the domestic use of drones is surging
among public agencies and private citizens alike, including a thriving subculture
of amateur hobbyists, even as the prospect of countless tiny but powerful
eyes circling in the skies raises serious privacy concerns. (Eric Risberg)
[Image]In this March, 28, 2012, photo, Mark Harrison, left, and Andreas Oesterer,
right, watch as a Ritewing Zephyr II drone lifts off at a waterfront park
in Berkeley, Calif. Interest in the domestic use of drones is surging among
public agencies and private citizens alike, including a thriving subculture
of amateur hobbyists, even as the prospect of countless tiny but powerful
eyes circling in the skies raises serious privacy concerns. (Eric Risberg)
[Image]A quadrocopter drone equipped with a camera stands on display at the Zeiss
stand on the first day of the CeBIT 2012 technology trade fair on March 6,
2012 in Hanover, Germany. CeBIT 2012, the world’s largest information technology
trade fair, will run from March 6-10, and advances in cloud computing and
security are major features this year. Getty
[Image]A drone equipped with cameras and sensors flies over a simulation of a
contaminated area during a training exercise of a nuclear accident following
an earthquake in the region of the nuclear site of Cadarache, January 17,
2012. Reuters
[Image]Israeli soldiers dismantle the Skylark drone during a drill on January 16,
2012 near Bat Shlomo, Israel. The Skylark can carry a camera payload of up
to 1kg, has an operational calking of 15,000ft and allows users to monitor
any designated point within a 15km radius. The Skylark unit consists of a
ground control element and three drones, which provide battalion-level commanders
with real-time information. Getty
[Image]A TV drone flies beside Canada’s Erick Guay during the second practice of
the men’s Alpine skiing World Cup downhill race at the Lauberhorn in Wengen,
January 12, 2012. Reuters
[Image]Advanced Defense Technology Centre engineer Fumiyuki Sato demonstrates his
spherical observation drone at the opening of the annual Digital Contents
Expo in Tokyo on October 20, 2011. The Japanese defence researcher has invented
a spherical observation drone that can fly down narrow alleys, hover on the
spot, take off vertically and bounce along the ground. Getty
[Image]President of French far-right party Front national (FN) and candidate for
the 2012 French presidential election Marine Le Pen looks at a drone helicopter
at the stand of French company Eden as she visits on October 19, 2011 in
Paris, at the the France’s Milipol global security trade fair on October
18, 2011 in Paris. Milipol Paris 2011, welcoming more than 1,000 exhibiting
companies from 43 countries, runs until October 21. Getty
[Image]This Sept. 2011 photo provided by Vanguard Defense Industries, shows a ShadowHawk
drone with Montgomery County, Texas, SWAT team members. Civilian cousins
of the unmanned military aircraft that have been tracking and killing terrorists
in the Middle East and Asia are being sought by police departments, border
patrols, power companies, news organizations and others who want a bird?s-eye
view. AP
[Image]A Pakistani villager holds a wreckage of a suspected surveillance drone which
is crashed in Pakistani border town of Chaman along the Afghanistan border
in Pakistan on Thursday, Aug 25, 2011. Suspected US surveillance drone crashes
in Pakistan military area near border with Afghanistan. (Shah Khalid)
[Image]A maple seed is seen on the hand of Craig Stoneking, bottom, project manager
at Lockheed Martin Advance Technology Laboratories, as engineer David Sharp
holds the company’s new drone, Wednesday, Aug. 10, 2011, in Southampton,
N.J. The unmanned, one-winged flight machine is based on the flight of maple
seeds that twirl down from trees during the spring. AP
[Image]Pakistani officials collect remains of a Pakistan Navy unmanned aerial vehicle
(UAV) which crashed outside an oil refinery in Karachi, Pakistan on Tuesday,
July 19, 2011. According to a Pakistan Navy official, the accident was caused
by a bird hit. No casualties were reported. (Shakil Adil)
[Image]Dr. Gregory Parker, Micro Air Vehicle team leader, holds a small winged drone
that resembles an insect, in the U.S. Air Force Micro Air Vehicles lab at
Wright Patterson Air Force Base in Dayton, Ohio, July 11, 2011. The Micro
Air Vehicles unit of the Air Force Research Laboratory at Wright Patterson
AFB is developing small military drones, with the goal of making them so
small that they resemble small birds and insects, including some that will
have moving wings. The mission is to develop MAVs that can find, track and
target adversaries while operating in complex urban environments. The engineers
are using a variety of small helicopters and drones in the lab to develop
the programs and software. Testing takes place in a controlled indoor lab
where the team flies the MAVs and then gathers data to analyze for further
development. Reuters
[Image]A model of an insect size U.S. Air Force drone is held by a member of the
Micro Air Vehicles team of the Air Force Research Laboratory, which is developing
small drones at Wright Patterson Air Force Base in Dayton, Ohio, July 11,
2011. Reuters
[Image]A computer controlled U.S. Air Force drone prepares to lift off for a test
flight of in the Micro Air Vehicles lab at Wright Patterson Air Force Base
in Dayton, Ohio, July 11, 2011. Reuters
[Image]This product image provided by Parrot, shows the AR.Drone. Parrot, a company
known more for its Bluetooth hands-free car speakerphones, has launched a
small, unmanned aircraft that can be controlled using an iPhone or another
of Apple Inc.’s Wi-Fi-enabled gadgets, including the iPod Touch and the
iPad.(Parrot)
[Image]This undated handout photo provided by the U.S. Air Force shows a MQ-9 Reaper,
armed with GBU-12 Paveway II laser guided munitions and AGM-114 Hellfire
missiles, piloted by Col. Lex Turner during a combat mission over southern
Afghanistan. (Lt. Col.. Leslie Pratt, US Air Force)
[Image]This undated photo provided by U.S. Customs and Border Protection shows an
unmanned drone used to patrol the U.S.-Canadian border. The planes, which
are based out of North Dakota, are now venturing as far as Eastern Washington
on their patrols. (U.S. Customs and Border Protection)
[Image]

U.S. Navy Boatswain’s Mate 3rd Class Christian Riddle, left, and Boatswain’s
Mate 2nd Class Dante Galati secure a recovered Air Force BQM-74C Chukar III
aerial target drone to a crane aboard USS Tortuga (LSD 46) after an at-sea
exercise for Cooperation Afloat Readiness and Training (CARAT) 2011 in the
South China Sea June 11, 2011. CARAT is a series of bilateral exercises held
annually in Southeast Asia to strengthen relationships and enhance force
readiness. (U.S. Navy photo by Mass Communication Specialist 2nd Class Katerine
Noll/Released)[Image]

An X-47B Unmanned Combat Air System Demonstrator (UCAS-D) completes its first
flight at Edwards Air Force Base, Calif., Feb. 4, 2011. The UCAS-D program
will demonstrate the capability of an autonomous, low-observable unmanned
aircraft to perform carrier launches and recoveries. (DoD photo courtesy
of Northrop Grumman/Released). Date Shot: 2/4/2011

[Image][Image]

Air Photo Service
Co. Inc
, Japan, January 2011[Image]

U.S. Army Sgt. Brian Curd, and Spc. Nicholas Boxley, both combat engineers,
from Echo Company, 1st Battalion, 68th Armor Regiment, 3rd Advise and Assist
Brigade, 4th Infantry Division, prepare the RQ-16A Tarantula Hawk unmanned
aerial vehicle, for operation, at Basra province, Iraq, Dec. 1, 2010. Although,
T-Hawk requires a great deal of maintenance, the capabilities it provides
are well worth the time spent. (U.S. Army photo by 2nd Lt. Matthew
Fumagalli/Released). Date Shot: 12/1/2010[Image]

Engineers, from left, Daniel Braun, Eric Sanchez and David Barney, with Space
and Naval Warfare Systems Command Systems Center Pacific, perform pre-deployment
inspections on Littoral Battlespace Sensing Unmanned Undersea Vehicles aboard
the oceanographic survey ship USNS Pathfinder (T-AGS 60) while portside in
San Diego, Calif., Oct. 21, 2010. Each vehicle hosts a payload suite of sensors
that will measure the physical characteristics of the water column as it
routinely descends and ascends in the ocean. (U.S. Navy photo by Rick
Naystatt/Released). Date Shot: 10/21/2010[Image]

U.S. Navy Aerographer’s Mate Airman Alex Boston, left, and Aerographer’s
Mate 3rd Class Ryan Thuecks, right, both assigned to the Naval Oceanography
Mine Warfare Center, and Ana Ziegler, with the Office of Naval Research,
deploy an unmanned underwater vehicle during exercise Frontier Sentinel in
the northern Atlantic Ocean June 9, 2010. The annual joint maritime homeland
security exercise involved the Canadian navy, the U.S. Navy and Coast Guard,
and federal, state, and local agencies in the detection, assessment and response
to maritime security threats. (U.S. Navy photo by Wayne Stigstedt/Released).
Date Shot: 6/9/2010[Image]

U.S. Navy Sonar Technician Surface 1st Class Bryson Menke and Mineman 3rd
Class Michael Darcy, both stationed with Explosive Ordnance Disposal Mobile
Unit (EODMU) 1, prepare to deploy an unmanned underwater vehicle April 22,
2010, in the Persian Gulf. EODMU-1 and USS Dextrous (MCM 13) are conducting
drills. (U.S. Navy photo by Mass Communication Specialist 2nd Class Ja’lon
A. Rhinehart/Released). Date Shot: 4/22/2010[Image]

Danielle Bryant, right, an oceanographer from the Naval Oceanographic Office
(NAVOCEANO), establishes a satellite connection to the Glider Operations
Center at NAVOCEANO before launching the seaglider unmanned underwater vessel
from the Military Sealift Command oceanographic survey ship USNS Henson (T-AGS
63) March 24, 2010, in the Atlantic Ocean. The vessel is designed to collect
physical oceanography data in deep water. Henson is under way off the coast
of Fortaleza, Brazil, for Oceanographic-Southern Partnership Station 2010
conducting survey demonstrations with the Brazilian Directorate of Hydrograph
and Navigation. Oceanographic-Southern Partnership Station is an oceanographic
surveying and information exchange program between subject matter experts
with partner nations in the U.S. Southern Command area of responsibility.
(U.S. Navy photo by Mass Communication Specialist 2nd Class Lily
Daniels/Released). Date Shot: 3/24/2010[Image]

U.S. Navy Sonar Technician (Surface) 2nd Class Brad Goss, right, and Sonar
Technician (Surface) 1st Class Anthony Craig, left, from the Littoral Combat
Ship Anti-Submarine Warfare (LCS ASW) Mission Package detachment, operate
an unmanned surface vehicle (USV) in the waters of the Narragansett Bay,
R.I., Feb. 16, 2010. The Naval Undersea Warfare Center Division Newport is
developing the USV for future LCS ASW operations. (U.S. Navy photo/Released).
Date Shot: 2/16/2010[Image]

U.S. Navy Mineman Seaman James Raper pushes the mine neutralization vehicle
(MNV) of the mine countermeasures ship USS Defender (MCM 2) into its cradle
Nov. 24, 2009, in the Yellow Sea. An MNV is a remote-controlled, unmanned
submarine that uses a video camera to confirm the presence of underwater
mines. Defender is participating in exercise Clear Horizon, an annual exercise
conducted with the Republic of Korea Navy, that is one of the largest
international mine counter-measures exercises in the world. (U.S. Navy photo
by Mass Communication Specialist 1st Class Richard Doolin/Released). Date
Shot: 11/24/2009[Image]

The U.S Air Force Academy’s Viking 300 aircraft, an unmanned aerial system,
flies over Camp Red Devil at Fort Carson, Colo., July 22, 2009. The Air Force
Academy is the first military service academy to begin integrating unmanned
aerial systems into its curriculum. (U.S. Air Force photo by Mike
Kaplan/Released). Date Shot: 7/23/2009[Image]

An Unmanned Little Bird helicopter, a smaller version of the manned A/MH-6M
Little Bird helicopter, is tested and evaluated by personnel from the U.S.
Marine Corps’ Warfighting Laboratory at Marine Corps Combat Development Command,
Quantico, Va., June 16, 2009, in Bridgeport, Calif., during Javelin Thrust-09.
Marine Forces Reserve, headquartered in New Orleans, is conducting Javelin
Thrust-09 at six locations throughout the Western United States. The combined
arms exercise showcases a range of combat and logistics capabilities and
allows leaders to assess the operational readiness of participating units.
More than 2,000 reserve- and active-component Marines, Sailors, Soldiers
and Airmen are training simultaneously in support of the exercise. (U.S.
Marine Corps photo by Chief Warrant Officer Keith A. Stevenson/Released).
Date Shot: 6/16/2009[Image]

Dirk D. Reum, a robotic systems engineer, conducts a systems check of a robotic
unmanned ground vehicle (RUGV) June 13, 2009, in Hawthorne, Nev., before
making it available for test training with U.S. Marine Corps infantrymen
of India Company, 3rd Battalion, 23rd Marine Regiment, 4th Marine Division,
during exercise Javelin Thrust 2009. The RUGV has a payload capacity of 1,400
pounds. Javelin Thrust showcases a wide range of combat and logistics
capabilities, and allows leaders to assess the operational readiness of
participating units. More than 3,000 reserve and active component Marines
and members of the Navy, Army and Air National Guard will train during the
combined arms exercise at six locations throughout the Western United States.
(U.S. Marine Corps photo by Chief Warrant Officer 2 Keith A. Stevenson/Released).
Date Shot: 6/13/2009[Image]

The Heron TP medium altitude long endurance unmanned aerial vehicle takes
off from Comalapa International Airport in San Salvador, El Salvador, May
21, 2009, during a counter drug operations support mission. The Heron is
part of an unmanned aircraft system deployed to El Salvador to support Project
Monitoreo, a month-long evaluation initiative to assess the suitability of
using unmanned aircraft for counterdrug missions in the United States Southern
Command area. (U.S. Army photo by Jose Ruiz/Released). Date Shot: 5/21/2009[Image]

The U.S. Navy and Spatial Integrated Systems Inc. demonstrate a fully autonomous
Unmanned Surface Vehicle (USV) near Fort Monroe, Va., Jan. 14, 2009. The
USV uses its autonomous maritime navigation systems to patrol and detect
intruders. (U.S. Navy photo by Mass Communication Specialist Seaman Apprentice
Joshua Adam Nuzzo/Released). Date Shot: 1/14/2009[Image]

U.S. Navy Lt. Timothy Stanford, a graduate student at University of Wisconsin,
tests his Autonomous Unmanned Vehicle (AUV) prior to competing in the Association
for Unmanned Vehicle Society International’s (AUVSI) 11th annual competition
in San Diego, Calif., Aug. 1, 2008. AUVSI, in cooperation with the Space
and Naval Warfare Systems Center, hosts the event to encourage young engineers
and scientists to consider careers developing AUV technologies for the U.S.
Navy. (U.S. Navy photo by Mass Communication Specialist 2nd Class Brian
Gaines/Released). Date Shot: 8/1/2008[Image]

Fox News reporter Phil Keating interviews U.S. Navy Capt. Robert Dishman,
the Persistent Maritime Unmanned Aircraft Systems Program Office 262 Program
Manager, in front of the Skyship 600 blimp at Naval Air Station Key West,
Fla., July 10, 2008. The lighter-than-air vehicle is in Key West for six
weeks to conduct a series of maritime surveillance evaluations. The joint
airship experiment between the U.S. Navy and Coast Guard emphasizes the
cooperative strategy for 21st century seapower among the sea services. (U.S.
Navy photo by Mass Communication Specialist 2nd Class Rachel McMarr/Released).
Date Shot: 7/10/2008[Image]

An unmanned aerial vehicle’s Predator Hellfire missile is shown on a simulator’s
virtual camera at the March Air Reserve Base in Riverside County, Calif.,
June 25, 2008. As the U.S. military scrambles to get more robotic warplanes
like the Predator drone aloft, it is confronting an unexpected adversary:
human error. (Damian Dovarganes)[Image]

Secretary of Defense Robert M. Gates learns how to operate an unmanned ground
vehicle during a tour of the future combat systems facility at Fort Bliss,
Texas, May 1, 2008. (Department of Defense photo by Cherie Cullen/Released).
Date Shot: 5/1/2008[Image]

A Condor unmanned aerial vehicle sits on top of its carrying case before
flying during Atlantic Strike V at the air-ground training complex in Avon
Park, Fla., April 17, 2007. Atlantic Strike is a U.S. Central Command Air
Forces initiative and the only joint, tactical-level, urban, close air support
training event dedicated to supporting the war on terror. (U.S. Air Force
photo by Staff Sgt. Stephen Otero) (Released). Date Shot: 4/17/2007[Image]

US Marine Corps (USMC) Marines, 15th Marine Expeditionary Unit (MEU) show
the US Navy (USN) Sailors aboard the USN Wasp Class Amphibious Assault Ship
USS BOXER (LHD 4) the “Silver Fox” Unmanned Aerial Vehicle (UAV). The 15th
MEU and the BOXER are part of Expeditionary Strike Group (ESG) 5 which is
currently participating in their Composite Training Unit Exercise (COMPTUEX)
off the coast of Southern California. U.S. Navy photo by Mass Communication
Specialist Third Class Noel Danseco (RELEASED). Date Shot: 7/16/2006[Image]

Engineers check the structure after the test flights of the Navy-built Guardian
Griffin unmanned aerial vehicle (UAV). The flights demonstrated its capability
to support U.S. joint forces with missions ranging from convoy escort and
port security to combat patrol. U.S. Navy photo by Mr. John Joyce (RELEASED).
Date Shot: 5/18/2006[Image]

The Proteus aircraft takes off from Mojave Airfield near Edwards Air Force
Base, Calif., on May 9, 2006. It carries the pod that eventually will contain
the radar that will be used on the Global Hawk unmanned aerial vehicle. A
year of testing, that will be conducted by the 851st Electronic Testing Group,
will begin in September once the radar is installed on Proteus. (U.S. Air
Force photo) (Released). Date Shot: 5/9/2006[Image]

Northrop Grumman’s RQ-8A Fire Scout Vertical Takeoff and Landing Tactical
Unmanned Aerial Vehicle (VTUAV) test fires the second of two Mark (MK) 66
2.75-inch unguided rockets during weapons testing at Arizona’s Yuma Proving
Grounds. The Fire Scout has the ability to autonomously take off and land
from any aviation-capable warship and at unprepared landing zones, with an
on-station endurance of over four hours. The Fire Scout system is capable
of continuous operations, providing coverage at 110 nautical miles from the
launch site. Utilizing a baseline payload that includes electro-optical/infrared
sensors and a laser rangefinder/designator the Fire Scout can find and identify
tactical targets, track and designate targets, accurately provide targeting
data to strike platforms, employ precision weapons, and perform battle damage
assessment. Photographer’s Name: TIM PAYNTER, CIV. Date Shot: 7/25/2005[Image]

U.S. Air Force Tech. Sgt. Patrick Vasquez, a Force Protection Airborne
Surveillance System (FPASS) operator from the 99th Security Forces Group,
prepares to release a Desert Hawk unmanned aerial vehicle during an urban
warfare training at Indian Springs Auxiliary Air Field, Nev., on May 4, 2005.
The Desert Hawk gives real-time video surveillance to FPASS operators who
in turn are able to instantly relay enemy force locations to the troops in
the field. (U.S. Air Force photo by Master Sgt. Robert W. Valenca) (Released).
Date Shot: 5/4/2005[Image]

A U.S. Air Force BQM-167A Unmanned Aerial Vehicle (UAV) is launched from
Tyndall Air Force Base, Fla., on Dec. 22, 2004. The BQM-167A is powered by
a ventrally mounted turbojet engine. It can be air or ground launched, and
can carry the full range of current target payloads, including radar enhancers,
countermeasures, scoring devices, and towed targets. (USAF Photo by Bruce
Hoffman, CIV) (Released). Date Shot: 12/22/2004

[Image]

A Boeing ScanEagle Unmanned Aerial Vehicle (UAV) sits on top of a table during
a demonstration at Indian Springs Auxiliary Field, N.V., on Dec. 18, 2004.
The U.S. military uses the four-foot-long UAV as a forward observer to monitor
enemy concentrations, vehicle and personnel movement, buildings and terrain
in Iraq. (USAF Photo by Tech. Sgt. Kevin J.Gruenwald) (Released). Date Shot:
12/18/2004 [Engine and propeller unit is rotated 90-degrees for service.]

[Image]

Mark LaVille, the Scan Eagle Project manager from Boeing Corporation, and
Brett Kelley, a support engineer with the Insitu Group also from Boeing,
uses an electronic blower to cool the engine of a Scan Eagle unmanned aerial
vehicle during an urban warfare exercise at Indian Springs Auxiliary Air
Field, Nev., on May 4, 2005. Scan Eagle flies at low altitudes while taking
video surveillance and it feeds images directly to security forces personnel
in the field. (U.S. Air Force photo by Master Sgt. Robert W. Valenca) (Released).
Date Shot: 5/4/2005[Image]

U.S. Air Force maintenance personnel prepare to push Global Hawk Air Vehicle
Number 3 (AV-3) into its hanger after its 400th mission at an undisclosed
location in support of Operation Iraqi Freedom on Nov. 8, 2004. The Global
Hawk is an unmanned aerial vehicle designed for surveillance and reconnaissance.
(USAF Photo by Tech. Sgt. Erik Gudmundson) (Released). Date Shot: 11/8/2004[Image]

An AGM-114 Hellfire missile hung on the rail of an US Air Force (USAF) MQ-1L
Predator Unmanned Aerial Vehicle (UAV) is inscribed with, “IN MEMORY OF HONORABLE
RONALD REAGAN.” Photographer’s Name: TSGT SCOTT REED, USAF. Date Shot: 6/10/2004[Image]

Tracked and wheeled versions of the Gladiator Tactical Unmanned Ground Vehicles
(TUGV) take a forward position to determine security of the area. The Gladiators
are taking part in a live fire exercise with 1st Battalion, 2nd Marines (1/2),
Bravo Company (B CO), Marine Corps Base (MCB) Camp Lejeune, North Carolina
(NC), at Range 400 aboard Marine Air Ground Task Force Training Command
(MAGTF-TC), Twentynine Palms, California (CA). Photographer’s Name: LCPL
PATRICK GREEN, USMC. Date Shot: 1/14/2004[Image]

Lt. Col. George Biondi, Director of Operations for the 82nd Aerial Targets
Squadron, Tyndall Air Force Base, Florida, flies this QF-4 “Rhino” as a safety
chase on the wing of a remote-controlled unmanned QF-4 “Rhino” full-scale
aerial target drone after a Combat Archer Air-to-Air Weapons System Evaluation
Program mission over the Gulf of Mexico. The QF-4 Phantom II, affectionately
known as the “Rhino”, is used as a threat-representative unmanned target
for live-fire test and evaluation missions. It maintains the basic flight
envelope capabilities of the original F-4, and can also be flown manned for
workup and remote controller training missions. United States Air Force QF-4′s
are flown by the 82nd Aerial Targets Squadron from Tyndall Air Force Base,
Florida and Holloman Air Force Base, New Mexico. (U.S. Air Force photo Tech.
Sgt. Michael Ammons) (Released). Date Shot: 9/16/2003[Image]

A VMU-2′s Unmanned Air Vehicle (UAV) is ready for launch off a Pneumatic
Launcher on the desert floor. Photographer’s Name: LCPL RICHARD W. COURT,
USAF. Date Shot: 3/9/2003[Image]

Chief of Naval Operations (CNO) Admiral Vern Clark listens to Steve Castelin
of NAVSEA Coastal Systems Station, as he talks about the future of unmanned
aerial vehicles (UAV) such as the Blue Fin currently displayed on Nov. 26,
2002. The CNO is in Panama City, Fla., to see new technology hardware and
to visit with local area community leaders. (U.S. Navy photo by Chief
Photographer’s Mate Johnny Bivera) (RELEASED). Date Shot: 11/26/2002[Image]

A RQ-1L Predator UAV (Unmanned Aerial Vehicle) from the 57th Wing Operations
Group, Nellis AFB, NV sits in a maintenance bunker at a forward operating
airbase in the ENDURING FREEDOM area. The Predator is a medium-altitude,
long-endurance, unmanned aerial vehicle system used for reconnaissance,
surveillance and target acquisition and is in Afghanistan in direct support
of Operation ENDURING FREEDOM. Photographer’s Name: CWO2 William D. Crow,
USMC. Date Shot: 2/14/2002[Image]

Operations Specialist 1st Class Guy Hurkmans of Escanaba, Mich., assigned
to Destroyer Squadron 50 (DESRON50), Naval Support Activity, Bahrain manually
launches an Unmanned Air Vehicle (UAV) during a flight test that is being
conducted in support of Maritime Interception Operations (MIO) on Jan. 6,
2002. (U.S. Navy photo by Photographer’s Mate 1st Class Ted Banks) (Released).
Date Shot: 1/6/2002[Image]

Army personnel walkout and position the Hunter UAV (Unmanned Aerial Vehicle)
for takeoff at Petrovec Airfield, Skopje, Macedonia, in support of TASK FORCE
HARVEST. The role of TASK FORCE HARVEST is to collect arms and ammunition
voluntarily turned over by ethnic Albanian insurgents, and thereby helps
to build confidence in the broader peace process suggested by the President
of former Yugoslav Republic of Macedonia. The Hunter UAV plays a key role
in helping NATO troops by surveying and looking for any changes in the local
area that might hinder the peacekeeping mission. Photographer’s Name: SSGT
JOCELYN M. BROUSSARD, USAF. Date Shot: 9/13/2001[Image]

The new Dragon Eye Unmanned Arial Reconnaissance Vehicle sits partially
disassembled prior to a demonstration given to commanders during Kernal Blitz
Experimental aboard Camp Pendleton, Calif., on June 23, 2001. The Dragon
Eye is controlled line of site via computer and can transmit real time video
imagery back to the operator. (U.S. Marine Corps photo by Sgt. John Vannucci)
(Released) Date Shot: 6/23/2001[Image]

The Global Hawk heads back towards its hanger after doing preflight checks
before going on a twenty four hour mission out of Edinburgh Air Force Base
in Adelaide, South Australia, in support of Exercise Tandem Thrust. The Global
Hawk is a jet powered Unmanned Aerial Vehicle (UAV) designed as a Reconnaissance
and Surveillance vehicle with a wing span equal to a Boeing 737, flying at
altitudes of up to 65,000 feet for more than 24 hours and capable of searching
an area of more than 40,000 square miles. The Global Hawk is deployed to
Australia from April to June 2001, flying more than a dozen missions. These
missions will include sorties in support of Tandem Thrust as well as maritime,
littoral, land surveillance and stand off reconnaissance capabilities. The
Global Hawk completed its first successful maiden flight in February 1998.
Currently there are five U.S. Air Force Global Hawks which have logged over
60 flights and have clocked more than 600 hours, with it’s biggest challenge
to date the non-stop Trans-Pacific flight from Edwards AFB CA to Edinburgh
AFB South Australia. Exercise Tandem Thrust 2001 is a combined United States
and Australian military training exercise. This biennial exercise is being
held in the vicinity of Shoalwater Bay Training Area, Queensland, Australia.
More than 27,000 Soldiers, Sailors, Airmen and Marines are participating,
with Canadian units taking part as opposing forces. The purpose of Exercise
Tandem Thrust is to train for crisis action planning and execution of contingency
response operations. Photograph CLEARED FOR RELEASE by Lt. Col .Pat Bolibrzuch,
Australian Deployment Commander, Global Hawk Program Office and Wing Commander
Brett Newell, Deputy Director Emerging Systems, Aerospace Development Branch.
U.S. Navy Photo by PH3 J. Smith (Released). Photographer’s Name: PH3 JENNIFER
A. SMITH. Date Shot: 5/13/2001[Image]

The Broad-area Unmanned Responsive Resupply Operations (BURRO) is used in
conjunction with the Slice Multi-Task Boat (only flight deck is seen) for
providing over the horizon sea-based logistics. The BURRO (also known as
the KAMAN K-1200 K-MAX Helicopter) is also used for resupplying ships at
sea. It is currently on the flightdeck of the Slice Boat (Prototype) at Coast
Guard Island in Oakland, California, due to its participation in Fleet Battle
Experiment Echo. Also seen in the frame is a right side front view of the
U.S. Coast Guard High Endurance Cutter, USCGC SHERMAN, (WHEC-720). This mission
is in direct support of Urban Warrior ’99. Photographer’s Name: LCPL Christopher
L. Vallee. Date Shot: 3/19/1999[Image]

The Navtec, Incorporated Owl MKII Unmanned Surface Vehicle (USV) glides stealthly
through the waters of Mile Hammock Bay, New River during a demonstration
to highlight it’s marine reconnaissance capabilities to the Riverine Insertion
Operation Exercise (RIOEX) ’98 participants. The Owl MKII is funded by the
Office of Naval Research (ONR) and is remote-controlled from a small shoreline
control station by Brad Dowling, a Navtec, Inc. electronics engineer, at
Camp Lejeune, North Carolina, during the Riverine Insertion Operation Exercise
(RIOEX) ’98. Photographer’s Name: LCPL T.A. Pope, USMC. Date Shot: 5/14/1998[Image]

The Dragon Drone Unmanned Aerial Vehicle was on display at the MOUT (Military
Operations in Urban Terrain) facility during LOE 1 (Limited Objective Experiment
1). Urban Warrior is the U.S. Marine Corps Warfighting Laboratory’s series
of limited objective experiments examining new urban tactics and experimental
technologies. Photographer’s Name: Sgt. Jason J. Bortz. Date Shot: 1/23/1998[Image]

US Marine Corps Air Ground Combat Center (MCAGCC). A “Night Owl”, or RQ-2A
Pioneer, surveillance Unmanned Aerial Vehicle (UAV) is launched from its
twin rail catapult mounted on a 5-ton truck. This launch is conducted by
the Cherry Point Marine Base, Squadron-2, part of Combined Arms Exercise
(CAX) 5-97 at Airfield Seagle. Photographer’s Name: LCPL E. J. Young. Date
Shot: 4/14/1997[Image]

A close up front view of the fuselage section from the wreckage of a Predator
Unmanned Aerial Vehicle (UAV) laying on a hillside in the Russian sector
of the Multinational Division North (MDN) area of operations. Photographer’s
Name: SSG Edward W. Nino. Date Shot: 10/1/1996[Image]

A civilian contractor tests the unmanned submersible Deep Drone aboard a
US Navy ship. The sonar device is being used during salvage operations for
downed Korean Air Lines Flight 007 (KAL 007). The commercial jet was shot
down by Soviet aircraft over Sakhalin Island in the Sea of Japan on August
30, 1983. All 269 passengers and crewmen were killed. PH1 Fel Barbante, USN

04/30/12

Cyber Weapons and Cyber Attacks

gAtO wAs -reading my friend Pierluigi Paganini’s Security Affairs blog – http://securityaffairs.co -  about “Google Used as Cyber Weapons and it got me thinking. To put it in todays terms, cyber Iran is in the news lately and they do control oil coming from the middle east. Their oil fields are controlled by the Internet (SCADA) and thus vulnerable to a cyber attack. So talking about cyber weapons is not far fetched.. so.. What are Cyber weapons and how do we use them in today’s digital infrastructure. Cyber weapons today are not just about security but also as a geo-political tool and it’s power to control the price of oil as well as an a attack vector. 

We have targeted and un-targeted cyber weapons. If we look at Stuxnet and DuQu style of targeted attacks we have a cyber weapon that is guided to make sure it has the right target then uses unpublished certificates to give the software a trusted attack vector, then it goes about doing it’s dirty work. DuQu is different and these two codes do different things one is a computer to kinetic cause and effect like messing with their centrifuges in their enrichment plant and telling the monitoring stations that everything was cool and dandy and then deletes itself from the face of the earth after a self-kill date.

One lone person can with today’s tools develop, control and execute a massive cyber attack to any physical device that is connected to the Internet.

 

What is a Cyber Weapon? – http://hackmageddon.com/2012/04/22/what-is-a-cyber-weapon/

On the other hand DuQu goes and does recon and gathering of information to make an attack transmit it back to Command & Control, then sits back and waits quietly and undetected. What a dynamic dual these two are, why mention these two because, Stuxnet was the first and DuQu was the son of…stuxnet. We now have an evolving Code-Based warrior class of cyber weapons that using this framework other cyber weapons can be created.

 

The Internet was design as a weapons-class communication medium.

Spammers and phising criminals have got a new tool social engineering: it is used in:Advanced Persistent Threat (APT) style attacks just a simple email attachment and your their next victim. Then the Chinese did a clever legal plain overt in your face thing— they created an FACEBOOK account for “James Stavridis”  who happens to be an American Admiral in the Minister of Defence in NATO and then other officials from NATO accepted his Friend request and gathered tons of personal information about high ranking NATO officials.

This is the plain in sight social engineering planning that goes into today’s complex cyber operations. It’s a numbers game. The question needs to be asked. How many dead unknown family relatives have died and left me billion of dollars from Nigeria? Like I said someone will click on the link, greed, stupidity or just drunk, they just created another zombie computer. This zombie can now be given a dictionary attack code to hack your site and the hack begins a new. The life-cycle of hacking botNet.

The bad guy’s are everywhere -  The social engineer aspect in today’s social networks is so new that nobody has the rules. 

Let’s go into a hackers mind. I’m a game player and we figure out the games and then find the weak spot and slide right in and killing that monster to that level 22 knight elf warrior. To make it more fun Google and Facebook are changing their security policy to allow more and more information about ourselves is available online. Make sure you know that anything you say online is stored, collected and examined until you go down the rabbit hole like ToR “Smile your on candid camera” – all the time.

 

In today’s digital matrix just about anything can be used to hack you. 

We today have attacks like the LuckyCat attack from China that has a Chinese professor with a masters and PHD in computer science leading the team. The LuckyKat hack was very well though out and planned with “state-sponsored individuals in China”. Lucky Cat:

To avoid detection, the hackers used a diverse set of infrastructure and anonymity tools. Each attack used a unique campaign code to track which victims were compromised by which malware, illustrating that the attackers were both very aggressive and continually targeted intended victims with several waves of malware, according to Trend Micro’s report.

The security company was able to connect an email address used to register one of the group’s command-and-control servers to a hacker in the Chinese underground community.

The hacker has been using aliases “dang0102″ or “scuhkr” and has been linked to the Information Security Institute of the Sichuan University in Chengdu, China, where he was involved in a research project on network attack and defense.

The person behind the aliases and the email address is Gu Kaiyuan, who is now apparently an employee at Tencent, China’s leading Internet portal company, The New York Times reported on Thursday.

While we spend time on low hanging fruits like the Anonymous attack from the LulzSec crewz and Sabu. Come on this was an embarrassment and the FBI took it personal while the RSA (March 27, 2012 NSA Chief:China behind RSA Attacks: ( http://www.informationweek.com/news/government/security/232700341 ) and Locckheed Martin (May 31, 2011- Lockheed Martin Suffers Massive Cyber attack – http://www.informationweek.com/news/government/security/229700151 ) hacks from foreign nationalist hacking into our defense contractors was a much bigger deal but we ate up the LuLz and three months later we gave Loockheed Martin a National contract to protect our National electrical grid(July 27, 2011 – Lockheed Promised Electric Grid Security Contract – http://uscyberlabs.com/blog/2011/07/27/lockheed-promises-electric-grid-security/ ).

Now why is “gAtO going LoCo” over all this is because while all this madness is going on these professional hacks are being given to smaller countries and even smaller terrorist cells that can use these same tools professionaled managed and all in a box. How to Hack a Box going to your local nut case living in mama’s basement, another unemployed person with time on their hands and reading all about it. This is the bottom of the connect the dot contest. One lone person can with today’s tools develop, control and execute a massive cyber attack to any physical device that is connected to the Internet now that’s a cyber weapon

 

How many devices connected to the Internet that you know about??? -?— gAtO oUt. .

 

04/15/12

Latino Anonymous Phenomenon

gAtO hAs- been following the Anonymous Phenomenon since it began a few years ago but gATO have also seen this year especially an ever increasing Latino flavor to Anonymous. As the Arab spring has taught people that are oppressed to band together and fight Latino Nations have also been targeted more and more. I know

ViVa CYbEr LaTiNos

that Latino Nations like Brazil has a great digital infrastructure and it’s a fact that as more and more countries integrate their digital infrastructure to support business and commerce the population have also adapted to this especially in the Smart-Phone and game console market. These devices have enabled many who were digitally oppressed to venture into the web. As we move into the digital world we of course become more vulnerable to the pit-falls of the web.

bIg mEoWs 2 LaTiNoS – I am glad that we are doing something online to make it a better world

gAtO is Latino born and I can tell you in some Latin Nations the government is oppressive so I can see why Anonymous and hacktavism is attractive and we see this phenomenon all over pasterbin more and more posting of the “el presidente” and such get hacked. Below I have included some of the current hacks – Columbia, Mexico, Spain and Brazil all kinds of latinos have banned under the Anonymous umbrella and learned that together they can fight to change their country and the world. Another thing is Latinas (yes the ladies) are more and more pressing the hacks and “Tango Down” has become not only a dance but a chance to feel strong, to feel free and empowered to do better for their families and friends  -gAtO oUt

Columbia

Web Hive Operation Colombia

http://pastebin.com/dAAbY97X”>http://pastebin.com/dAAbY97X

Mexico

********HACKED BY XEESOFT & IDEPENDENCIA MEXICO #SECTOR404*********

http://pastebin.com/thRF8qSC”>http://pastebin.com/thRF8qSC

Mexico helps Colombia hackers

Spain

http://pastebin.com/SGVw1xHB”>http://pastebin.com/SGVw1xHB

Brazil

http://pastebin.com/3SaeLMVd”>http://pastebin.com/3SaeLMVd