Low-Tech Cyberwar

Details matter. As this article from Defense Tech shows, not understanding the hidden side of technology can have deadly consequences:

When you take a photo with your cellphone, the gps coordinates of the location you took the picture is embedded into the image. When you upload said photo onto the internet for all to see, people can pull the location data from that picture. If you think this is just people being paranoid and that the Taliban would never do this in Afghanistan, think again. Insurgents figured out how to use this to their advantage in Iraq years ago. In 2007, a group of Iraqi insurgents used geotags to destroy several American AH-64 Apache choppers sitting on a flightline in Iraq.

Once again, it’s worth remembering that by far the biggest vulnerability in any secure system is the people involved. In this case, the troopers involved weren’t stupid or reckless – they just needed a little more training on the way their information can be used.

Advertisements

About thinklikeafox

I'm a Naval Officer living in Southern California. I hope to be attending law school in the next year or two, and I started writing this blog out of a desire to improve my writing and critical thinking skills after a couple years outside of academia.
This entry was posted in Computer Security, Military and tagged , , , , , . Bookmark the permalink.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s