this post was submitted on 08 Mar 2024
333 points (97.4% liked)

Europe

8324 readers
1 users here now

News/Interesting Stories/Beautiful Pictures from Europe ๐Ÿ‡ช๐Ÿ‡บ

(Current banner: Thunder mountain, Germany, ๐Ÿ‡ฉ๐Ÿ‡ช ) Feel free to post submissions for banner pictures

Rules

(This list is obviously incomplete, but it will get expanded when necessary)

  1. Be nice to each other (e.g. No direct insults against each other);
  2. No racism, antisemitism, dehumanisation of minorities or glorification of National Socialism allowed;
  3. No posts linking to mis-information funded by foreign states or billionaires.

Also check out [email protected]

founded 2 years ago
MODERATORS
 

Four German military officials discussed what targets German-made Taurus missiles could potentially hit if Chancellor Olaf Scholz ever allowed them to be sent to Kyiv, and the call had been intercepted by Russian intelligence.

According to German authorities, the "data leak" was down to just one participant dialling in on an insecure line, either via his mobile or the hotel wi-fi.

The exact mode of dial-in is "still being clarified", Germany has said.

"I think that's a good lesson for everybody: never use hotel internet if you want to do a secure call," Germany's ambassador to the UK, Miguel Berger, told the BBC this week. Some may feel the advice came a little too late.

Eyebrows were raised when it emerged the call happened on the widely-used WebEx platform - but Berlin has insisted the officials used an especially secure, certified version.

Professor Alan Woodward from the Surrey Centre for Cyber Security says that WebEx does provide end-to-end encryption "if you use the app itself".

But using a landline or open hotel wi-fi could mean security was no longer guaranteed - and Russian spies, it's now supposed, were ready to pounce.

you are viewing a single comment's thread
view the rest of the comments
[โ€“] [email protected] 87 points 9 months ago (3 children)

Maybe he dialed in by telephone? It would be a complete boomer move, but Iโ€™ve seen people do it.

[โ€“] [email protected] 85 points 9 months ago (1 children)

A researcher in cryptography in Berlin, Henning Seidler, believes the most likely theory is that the officer dialled in via his mobile phone and the call was picked up by spies' antenna who can also "forward" the traffic onto the main, official antenna.

Seems like the more likely theory

[โ€“] [email protected] 10 points 9 months ago* (last edited 9 months ago) (3 children)

That is an expensive way to lose your job!

[โ€“] [email protected] 41 points 9 months ago (1 children)

"Intelligence" services cost taxpayers billions a year, so the billion dollar question is why is it possible to dial in to "official" military communications over insecure channels at all?

Why doesn't the government run their own signal or matrix infra? Why are they paying Cisco, and introducing the numerous attack vectors of a proprietary optionally-encrypted service?

The threat of surveillance capitalism isn't just in the dragnet surveillance of the population. It's in the profiteering of "partnerships" between private and public โ€” the drive of corrupt and incompetent political and military leadership to direct funds to sub-optimal proprietary services and protocols, instead of leveraging public funding to contribute to open-source and make hardened systems ubiquitous.

[โ€“] [email protected] 25 points 9 months ago (2 children)

The funny thing is, that the Bundeswehr actually has a communications platform based on Matrix: bwMessenger goes live for Bundeswehr, element.io

Why they're not using it? Who knows...

[โ€“] [email protected] 9 points 9 months ago

That's what I'm getting at. This ultimately isn't the fault of some technobozo who dialled in from hotel wifi. If the system were fit for purpose, technobozo could dial in over any network.

The is the fault of German politicians, military, and "intelligence". This type of compromise should not exist as a matter of circumstance. It should only be possible when an end users device is directly compromised.

[โ€“] [email protected] 2 points 9 months ago

Probably the client runs poorly on the cutting edge Nokia 3310s those generals use

[โ€“] [email protected] 2 points 9 months ago (1 children)

We are talking about the person/department that has ensured that they run an especially secure, certified, version of webex losing their job right?

As much as I'd like to think that senior military people have some basic awareness about security, this is really a tool that was considered secure by the organisation. Sounds like a big gaping whole letting dialin enabled for anyone to use.

[โ€“] [email protected] 2 points 9 months ago

Not even. A Pringles can and some wire.

[โ€“] [email protected] 13 points 9 months ago

Yes, it is a boomer move. But don't let Cisco off the hook. What kind of specially certified security feature is that, if it can be turned off so easily by accident.

[โ€“] [email protected] 2 points 9 months ago

He most likely did, at least from what I can deduce from the published recording.