Small number of computer-aided rifles could be hacked in contrived scenario

Year-long publicity effort hits bullseye ... in a way


The internet is reeling today at the "news" that a rare make of computer-aided gunsight can under certain circumstances be hacked into, permitting a hacker to interfere with a suitably-equipped rifle's aim.

The gunsight in question is the much-hyped but seldom purchased TrackingPoint kit, a system with a Linux machine at its heart which can be fitted to a range of different rifles.

The TrackingPoint (details on its capabilities are at the end of this article) is mainly a curiosity. People who would be interested in it - experienced long-range marksmen - basically don't need it, and people who need it - those who have seldom or never fired a rifle - typically don't want it. And very few in either group can afford it.

But you wouldn't find that out by reading WiReD:

Put a computer on a sniper rifle, and it can turn the most amateur shooter into a world-class marksman.

The oh-gosh tech mag has partnered up this week with husband and wife security-pro hackers Runa Sandvik and Michael Auger in a publicity push ahead of the Black Hat conference. It seems that the duo have spent a year hacking into the TrackingPoint kit. So what have they done?

Well, the TrackingPoint's Linux heart has Wi-Fi. This is primarily intended to allow video from the gunsight to be exported to other devices, and it is turned off by default. If a TrackingPoint user leaves his Wi-Fi turned off, he can't be hacked.

However, if a TrackingPoint's Wi-Fi is turned on, and left on the default password, anyone who knows that default and is within Wi-Fi range can gain access to the system. This is pretty basic stuff - so basic you would hardly call it hacking, really.

It turns out that one can also, having got onto the gun's local network, get full access up to and including root on the Linux computer, and so do pretty much anything you like to it. It should be noted here that despite the TrackingPoint's trigger feature, this doesn't allow firing a shot: the computer only has the power to prevent firing. If the trigger isn't pulled the gun won't fire, no matter what the hacker may do.

What a hacker can do, though, is tamper with variables in the ballistic calculator so as to change where the bullet will strike:

Sandvik and Auger haven’t figured out why, but they’ve observed that higher ammunition weights aim a shot to the left, while lower or negative values aim it to the right. So on Auger’s next shot, Sandvik’s change of that single number [bullet weight] in the rifle’s software made the bullet fly 2.5-feet to the left, bullseyeing an entirely different target.

You would have thought that having spent a year on this project, the hacker couple would have taken time to look at the TrackingPoint website and bone up on some basic ballistics, but evidently not. However we here on the Reg weapons desk found time to do so this morning, and we would point out that the TrackingPoint system, among other things, compensates for "spin drift" or "gyroscopic drift".

Spin drift is a complex phenomenon and is affected by several factors. However the underlying reason it occurs is that bullets wobble a little as they leave the muzzle of a gun (they suffer "transient yaw", in the trade jargon). This gets damped out by the very strong gyroscopic stabilisation generated by the bullet's spin: but the damping process leaves the bullet stabilised in flight with a small off angle to the right of its line of travel (in the case of normal US-style clockwise rifling twist). This small angling to the right is known as the "yaw of repose" and means that the bullet is pushed slightly right by the air as it flies.

The formula for the angle of yaw of repose is given here. It's a bit fiddly, but what we care about is that the angle of yaw rises with the quantity Ix, which is the bullet's axial moment of inertia. All other things being equal, as a bullet increases in mass ("weight") it has a larger axial moment of inertia, the yaw-of-repose gets bigger and the bullet deviates more to the right ... and the TrackingPoint software corrects aim to the left further and further to compensate.

That's why, if you tell it the slug weighs a lot more than it does, you find your rounds going left of where you expected. Simples.

From the WiReD article it appears that you must actually be in the rifle's local Wi-Fi network to hack it: TrackingPoint's "ShotView" system actually allows video and audio to be streamed across the wider internet, but apparently you can't actually hack the gun from there. You have to be physically close to it and the user has to have enabled Wi-Fi and left it on the default password. Even then, all you can do is alter the direction of aim by quite small angles, brick the gunsight, or prevent the weapon from firing.

We should also remember that total TrackingPoint sales aren't thought to have been much more than a thousand, despite the massive hype around it.


Other stories you might like

  • It's primed and full of fuel, the James Webb Space Telescope is ready to be packed up prior to launch

    Fingers crossed the telescope will finally take to space on 22 December

    Engineers have finished pumping the James Webb Space Telescope with fuel, and are now preparing to carefully place the folded instrument inside the top of a rocket, expected to blast off later this month.

    “Propellant tanks were filled separately with 79.5 [liters] of dinitrogen tetroxide oxidiser and 159 [liters of] hydrazine,” the European Space Agency confirmed on Monday. “Oxidiser improves the burn efficiency of the hydrazine fuel.” The fuelling process took ten days and finished on 3 December.

    All eyes are on the JWST as it enters the last leg of its journey to space; astronomers have been waiting for this moment since development for the world’s largest space telescope began in 1996.

    Continue reading
  • China to upgrade mainstream RISC-V chips every six months

    Home-baked silicon is the way forward

    China is gut punching Moore's Law and the roughly one-year cadence for major chip releases adopted by the Intel, AMD, Nvidia and others.

    The government-backed Chinese Academy of Sciences, which is developing open-source RISC-V performance processor, says it will release major design upgrades every six months. CAS is hoping that the accelerated release of chip designs will build up momentum and support for its open-source project.

    RISC-V is based on an open-source instruction architecture, and is royalty free, meaning companies can adopt designs without paying licensing fees.

    Continue reading
  • The SEC is investigating whistleblower claims that Tesla was reckless as its solar panels go up in smoke

    Tens of thousands of homeowners and hundreds of businesses were at risk, lawsuit claims

    The Securities and Exchange Commission has launched an investigation into whether Tesla failed to tell investors and customers about the fire risks of its faulty solar panels.

    Whistleblower and ex-employee, Steven Henkes, accused the company of flouting safety issues in a complaint with the SEC in 2019. He filed a freedom of information request to regulators and asked to see records relating to the case in September, earlier this year. An SEC official declined to hand over documents, and confirmed its probe into the company is still in progress.

    “We have confirmed with Division of Enforcement staff that the investigation from which you seek records is still active and ongoing," a letter from the SEC said in a reply to Henkes’ request, according to Reuters. Active SEC complaints and investigations are typically confidential. “The SEC does not comment on the existence or nonexistence of a possible investigation,” a spokesperson from the regulatory agency told The Register.

    Continue reading

Biting the hand that feeds IT © 1998–2021