Small number of computer-aided rifles could be hacked in contrived scenario

Year-long publicity effort hits bullseye ... in a way

The internet is reeling today at the "news" that a rare make of computer-aided gunsight can under certain circumstances be hacked into, permitting a hacker to interfere with a suitably-equipped rifle's aim.

The gunsight in question is the much-hyped but seldom purchased TrackingPoint kit, a system with a Linux machine at its heart which can be fitted to a range of different rifles.

The TrackingPoint (details on its capabilities are at the end of this article) is mainly a curiosity. People who would be interested in it - experienced long-range marksmen - basically don't need it, and people who need it - those who have seldom or never fired a rifle - typically don't want it. And very few in either group can afford it.

But you wouldn't find that out by reading WiReD:

Put a computer on a sniper rifle, and it can turn the most amateur shooter into a world-class marksman.

The oh-gosh tech mag has partnered up this week with husband and wife security-pro hackers Runa Sandvik and Michael Auger in a publicity push ahead of the Black Hat conference. It seems that the duo have spent a year hacking into the TrackingPoint kit. So what have they done?

Well, the TrackingPoint's Linux heart has Wi-Fi. This is primarily intended to allow video from the gunsight to be exported to other devices, and it is turned off by default. If a TrackingPoint user leaves his Wi-Fi turned off, he can't be hacked.

However, if a TrackingPoint's Wi-Fi is turned on, and left on the default password, anyone who knows that default and is within Wi-Fi range can gain access to the system. This is pretty basic stuff - so basic you would hardly call it hacking, really.

It turns out that one can also, having got onto the gun's local network, get full access up to and including root on the Linux computer, and so do pretty much anything you like to it. It should be noted here that despite the TrackingPoint's trigger feature, this doesn't allow firing a shot: the computer only has the power to prevent firing. If the trigger isn't pulled the gun won't fire, no matter what the hacker may do.

What a hacker can do, though, is tamper with variables in the ballistic calculator so as to change where the bullet will strike:

Sandvik and Auger haven’t figured out why, but they’ve observed that higher ammunition weights aim a shot to the left, while lower or negative values aim it to the right. So on Auger’s next shot, Sandvik’s change of that single number [bullet weight] in the rifle’s software made the bullet fly 2.5-feet to the left, bullseyeing an entirely different target.

You would have thought that having spent a year on this project, the hacker couple would have taken time to look at the TrackingPoint website and bone up on some basic ballistics, but evidently not. However we here on the Reg weapons desk found time to do so this morning, and we would point out that the TrackingPoint system, among other things, compensates for "spin drift" or "gyroscopic drift".

Spin drift is a complex phenomenon and is affected by several factors. However the underlying reason it occurs is that bullets wobble a little as they leave the muzzle of a gun (they suffer "transient yaw", in the trade jargon). This gets damped out by the very strong gyroscopic stabilisation generated by the bullet's spin: but the damping process leaves the bullet stabilised in flight with a small off angle to the right of its line of travel (in the case of normal US-style clockwise rifling twist). This small angling to the right is known as the "yaw of repose" and means that the bullet is pushed slightly right by the air as it flies.

The formula for the angle of yaw of repose is given here. It's a bit fiddly, but what we care about is that the angle of yaw rises with the quantity Ix, which is the bullet's axial moment of inertia. All other things being equal, as a bullet increases in mass ("weight") it has a larger axial moment of inertia, the yaw-of-repose gets bigger and the bullet deviates more to the right ... and the TrackingPoint software corrects aim to the left further and further to compensate.

That's why, if you tell it the slug weighs a lot more than it does, you find your rounds going left of where you expected. Simples.

From the WiReD article it appears that you must actually be in the rifle's local Wi-Fi network to hack it: TrackingPoint's "ShotView" system actually allows video and audio to be streamed across the wider internet, but apparently you can't actually hack the gun from there. You have to be physically close to it and the user has to have enabled Wi-Fi and left it on the default password. Even then, all you can do is alter the direction of aim by quite small angles, brick the gunsight, or prevent the weapon from firing.

We should also remember that total TrackingPoint sales aren't thought to have been much more than a thousand, despite the massive hype around it.

Other stories you might like

  • Screencastify fixes bug that would have let rogue websites spy on webcams
    School-friendly tool still not fully protected, privacy guru warns

    Screencastify, a popular Chrome extension for capturing and sharing videos from websites, was recently found to be vulnerable to a cross-site scripting (XSS) flaw that allowed arbitrary websites to dupe people into unknowingly activating their webcams.

    A miscreant taking advantage of this flaw could then download the resulting video from the victim's Google Drive account.

    Software developer Wladimir Palant, co-founder of ad amelioration biz Eyeo, published a blog post about his findings on Monday. He said he reported the XSS bug in February, and Screencastify's developers fixed it within a day.

    Continue reading
  • FTC urged to protect data privacy of women visiting abortion clinics
    As Supreme Court set to overturn Roe v Wade, safeguards on location info now more vital than ever

    Democrat senators have urged America's Federal Trade Commission to do something to protect the privacy of women after it emerged details of visits to abortion clinics were being sold by data brokers.

    Women's healthcare is an especially thorny issue right now after the Supreme Court voted in a leaked draft majority opinion to overturn Roe v Wade, a landmark ruling that declared women's rights to have an abortion are protected by the Fourteenth Amendment of the US Constitution.

    If the nation's top judges indeed vote to strike down that 1973 decision, individual states, at least, can set their own laws governing women's reproductive rights. Thirteen states already have so-called "trigger laws" in place prohibiting abortions – mostly with exceptions in certain conditions, such as if the pregnancy or childbirth endangers the mother's life – that will go into effect if Roe v Wade is torn up. People living in those states would, in theory, have to travel to another state where abortion is legal to carry out the procedure lawfully, although laws are also planned to ban that.

    Continue reading
  • Zuckerberg sued for alleged role in Cambridge Analytica data-slurp scandal
    I can prove CEO was 'personally involved in Facebook’s failure to protect privacy', DC AG insists

    Cambridge Analytica is back to haunt Mark Zuckerberg: Washington DC's Attorney General filed a lawsuit today directly accusing the Meta CEO of personal involvement in the abuses that led to the data-slurping scandal. 

    DC AG Karl Racine filed [PDF] the civil suit on Monday morning, saying his office's investigations found ample evidence Zuck could be held responsible for that 2018 cluster-fsck. For those who've put it out of mind, UK-based Cambridge Analytica harvested tens of millions of people's info via a third-party Facebook app, revealing a – at best – somewhat slipshod handling of netizens' privacy by the US tech giant.

    That year, Racine sued Facebook, claiming the social network was well aware of the analytics firm's antics yet failed to do anything meaningful until the data harvesting was covered by mainstream media. Facebook repeatedly stymied document production attempts, Racine claimed, and the paperwork it eventually handed over painted a trail he said led directly to Zuck. 

    Continue reading
  • Florida's content-moderation law kept on ice, likely unconstitutional, court says
    So cool you're into free speech because that includes taking down misinformation

    While the US Supreme Court considers an emergency petition to reinstate a preliminary injunction against Texas' social media law HB 20, the US Eleventh Circuit Court of Appeals on Monday partially upheld a similar injunction against Florida's social media law, SB 7072.

    Both Florida and Texas last year passed laws that impose content moderation restrictions, editorial disclosure obligations, and user-data access requirements on large online social networks. The Republican governors of both states justified the laws by claiming that social media sites have been trying to censor conservative voices, an allegation that has not been supported by evidence.

    Multiple studies addressing this issue say right-wing folk aren't being censored. They have found that social media sites try to take down or block misinformation, which researchers say is more common from right-leaning sources.

    Continue reading
  • US-APAC trade deal leaves out Taiwan, military defense not ruled out
    All fun and games until the chip factories are in the crosshairs

    US President Joe Biden has heralded an Indo-Pacific trade deal signed by several nations that do not include Taiwan. At the same time, Biden warned China that America would help defend Taiwan from attack; it is home to a critical slice of the global chip industry, after all. 

    The agreement, known as the Indo-Pacific Economic Framework (IPEF), is still in its infancy, with today's announcement enabling the United States and the other 12 participating countries to begin negotiating "rules of the road that ensure [US businesses] can compete in the Indo-Pacific," the White House said. 

    Along with America, other IPEF signatories are Australia, Brunei, India, Indonesia, Japan, South Korea, Malaysia, New Zealand, the Philippines, Singapore, Thailand and Vietnam. Combined, the White House said, the 13 countries participating in the IPEF make up 40 percent of the global economy. 

    Continue reading

Biting the hand that feeds IT © 1998–2022