Page 5 of 5 FirstFirst 12345
Results 41 to 45 of 45

Thread: SHOT SHOW 2013 REPORT: Trackingpoint Precision Guided Firearm

  1. #41
    CGN Ultra frequent flyer
    Join Date
    Dec 2010
    Location
    winnipeg
    Posts
    2,880
    OP what was the size of the target at 1000yds?

  2. #42
    Moderator tootall's Avatar
    Join Date
    Jun 2005
    Location
    BC
    Posts
    11,872
    Torso size, I believe. Something like 12"x18" probably.

  3. #43
    Member
    Join Date
    Mar 2013
    Location
    gta
    Posts
    31
    Took the words right out of my mouth

  4. #44
    Moderator tootall's Avatar
    Join Date
    Jun 2005
    Location
    BC
    Posts
    11,872
    I came across this article today. (Exactly two years to the day since the previous post!)
    http://www.alloutdoor.com/2015/08/05...kly+Newsletter


    By now, most of us gungy types know about TrackingPoint, the company that offers a high-tech, high-dollar technologically advanced long-range rifle system that pretty much aims itself. Find your target in the scope, “mark” it, and TrackingPoint does the rest.

    Unless it’s been hacked, that is.

    A husband-and-wife hacking team has managed to manipulate the rifle’s computer via Wi-Fi and tell it lies–lies that it will never reveal to the person shooting the rifle. Runa Sandvik and Michael Auger went to work and found that the possibilities for mischief are many.

    You can make it lie constantly to the user so they’ll always miss their shot.

    In a recent Wired article, Sandvik said it was also possible to wipe out the TrackingPoint’s computer files, effectively turning the high-dollar scope into a non-functioning “brick.”

    If the scope is bricked, you have a six to seven thousand dollar computer you can’t use on top of a rifle that you still have to aim yourself.

    And because the firing pin is controlled by a computer-controlled solenoid instead of a traditional sear, these hackers can lock it up, rendering the gun itself completely useless.

    In the video, the proper function of the TrackingPoint system is demonstrated, and then they show their work. By manipulating data such as bullet weight, wind speed, and the like, they can place shots inches or even feet away from the pre-selected point of aim.

    The TrackingPoint system must have other quirks than hacking vulnerabilities:

    Sandvik and Auger haven’t figured out why, but they’ve observed that higher ammunition weights aim a shot to the left, while lower or negative values aim it to the right. So on Auger’s next shot, Sandvik’s change of that single number in the rifle’s software made the bullet fly 2.5-feet to the left, bullseyeing an entirely different target.

    Thankfully, the one thing the hackers couldn’t do was to fire the rifle without physical input, in the form of a trigger pull. But they could conceivably cause a sniper to kill someone other than his intended target.

    TrackingPoint’s company founder responded gratefully to news of the hackers’ research, and said he plans to work with them to plug the holes in his software. Once developed, he says a software patch will be sent to owners of TrackingPoint firearms.

    The Wired article suggests, though, that the company may be in dire straits and therefore unable to develop a usable patch. For that reason, the hacker couple plan to keep the code a secret.

    Unless, I suppose, they get hacked…

  5. #45
    Moderator tootall's Avatar
    Join Date
    Jun 2005
    Location
    BC
    Posts
    11,872
    This is the original Wired article.
    http://www.wired.com/2015/07/hackers...change-target/


    Hackers Can Disable a Sniper Rifle—Or Change Its Target


    Put a computer on a sniper rifle, and it can turn the most amateur shooter into a world-class marksman. But add a wireless connection to that computer-aided weapon, and you may find that your smart gun suddenly seems to have a mind of its own—and a very different idea of the target.



    At the Black Hat hacker conference in two weeks, security researchers Runa Sandvik and Michael Auger plan to present the results of a year of work hacking a pair of $13,000 TrackingPoint self-aiming rifles. The married hacker couple have developed a set of techniques that could allow an attacker to compromise the rifle via its Wi-Fi connection and exploit vulnerabilities in its software. Their tricks can change variables in the scope’s calculations that make the rifle inexplicably miss its target, permanently disable the scope’s computer, or even prevent the gun from firing. In a demonstration for WIRED (shown in the video above), the researchers were able to dial in their changes to the scope’s targeting system so precisely that they could cause a bullet to hit a bullseye of the hacker’s choosing rather than the one chosen by the shooter.

    “You can make it lie constantly to the user so they’ll always miss their shot,” says Sandvik, a former developer for the anonymity software Tor. Or the attacker can just as easily lock out the user or erase the gun’s entire file system. “If the scope is bricked, you have a six to seven thousand dollar computer you can’t use on top of a rifle that you still have to aim yourself.”

    Since TrackingPoint launched in 2011, the company has sold more than a thousand of its high-end, Linux-power rifles with a self-aiming system. The scope allows you to designate a target and dial in variables like wind, temperature, and the weight of the ammunition being fired. Then, after the trigger is pulled, the computerized rifle itself chooses the exact moment to fire, activating its firing pin only when its barrel is perfectly oriented to hit the target. The result is a weapon that can allow even a gun novice to reliably hit targets from as far as a mile away.

    But Sandvik and Auger found that they could use a chain of vulnerabilities in the rifle’s software to take control of those self-aiming functions. The first of these has to do with the Wi-Fi, which is off by default, but can be enabled so you can do things like stream a video of your shot to a laptop or iPad. When the Wi-Fi is on, the gun’s network has a default password that allows anyone within Wi-Fi range to connect to it. From there, a hacker can treat the gun as a server and access APIs to alter key variables in its targeting application. (The hacker pair were only able to find those changeable variables by dissecting one of the two rifles they worked with, using an eMMC reader to copy data from the computer’s flash storage with wires they clipped onto its circuit board pins.)


    In the video demonstration for WIRED at a West Virginia firing range, Auger first took a shot with the unaltered rifle and, using the TrackingPoint rifle’s aiming mechanism, hit a bullseye on his first attempt. Then, with a laptop connected to the rifle via Wi-Fi, Sandvik invisibly altered the variable in the rifle’s ballistic calculations that accounted for the ammunition’s weight, changing it from around .4 ounces to a ludicrous 72 pounds. “You can set it to whatever crazy value you want and it will happily accept it,” says Sandvik.

    Changing a single number in the rifle’s software made the bullet fly 2.5-feet to the left, bullseyeing an entirely different target.

    Sandvik and Auger haven’t figured out why, but they’ve observed that higher ammunition weights aim a shot to the left, while lower or negative values aim it to the right. So on Auger’s next shot, Sandvik’s change of that single number in the rifle’s software made the bullet fly 2.5-feet to the left, bullseyeing an entirely different target.

    The only alert a shooter might have to that hack would be a sudden jump in the scope’s view as it shifts position. But that change in view is almost indistinguishable from jostling the rifle. “Depending on how good a shooter you are, you might chalk that up to ‘I bumped it,’” says Sandvik.

    The two hackers’ wireless control of the rifle doesn’t end there. Sandvik and Auger found that through the Wi-Fi connection, an attacker could also add themselves as a “root” user on the device, taking full control of its software, making permanent changes to its targeting variables, or deleting files to render the scope inoperable. If a user has set a PIN to limit other users’ access to the gun, that root attack can nonetheless gain full access and lock out the gun’s owner with a new PIN. The attacker can even disable the firing pin, a computer controlled solenoid, to prevent the gun from firing.

    One thing their attack can’t do, the two researchers point out, is cause the gun to fire unexpectedly. Thankfully TrackingPoint rifles are designed not to fire unless the trigger is manually pulled.

    Thankfully TrackingPoint rifles are designed not to fire unless the trigger is manually pulled.

    In a phone call with WIRED, TrackingPoint founder John McHale said that he appreciates Sandvik and Auger’s research, and that the company will work with them to develop a software update to patch the rifle’s hackable flaws as quickly as possible. When it’s ready, that update will be mailed out to customers as a USB drive, he said. But he argued that the software vulnerabilities don’t fundamentally change the gun’s safety. “The shooter’s got to pull the rifle’s trigger, and the shooter is responsible for making sure it’s pointed in a safe direction. It’s my responsibility to make sure my scope is pointed where my gun is pointing,” McHale says. “The fundamentals of shooting don’t change even if the gun is hacked.”


    He also pointed out that the Wi-Fi range of the hack would limit its real-world use. “It’s highly unlikely when a hunter is on a ranch in Texas, or on the plains of the Serengeti in Africa, that there’s a Wi-Fi internet connection,” he says. “The probability of someone hiding nearby in the bush in Tanzania are very low.”

    But Auger and Sandvik counter that with their attack, a hacker could alter the rifle in a way that would persist long after that Wi-Fi connection is broken. It’s even possible (although likely difficult), they suggest, to implant the gun with malware that would only take effect at a certain time or location based on querying a user’s connected phone.

    In fact, Auger and Sandvik have been attempting to contact TrackingPoint to help the company patch its rifles’ security flaws for months, emailing the company without response. The company’s silence until WIRED’s inquiry may be due to its financial problems: Over the last year, TrackingPoint has laid off the majority of its staff, switched CEOs and even ceased to take new orders for rifles. McHale insists that the company hasn’t gone out of business, though it’s “working through an internal restructuring.”


    Given TrackingPoint’s financial straits, Sandvik and Auger say they won’t release the full code for their exploit for fear that the company won’t have the manpower to fix its software. And with only a thousand vulnerable rifles in consumers’ hands and the hack’s limited range, it may be unlikely that anyone will actually be victimized by the attack.

    But the rifles’ flaws signal a future where objects of all kinds are increasingly connected to the Internet and are vulnerable to hackers—including lethal weapons. “There are so many things with the Internet attached to them: cars, fridges, coffee machines, and now guns,” says Sandvik. “There’s a message here for TrackingPoint and other companies…when you put technology on items that haven’t had it before, you run into security challenges you haven’t thought about before.”

Page 5 of 5 FirstFirst 12345

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •