The Register Home Page

back to article US military contractor open sources tool for validating hidden communications networks

A software toolkit built for DARPA to test and validate covert communication networks is now open source, and it could help orgs who want to experiment with new kinds of secure, anonymous communications tools.  Defense contractor RTX, formerly Raytheon Technologies, said on Wednesday that its BBN research arm had released …

  1. Long John Silver Silver badge
    Pirate

    Nothing new?

    This appears to be the modern equivalent to dropping an agent equipped with a battery-powered morse radio transmitter behind enemy lines. Before departure on the mission the agent is taught means to avoid detection which include brief coded messages and frequent changes of transmitter location.

    1. IGotOut Silver badge

      Re: Nothing new?

      That's like saying an F-35 is nothing new, it's like a Lancaster bomber flying low to avoid radar detection.

    2. smudge
      Black Helicopters

      Re: Nothing new?

      Actually, it's more like a modern version of what the Orange Book called "covert channels", extended to include wide area communications networks. (I presume the Red Books covered that?).

      Though I wonder if it can detect delights such as covert timing channels.

  2. Anonymous Coward
    Anonymous Coward

    What would be interesting...

    would be the list of people who download this.

  3. ecofeco Silver badge

    Interesting

    Very interesting.

    1. that one in the corner Silver badge

      Re: Interesting

      But schtupid*

      * this communication brought to you from beautiful downtown Burbank

  4. Paul Hovnanian Silver badge
    Devil

    In other words, this is the sort of thing that people sneaking messages out of warzones, or leaking sensitive information to the press, are thinking about when trying to decide the best course of action in a given situation.

    Also, enemy agents trying to figure out the best way to feed data back to their home offices. It's difficult to tell which is which.

    Perhaps we could have this tool set an "evil bit" -->

    in messages to better inform our law enforcement agencies which is which.

  5. Claptrap314 Silver badge

    I'm SO confused...

    So are we to assume that EVERY malware author already has access to equal or better tooling? What does the US government stand to gain by the release of this tool?

    I'ld rather have highly detailed information about nuclear power production made generally available. That's a risk/reward calculation I can at least fathom.

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon