Feeds

US Veep's wireless heart implant disabled to stop TERRORIST HACKERS

Dick Cheney's defibrillator adjusted at the factory to stop attack depicted on Homeland

The Power of One eBook: Top reasons to choose HP BladeSystem

A defibrillator fitted to US vice president Dick Cheney had its wireless functions removed in the factory, in order to ensure hackers – or terrorists – could not kill him by attacking the device.

Defibrillators and their close cousins the pacemaker have been fingered as a security risk before. Last year we reported that radio interference could set them off under some circumstances. Back in 2008 similar concerns were raised by The Medical Device Security Centre.

It now appears that US security authorities were aware of the potential problem in 2007, the year then-Veep Dick Cheney was fitted with a new defibrillator by Dr. Jonathan Reiner.

In a video posted here and embdeded below, Dr Reiner says “It seemed to me to be a bad idea for the vice-president of the United States to have a device that maybe someone on a rope line or someone in the next hotel room or somebody downstairs might be able to get into, hack into.”

Turning to Cheney he says: ”I worried that someone could kill you.”

Cheney responds: “I was aware of the danger.”

The idea of a vice-presidential implant being used to attack the holder of the office often said to have only one function – having a heartbeat – was later used in an episode of US television drama Homeland. Cheney says in the video that episode featuring the attack “was an accurate portrayal of what was possible.” ®

Designing a Defense for Mobile Applications

More from The Register

next story
DARPA-derived secure microkernel goes open source tomorrow
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.