Insurgents Hack U.S. Drones

Discussion in 'OFF-Topic / Misc.' started by beaupower32, Dec 17, 2009.

  1. beaupower32

    beaupower32 Well-Known Member

    Joined:
    Jun 10, 2007
    Messages:
    1,840
    Likes Received:
    41
    Trophy Points:
    48
    Location:
    Lancaster, California
    #1 beaupower32, Dec 17, 2009
    Last edited: Dec 17, 2009
    WASHINGTON -- Militants in Iraq have used $26 off-the-shelf software to intercept live video feeds from U.S. Predator drones, potentially providing them with information they need to evade or monitor U.S. military operations.

    Senior defense and intelligence officials said Iranian-backed insurgents intercepted the video feeds by taking advantage of an unprotected communications link in some of the remotely flown planes' systems. Shiite fighters in Iraq used software programs such as (wont name software on this forum) -- available for as little as $25.95 on the Internet -- to regularly capture drone video feeds, according to a person familiar with reports on the matter.

    U.S. officials say there is no evidence that militants were able to take control of the drones or otherwise interfere with their flights. Still, the intercepts could give America's enemies battlefield advantages by removing the element of surprise from certain missions and making it easier for insurgents to determine which roads and buildings are under U.S. surveillance.

    The drone intercepts mark the emergence of a shadow cyber war within the U.S.-led conflicts overseas. They also point to a potentially serious vulnerability in Washington's growing network of unmanned drones, which have become the American weapon of choice in both Afghanistan and Pakistan.

    The Obama administration has come to rely heavily on the unmanned drones because they allow the U.S. to safely monitor and stalk insurgent targets in areas where sending American troops would be either politically untenable or too risky.

    The stolen video feeds also indicate that U.S. adversaries continue to find simple ways of counteracting sophisticated American military technologies.

    U.S. military personnel in Iraq discovered the problem late last year when they apprehended a Shiite militant whose laptop contained files of intercepted drone video feeds. In July, the U.S. military found pirated drone video feeds on other militant laptops, leading some officials to conclude that militant groups trained and funded by Iran were regularly intercepting feeds.

    In the summer 2009 incident, the military found "days and days and hours and hours of proof" that the feeds were being intercepted and shared with multiple extremist groups, the person said. "It is part of their kit now."

    A senior defense official said that James Clapper, the Pentagon's intelligence chief, assessed the Iraq intercepts at the direction of Defense Secretary Robert Gates and concluded they represented a shortcoming to the security of the drone network.

    "There did appear to be a vulnerability," the defense official said. "There's been no harm done to troops or missions compromised as a result of it, but there's an issue that we can take care of and we're doing so."

    Senior military and intelligence officials said the U.S. was working to encrypt all of its drone video feeds from Iraq, Afghanistan and Pakistan, but said it wasn't yet clear if the problem had been completely resolved.

    Some of the most detailed evidence of intercepted feeds has been discovered in Iraq, but adversaries have also intercepted drone video feeds in Afghanistan, according to people briefed on the matter. These intercept techniques could be employed in other locations where the U.S. is using pilotless planes, such as Pakistan, Yemen and Somalia, they said.

    The Pentagon is deploying record numbers of drones to Afghanistan as part of the Obama administration's troop surge there. Lt. Gen. David Deptula, who oversees the Air Force's unmanned aviation program, said some of the drones would employ a sophisticated new camera system called "Gorgon Stare," which allows a single aerial vehicle to transmit back at least 10 separate video feeds simultaneously.

    Gen. Deptula, speaking to reporters Wednesday, said there were inherent risks to using drones since they are remotely controlled and need to send and receive video and other data over great distances. "Those kinds of things are subject to listening and exploitation," he said, adding the military was trying to solve the problems by better encrypting the drones' feeds.

    The potential drone vulnerability lies in an unencrypted downlink between the unmanned craft and ground control. The U.S. government has known about the flaw since the U.S. campaign in Bosnia in the 1990s, current and former officials said. But the Pentagon assumed local adversaries wouldn't know how to exploit it, the officials said.

    Last December, U.S. military personnel in Iraq discovered copies of Predator drone feeds on a laptop belonging to a Shiite militant, according to a person familiar with reports on the matter. "There was evidence this was not a one-time deal," this person said. The U.S. accuses Iran of providing weapons, money and training to Shiite fighters in Iraq, a charge that Tehran has long denied.

    The militants use programs such as (again, wont name program on this forum), from Russian company -----------. Andrew Solonikov, one of the software's developers, said he was unaware that his software could be used to intercept drone feeds. "It was developed to intercept music, photos, video, programs and other content that other users download from the Internet -- no military data or other commercial data, only free legal content," he said by email from Russia.

    Officials stepped up efforts to prevent insurgents from intercepting video feeds after the July incident. The difficulty, officials said, is that adding encryption to a network that is more than a decade old involves more than placing a new piece of equipment on individual drones. Instead, many components of the network linking the drones to their operators in the U.S., Afghanistan or Pakistan have to be upgraded to handle the changes. Additional concerns remain about the vulnerability of the communications signals to electronic jamming, though there's no evidence that has occurred, said people familiar with reports on the matter.

    Predator drones are built by General Atomics Aeronautical Systems Inc. of San Diego. Some of its communications technology is proprietary, so widely used encryption systems aren't readily compatible, said people familiar with the matter.

    In an email, a spokeswoman said that for security reasons, the company couldn't comment on "specific data link capabilities and limitations."

    Fixing the security gap would have caused delays, according to current and former military officials. It would have added to the Predator's price. Some officials worried that adding encryption would make it harder to quickly share time-sensitive data within the U.S. military, and with allies.

    "There's a balance between pragmatics and sophistication," said Mike Wynne, Air Force Secretary from 2005 to 2008.

    The Air Force has staked its future on unmanned aerial vehicles. Drones account for 36% of the planes in the service's proposed 2010 budget.

    Today, the Air Force is buying hundreds of Reaper drones, a newer model, whose video feeds could be intercepted in much the same way as with the Predators, according to people familiar with the matter. A Reaper costs between $10 million and $12 million each and is faster and better armed than the Predator. General Atomics expects the Air Force to buy as many as 375 Reapers.

    [​IMG]


    This is all we need now, towel heads watching themselves being blown up live. hehehehe.
     
  2. evangilder

    evangilder "Shooter"
    Staff Member Administrator

    Joined:
    Sep 17, 2004
    Messages:
    19,419
    Likes Received:
    137
    Trophy Points:
    63
    Occupation:
    Network Engineer/Photographer
    Location:
    Moorpark, CA
    Home Page:
    I can't believe they were sending those video feeds unencrypted. Where was the CommSec?!?!?!
     
  3. Njaco

    Njaco The Pop-Tart Whisperer
    Staff Member Moderator

    Joined:
    Feb 19, 2007
    Messages:
    23,053
    Likes Received:
    994
    Trophy Points:
    113
    Occupation:
    Animal Control Officer
    Location:
    Southern New Jersey
    and the media just created 1000 more jihadists by naming the software.
     
  4. evangilder

    evangilder "Shooter"
    Staff Member Administrator

    Joined:
    Sep 17, 2004
    Messages:
    19,419
    Likes Received:
    137
    Trophy Points:
    63
    Occupation:
    Network Engineer/Photographer
    Location:
    Moorpark, CA
    Home Page:
    Another fine example of the press trying to get more of our guys killed.
     
  5. RabidAlien

    RabidAlien Active Member

    Joined:
    Apr 27, 2008
    Messages:
    6,592
    Likes Received:
    4
    Trophy Points:
    38
    Occupation:
    IT
    Location:
    Hurst, Texas
    This "unnamed source" that leaked the info better STAY unnamed. He/she wouldn't live long enough to be court-martialed.

    Every technology that emerges soon finds that there's something that comes along to defeat it. That's the nature of conflict. But to have unencrypted WIRELESS signals? That's just frikkin stoopid! They should encrypt everything, but leave one channel open feeding pre-recorded footage of a completely different location.
     
  6. beaupower32

    beaupower32 Well-Known Member

    Joined:
    Jun 10, 2007
    Messages:
    1,840
    Likes Received:
    41
    Trophy Points:
    48
    Location:
    Lancaster, California
    Guys, I went back through and deleted the name of the software and company. I dont want that on here, and I should have done it in the first place.


    Its pretty crazy that they did this, and I agree with Evan, why wasnt this encripted even before it was deployed.
     
  7. mudpuppy

    mudpuppy Member

    Joined:
    Mar 6, 2008
    Messages:
    646
    Likes Received:
    2
    Trophy Points:
    18
    Location:
    Appalachian Foothills in Virginia
    Good move to delet the name there, BP. I had already seen the software named on another website early this morning and I pratically choked on my coffee when my sleepy brain woke up and realized what i was reading.
    I have no doubt the DoD will find some means of correcting this grave oversight of sending information through non-encrypted transmissions....if this has truly occurred. I worry how many of those in uniform may be placed in harms way if they have to reduce or remove these UAVs for a time being while they make the hardware/software corrections?

    My second string of curses was reserved for the media that has so gleefully reported this information. Buggers!
    Derekl
     
  8. syscom3

    syscom3 Pacific Historian

    Joined:
    Jun 4, 2005
    Messages:
    12,631
    Likes Received:
    309
    Trophy Points:
    83
    Gender:
    Male
    Location:
    Orange County, CA
    Evan ..... the issue isnt why the media is reporting this.

    The issue is why the video feeds were not encrypted in the first place.

    But then, think of all the fun the drone operators could have with transmitting multiple video feeds off of the drone. They could provide a video of a jihadist going to heaven only to find all of the virgins have chastity belts on. LOL!
     
  9. vikingBerserker

    vikingBerserker Well-Known Member

    Joined:
    Apr 10, 2009
    Messages:
    24,064
    Likes Received:
    655
    Trophy Points:
    113
    Occupation:
    Korporate Kontrolleur
    Location:
    South Carolina
    The big problem I see is it's been known for 10 fricken years and nobody thought they needed to do something about it.
     
  10. FLYBOYJ

    FLYBOYJ "THE GREAT GAZOO"
    Staff Member Moderator

    Joined:
    Apr 9, 2005
    Messages:
    23,198
    Likes Received:
    784
    Trophy Points:
    113
    Gender:
    Male
    Occupation:
    Aircraft Maintenance Manager/ Flight Instructor
    Location:
    Colorado, USA
    The discovery was made in the summer time and it's just getting reported. I'd bet dollars to donuts its now corrected or somethings been done to make it very dangerous to hack into a feed from a predator.
     
  11. beaupower32

    beaupower32 Well-Known Member

    Joined:
    Jun 10, 2007
    Messages:
    1,840
    Likes Received:
    41
    Trophy Points:
    48
    Location:
    Lancaster, California
    #11 beaupower32, Dec 17, 2009
    Last edited: Dec 17, 2009

    Yeah, im sure they have already fixed the problem. They are probably able to track down the computer and insert come sort of virus into it. Now that would be funny, you see a insurgent watching a live feed from a preditor, then all of a sudden he gets 20 million popups for men humping goats or something like that curtisy of the US Military.
     
  12. Messy1

    Messy1 Well-Known Member

    Joined:
    Nov 21, 2007
    Messages:
    2,708
    Likes Received:
    29
    Trophy Points:
    48
    Occupation:
    Sales for Karl Performance
    Location:
    Ankeny, Iowa
    Home Page:
    I'd laugh it they made if to heaven, only to find out their 72 virgins were all Perez Hilton!
     
  13. evangilder

    evangilder "Shooter"
    Staff Member Administrator

    Joined:
    Sep 17, 2004
    Messages:
    19,419
    Likes Received:
    137
    Trophy Points:
    63
    Occupation:
    Network Engineer/Photographer
    Location:
    Moorpark, CA
    Home Page:
    I agree that the issue is sending the data in the clear. But for the media to broadcast the issue is irresponsible reporting.
     
  14. Amsel

    Amsel Active Member

    Joined:
    Jul 15, 2008
    Messages:
    1,857
    Likes Received:
    5
    Trophy Points:
    38
    Location:
    Texas
    Or they thought that it was 72 virgins, but was really 72 Virginians, including Washington, Lee, etc.
     
  15. wheelsup_cavu

    wheelsup_cavu Well-Known Member

    Joined:
    Mar 8, 2009
    Messages:
    4,530
    Likes Received:
    43
    Trophy Points:
    48
    Occupation:
    CNC Machinist/Programmer
    Location:
    Corona, California
    Home Page:
    I seem to recall something similar with the satellites having unencrypted feeds a few years back.


    Wheels
     
  16. syscom3

    syscom3 Pacific Historian

    Joined:
    Jun 4, 2005
    Messages:
    12,631
    Likes Received:
    309
    Trophy Points:
    83
    Gender:
    Male
    Location:
    Orange County, CA
    And if the media didnt report the various military fiascos, then how would the DOD change?
     
  17. Aaron Brooks Wolters

    Aaron Brooks Wolters Well-Known Member

    Joined:
    Jul 28, 2007
    Messages:
    15,719
    Likes Received:
    339
    Trophy Points:
    83
    Gender:
    Male
    Occupation:
    Auto Restoration
    Location:
    Abingdon, VA.
    You know, the media keeps claiming the rite to freedom of the press but there is a point where it DOES become TREASONOUS!!!:mad:
     
  18. syscom3

    syscom3 Pacific Historian

    Joined:
    Jun 4, 2005
    Messages:
    12,631
    Likes Received:
    309
    Trophy Points:
    83
    Gender:
    Male
    Location:
    Orange County, CA
    Why?

    The media is reporting the inept decisions made by the military. I applaud them for this. No secrets were lost because the terrorists had already figured it out.
     
  19. Njaco

    Njaco The Pop-Tart Whisperer
    Staff Member Moderator

    Joined:
    Feb 19, 2007
    Messages:
    23,053
    Likes Received:
    994
    Trophy Points:
    113
    Occupation:
    Animal Control Officer
    Location:
    Southern New Jersey
    Are you sure about that? All I know is that instead of a few cells using that stuff or even thinking of it, now there many more M.E. Tim McVeighs running around.
     
  20. Soren

    Soren Banned

    Joined:
    Feb 6, 2005
    Messages:
    6,624
    Likes Received:
    3
    Trophy Points:
    0
    Exactly, that was my first thought as-well.

    That the transmissions weren't encrypted to begin with was stupid alright, but they found out and dealt with it.
     
Loading...

Share This Page