12-17-2009, 07:31
|
#1
|
|
Quiet Professional
Join Date: Aug 2004
Location: NorCal
Posts: 15,370
|
Iraqi Militants 'Hack' Predator Video
Iraqi militants use $26 software program to hack into real-time Pradator video feeds to see what US is observing.
http://today.msnbc.msn.com/id/261848...52335#34460555
And so it goes...
Richard
__________________
“Sometimes the Bible in the hand of one man is worse than a whisky bottle in the hand of (another)… There are just some kind of men who – who’re so busy worrying about the next world they’ve never learned to live in this one, and you can look down the street and see the results.” - To Kill A Mockingbird (Atticus Finch)
“Almost any sect, cult, or religion will legislate its creed into law if it acquires the political power to do so.” - Robert Heinlein
|
|
Richard is offline
|
|
12-17-2009, 07:59
|
#2
|
|
Quiet Professional
Join Date: Jun 2004
Location: Occupied Pineland
Posts: 4,701
|
Smile, you're on Candid Camera! Please note the cross hairs on your tv.
Not to worry, this is a known vulnerability; the fix is being implemented.
__________________
A nation can survive its fools, and even the ambitious. But it cannot survive treason from within. An enemy at the gates is less formidable, for he is known and carries his banner openly. But the traitor moves amongst those within the gate freely, his sly whispers rustling through all the alleys, heard in the very halls of government itself. For the traitor appears not a traitor; he speaks in accents familiar to his victims, and he wears their face and their arguments, he appeals to the baseness that lies deep in the hearts of all men. He rots the soul of a nation, he works secretly and unknown in the night to undermine the pillars of the city, he infects the body politic so that it can no longer resist. A murderer is less to fear.
~ Marcus Tullius Cicero (42B.C)
|
|
Peregrino is offline
|
|
12-17-2009, 08:05
|
#3
|
|
Quiet Professional
Join Date: Jun 2005
Location: America, the Beautiful
Posts: 3,193
|
Quote:
Originally Posted by Peregrino
Smile, you're on Candid Camera! Please note the cross hairs on your tv.
Not to worry, this is a known vulnerability; the fix is being implemented.
|
And will cost a hell of a lot more than $26!
|
|
Warrior-Mentor is offline
|
|
12-17-2009, 09:48
|
#4
|
|
Quiet Professional
Join Date: Dec 2004
Location: Nashville
Posts: 956
|
Is it not possible to...
Is it not possible to equip the drones to hone in on those receivers.. I'm a sluggo when it comes to electronics and such . It would seem to me that that capability would be with in our grasps'. I know that the Air Force security in Alaska was able to locate an A-team's hidden target surveillance position by tracing the frequency of their quartz watches three times the team was picked up and returned to the field. each time they were in different locations. The Air Force Lt. in charge stated that they could find this signal at a 4 mile range. Just asking,
__________________
The strongest reason for the people to retain the right to keep and bear arms is, as a last resort, to protect themselves against tyranny in government.
Thomas Jefferson
To compel a man to subsidize with his taxes the propagation of ideas which he disbelieves and abhors is sinful and tyrannical.
Thomas Jefferson
|
|
Blitzzz (RIP) is offline
|
|
12-17-2009, 12:38
|
#5
|
|
Quiet Professional (RIP)
Join Date: May 2007
Location: Carriere,Ms.
Posts: 6,922
|
Quote:
Originally Posted by Blitzzz
Is it not possible to equip the drones to hone in on those receivers.. I'm a sluggo when it comes to electronics and such . It would seem to me that that capability would be with in our grasps'. I know that the Air Force security in Alaska was able to locate an A-team's hidden target surveillance position by tracing the frequency of their quartz watches three times the team was picked up and returned to the field. each time they were in different locations. The Air Force Lt. in charge stated that they could find this signal at a 4 mile range. Just asking,
|
Wow,hope they have corrected that problem..............  
Big Teddy
__________________
I believe that SF is a 'calling' - not too different from the calling missionaries I know received. I knew instantly that it was for me, and that I would do all I could to achieve it. Most others I know in SF experienced something similar. If, as you say, you HAVE searched and read, and you do not KNOW if this is the path for you --- it is not....
Zonie Diver
SF is a calling and it requires commitment and dedication that the uninitiated will never understand......
Jack Moroney
SFA M-2527, Chapter XXXVII
|
|
greenberetTFS is offline
|
|
12-17-2009, 13:09
|
#6
|
|
Quiet Professional
Join Date: Aug 2004
Location: NorCal
Posts: 15,370
|
The full WSJ article.
Richard
Quote:
Insurgents Hack U.S. Drones
$26 Software Is Used to Breach Key Weapons in Iraq; Iranian Backing Suspected
Siobhsn Gorman, Yochi Dreazen, August Cole; WSJ, 18 Dec 2009
Militants in Iraq have used $26 off-the-shelf software to intercept live video feeds from U.S. Predator drones, potentially providing them with information they need to evade or monitor U.S. military operations.
Senior defense and intelligence officials said Iranian-backed insurgents intercepted the video feeds by taking advantage of an unprotected communications link in some of the remotely flown planes' systems. Shiite fighters in Iraq used software programs such as SkyGrabber -- available for as little as $25.95 on the Internet -- to regularly capture drone video feeds, according to a person familiar with reports on the matter.
U.S. officials say there is no evidence that militants were able to take control of the drones or otherwise interfere with their flights. Still, the intercepts could give America's enemies battlefield advantages by removing the element of surprise from certain missions and making it easier for insurgents to determine which roads and buildings are under U.S. surveillance.
The drone intercepts mark the emergence of a shadow cyber war within the U.S.-led conflicts overseas. They also point to a potentially serious vulnerability in Washington's growing network of unmanned drones, which have become the American weapon of choice in both Afghanistan and Pakistan.
The Obama administration has come to rely heavily on the unmanned drones because they allow the U.S. to safely monitor and stalk insurgent targets in areas where sending American troops would be either politically untenable or too risky.
The stolen video feeds also indicate that U.S. adversaries continue to find simple ways of counteracting sophisticated American military technologies.
U.S. military personnel in Iraq discovered the problem late last year when they apprehended a Shiite militant whose laptop contained files of intercepted drone video feeds. In July, the U.S. military found pirated drone video feeds on other militant laptops, leading some officials to conclude that militant groups trained and funded by Iran were regularly intercepting feeds.
In the summer 2009 incident, the military found "days and days and hours and hours of proof" that the feeds were being intercepted and shared with multiple extremist groups, the person said. "It is part of their kit now."
A senior defense official said that James Clapper, the Pentagon's intelligence chief, assessed the Iraq intercepts at the direction of Defense Secretary Robert Gates and concluded they represented a shortcoming to the security of the drone network.
"There did appear to be a vulnerability," the defense official said. "There's been no harm done to troops or missions compromised as a result of it, but there's an issue that we can take care of and we're doing so."
Senior military and intelligence officials said the U.S. was working to encrypt all of its drone video feeds from Iraq, Afghanistan and Pakistan, but said it wasn't yet clear if the problem had been completely resolved.
Some of the most detailed evidence of intercepted feeds has been discovered in Iraq, but adversaries have also intercepted drone video feeds in Afghanistan, according to people briefed on the matter. These intercept techniques could be employed in other locations where the U.S. is using pilotless planes, such as Pakistan, Yemen and Somalia, they said.
The Pentagon is deploying record numbers of drones to Afghanistan as part of the Obama administration's troop surge there. Lt. Gen. David Deptula, who oversees the Air Force's unmanned aviation program, said some of the drones would employ a sophisticated new camera system called "Gorgon Stare," which allows a single aerial vehicle to transmit back at least 10 separate video feeds simultaneously.
Gen. Deptula, speaking to reporters Wednesday, said there were inherent risks to using drones since they are remotely controlled and need to send and receive video and other data over great distances. "Those kinds of things are subject to listening and exploitation," he said, adding the military was trying to solve the problems by better encrypting the drones' feeds.
The potential drone vulnerability lies in an unencrypted downlink between the unmanned craft and ground control. The U.S. government has known about the flaw since the U.S. campaign in Bosnia in the 1990s, current and former officials said. But the Pentagon assumed local adversaries wouldn't know how to exploit it, the officials said.
Last December, U.S. military personnel in Iraq discovered copies of Predator drone feeds on a laptop belonging to a Shiite militant, according to a person familiar with reports on the matter. "There was evidence this was not a one-time deal," this person said. The U.S. accuses Iran of providing weapons, money and training to Shiite fighters in Iraq, a charge that Tehran has long denied.
The militants use programs such as SkyGrabber, from Russian company SkySoftware. Andrew Solonikov, one of the software's developers, said he was unaware that his software could be used to intercept drone feeds. "It was developed to intercept music, photos, video, programs and other content that other users download from the Internet -- no military data or other commercial data, only free legal content," he said by email from Russia.
Officials stepped up efforts to prevent insurgents from intercepting video feeds after the July incident. The difficulty, officials said, is that adding encryption to a network that is more than a decade old involves more than placing a new piece of equipment on individual drones. Instead, many components of the network linking the drones to their operators in the U.S., Afghanistan or Pakistan have to be upgraded to handle the changes. Additional concerns remain about the vulnerability of the communications signals to electronic jamming, though there's no evidence that has occurred, said people familiar with reports on the matter.
Predator drones are built by General Atomics Aeronautical Systems Inc. of San Diego. Some of its communications technology is proprietary, so widely used encryption systems aren't readily compatible, said people familiar with the matter.
In an email, a spokeswoman said that for security reasons, the company couldn't comment on "specific data link capabilities and limitations."
Fixing the security gap would have caused delays, according to current and former military officials. It would have added to the Predator's price. Some officials worried that adding encryption would make it harder to quickly share time-sensitive data within the U.S. military, and with allies.
"There's a balance between pragmatics and sophistication," said Mike Wynne, Air Force Secretary from 2005 to 2008.
The Air Force has staked its future on unmanned aerial vehicles. Drones account for 36% of the planes in the service's proposed 2010 budget.
Today, the Air Force is buying hundreds of Reaper drones, a newer model, whose video feeds could be intercepted in much the same way as with the Predators, according to people familiar with the matter. A Reaper costs between $10 million and $12 million each and is faster and better armed than the Predator. General Atomics expects the Air Force to buy as many as 375 Reapers.
http://online.wsj.com/article/SB126102247889095011.html
|
__________________
“Sometimes the Bible in the hand of one man is worse than a whisky bottle in the hand of (another)… There are just some kind of men who – who’re so busy worrying about the next world they’ve never learned to live in this one, and you can look down the street and see the results.” - To Kill A Mockingbird (Atticus Finch)
“Almost any sect, cult, or religion will legislate its creed into law if it acquires the political power to do so.” - Robert Heinlein
|
|
Richard is offline
|
|
12-17-2009, 14:50
|
#7
|
|
Area Commander
Join Date: May 2006
Location: Raeford, NC
Posts: 3,374
|
How is it "hacked" when it's an open transmission?
This vulnerability has been in the open since day one...
From 1996... http://www.defense.gov/transcripts/t...anscriptid=361
Quote:
Q: Can you tell us how much you'll save by using commercial technology?
Kaminski: I can't tell you how much we'll save. What I would say is that there isn't a path to do this, relying on developing something from scratch at a defense base. What we're doing is relying on the commercial-developed base because it's a quick base as well.
Q: Who are the commercial providers?
A: Hughes is the primary provider of direct broadcast TV that you can buy in the United States, and that's the technology we're leveraging off of -- that type of technology.
|
It was also brought to light back in 2002 in Bosnia....(looking for a reference)
__________________
D-3129 Life
"If one day you decide to know yourself...you'll have to choose the warrior path...You'll reach the darkness of your spirit.... Then, if you overcome your fears....You will know who you are."
"De Oppresso Liber"
|
|
Snaquebite is offline
|
|
12-17-2009, 17:32
|
#8
|
|
Quiet Professional
Join Date: Dec 2004
Location: CO
Posts: 333
|
Quote:
Originally Posted by Blitzzz
Is it not possible to equip the drones to hone in on those receivers.. I'm a sluggo when it comes to electronics and such . It would seem to me that that capability would be with in our grasps'. I know that the Air Force security in Alaska was able to locate an A-team's hidden target surveillance position by tracing the frequency of their quartz watches three times the team was picked up and returned to the field. each time they were in different locations. The Air Force Lt. in charge stated that they could find this signal at a 4 mile range. Just asking,
|
Probably not. They are probably simply grabbing the signal out of the air that the drones are transmitting. They are probably not transmitting any signal for the drones, or anyone else, to hone in on. This seems to be not unlike the technology that hackers use to break into someone's computer when they are using unsecured WIFI.
SFC W
|
|
uboat509 is offline
|
|
12-19-2009, 22:50
|
#9
|
|
Quiet Professional
Join Date: Dec 2004
Location: Nashville
Posts: 956
|
Too bad...
Too bad we don't have some JDAM that can follow a tracking reciever's passive signals.
__________________
The strongest reason for the people to retain the right to keep and bear arms is, as a last resort, to protect themselves against tyranny in government.
Thomas Jefferson
To compel a man to subsidize with his taxes the propagation of ideas which he disbelieves and abhors is sinful and tyrannical.
Thomas Jefferson
|
|
Blitzzz (RIP) is offline
|
|
|
Currently Active Users Viewing This Thread: 1 (0 members and 1 guests)
|
|
|
Posting Rules
|
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts
HTML code is Off
|
|
|
All times are GMT -6. The time now is 22:29.
|
|
|