Announcement

Collapse
No announcement yet.

Drones Hacked with $26 Software

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • Drones Hacked with $26 Software

    Militants in Iraq hacked U.S. Predator drones using $26 off-the-shelf software to download and watch military surveillance video. Elizabeth Palmer reports.


  • #2
    Re: Drones Hacked with $26 Software

    Originally posted by Rajiv View Post
    Militants in Iraq hacked U.S. Predator drones using $26 off-the-shelf software to download and watch military surveillance video. Elizabeth Palmer reports...
    26 bucks? That's cheaper and more useful than anything Microsoft produces...:rolleyes:

    Comment


    • #3
      Re: Drones Hacked with $26 Software

      'hack' is rather an overstatement considering they've only tapped unencrypted satellite feeds. I'm sure the military considered this happening when they chose the way it transmits the signal.
      engineer with little (or even no) economic insight

      Comment


      • #4
        Re: Drones Hacked with $26 Software

        Originally posted by FrankL View Post
        'hack' is rather an overstatement considering they've only tapped unencrypted satellite feeds. I'm sure the military considered this happening when they chose the way it transmits the signal.
        During WWII didn't the various warring parties release fake intelligence reports, such as the location of the D Day landing sites, in codes they knew would be broken...:cool:

        Comment


        • #5
          Re: Drones Hacked with $26 Software

          This story was also discussed over at DailyTech.

          Comment


          • #6
            Re: Drones Hacked with $26 Software

            Originally posted by FrankL View Post
            'hack' is rather an overstatement considering they've only tapped unencrypted satellite feeds. I'm sure the military considered this happening when they chose the way it transmits the signal.
            According to the story in the Post they did consider it, but then decided the simple tribesmen in Afgh/Pak would never figure it out. :rolleyes:

            Comment


            • #7
              Re: Drones Hacked with $26 Software

              Given the quality of TV these days, it's just another Reality TV show.

              Comment


              • #8
                Re: Drones Hacked with $26 Software

                Originally posted by WDCRob View Post
                According to the story in the Post they did consider it, but then decided the simple tribesmen in Afgh/Pak would never figure it out. :rolleyes:
                That isn't correct. There simply isn't enough encrypted/secure bandwidth to go around, that is why they're transmitting openly like that. AFAIK adding more bandwidth would require more satellites which is expensive and time consuming to say the least. They run into similar issues with radio transmissions too believe it or not, also for the same reasons.

                This article is sensationalist, there is no hacking going on at all.

                Comment


                • #9
                  Re: Drones Hacked with $26 Software

                  http://www.wired.com/dangerroom/2009...-us-warplanes/

                  Danger Room What’s Next in National Security
                  Not Just Drones: Militants Can Snoop on Most U.S. Warplanes (Updated)

                  • By Noah Shachtman
                  • December 17, 2009 |
                  • 6:10 pm |
                  • Categories: Air Force



                  Tapping into drones’ video feeds was just the start. The U.S. military’s primary system for bringing overhead surveillance down to soldiers and Marines on the ground is also vulnerable to electronic interception, multiple military sources tell Danger Room. That means militants have the ability to see through the eyes of all kinds of combat aircraft — from traditional fighters and bombers to unmanned spy planes. The problem is in the process of being addressed. But for now, an enormous security breach is even larger than previously thought.
                  The military initially developed the Remotely Operated Video Enhanced Receiver, or ROVER, in 2002. The idea was let troops on the ground download footage from Predator drones and AC-130 gunships as it was being taken. Since then, nearly every airplane in the American fleet — from F-16 and F/A-18 fighters to A-10 attack planes to Harrier jump jets to B-1B bombers has been outfitted with equipment that lets them transmit to ROVERs. Thousands of ROVER terminals have been distributed to troops in Afghanistan and Iraq.
                  But those early units were “fielded so fast that it was done with an unencrypted signal. It could be both intercepted (e.g. hacked into) and jammed,” e-mails an Air Force officer with knowledge of the program. In a presentation last month before a conference of the Army Aviation Association of America, a military official noted that the current ROVER terminal “receives only unencrypted L, C, S, Ku [satellite] bands.”
                  So the same security breach that allowed insurgent to use satellite dishes and $26 software to intercept drone feeds can be used the tap into the video transmissions of any plane.
                  The military is working to plug the hole — introducing new ROVER models that communicate without spilling its secrets. “Recognizing the potential for future exploitation the Air Force has been working aggressively to encrypt these ROVER downlink signals. It is my understanding that we have already developed the technical encryption solutions and are fielding them,” the Air Force officer notes.
                  But it won’t be easy. An unnamed Pentagon official tells reporters that “this is an old issue that’s been addressed.” Air Force officers contacted by Danger Room disagree, strongly.
                  “This is not a trivial solution,” one officer observes. “Almost every fighter/bomber/ISR [intelligence surveillance reconnaissance] platform we have in theater has a ROVER downlink. All of our Tactical Air Control Parties and most ground TOCs [tactical operations centers] have ROVER receivers. We need to essentially fix all of the capabilities before a full transition can occur and in the transition most capabilities need to be dual-capable (encrypted and unencrypted).”
                  Which presents all sorts of problems. Let’s say a drone or an A-10 is sent to cover soldiers under fire. If the aircraft has an encrypted transmitter and the troops have an unencrypted ROVER receiver, that surveillance footage can’t be passed down to the soldiers who need it most.
                  “Can these feeds be encrypted with 99.5 percent chance of no compromise? Absolutely! Can you guarantee that all the encryption keys make it down to the lowest levels in the Army or USMC [United States Marine Corps]? No way,” adds a second Air Force officer, familiar with the ROVER issue. “Do they trust their soldiers/Marines with these encryption keys? Don’t know that.”
                  Since the top commander in Afghanistan, General Stanley McChrystal, issued strict new guidelines on the use of airstrikes, the United States has turned nearly every plane in its inventory into an eye in the sky. Sending video down to those ROVER terminals has become job No. 1 for most American air crews flying today.
                  And U.S. troops fighting in Iraq and Afghanistan have come to depend on the feeds. “For sure,” Lt. Col. Greg Harbin told the Los Angeles Times, “I would be dead without this technology.”
                  Still, some Air Force officers downplayed the significance of the ROVER’s security hole. “If you’re an insurgent, you need to know when and where [aircraft] are flying and then be within the line-of-sight footprint of the feed for any chance of successfully using the information real-time,” one officer writes. “This is much to do about nothing. You have bigger fish to fry.”
                  “The ranges on these signals is not very great, they are low-power and intended for line-of sight communications. A risk has been identified, [but] it poses limited immediate operational or tactical risk, and certainly does not outweigh the value of thee capabilities,” a second notes.
                  I have immense respect for both of these officers. But I’m not sure I buy their arguments. If real-time video feeds are valuable to U.S. troops, then it stands to reason that the footage is valuable to insurgent forces, as well. Either this is important data — and worth protecting — or it isn’t.
                  UPDATE: Some military drones are “particularly susceptible” to having their video tapped, a senior military officer tells Danger Room. That’s because these smaller unmanned aircraft — like the Shadow, Hunter, and Raven — broadcast their surveillance footage constantly and in every direction. All you have to do, basically, is stand within “line of sight” of the drone, and you can tap in. “It’s like criminals using radio scanners to pick up police communications,” the senior officer says.
                  Larger aircraft — both manned and unmanned — are a little less vulnerable. They can shut off their video feeds if no friendly forces are watching at the time. And they can “neck down” those omnidirectional signals a bit. So it’s more difficult to intercept the transmission. The officer contends that there have “not been any significant — not any impact — on operations as a result of this.”
                  Still, systems like the ROVER (and the Predator, for that matter) were “built to be cheap. They used commercial off-the-shelf hardware. We wanted to get stuff out there. So it’s not gonna be perfect,” the officer adds. “So yeah, if we’re broadcasting in the electromagnetic spectrum and you’re underneath the footprint, you can receive it. Duh-uhhhh.”
                  – Noah Shachtman, with Nathan Hodge

                  Comment


                  • #10
                    Re: Drones Hacked with $26 Software

                    Originally posted by KGW, quoting Noah Shachtman View Post
                    I have immense respect for both of these officers. But I’m not sure I buy their arguments. If real-time video feeds are valuable to U.S. troops, then it stands to reason that the footage is valuable to insurgent forces, as well. Either this is important data — and worth protecting — or it isn’t.
                    Information is most valuable when the entire context is understood. The insurgents may have access to the raw video feed, but they do not have the mission planning briefs and other such important aspects.

                    Comment


                    • #11
                      Re: Drones Hacked with $26 Software

                      Originally posted by KGW View Post
                      I have immense respect for both of these officers. But I’m not sure I buy their arguments. If real-time video feeds are valuable to U.S. troops, then it stands to reason that the footage is valuable to insurgent forces, as well. Either this is important data — and worth protecting — or it isn’t.
                      Well the drones are used for reconaissance largely, so if a drone is going on a reconaissance run finding out enemy locations, the worth of the feed to the insurgents would be minimal, they know where they are and the surrounding area unless the drone's video feed is exposing troop placements and bases (which they know where the camps and bases are already). And another thing is that especially in a mountainous environment the line-of-sight distance would be far less than, say, the Iraqi desert.

                      And if the insurgents are actively trying to read the video feed, that's a good thing, because then a certain item in our nation's artillery can be used against the computer operators.

                      Comment

                      Working...
                      X