What's new

Insurgents Hack U.S. Drones

tamir

FULL MEMBER
Joined
Dec 10, 2008
Messages
344
Reaction score
0
Interesting article.



WASHINGTON -- Militants in Iraq have used $26 off-the-shelf software to intercept live video feeds from U.S. Predator drones, potentially providing them with information they need to evade or monitor U.S. military operations.

Senior defense and intelligence officials said Iranian-backed insurgents intercepted the video feeds by taking advantage of an unprotected communications link in some of the remotely flown planes' systems. Shiite fighters in Iraq used software programs such as SkyGrabber -- available for as little as $25.95 on the Internet -- to regularly capture drone video feeds, according to a person familiar with reports on the matter.

U.S. officials say there is no evidence that militants were able to take control of the drones or otherwise interfere with their flights. Still, the intercepts could give America's enemies battlefield advantages by removing the element of surprise from certain missions and making it easier for insurgents to determine which roads and buildings are under U.S. surveillance.

The drone intercepts mark the emergence of a shadow cyber war within the U.S.-led conflicts overseas. They also point to a potentially serious vulnerability in Washington's growing network of unmanned drones, which have become the American weapon of choice in both Afghanistan and Pakistan.

The Obama administration has come to rely heavily on the unmanned drones because they allow the U.S. to safely monitor and stalk insurgent targets in areas where sending American troops would be either politically untenable or too risky.

The stolen video feeds also indicate that U.S. adversaries continue to find simple ways of counteracting sophisticated American military technologies.

U.S. military personnel in Iraq discovered the problem late last year when they apprehended a Shiite militant whose laptop contained files of intercepted drone video feeds. In July, the U.S. military found pirated drone video feeds on other militant laptops, leading some officials to conclude that militant groups trained and funded by Iran were regularly intercepting feeds.

In the summer 2009 incident, the military found "days and days and hours and hours of proof" that the feeds were being intercepted and shared with multiple extremist groups, the person said. "It is part of their kit now."

A senior defense official said that James Clapper, the Pentagon's intelligence chief, assessed the Iraq intercepts at the direction of Defense Secretary Robert Gates and concluded they represented a shortcoming to the security of the drone network.

"There did appear to be a vulnerability," the defense official said. "There's been no harm done to troops or missions compromised as a result of it, but there's an issue that we can take care of and we're doing so."

Senior military and intelligence officials said the U.S. was working to encrypt all of its drone video feeds from Iraq, Afghanistan and Pakistan, but said it wasn't yet clear if the problem had been completely resolved.

View Full Image

U.S. Air Force

U.S. enemies in Iraq and Afghanistan have used off-the-shelf programs to intercept video feeds from Predator unmanned aircraft.
Some of the most detailed evidence of intercepted feeds has been discovered in Iraq, but adversaries have also intercepted drone video feeds in Afghanistan, according to people briefed on the matter. These intercept techniques could be employed in other locations where the U.S. is using pilotless planes, such as Pakistan, Yemen and Somalia, they said.

The Pentagon is deploying record numbers of drones to Afghanistan as part of the Obama administration's troop surge there. Lt. Gen. David Deptula, who oversees the Air Force's unmanned aviation program, said some of the drones would employ a sophisticated new camera system called "Gorgon Stare," which allows a single aerial vehicle to transmit back at least 10 separate video feeds simultaneously.

Gen. Deptula, speaking to reporters Wednesday, said there were inherent risks to using drones since they are remotely controlled and need to send and receive video and other data over great distances. "Those kinds of things are subject to listening and exploitation," he said, adding the military was trying to solve the problems by better encrypting the drones' feeds.

The potential drone vulnerability lies in an unencrypted downlink between the unmanned craft and ground control. The U.S. government has known about the flaw since the U.S. campaign in Bosnia in the 1990s, current and former officials said. But the Pentagon assumed local adversaries wouldn't know how to exploit it, the officials said.

Journal Communitydiscuss“ Who were the lame engineers who came up with a system that runs without encryption? Even the graduates of the local high school programming courses know better than to leave to chance an important security hole. ”
— John Cierra Last December, U.S. military personnel in Iraq discovered copies of Predator drone feeds on a laptop belonging to a Shiite militant, according to a person familiar with reports on the matter. "There was evidence this was not a one-time deal," this person said. The U.S. accuses Iran of providing weapons, money and training to Shiite fighters in Iraq, a charge that Tehran has long denied.

The militants use programs such as SkyGrabber, from Russian company SkySoftware. Andrew Solonikov, one of the software's developers, said he was unaware that his software could be used to intercept drone feeds. "It was developed to intercept music, photos, video, programs and other content that other users download from the Internet -- no military data or other commercial data, only free legal content," he said by email from Russia.

Related Iraq Videos
Iraqi Oil Up For Auction News Hub: Bombs Target Government Symbols Seven Children Killed at Bombed Baghdad School Obama Welcomes Iraq Election Law U.S. Troops to be Pulled From Iraq Isolationism Grows in America Officials stepped up efforts to prevent insurgents from intercepting video feeds after the July incident. The difficulty, officials said, is that adding encryption to a network that is more than a decade old involves more than placing a new piece of equipment on individual drones. Instead, many components of the network linking the drones to their operators in the U.S., Afghanistan or Pakistan have to be upgraded to handle the changes. Additional concerns remain about the vulnerability of the communications signals to electronic jamming, though there's no evidence that has occurred, said people familiar with reports on the matter.

Predator drones are built by General Atomics Aeronautical Systems Inc. of San Diego. Some of its communications technology is proprietary, so widely used encryption systems aren't readily compatible, said people familiar with the matter.

In an email, a spokeswoman said that for security reasons, the company couldn't comment on "specific data link capabilities and limitations."

Fixing the security gap would have caused delays, according to current and former military officials. It would have added to the Predator's price. Some officials worried that adding encryption would make it harder to quickly share time-sensitive data within the U.S. military, and with allies.

"There's a balance between pragmatics and sophistication," said Mike Wynne, Air Force Secretary from 2005 to 2008.

The Air Force has staked its future on unmanned aerial vehicles. Drones account for 36% of the planes in the service's proposed 2010 budget.

Today, the Air Force is buying hundreds of Reaper drones, a newer model, whose video feeds could be intercepted in much the same way as with the Predators, according to people familiar with the matter. A Reaper costs between $10 million and $12 million each and is faster and better armed than the Predator. General Atomics expects the Air Force to buy as many as 375 Reapers.

Write to Siobhan Gorman at siobhan.gorman@wsj.com, Yochi J. Dreazen at yochi.dreazen@wsj.com and August Cole at august.cole@dowjones.com

Insurgents Hack U.S. Drones - WSJ.com
 
.
Oh how come ?

And i wonder why they use the word insurgents for Iraqi people. I mean insurgents means rebels and there arent any. They are common Iraqis who want US invaders out of their country.

BTW interesting news.
 
.
Hi,

It is a breath taking news---all the time we talk about data linked aircraft---oh guess what---someday someone will break into the link and then the planes do cartweels and the missiles sommersaults---.

Once hacked in---the hacker can ultimately take over the control of the aircraft and the weapons system at some stage and then make the plane do 'magic'.

The nightmare has come true for the u s millitary.
 
.
Hi,

It is a breath taking news---all the time we talk about data linked aircraft---oh guess what---someday someone will break into the link and then the planes do cartweels and the missiles sommersaults---.

Once hacked in---the hacker can ultimately take over the control of the aircraft and the weapons system at some stage and then make the plane do 'magic'.

The nightmare has come true for the u s millitary.

And it also means that they can hit Isreal by using it?

And in case of subcontinent they can hit any vital installation be in India or Pakistan or also in China ?
 
.
I have been crying about this thing in my thread but every one thought that i was Insane:sick:

you will see something more horrible from Hacking world !
Please watch " Eagle eye":tup:
 
.
Hi,

It is a breath taking news---all the time we talk about data linked aircraft---oh guess what---someday someone will break into the link and then the planes do cartweels and the missiles sommersaults---.

Once hacked in---the hacker can ultimately take over the control of the aircraft and the weapons system at some stage and then make the plane do 'magic'.

The nightmare has come true for the u s millitary.

:cheers: Please read my thread " Why PAF should think about this thread"

It talks about Cyber warfare .
 
.
Interesting article.
Senior defense and intelligence officials said Iranian-backed insurgents intercepted the video feeds by taking advantage of an unprotected communications link in some of the remotely flown planes' systems. Shiite fighters in Iraq used software programs such as SkyGrabber -- available for as little as $25.95 on the Internet -- to regularly capture drone video feeds, according to a person familiar with reports on the matter.

U.S. officials say there is no evidence that militants were able to take control of the drones or otherwise interfere with their flights. Still, the intercepts could give America's enemies battlefield advantages by removing the element of surprise from certain missions and making it easier for insurgents to determine which roads and buildings are under U.S. surveillance.

U.S. military personnel in Iraq discovered the problem late last year when they apprehended a Shiite militant whose laptop contained files of intercepted drone video feeds. In July, the U.S. military found pirated drone video feeds on other militant laptops, leading some officials to conclude that militant groups trained and funded by Iran were regularly intercepting feeds.


Gen. Deptula, speaking to reporters Wednesday, said there were inherent risks to using drones since they are remotely controlled and need to send and receive video and other data over great distances. "Those kinds of things are subject to listening and exploitation," he said, adding the military was trying to solve the problems by better encrypting the drones' feeds.

The potential drone vulnerability lies in an unencrypted downlink between the unmanned craft and ground control. The U.S. government has known about the flaw since the U.S. campaign in Bosnia in the 1990s, current and former officials said. But the Pentagon assumed local adversaries wouldn't know how to exploit it, the officials said.

Read the boldfaced parts before anyone "happily" jumps to conclusions.


Hi,

It is a breath taking news---all the time we talk about data linked aircraft---oh guess what---someday someone will break into the link and then the planes do cartweels and the missiles sommersaults---.

Once hacked in---the hacker can ultimately take over the control of the aircraft and the weapons system at some stage and then make the plane do 'magic'.

The nightmare has come true for the u s millitary.

The "unencrypted downlink" part was fed off to collect the video grabs. Anyone with amateur electronics knowledge knows that its a very simple thing to do, just like feeding off a TV cable wire running on your rooftops.

All those who are trying to download that SkyGrabber software, the only thing you can achieve is get hold of some on air videos or if they are in the vicinity of a UAV (with all the paraphernalia like an antenna, laptop etc - which makes one very obvious and standout for the UAV to 'see'), if lucky, might get a glimpse of what the UAV is seeing. YOU CANNOT CONTROL THE UAV! Those flight controls are through a secure link!

And about aircrafts, geez, there are human pilots in there who control the damn thing! The "links" the aircraft uses is for communication, not flight control!!! Is there any present day avionics suite which fires weapons off another aircraft? Dont think so! And my guess is, neither will there be any. Too dangerous.

Another point to note is that they are making a fuss about "Shite" insurgents apparently funded by Iran! Now is that to prepare groundwork for an impending attack?
 
Last edited:
.
problem is that not every drone is having a data link (Link 11 or Link 16) kind of a thing, which are more secure and encrypted. Most of the drones use data link which are simple ones and can be susceptible to such interception.

Should be an eye opener for PAF and other drone operating countries too.

This report doesn't says all drone communication was intercepted, some in case. Their makes and models are not specified, so we don't know for sure which kind of data link are susceptible to interception.
 
.
This is big news man, irrespective of how much they used it.
 
.
Hi,

It is what we know---is what we are told---u s defence industry is spending millions to make a break through in this field. Once broken through, the hacker can shut off the engine---change the lock on the missile---but that would have to be done through an awac and with a super powerful computer.

And indeed this is big b news as our colleague indianrabbit stated.
 
. .
Oh how come ?

And i wonder why they use the word insurgents for Iraqi people. I mean insurgents means rebels and there arent any. They are common Iraqis who want US invaders out of their country.

BTW interesting news.

Quoting from Bruce Schneier on Security: The U.S. Civil Rights Movement as an Insurgency

The U.S. Civil Rights Movement as an Insurgency

This is interesting:

Most Americans fail to appreciate that the Civil Rights movement was about the overthrow of an entrenched political order in each of the Southern states, that the segregationists who controlled this order did not hesitate to employ violence (law enforcement, paramilitary, mob) to preserve it, and that for nearly a century the federal government tacitly or overtly supported the segregationist state governments. That the Civil Rights movement employed nonviolent tactics should fool us no more than it did the segregationists, who correctly saw themselves as being at war. Significant change was never going to occur within the political system: it had to be forced. The aim of the segregationists was to keep the federal government on the sidelines. The aim of the Civil Rights movement was to "capture" the federal government -- to get it to apply its weight against the Southern states. As to why it matters: a major reason we were slow to grasp the emergence and extent of the insurgency in Iraq is that it didn't -- and doesn't -- look like a classic insurgency. In fact, the official Department of Defense definition of insurgency still reflects a Vietnam era understanding of the term. Looking at the Civil Rights movement as an insurgency is useful because it assists in thinking more comprehensively about the phenomenon of insurgency and assists in a more complete -- and therefore more useful -- definition of the term.

The link to his talk is broken, unfortunately.

EDITED TO ADD (12/15): Video here. Thanks, mcb.​
 
.
AWACS can actually guide AMRAAM"s through Link-16.

That is a secure link, which in no way controls the FCS of an aircraft.
Secondly, the missile has to be fired by the human pilot! The control of the missile is then handed over to the AWACS team, that too in a scenario where its risky for the fighter pilot to switch his radars on. Operators in an AWACS cannot fire missiles from another aircraft. Correct me if I am wrong.
 
.
I reckon They should have been doing it silently ......
 
.
They were aware of the pitfalls of the lack of encryption on certain video feeds but took their chances to ensure a decent video feed. Encryption means feed delays & higher processing power consumption, something not ideal on the drone with limited source of energy due to size constraints.

As per controlling the drone, forget about it. Unless u have the encryption/decryption algorithms by some source, its not gonna happen.
 
.
Back
Top Bottom