What's new

US Stealth UAV RQ-170 downed in IRAN

gambit,

You will never get it since your mind is so closed and arrogant. No one is talking here about hacking into your C2 signals. No one. We have talked and proved that it was a super virus attack on US control centers in US bases which is completely a different thing. A virus penetrated those systems and had been reported in media. This virus searched all US drone assets looking for the most valuable to Iranians which was RQ-170, once it found it, the virus changed it into a trojan. Once the drone flew near to Iran or entered its air space, the virus got activated and took control of the plane and took it for a crash landing in an Iranian airbase as directed by the virus. The only jamming that occurred was to prevent the drone from re-establishing any contact with US control centers and prevent it from sending your Vf signals. Understood now?
 
.
You mean the Iranians got lucky, assuming this is real and am willing to be generous that it is.

Whatever dont make a difference whether iranians lucky americans unlucky or iranians brilliant bottom line this tech will be copied and used against americans brilliant news
 
.
gambit,

You will never get it since your mind is so closed and arrogant. No one is talking here about hacking into your C2 signals. No one. We have talked and proved that it was a super virus attack on US control centers in US bases which is completely a different thing. A virus penetrated those systems and had been reported in media. This virus searched all US drone assets looking for the most valuable to Iranians which was RQ-170, once it found it, the virus changed it into a trojan. Once the drone flew near to Iran or entered its air space, the virus got activated and took control of the plane and took it for a crash landing in an Iranian airbase as directed by the virus. The only jamming that occurred was to prevent the drone from re-establishing any contact with US control centers and prevent it from sending your Vf signals. Understood now?
You have not done a single thing to 'prove' it. All you did was made baseless assumptions.
 
.
You have not done a single thing to 'prove' it. All you did was made baseless assumptions.

Oh, yes we have, you liar. Go and read the posts from page 20 onwards. Go and read the discussion you had with me and It.fridz, you liar. You have not put up any evidence, not even circumstantial to prove your case. All you have done is copy pasting hocus pocus from internet. While the virus scenario is the strongest since there is circumstantial evidence for it. The virus had been reported by western media to have been there. The drone is in mint condition. That is what is important. Now you can go on about your business of lying again.
 
.
Oh, yes we have, you liar. Go and read the posts from page 20 onwards. Go and read the discussion you had with me and It.fridz, you liar. You have not put up any evidence, not even circumstantial to prove your case. All you have done is copy pasting hocus pocus from internet. While the virus scenario is the strongest since there is circumstantial evidence for it. The virus had been reported by western media to have been there. The drone is in mint condition. That is what is important. Now you can go on about your business of lying again.

well why should americans change they were liars yesterday, liars today and will lie tommorow. Its their way of life
 
.
Oh, yes we have, you liar. Go and read the posts from page 20 onwards. Go and read the discussion you had with me and It.fridz, you liar. You have not put up any evidence, not even circumstantial to prove your case. All you have done is copy pasting hocus pocus from internet. While the virus scenario is the strongest since there is circumstantial evidence for it. The virus had been reported by western media to have been there. The drone is in mint condition. That is what is important. Now you can go on about your business of lying again.
I have read this entire thread so far and have YET to see any credible explanations on what is that 'virus'. The only thing any report said about it is because it was difficult to remove, of which there are plenty, enough to keep many people making good money from it. So if I failed to prove my arguments, so did you with your baseless assumptions.

No better words to describe your argument so far: baseless assumptions.
 
.
Here is the proof for the existence of the virus:

Could The US Drone Have Been Compromised In September's Computer Attack On A US Air Base?

The Iranian video footage of the downed RQ-170 drone suggest that either Iran has one hell of a set of model builders or they somehow managed to compromise a highly secure US computer network.

If it's the latter, it may be no coincidence that in October Noah Shactman broke a story out of Creech Air Force base exposing a widespread computer virus that had fully infected drone operations. Two months ago it was believed the drones most likely to suffer from such and attack would be Reapers or Predators, but the RQ-170s also fly out of Creech AFB.
If the Iranians somehow breached the drone network and were able to reprogram the drone to make a gentle landing, in country, from 50,000 feet, it would be a military and engineering coup.
The RQ-170 doesn't require an outside signal to fly or navigate, so the suggestion that the drones signal could have been jammed is not entirely likely.
At the time, the Air Force downplayed the computer virus and explained it was merely a "keystroke logger" meaning it could have captured passwords and usernames of users and planes in the network. Could The US Drone Have Been Compromised In September's Computer Attack On A US Air Base?

And this news from CNN on October 10, 2011:

Virus infects program that controls U.S. drones

The systems that control U.S. military drones have been infected with a computer virus, a U.S. defense official confirmed to CNN on Monday.

Despite the infection of the classified program, the virus has not "stopped flights worldwide," the official said.

The official declined to comment on how the systems were infected nor whether the virus has resisted attempts to remove it.

The infection was first reported by Noah Shachtman for Wired magazine last week.

"Military officials are more concerned than panicked by this virus. They're just really not sure what's going on. They're not sure if it's a deliberate attack. They're not sure if it's something accidental," he said.

While drones are flown on missions in war zones such as Iraq and Afghanistan, the actual "cockpit" of the unmanned aircraft is on U.S. soil -- the operators work at Nevada's Creech Air Force Base.

According to Wired, the virus, which records pilot key strokes, was first detected about two weeks ago. Tech specialists are unsure whether it was installed intentionally, Wired reported.

Shachtman said the military has had a hard time wiping out the virus.

"They're tried over and over again to get rid of this thing using some fairly conventional methods, and they haven't worked. And so it seems the only thing to get rid of this virus is to basically wipe the hard drives of these computers entirely and sort of rebuild the computers from scratch," he said.

But that can be an exhausting process.

In 2008, removable hard drives introduced a virus into thousands of Defense Department computers, and to this day the Pentagon is still purging some machines.

In the case of the computers that help coordinate the drones, care also has to be taken to back up all the information so it isn't lost during rebuilding.
Virus infects program that controls U.S. drones - CNN

Here is another report about the super virus roaming the US air base. It was a revenge for Stuxnet:

Get Hacked, Don’t Tell: Drone Base Didn’t Report Virus

Officials at Creech Air Force Base in Nevada knew for two weeks about a virus infecting the drone “cockpits” there. But they kept the information about the infection to themselves — leaving the unit that’s supposed to serve as the Air Force’s cybersecurity specialists in the dark. The network defenders at the 24th Air Force learned of the virus by reading about it in Danger Room.

The virus, which records the keystrokes of remote pilots as their drones fly over places like Afghanistan, is now receiving attention at the highest levels; the four-star general who oversees the Air Force’s networks was briefed on the infection this morning. But for weeks, it stayed (you will pardon the expression) below the radar: a local problem that local network administrators were determined to fix on their own.

“It was not highlighted to us,” says a source involved with Air Force network operations. “When your article came out, it was like, ‘What is this?’”

The drones are still flying over warzones from Afghanistan to Pakistan to Yemen. There’s no sign, yet, that the virus either damaged any of the systems associated with the remotely piloted aircraft or transmitted sensitive information outside the military chain of command — although three military insiders caution that a full-blown, high-level investigation into the virus is only now getting underway.

Nevertheless, the virus has sparked a bit of a firestorm in military circles. Not only were officials in charge kept out of the loop about an infection in America’s weapon and surveillance system of choice, but the surprise surrounding that infection highlights a flaw in the way the U.S. military secures its information infrastructure: There’s no one in the Defense Department with his hand on the network switch. In fact, there is no one switch to speak of.


The four branches of the U.S. armed forces each has a dedicated unit that, in theory, is supposed to handle cyber defense for the entire service. The 24th Air Force, for example, “is the operational warfighting organization that establishes, operates, maintains and defends Air Force networks,” according to a military fact sheet. These units are then supposed to provide personnel and information to U.S. Cyber Command, which is supposed to oversee the military’s overall network defense.

In practice, it’s not that simple. Unlike most big private enterprises, the 24th doesn’t have a centralized system for managing and monitoring its networks. There’s no place at the 24th’s San Antonio headquarters where someone could see all the digital traffic hurtling through the service’s pipes. In fact, most of the major commands within the Air Force don’t have formal agreements to carry the other’s network traffic. (The 24th Air Force did not immediately respond to requests to comment for this article.)

“We’d never managed the entire Air Force network as a single enterprise,” Vince Ross, the program manager of the Air Force Electronic Systems Center’s Cyber Integration Division, said in March. “That meant there was no centralized management of the network, that systems and hardware weren’t standardized, and that top-level commanders didn’t have complete situational awareness.”

The plan is to one day integrate all that infrastructure into a single Air Force network. But for now, it’s largely cybersecurity by the honor system. Each base and each unit in the Air Force has its own geek squad. They only call for help if there’s a broader network problem, or if they’re truly stumped.

That didn’t happen when a so-called “keylogger” virus hit Creech more than two weeks ago.

“Nothing was ever reported anywhere. They just didn’t think it was important enough,” says a second source involved with operating the Air Force’s networks. “The incentive to share weaknesses is just not there.”

Not even when that weakness hits the robotic weapons that have become the lynchpin for American military operations around the planet. Get Hacked, Don't Tell: Drone Base Didn't Report Virus | Danger Room | Wired.com
 
.
Iran was 10 years in war, 10 years rebuilding her country, and 10 years improving. I guess they consider F14 as not up to date technology that doesnt worth producing again. The fact that they yet can use them without any foreign support should tell you volumes. Ofcourse if you dont come up with something like USA is giving them helping hand!
They dismantled other F-14s for spare parts, plus they got foreign aid, even from Israel.

Now what technologies they can get from the drone?

- RAM materials. Nothing too secret. Both China and Russia got them from Yugoslavian F-117.
- Engine. Very hard to copy, plus I dont think that this small subsonic drone has some hitec engine.
- Fly by wire. Virtually impossible to copy.
- E/O pod or SAR radar. Virtually impossible to copy. Most probably heavily damaged during the harsh landing.
 
.
Iran has F-14 for over 30 years but unable to produce anything even remotely similar. Stop fantasising.
hey 500!stop prattling! its not fantasising.its reality!we have about 8 years war an 33 years boycott.can you understand it?i know you can not.in last age of our war we had 3 tomcats in sevice.can you understand it.but we began refreshing unservice tomcats and now we have 50 tomcat incervice inside su-27,mig-29,su-24,mig-31 and iranian saegheh fighter.
we have make some models of iranian 5 gen fighter that we'll show it soon.and about 700 shahab3 and sejjil2 that they are ready to .....
 
.
They dismantled other F-14s for spare parts, plus they got foreign aid, even from Israel.

Now what technologies they can get from the drone?

- RAM materials. Nothing too secret. Both China and Russia got them from Yugoslavian F-117.
- Engine. Very hard to copy, plus I dont think that this small subsonic drone has some hitec engine.
- Fly by wire. Virtually impossible to copy.
- E/O pod or SAR radar. Virtually impossible to copy. Most probably heavily damaged during the harsh landing.

No, they never got any help from Israel at all. That was just a propaganda made up by Zionist media in those times much like Wikileaks of today. Just like US and Israel at that time used to spread propaganda that Iran was using chemical weapons against Iraqis, but the truth was that it was other way around. Propaganda against Iran is nothing new. Iran has officially denied all those allegations and these live on only in Zionist media. By the way as I said my earlier post, only Iran and US had F-14's and US itself physically shredded its own F-14's in order to keep Iranians from getting any spare parts.

- RAM materials, Iran did not have. Now they do.
- Engine: It is a TF-34 which is an old very simple but efficient engine used in A-10, a plane which was one of the cheapest planes of all times. Iran certainly can reverse engineer a 1970 simple turbofan, if it allocates enough funds for the project.
- Fly by wire is not even necessary to be copied. It is very simple to design and make a new one, as even undergrads in universities do them all the time as part of their pet projects.

-Sensors are fine since the landing was not that hard. The plane is in very good condition and so are sensors. I bet all electronics are commercial components making Iran's job much easier to copy.

And do not forget only five RQ-170 had been made according to some rumors and reports. So Iran has one of them now. China and Russia would be very interested. Go figure.
 
.
Here is the proof for the existence of the virus:
Yeah...Look at your own sources and what one said about Iran...

Could The US Drone Have Been Compromised In September's Computer Attack On A US Air Base?
It also just as likely that Iran has put on display a very convincing RQ-170 model. It would not be the first time Tehran has created mock-ups of military hardware it aspires to call its own.

Iran has been clamoring for Russian made S-300 surface-to-air missiles since 2005. So far, Russia has yet to deliver but that hasn't stopped Tehran from including these supposed S-300 launchers in Sunday's Army Day parade.

DefenseTech points out they look to be more like 55-gallon drums welded together than like S-300 launchers pictured in the Russian parade below.
If you want to use circumstantial evidences to support your argument, then understand that it is a double-edged sword and we can say that there are plenty of circumstantial evidences to support an argument that Iran is lying today as in the past.

Virus infects program that controls U.S. drones - CNN
Despite the infection of the classified program, the virus has not "stopped flights worldwide," the official said.

Get Hacked, Don't Tell: Drone Base Didn't Report Virus | Danger Room | Wired.com
The drones are still flying over warzones from Afghanistan to Pakistan to Yemen. There’s no sign, yet, that the virus either damaged any of the systems associated with the remotely piloted aircraft or transmitted sensitive information outside the military chain of command — although three military insiders caution that a full-blown, high-level investigation into the virus is only now getting underway.
Here is where we have to wonder...

If an adversary produces a new weapon, there are two ways to defeat it:

- Match said weapon. In other words, meet an aircraft with an aircraft. A tank with a tank. A ship with a ship. Granted, the quality differences between them is up for discussion, but the point here is that you either match type for type and lose, or you match type for type and win.

- Negate said weapon. In other words, if the adversary develop something called 'an aircraft' that exploits aerodynamic forces to fly and attack from the sky, you develop something that remove those aerodynamic forces. Get rid of Bernouli and his principles. It would indeed be magical because it would make birds fall out of the sky as well, but it would render the weapon useless at the elemental level before it can have any effect.

Stuxnet was exactly just that: a weapon that attacked at the foundation of nuclear technology, not just at nuclear weapons. Stuxnet cannot attack humans, but it was designed to DESTROY, if possible, a machine crucial for the development of nuclear weapon: the centrifuge. It was designed to destroy, not steal, because the centrifuge is a well known technology. So between the choice of destroying an enemy's military aviation by meeting him aircraft for aircraft versus denying him the ability to take off in the first place, which would anyone chose?

If you can engineer a virus that can inhabit the computer system that manages take-offs and landings scheduling and your intention is nefarious, why would you restrict yourself to anything less scheduling all ground aircrafts to hit the taxiways at once and authorize all airborne aircrafts to land at the same time?

So what is this 'virus' doing by continuing to allow drones to fly missions as if nothing as happened? Why not crash them all and set the Americans back in decades? Why bother to steal and match the Americans if you can remove that advantage in the first place?
 
. .
No, they never got any help from Israel at all. That was just a propaganda made up by Zionist media in those times much like Wikileaks of today. Just like US and Israel at that time used to spread propaganda that Iran was using chemical weapons against Iraqis, but the truth was that it was other way around. Propaganda against Iran is nothing new. Iran has officially denied all those allegations and these live on only in Zionist media. By the way as I said my earlier post, only Iran and US had F-14's and US itself physically shredded its own F-14's in order to keep Iranians from getting any spare parts.
They got lots of spare parts from Israel.

- RAM materials, Iran did not have. Now they do.
Its not a big deal. Every physics graduate knows princicples of RAM coating. Technologies are moe complicated thing but Iran still does not have them.

- Engine: It is a TF-34 which is an old very simple but efficient engine used in A-10, a plane which was one of the cheapest planes of all times. Iran certainly can reverse engineer a 1970 simple turbofan, if it allocates enough funds for the project.
Thats speculation. It was assumed that RQ-170 has 26-28 m wingspan and has TF-34 engine. Now we know that its less than 10 m wingspan.

- Fly by wire is not even necessary to be copied. It is very simple to design and make a new one, as even undergrads in universities do them all the time as part of their pet projects.
Fly by wire is quite complicated thing.

-Sensors are fine since the landing was not that hard. The plane is in very good condition and so are sensors. I bet all electronics are commercial components making Iran's job much easier to copy.
Its impossible to copy thermal camera array just as its impossible to copy processor. Even mighty Soviet Union could not mass produce thermal cameras.

And do not forget only five RQ-170 had been made according to some rumors and reports. So Iran has one of them now. China and Russia would be very interested. Go figure.
RQ-170 is just a small drone made for CIA needs.
 
.
when iphone was launched apple made tall claims that the phone cannot be hacked and these werent empty vlaims...Apple had spent truck loads of mkney on securing the phone..
how many days it took one teeny teenager to hack it?we all know that..
did apple know how their phone was hacked? no they didnt...
they had to ask the havker himself to reveal.how he did it..
the company who made the UAV wasnt bigger than apple and vouldnt have spent more mkney than apple to secure the system...
iranians somehow gound a security loop.hole and exploited that..
how they did it? they eont post it on.internet for all to read...and it will be very difficult for
american engineers to find out how it happened...
other examples are sony...they spent.years developing HDCP encryption for blue ray...and lots of money...and that was hacked...
microsoft makes tall claims at every new window release that this one cant be hacked...and it takes less than a week everytime to be hacked.
so no matter how big you are...your systems can be hacked...its not impossible.
 
.
Did we asked? How about letting US examine it? We can do it toollessly. We can do it without cameras or even to take notes. We do not need a lot of people, just two engineers. Is that too much to ask? :lol:

---------- Post added at 10:11 AM ---------- Previous post was at 10:10 AM ----------

when iphone was launched apple made tall claims that the phone cannot be hacked and these werent empty vlaims...Apple had spent truck loads of mkney on securing the phone..
how many days it took one teeny teenager to hack it?we all know that..
did apple know how their phone was hacked? no they didnt...
they had to ask the havker himself to reveal.how he did it..
the company who made the UAV wasnt bigger than apple and vouldnt have spent more mkney than apple to secure the system...
iranians somehow gound a security loop.hole and exploited that..
how they did it? they eont post it on.internet for all to read...and it will be very difficult for
american engineers to find out how it happened...
other examples are sony...they spent.years developing HDCP encryption for blue ray...and lots of money...and that was hacked...
microsoft makes tall claims at every new window release that this one cant be hacked...and it takes less than a week everytime to be hacked.
so no matter how big you are...your systems can be hacked...its not impossible.
See post 1031.
 
.
Back
Top Bottom