Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

US spy planes ‘hacked’ with off-the-shelf software
Information Age ^ | 17 December 2009 | Pete Swabey

Posted on 12/17/2009 4:38:32 AM PST by Yo-Yo

Iraqi insurgents intercepted Predator drone communications using $26 tool, according to report Insurgents in Iraq were able to intercept video images transmitted by the US army’s unmanned spy planes using software cheaply available on the Internet, according to a report in the Wall Street Journal.

The insurgents were not able to control the Predator drones, but military personnel told the newspaper that tactical advantages may have been compromised by the breach.

It came to light when US soldiers captured a laptop belonging to insurgents, and found that it contained video images from a Predator drone. The WSJ report cites a source claiming that insurgents regularly used satellite communications interception software “available for as little as $25.95 on the Internet”.

The news highlights an emerging dimension of the growing sophistication of the cyber-criminal underground: While once a certain degree of technical know-how was required to become a ‘hacker’, today such is the demand that cheap and easy-to-use tools are widely available on the web.


TOPICS: Government; News/Current Events
KEYWORDS: aerospace; bhodod; cybersecurity; espionage; hacker
Navigation: use the links below to view more comments.
first 1-2021-4041-58 next last
Heard this story this morning on F&F. You'd think the video downlink from these UAVs would be encrypted better than this.

If Afghanis can do it, imagine a real shooting war against an equal such as China or Russia? Most likely, these UAVs will be rendered useless due to jamming and control spoofing.

1 posted on 12/17/2009 4:38:34 AM PST by Yo-Yo
[ Post Reply | Private Reply | View Replies]

To: ShadowAce

There’s no excuse for this kind of negligence!

Not many specific details though.


2 posted on 12/17/2009 4:43:34 AM PST by KoRn (Department of Homeland Security, Certified - "Right Wing Extremist")
[ Post Reply | Private Reply | To 1 | View Replies]

To: Yo-Yo; Jeff Head
Jeff:

Like, *PING*, dude.

Yo-Yo:

Clinton's fault for the whole "COTS" procurement brainstorm.

And Obama's by definition.

By putting together information from multiple sorties, the enemy can figure out all kinds of things like time over target, operating ranges, lots of fun stuff.

If they've had the sense to save just the intercepts so far, they can do this even *if* we encrypt the intercepts going forward.

NO cheers, unforturnately.

3 posted on 12/17/2009 4:47:19 AM PST by grey_whiskers (The opinions are solely those of the author and are subject to change without notice.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Yo-Yo

Obama owns it now, but the media is never going to blame him for it. They will find ways to blame Bush.


4 posted on 12/17/2009 4:48:32 AM PST by Leftism is Mentally Deranged
[ Post Reply | Private Reply | To 1 | View Replies]

To: Yo-Yo

lots of money can buy anyone whatever they want or need. There is no such thing as unbreakable code or “hack” proof systems. Man made it man can undo it.


5 posted on 12/17/2009 4:48:56 AM PST by HiramQuick (work harder ... welfare recipients depend on you!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Yo-Yo

But Yoyo ...haven’t you received the memo! According to some on FR, all that the USAF needs is A-10 Warthogs and a ‘swarm’ of UCAVs ...no need for those pesky Raptors. They must be somehow sure a potential future near-peer adversary like China cannot be able to jam the signal, degrade the signal quality, corrupt the signal, or just simply take out the satellites relaying the signal (and any real future war involving near peer advanced adversaries will involve blinding or destroying foe satellites). Thus, to them this must be a non story ...must be a ‘fluke’ by the Jihadis that China cannot be able to replicate. Thus, hurrah to the A-10 and its BIG gun and the UCAV ‘swarms’ with 20G plus maneuvrability etc etc etc ...


6 posted on 12/17/2009 4:49:25 AM PST by spetznaz (Nuclear-tipped Ballistic Missiles: The Ultimate Phallic Symbol)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Yo-Yo

“he insurgents were not able to control the Predator drones, but military personnel told the newspaper that tactical advantages may have been compromised by the breach.”

This is a fairly comical assessment. May have been compromised?

We spent how much for these drones, and the feeds can be easily intercepted?

Governmental incompetence, contractor greed over patriotism.

Now that the terrorists have been able to develop their countermeasures, since they have had a chance to test them under live conditions, we have a much less effective system.

Idiots. Just idiots.


7 posted on 12/17/2009 4:51:36 AM PST by RFEngineer
[ Post Reply | Private Reply | To 1 | View Replies]

To: KoRn
Not many specific details though.

You’re right.

They should have provided a link to the sight where we can buy the software.

8 posted on 12/17/2009 4:52:12 AM PST by Pontiac
[ Post Reply | Private Reply | To 2 | View Replies]

To: Yo-Yo
...real shooting war against an equal such as China or Russia...

They're failed states too?

9 posted on 12/17/2009 4:53:05 AM PST by MichiganConservative (I wouldn't hate the government if it didn't exist. (Evil + Stupid) === Government)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Alas Babylon!; American_Centurion; An.American.Expatriate; ASA.Ranger; ASA Vet; Ax; Azeem; ...

MI Ping


10 posted on 12/17/2009 4:55:00 AM PST by ASA Vet (Iran should have ceased to exist Nov 5, 1979, but we had no president then either.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Yo-Yo

I’m not sure I buy this yet. I’ll have to hear from some real military comm geeks first.


11 posted on 12/17/2009 4:55:38 AM PST by rhombus
[ Post Reply | Private Reply | To 1 | View Replies]

To: Yo-Yo

It’s simple. They did not actually see the drone footage in real time. They simply downloaded the footage that some soldier uploaded to the internet. Done after the fact. Google, drone videos. Viola, you can watch dozens of them. I worry more about people who think they actually tapped into the drone programs.


12 posted on 12/17/2009 4:57:08 AM PST by 724th (If the enemy is in range, so are you.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Yo-Yo

You don’t think it possible the “video” feeds the insurgents were looking at were video feeds the CIA wanted them to see and believe were real time?

I would venture to guess there are any number of programs the CIA has to feed disinformation to the enemy.

Me, I put my money on the odds the insurgents watching these videos were being fed exactly what we wanted them to see - a video that makes them believe the drone is 250 miles from where it really is.


13 posted on 12/17/2009 5:01:24 AM PST by HD1200
[ Post Reply | Private Reply | To 1 | View Replies]

To: Yo-Yo

Obama should have his eye on ball and get this corrected. This is HIS FAULT.


14 posted on 12/17/2009 5:01:46 AM PST by Michigan Bowhunter (Democrat socialist liberal scumbags.....how did we let this happen!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: 724th
Viola, you can watch dozens of them. I worry more about people who think they actually tapped into the drone programs.

Presumably, the $26 decrypting software was also on the laptop, and was tested against encrypted video.

15 posted on 12/17/2009 5:04:07 AM PST by Yo-Yo
[ Post Reply | Private Reply | To 12 | View Replies]

To: Yo-Yo
You'd think the video downlink from these UAVs would be encrypted better than this.

It takes time to encrypt and decrypt data. Maybe the delay isn't acceptable for various reasons..

16 posted on 12/17/2009 5:05:18 AM PST by EVO X
[ Post Reply | Private Reply | To 1 | View Replies]

To: Yo-Yo

Just seems implausable. The military operates on an intranet ( self contained).


17 posted on 12/17/2009 5:08:57 AM PST by 724th (If the enemy is in range, so are you.)
[ Post Reply | Private Reply | To 15 | View Replies]

To: Yo-Yo

If you are going to use the UAV to shoot at someone, the video feed had better be as close to “real-time” as possible. Encrypting the feed takes time, and the better the encryption, the longer the lag, would be my guess. And no, I did not stay at a Holiday Inn Express last night.


18 posted on 12/17/2009 5:12:57 AM PST by laker_dad
[ Post Reply | Private Reply | To 1 | View Replies]

To: Yo-Yo
They weren't "hacked". Some video feeds were supposedly intercepted by software called "SkyGrabber".

The SkyGrabber site is unreachable this morning probably because of the news reports. I've learned elsewhere that this software can intercept satellite feeds but I don't see where it presents the feed back in real time.

19 posted on 12/17/2009 5:13:10 AM PST by FReepaholic (If ignorance ain't bliss I don't know what is.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: 724th; CodeToad; Myrddin; hiredhand; hollywood
It’s simple. They did not actually see the drone footage in real time. They simply downloaded the footage that some soldier uploaded to the internet. Done after the fact. Google, drone videos. Viola, you can watch dozens of them. I worry more about people who think they actually tapped into the drone programs.

I think so too. If they can actually intercept compressed freq hopping encrypted feeds with a $26 dollar tool, I'd be amazed.

20 posted on 12/17/2009 5:17:45 AM PST by Travis McGee (---www.EnemiesForeignAndDomestic.com---)
[ Post Reply | Private Reply | To 12 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-4041-58 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson