Insurgents Hack U.S. Drones

Status
Not open for further replies.

somedeafdudefromPNW

Active Member
Joined
Jul 6, 2009
Messages
9,499
Reaction score
1
Insurgents Hack U.S. Drones - WSJ.com

WASHINGTON -- Militants in Iraq have used $26 off-the-shelf software to intercept live video feeds from U.S. Predator drones, potentially providing them with information they need to evade or monitor U.S. military operations.

Senior defense and intelligence officials said Iranian-backed insurgents intercepted the video feeds by taking advantage of an unprotected communications link in some of the remotely flown planes' systems. Shiite fighters in Iraq used software programs such as SkyGrabber -- available for as little as $25.95 on the Internet -- to regularly capture drone video feeds, according to a person familiar with reports on the matter.

U.S. officials say there is no evidence that militants were able to take control of the drones or otherwise interfere with their flights. Still, the intercepts could give America's enemies battlefield advantages by removing the element of surprise from certain missions and making it easier for insurgents to determine which roads and buildings are under U.S. surveillance.

The drone intercepts mark the emergence of a shadow cyber war within the U.S.-led conflicts overseas. They also point to a potentially serious vulnerability in Washington's growing network of unmanned drones, which have become the American weapon of choice in both Afghanistan and Pakistan.

The Obama administration has come to rely heavily on the unmanned drones because they allow the U.S. to safely monitor and stalk insurgent targets in areas where sending American troops would be either politically untenable or too risky.

The stolen video feeds also indicate that U.S. adversaries continue to find simple ways of counteracting sophisticated American military technologies.

U.S. military personnel in Iraq discovered the problem late last year when they apprehended a Shiite militant whose laptop contained files of intercepted drone video feeds. In July, the U.S. military found pirated drone video feeds on other militant laptops, leading some officials to conclude that militant groups trained and funded by Iran were regularly intercepting feeds.

In the summer 2009 incident, the military found "days and days and hours and hours of proof" that the feeds were being intercepted and shared with multiple extremist groups, the person said. "It is part of their kit now."

A senior defense official said that James Clapper, the Pentagon's intelligence chief, assessed the Iraq intercepts at the direction of Defense Secretary Robert Gates and concluded they represented a shortcoming to the security of the drone network.

"There did appear to be a vulnerability," the defense official said. "There's been no harm done to troops or missions compromised as a result of it, but there's an issue that we can take care of and we're doing so."

Senior military and intelligence officials said the U.S. was working to encrypt all of its drone video feeds from Iraq, Afghanistan and Pakistan, but said it wasn't yet clear if the problem had been completely resolved.

Some of the most detailed evidence of intercepted feeds has been discovered in Iraq, but adversaries have also intercepted drone video feeds in Afghanistan, according to people briefed on the matter. These intercept techniques could be employed in other locations where the U.S. is using pilotless planes, such as Pakistan, Yemen and Somalia, they said.

The Pentagon is deploying record numbers of drones to Afghanistan as part of the Obama administration's troop surge there. Lt. Gen. David Deptula, who oversees the Air Force's unmanned aviation program, said some of the drones would employ a sophisticated new camera system called "Gorgon Stare," which allows a single aerial vehicle to transmit back at least 10 separate video feeds simultaneously.

Gen. Deptula, speaking to reporters Wednesday, said there were inherent risks to using drones since they are remotely controlled and need to send and receive video and other data over great distances. "Those kinds of things are subject to listening and exploitation," he said, adding the military was trying to solve the problems by better encrypting the drones' feeds.

The potential drone vulnerability lies in an unencrypted downlink between the unmanned craft and ground control. The U.S. government has known about the flaw since the U.S. campaign in Bosnia in the 1990s, current and former officials said. But the Pentagon assumed local adversaries wouldn't know how to exploit it, the officials said.

Last December, U.S. military personnel in Iraq discovered copies of Predator drone feeds on a laptop belonging to a Shiite militant, according to a person familiar with reports on the matter. "There was evidence this was not a one-time deal," this person said. The U.S. accuses Iran of providing weapons, money and training to Shiite fighters in Iraq, a charge that Tehran has long denied.

The militants use programs such as SkyGrabber, from Russian company SkySoftware. Andrew Solonikov, one of the software's developers, said he was unaware that his software could be used to intercept drone feeds. "It was developed to intercept music, photos, video, programs and other content that other users download from the Internet -- no military data or other commercial data, only free legal content," he said by email from Russia.

Officials stepped up efforts to prevent insurgents from intercepting video feeds after the July incident. The difficulty, officials said, is that adding encryption to a network that is more than a decade old involves more than placing a new piece of equipment on individual drones. Instead, many components of the network linking the drones to their operators in the U.S., Afghanistan or Pakistan have to be upgraded to handle the changes. Additional concerns remain about the vulnerability of the communications signals to electronic jamming, though there's no evidence that has occurred, said people familiar with reports on the matter.

Predator drones are built by General Atomics Aeronautical Systems Inc. of San Diego. Some of its communications technology is proprietary, so widely used encryption systems aren't readily compatible, said people familiar with the matter.

In an email, a spokeswoman said that for security reasons, the company couldn't comment on "specific data link capabilities and limitations."

Fixing the security gap would have caused delays, according to current and former military officials. It would have added to the Predator's price. Some officials worried that adding encryption would make it harder to quickly share time-sensitive data within the U.S. military, and with allies.

"There's a balance between pragmatics and sophistication," said Mike Wynne, Air Force Secretary from 2005 to 2008.

The Air Force has staked its future on unmanned aerial vehicles. Drones account for 36% of the planes in the service's proposed 2010 budget.

Today, the Air Force is buying hundreds of Reaper drones, a newer model, whose video feeds could be intercepted in much the same way as with the Predators, according to people familiar with the matter. A Reaper costs between $10 million and $12 million each and is faster and better armed than the Predator. General Atomics expects the Air Force to buy as many as 375 Reapers.

Someone really messed up here.
 
Of course, wireless is never 100% secured, and this proves my point that even with government military grade wireless system still hackable.
 
Not only a lot of money was invested in it. The security was breached as well.
 
They will have to come up with a much better and stronger encrypted technology.
 
They will have to come up with a much better and stronger encrypted technology.

Doubt it.

The software engineers I know of think that the US military messed up big-time.

The SkyGrabber is a fairly simple piece of code, that is somehow able to steal signals from the drones? Comon now.

Someone dropped the ball.
 
guys - I don't know if you're overlooking something. The reason why this was intercepted is because the transmission was not encrypted - therefore it was not hacked. It was simply available for anybody to grab. Shocking? not at all. This is old news.. been like this for decades since wireless (radio/satellite/etc) was born. Enabling encryption over transmission is complicated, expensive, and cumbersome. You only do it if it's absolutely vital.

The military officials were forced to disable encryption code because of on-demand live feed is needed for those on ground - urgently.

Enabling encryption causes live feed for those on ground to be glitchy and slow. No American soldiers' lives were harmed by this action. by the time soldiers used unencrypted transmission to track them, the terrorists were either dead or detained and then they're long gone before the soldiers were harmed.

don't worry. it's nothing shocking. It's just the fact of life and technology limitation. Not a big deal. nothing to panic about. time to move on :)
 
Doubt it.

The software engineers I know of think that the US military messed up big-time.

The SkyGrabber is a fairly simple piece of code, that is somehow able to steal signals from the drones? Comon now.

Someone dropped the ball.

nah I don't think so. My friend is deeply involved with UAW/UAV project (Predator drone). I'll ask him. Chance is - I'll probably won't be able to get any answer from him. you know... "it's classified"
 
Last edited:
guys - I don't know if you're overlooking something. The reason why this was intercepted is because the transmission was not encrypted - therefore it was not hacked. It was simply available for anybody to grab. Shocking? not at all. This is old news.. been like this for decades since wireless (radio/satellite/etc) was born. Enabling encryption over transmission is complicated, expensive, and cumbersome. You only do it if it's absolutely vital.

The military officials were forced to disable encryption code because of on-demand live feed is needed for those on ground - urgently.

Enabling encryption causes live feed for those on ground to be glitchy and slow. No American soldiers' lives were harmed by this action. by the time soldiers used unencrypted transmission to track them, the terrorists were either dead or detained and then they're long gone before the soldiers were harmed.

don't worry. it's nothing shocking. It's just the fact of life and technology limitation. Not a big deal. nothing to panic about. time to move on :)

:ty:

The people on my e-mail lists are just game developers. :lol:
 
Well they found a weakness. Now we need to add encryption to the streaming video.
 
Well they found a weakness. Now we need to add encryption to the streaming video.

*roll a newspaper* *BOP BOP BOP on your head*

They DO have encryption to transmission but they were FORCED to disable the encryption because the soldiers on-ground NEED it urgently to track terrorists. When enabling encryption - it causes laggy/glitchy videos. These soldiers' life are on the line and they need the live feed NOW so the military officials had to disable the encryption. Like I said and like what the officials said - No American soldiers' lives were harmed as the result of it. The soldiers were long gone before the terrorists can take action when intercepting the signal. Don't forget - the terrorists do not have fighter jet, hummer, or blackhawk helicopter. their speediness and mobility are extremely limited.

Sure the terrorists probably can phone them to warn them - LOOK! You're on candid camera! but it's not a big deal. They're most likely dead within the next min :lol: If they didn't get killed, they got lucky cuz the UAW tracking them is probably unarmed-version. oh well! better luck next time! :cool2:
 
Iraqi insurgents hacked Predator drone feeds, U.S. official indicates
Washington (CNN) -- Insurgents were able to use a mass-market software program to view live feeds from U.S. military Predator drones monitoring targets in Iraq, a U.S. official indicated to CNN Thursday.

The breach by Iranian-backed Shiite militants was discovered late last year, according to U.S. military and defense officials.

The story was first reported in the Wall Street Journal on Thursday.

The U.S. official, who asked not to be identified because he was not authorized to discuss the information, said no U.S. troops or combat missions had been compromised because of the intrusion.


There also is evidence that unmanned aerial vehicle (UAV) feeds also have been hacked in Afghanistan, according to the Journal article, but there was no evidence the militants were able to take control of the remote aircrafts' systems in either country.

The inexpensive software, created by a Russian company called SkyGrabber, is downloadable off the Internet. It allows users to take advantage of unprotected communication links in some of the UAVs.

A senior defense official who was not authorized to speak about the security breach said, "This was an old issue for us and it has been taken care of," but he would not elaborate on what specifically had been taken care of.

The official said that many of the UAV feeds need to be sent out live to numerous people at one time, and encryption was found to slow the real-time link. The encryption therefore was removed from many feeds.

Removing the encryption, however, allowed outsiders with the correct tools to gain unauthorized access to these feeds.

Pentagon spokesman Bryan Whitman would not comment on any of the article's details but said that any security breaches that arise are addressed.

"The department constantly evaluates and seeks to improve both the performance as well as the security of various intelligence, surveillance, and reconnaissance systems and platforms," Whitman said. "If and when we identify any shortfalls we obviously correct them as a continuous process of seeking both improved capabilities as well as improved security."

Lt. Gen. David Deptula, who is in charge of the Air Force's UAV mission, said the military is trying to fix vulnerabilities with improved encryption on UAV feeds.

"Those kinds of things are subject to listening and exploitation," he told reporters Wednesday when asked about vulnerabilities of UAV systems.

One U.S. official said special operations troops identified the threat "years ago" in Iraq and over the past two years have been "vastly improving" encryption on their various communications systems, including full-motion video.

The official said the United States generally can operate these systems with impunity in third-world countries that don't have the technology to tap into open satellite feeds. However, according to the official, Iran has been pushing the SkyGrabber-like technology to Shiite militants in Iraq essentially to see what the United States is looking at because Iranians believe they will be invaded next.

The vulnerability could date back to the 1990s, said Peter Singer, a military technology analyst for the Brookings Institution.

"In fact, in the Balkans, people with any satellite dish were able to intercept the communications from these systems, and watch special operations raids in Bosnia while sitting in their home," he said.

Before the U.S. invasion of Iraq in 2003, it is believed Saddam Hussein was able to monitor drone feeds. The Iraqis "located and downloaded the unencrypted satellite feed from U.S. military UAVs," a 2005 CIA report surmised.

The U.S. military and intelligence operations use pilotless drones in Iraq and Afghanistan both for surveillance and to fire missiles at targets.

While the CIA has never publicly acknowledged it, the agency operates the unmanned planes in Pakistan, where it has used drones to strike at Taliban and al Qaeda operatives, according to officials familiar with the strategy. But a U.S. official with knowledge of CIA and military UAV missions told CNN the drones used in Pakistan missions use encrypted feeds and are not vulnerable to hacking like the military drones used in Iraq.

The official said the drones employed by the intelligence community in Pakistan, which use state-of-the-art encryption technology, are used in a much more limited capacity than the military drones.

One of the developers of the SkyGrabber technology told CNN via e-mail that the software was developed to pull unprotected satellite feeds so that people in Russia could watch TV or gain access to the Internet in areas otherwise unable to get such signals.

"The software is intercepting data received from a satellite dish -- it doesn't say whether or not the data is classified, let alone that it is military data," said Andrew Solonikov.

He said the U.S. military has not contacted him about the reported security breach.

"Even if I wanted to do something about it, I wouldn't know what to do," he said.

Solonikov insisted the software was not developed for the use it has been put to in Iraq.

"[It seems that] somebody has invented a way to use this program outside of its intended purpose," he said. "But generally speaking, this points to a large security gap that the American military has missed."
 
:ty:

The people on my e-mail lists are just game developers. :lol:

oh lol ok. the thing about our military technology is.... it's comically complicated in so many ways that it didn't have to be. It is not unheard of to have over several dozens different contractors working on same project and it's typical of them to not share proprietary information among each other... thus leading to technical difficulty and system incompatibility. I wouldn't be surprised if this Predator has over 300 different contractors.

I just left message for my friend but he's probably snowboarding right now :lol:
 
Ah, thanks for pointing out!

*rubbing my injured head* :)
 
Status
Not open for further replies.
Back
Top