[Home]  [Headlines]  [Latest Articles]  [Latest Comments]  [Post]  [Mail]  [Sign-in]  [Setup]  [Help]  [Register] 

"International court’s attack on Israel a sign of the free world’s moral collapse"

"Pete Hegseth Is Right for the DOD"

"Why Our Constitution Secures Liberty, Not Democracy"

Woodworking and Construction Hacks

"CNN: Reporters Were Crying and Hugging in the Hallways After Learning of Matt Gaetz's AG Nomination"

"NEW: Democrat Officials Move to Steal the Senate Race in Pennsylvania, Admit to Breaking the Law"

"Pete Hegseth Is a Disruptive Choice for Secretary of Defense. That’s a Good Thing"

Katie Britt will vote with the McConnell machine

Battle for Senate leader heats up — Hit pieces coming from Thune and Cornyn.

After Trump’s Victory, There Can Be No Unity Without A Reckoning

Vivek Ramaswamy, Dark-horse Secretary of State Candidate

Megyn Kelly has a message for Democrats. Wait for the ending.

Trump to choose Tom Homan as his “Border Czar”

"Trump Shows Demography Isn’t Destiny"

"Democrats Get a Wake-Up Call about How Unpopular Their Agenda Really Is"

Live Election Map with ticker shows every winner.

Megyn Kelly Joins Trump at His Final PA Rally of 2024 and Explains Why She's Supporting Him

South Carolina Lawmaker at Trump Rally Highlights Story of 3-Year-Old Maddie Hines, Killed by Illegal Alien

GOP Demands Biden, Harris Launch Probe into Twice-Deported Illegal Alien Accused of Killing Grayson Davis

Previously-Deported Illegal Charged With Killing Arkansas Children’s Hospital Nurse in Horror DUI Crash

New Data on Migrant Crime Rates Raises Eyebrows, Alarms

Thousands of 'potentially fraudulent voter registration applications' Uncovered, Stopped in Pennsylvania

Michigan Will Count Ballot of Chinese National Charged with Voting Illegally

"It Did Occur" - Kentucky County Clerk Confirms Voting Booth 'Glitch'' Shifted Trump Votes To Kamala

Legendary Astronaut Buzz Aldrin 'wholeheartedly' Endorses Donald Trump

Liberal Icon Naomi Wolf Endorses Trump: 'He's Being More Inclusive'

(Washed Up Has Been) Singer Joni Mitchell Screams 'F*** Trump' at Hollywood Bowl

"Analysis: The Final State of the Presidential Race"

He’ll, You Pieces of Garbage

The Future of Warfare -- No more martyrdom!

"Kamala’s Inane Talking Points"

"The Harris Campaign Is Testament to the Toxicity of Woke Politics"

Easy Drywall Patch

Israel Preparing NEW Iran Strike? Iran Vows “Unimaginable” Response | Watchman Newscast

In Logansport, Indiana, Kids are Being Pushed Out of Schools After Migrants Swelled County’s Population by 30%: "Everybody else is falling behind"

Exclusive — Bernie Moreno: We Spend $110,000 Per Illegal Migrant Per Year, More than Twice What ‘the Average American Makes’

Florida County: 41 of 45 People Arrested for Looting after Hurricanes Helene and Milton are Noncitizens

Presidential race: Is a Split Ticket the only Answer?

hurricanes and heat waves are Worse

'Backbone of Iran's missile industry' destroyed by IAF strikes on Islamic Republic

Joe Rogan Experience #2219 - Donald Trump

IDF raids Hezbollah Radwan Forces underground bases, discovers massive cache of weapons

Gallant: ‘After we strike in Iran,’ the world will understand all of our training

The Atlantic Hit Piece On Trump Is A Psy-Op To Justify Post-Election Violence If Harris Loses

Six Al Jazeera journalists are Hamas, PIJ terrorists

Judge Aileen Cannon, who tossed Trump's classified docs case, on list of proposed candidates for attorney general

Iran's Assassination Program in Europe: Europe Goes Back to Sleep

Susan Olsen says Brady Bunch revival was cancelled because she’s MAGA.

Foreign Invaders crisis cost $150B in 2023, forcing some areas to cut police and fire services: report

Israel kills head of Hezbollah Intelligence.


Status: Not Logged In; Sign In

Obama Wars
See other Obama Wars Articles

Title: Insurgents Hack U.S. Drones///$26 Software Is Used to Breach Key Weapons in Iraq; Iranian Backing Suspected
Source: WSJ
URL Source: http://online.wsj.com/article/SB126 ... tml?mod=WSJ_hpp_LEFTTopStories
Published: Dec 17, 2009
Author: SIOBHAN GORMAN, YOCHI J. DREAZEN & AUGUS
Post Date: 2009-12-17 10:46:46 by Happy Quanzaa
Keywords: oops
Views: 2348
Comments: 11

WASHINGTON -- Militants in Iraq have used $26 off-the-shelf software to intercept live video feeds from U.S. Predator drones, potentially providing them with information they need to evade or monitor U.S. military operations.

Senior defense and intelligence officials said Iranian-backed insurgents intercepted the video feeds by taking advantage of an unprotected communications link in some of the remotely flown planes' systems. Shiite fighters in Iraq used software programs such as SkyGrabber -- available for as little as $25.95 on the Internet -- to regularly capture drone video feeds, according to a person familiar with reports on the matter.

U.S. officials say there is no evidence that militants were able to take control of the drones or otherwise interfere with their flights. Still, the intercepts could give America's enemies battlefield advantages by removing the element of surprise from certain missions and making it easier for insurgents to determine which roads and buildings are under U.S. surveillance.

The drone intercepts mark the emergence of a shadow cyber war within the U.S.-led conflicts overseas. They also point to a potentially serious vulnerability in Washington's growing network of unmanned drones, which have become the American weapon of choice in both Afghanistan and Pakistan.

The Obama administration has come to rely heavily on the unmanned drones because they allow the U.S. to safely monitor and stalk insurgent targets in areas where sending American troops would be either politically untenable or too risky.

The stolen video feeds also indicate that U.S. adversaries continue to find simple ways of counteracting sophisticated American military technologies.

U.S. military personnel in Iraq discovered the problem late last year when they apprehended a Shiite militant whose laptop contained files of intercepted drone video feeds. In July, the U.S. military found pirated drone video feeds on other militant laptops, leading some officials to conclude that militant groups trained and funded by Iran were regularly intercepting feeds.

In the summer 2009 incident, the military found "days and days and hours and hours of proof" that the feeds were being intercepted and shared with multiple extremist groups, the person said. "It is part of their kit now."

A senior defense official said that James Clapper, the Pentagon's intelligence chief, assessed the Iraq intercepts at the direction of Defense Secretary Robert Gates and concluded they represented a shortcoming to the security of the drone network.

"There did appear to be a vulnerability," the defense official said. "There's been no harm done to troops or missions compromised as a result of it, but there's an issue that we can take care of and we're doing so."

Senior military and intelligence officials said the U.S. was working to encrypt all of its drone video feeds from Iraq, Afghanistan and Pakistan, but said it wasn't yet clear if the problem had been completely resolved.

Some of the most detailed evidence of intercepted feeds has been discovered in Iraq, but adversaries have also intercepted drone video feeds in Afghanistan, according to people briefed on the matter. These intercept techniques could be employed in other locations where the U.S. is using pilotless planes, such as Pakistan, Yemen and Somalia, they said.

The Pentagon is deploying record numbers of drones to Afghanistan as part of the Obama administration's troop surge there. Lt. Gen. David Deptula, who oversees the Air Force's unmanned aviation program, said some of the drones would employ a sophisticated new camera system called "Gorgon Stare," which allows a single aerial vehicle to transmit back at least 10 separate video feeds simultaneously.

Gen. Deptula, speaking to reporters Wednesday, said there were inherent risks to using drones since they are remotely controlled and need to send and receive video and other data over great distances. "Those kinds of things are subject to listening and exploitation," he said, adding the military was trying to solve the problems by better encrypting the drones' feeds.

The potential drone vulnerability lies in an unencrypted downlink between the unmanned craft and ground control. The U.S. government has known about the flaw since the U.S. campaign in Bosnia in the 1990s, current and former officials said. But the Pentagon assumed local adversaries wouldn't know how to exploit it, the officials said.

Last December, U.S. military personnel in Iraq discovered copies of Predator drone feeds on a laptop belonging to a Shiite militant, according to a person familiar with reports on the matter. "There was evidence this was not a one-time deal," this person said. The U.S. accuses Iran of providing weapons, money and training to Shiite fighters in Iraq, a charge that Tehran has long denied.

The militants use programs such as SkyGrabber, from Russian company SkySoftware. Andrew Solonikov, one of the software's developers, said he was unaware that his software could be used to intercept drone feeds. "It was developed to intercept music, photos, video, programs and other content that other users download from the Internet -- no military data or other commercial data, only free legal content," he said by email from Russia.

Officials stepped up efforts to prevent insurgents from intercepting video feeds after the July incident. The difficulty, officials said, is that adding encryption to a network that is more than a decade old involves more than placing a new piece of equipment on individual drones. Instead, many components of the network linking the drones to their operators in the U.S., Afghanistan or Pakistan have to be upgraded to handle the changes. Additional concerns remain about the vulnerability of the communications signals to electronic jamming, though there's no evidence that has occurred, said people familiar with reports on the matter.

Predator drones are built by General Atomics Aeronautical Systems Inc. of San Diego. Some of its communications technology is proprietary, so widely used encryption systems aren't readily compatible, said people familiar with the matter.

In an email, a spokeswoman said that for security reasons, the company couldn't comment on "specific data link capabilities and limitations."

Fixing the security gap would have caused delays, according to current and former military officials. It would have added to the Predator's price. Some officials worried that adding encryption would make it harder to quickly share time-sensitive data within the U.S. military, and with allies.

"There's a balance between pragmatics and sophistication," said Mike Wynne, Air Force Secretary from 2005 to 2008.

The Air Force has staked its future on unmanned aerial vehicles. Drones account for 36% of the planes in the service's proposed 2010 budget.

Today, the Air Force is buying hundreds of Reaper drones, a newer model, whose video feeds could be intercepted in much the same way as with the Predators, according to people familiar with the matter. A Reaper costs between $10 million and $12 million each and is faster and better armed than the Predator. General Atomics expects the Air Force to buy as many as 375 Reapers.

Post Comment   Private Reply   Ignore Thread  


TopPage UpFull ThreadPage DownBottom/Latest

#1. To: Happy Quanzaa, *Military or Vets Affairs*, *SOCOM*, *Science and technology* (#0)

A senior defense official said that James Clapper, the Pentagon's intelligence chief, assessed the Iraq intercepts at the direction of Defense Secretary Robert Gates and concluded they represented a shortcoming to the security of the drone network.

"There did appear to be a vulnerability," the defense official said.

It ain't hard to see why this guy is a intelligence chief,is there? There just ain't no slippin' NUTHIN' past this guy!

The U.S. government has known about the flaw since the U.S. campaign in Bosnia in the 1990s, current and former officials said. But the Pentagon assumed local adversaries wouldn't know how to exploit it, the officials said.

If these Pentagram bosses were in the military,they should be court-martailed and thrown out of the military for gross neglect of duty. If they are already retired,they should be called back on active duty so they can be court-Martailed and lose their retirement pay.

If they are civilian geeks and/or political appointees they should be fired and lose their retirement benefits.

NEVER underestimate your enemy is "strategic and tactical planning 101." Ignoring this sort of problem is so serious a breach of duty that it is a criminal act.

Fixing the security gap would have caused delays, according to current and former military officials. It would have added to the Predator's price.

Well,we couldn't have this,could we? It might cut into the AIDS money being sent to Africa,or the free medical care and welfare money spend on illegal aliens in the US AND even some of those who have returned to Mexico. Hey! If a few soldiers and Marines have to die as a result of this,it was a sacrifice others were glad to have them make for them,right?

Some officials worried that adding encryption would make it harder to quickly share time-sensitive data within the U.S. military, and with allies.

Heaven forbid we refuse to share our technological advantages with the rest of the known universe!

Never mind that a Predator that can fly over and send back video feeds of enemy positions can also fly over and send back video feeds of US positions,and that for all THESE bozo's know,somebody is working right now on a software package that will allow remote users to take control of and even fire the Predator missiles.

Or even "spoof" the video feed and make the US controllers think they are firing missiles at enemy positions while they are firing them at US positions.

"There's a balance between pragmatics and sophistication," said Mike Wynne, Air Force Secretary from 2005 to 2008.

Nope,nothing to worry about. Everybody knows that if you are making a omelet you have to break a few eggs,and that it's the "Big Picture" we need to worry about.

sneakypete  posted on  2009-12-17   11:32:27 ET  Reply   Trace   Private Reply  


#2. To: Happy Quanzaa (#0)

The stolen video feeds . . .

They aren't stolen if they are being broadcast.

Abcdefg  posted on  2009-12-17   11:32:52 ET  Reply   Trace   Private Reply  


#3. To: sneakypete (#1)

How many of these systems have Chi-com software or hardware running them with all kinds of back doors engineered...

No doubt the Chinese want us to be very depended upon them for our defense

Joe Snuffy  posted on  2009-12-17   11:57:57 ET  Reply   Trace   Private Reply  


#4. To: Abcdefg (#2)

They aren't stolen if they are being broadcast.

Ha..try telling that to the satellite tv folks

Joe Snuffy  posted on  2009-12-17   11:58:42 ET  Reply   Trace   Private Reply  


#5. To: Happy Quanzaa (#0)

I'm sorry...can we post the store and see if there are any dollars off coupons for the holidays?

Loose lips...

No Stems No Seeds That You Don't Need...

war  posted on  2009-12-17   12:48:54 ET  Reply   Trace   Private Reply  


#6. To: war (#5)

I'm sorry...can we post the store and see if there are any dollars off coupons for the holidays?

SkyGrabber Free Download

Happy Quanzaa  posted on  2009-12-17   12:59:51 ET  Reply   Trace   Private Reply  


#7. To: Happy Quanzaa (#0)

But health care will be handled differently.

-----------------------------------------------------------
Toss: ADL,CAIR and the Vatican into the pit they belong in.

WhiteSands  posted on  2009-12-17   13:42:10 ET  Reply   Trace   Private Reply  


#8. To: Joe Snuffy (#4)

They aren't stolen if they are being broadcast.

Ha..try telling that to the satellite tv folks

You have the ability and the right to recieve the signals. Now, decrypting them will be your problem. It's a shame encryption technology is beyond our government . . .

Abcdefg  posted on  2009-12-17   14:47:37 ET  Reply   Trace   Private Reply  


#9. To: Joe Snuffy (#3)

How many of these systems have Chi-com software or hardware running them with all kinds of back doors engineered...

Who knows? Bettween Clinton and the Bush Crime Family,are there ANY secrets we didn't sell to the Chinese?

sneakypete  posted on  2009-12-17   15:22:01 ET  Reply   Trace   Private Reply  


#10. To: Abcdefg (#8)

It's a shame encryption technology is beyond our government . . .

No,it's a shame that common sense and honor are beyond our government.

sneakypete  posted on  2009-12-17   15:23:30 ET  Reply   Trace   Private Reply  


#11. To: sneakypete (#9)

are there ANY secrets we didn't sell to the Chinese?

The recipe of Bush Family Baked Beans. Rumor has it that even that may have been compromised. As long as there are no consequences for Treason or Aiding the Enemy, Secrets will be sold to appease greed.

SR1  posted on  2009-12-17   20:31:13 ET  Reply   Trace   Private Reply  


TopPage UpFull ThreadPage DownBottom/Latest

[Home]  [Headlines]  [Latest Articles]  [Latest Comments]  [Post]  [Mail]  [Sign-in]  [Setup]  [Help]  [Register] 

Please report web page problems, questions and comments to webmaster@libertysflame.com