3D Robotics

3689437565?profile=original

[I'm applying the sysadmin privilage of making an exception to our usual no-military rule here, because the technical issues are sufficiently interesting].

Apply the usual skepticism about the claims, but there's something plausible in the following. As I understand it, the assertion is that Iran basically used radio jamming techniques to force the RQ-170 into RTL mode, then overrode the GPS signal with a fake one that made it think that "home" was an Iranian field. 

An excerpt from the Christian Science Monitor, a good article that discusses what may have caused the capture:

Iran guided the CIA's "lost" stealth drone to an intact landing inside hostile territory by exploiting a navigational weakness long-known to the US military, according to an Iranian engineer now working on the captured drone's systems inside Iran.

Iranian electronic warfare specialists were able to cut off communications links of the American bat-wing RQ-170 Sentinel, says the engineer, who works for one of many Iranian miltiary and civilian teams currently trying to unravel the drone’s stealth and intelligence secrets, and who could not be named for his safety.

Using knowledge gleaned from previous downed American drones and a technique proudly claimed by Iranian commanders in September, the Iranian specialists then reconfigured the drone's GPS coordinates to make it land in Iran at what the drone thought was its actual home base in Afghanistan.

...

"GPS signals are weak and can be easily outpunched [overridden] by poorly controlled signals from television towers, devices such as laptops and MP3 players, or even mobile satellite services," Andrew Dempster, a professor from the University of New South Wales School of Surveying and Spatial Information Systems, told a March conference on GPS vulnerability in Australia.

"This is not only a significant hazard for military, industrial, and civilian transport and communication systems, but criminals have worked out how they can jam GPS," he says.

The US military has sought for years to fortify or find alternatives to the GPS system of satellites, which are used for both military and civilian purposes. In 2003, a “Vulnerability Assessment Team” at Los Alamos National Laboratory published research explaining how weak GPS signals were easily overwhelmed with a stronger local signal.

“A more pernicious attack involves feeding the GPS receiver fake GPS signals so that it believes it is located somewhere in space and time that it is not,” reads the Los Alamos report. “In a sophisticated spoofing attack, the adversary would send a false signal reporting the moving target’s true position and then gradually walk the target to a false position.”

E-mail me when people leave their comments –

You need to be a member of diydrones to add comments!

Join diydrones

Comments

  • Moderator

    @Jack,  They say that they could not successfully spoof the altitude difference between the actual landing site and the runway back at it's base, so the drone damaged its under regions in a rough landing.   (supposedly)

  • and i must tell that iranian people and universities students are very peaceful and very genius.

  • i seen that video in goverment tv channels every day.

    if this aircraft landed by that eventful technology WHY wings are CUTED?

  • Robert, you missed the point.  If they were spies, they would not use their real names.  That's the nature of spying, subterfuge.   If they openly use their real names, and claim to be connected to Iran, then it's not spying, it's just information gathering.  

    If people call your mother, asking for information on biological weapons, claiming to be from Iranian universities, you can bet your bottom dollar that they are not calling from Iranian universities.

  • So what if they used made-up names?

     

    I'm not surprised by the suggestion at all.  My mother worked as a research biologist for the government, and often used to get calls from people purporting to be Iranian university researchers, asking questions which would only be interesting to somebody developing biological weapons.  Of course they didn't answer them.  But this was back in the 80's.  This type of thing has been going on a LONG time.

  • Kevin, if the guys mentioned in the article are Iranian spies, trolling the internet for secret gps jamming information, I doubt they would be using their real names.

  • For those who think this is a fake, trojan horse, here's some video of them walking around the downed drone:

    The drone may be non-operational due to anti-spoofing measures, but I'm sure China, and other enemies of the US will want to get their hands on some of the hull to analyse the anti-radar coating.  So much for US stealth technology.

  • Moderator
    Hey, ya, a Trojan horse makes sense!

    That Would explain why it looks more like a cartoon than any other american stealth platform.
  • hi all,

    i live in Iran and don't believe this scenario.

    i think spoofing gps signals may forced plane to land on other area BUT this maybe works for my 1000$ plane. not for Lockheed Martin Billion Dollars Technologies.

    Because i believe that Lockheed Engineers are not idiot .if this aircraft built by Elbit systems Idiot engineers maybe!

    in iran is a funny rumour about this aircraft "Trojan's Horse " LOL!

    however there is too many lost piece of this puzzle.

    Kind regards

  • Hi all,

    Interesting discussion. I just wanted to point out that the same issue has also been discussed on slashdot, although maybe on a slightly less technical level. One point raised there is that the track record for security in military drones has been rather weak (think unencrypted video that was possible to be received with cheapo receivers readily available) so "occam's razor" (that reference has been used here as some sort of magical sword :) points to some software or hardware "bug"/"feature".

This reply was deleted.