Insurgents Hack U.S. Drones

Senior defense and intelligence officials said Iranian-backed insurgents intercepted the video feeds by taking advantage of an unprotected communications link in some of the remotely flown planes' systems. Shiite fighters in Iraq used software programs such as SkyGrabber -- available for as little as $25.95 on the Internet -- to regularly capture drone video feeds, according to a person familiar with reports on the matter.http://online.wsj.com/article/SB126102247889095011.html
E-mail me when people leave their comments –

You need to be a member of diydrones to add comments!

Join diydrones

Comments

  • Admin
    :) , this news just made it to BBC world news( sat TV) and I saw it just few minutes back. It probably will get repeated again later in the same news.
  • Never think your enemy is a fool. He'll surprise you in the worst possible way.

    Seriously folks, think about the "State of the Art". The "uber-UAV" is wandering around without encrypted links (hopefully the control links are protected...)
    This field is incredibly young, the potential for a bunch of guys, working out of their garage (Hey, that's you all!) to innovate is incredible.
    All of a sudden, a Predator drone doesn't seem that technologically complex.

    The flip side of this (as innovators) do we have a duty to encrypt certain parts of our transmissions? Particularly in light of the (potential) FAA re-evaluation of UAV guidelines?
  • Is it possible that they didn't encrypt it on purpose. It seems so inconceivable that they wouldn't encrypt the video stream that they may have at certain times un-encrypted it on one or two drones for some strategic reason. Just a thought.
  • Admin
    Hi Paul, Smart people in this business( security audits/ethical pen testing) don't disclose the exploits and so do the smart hackers( don't want the doors closed ;) ), it is only kids who do the talking and boost their doings :)).
    I bet the end users never knew( weak policies) that the feed was un encrypted and manufacturers don't always advertise their weak points. Also I bet Iranians or who ever were sniffing the air did not find it by accident , it is just habit of good hunter. It would be part of duties of non advertised Gov Comms dept guys listening/scanning on the discrete freqs.My 2 cents.
  • what the? I find it inconceivable that the US dosen't fully encrypt their UAV datalinks.
  • Bleh...and there's no easy fix cause it's all decade old proprietary tech. Pretty pathetic really. I'd think there'd be some reg that all military communications need to be encrypted.
  • It may also have to do with bandwidth issues.
  • I wonder at what level this decision (to not encrypt) was actually made. Surely there must have been more than a few engineers and managers to whom an unencrypted video feed sounded like a bad idea...I wonder who in the end actually decided it was ok.
  • T3
    Just lucky Iraqi insurgents are not the IRA...yet
  • Doesn't shock me at all. Skygrabber has been around forever, as well langrabber. I am shocked that they are not encrypting the connection, but knowing our DoD it doesn't shock me at all. Funny thing, this exact principal is how our Gov't monitors worldwide data transmission from Ft. Huachuca for project Echelon.
This reply was deleted.