U.S. Drones Hacked With $26 COTS Software | Aero-News Network
Aero-News Network
RSS icon RSS feed
podcast icon MP3 podcast
Subscribe Aero-News e-mail Newsletter Subscribe

Airborne Unlimited -- Most Recent Daily Episodes

Episode Date

Airborne-Monday

Airborne-Tuesday

Airborne-Wednesday Airborne-Thursday

Airborne-Friday

Airborne On YouTube

Airborne-Unlimited-04.22.24

Airborne-Unlimited-04.16.24

Airborne-FlightTraining-04.17.24 Airborne-AffordableFlyers-04.18.24

Airborne-Unlimited-04.19.24

Join Us At 0900ET, Friday, 4/10, for the LIVE Morning Brief.
Watch It LIVE at
www.airborne-live.net

Sat, Dec 19, 2009

U.S. Drones Hacked With $26 COTS Software

Insurgents Intercepted Video Feed From Aircraft

Insurgents using an inexpensive commercial off-the-shelf (COTS) software package have reportedly intercepted video feeds from U.S. military drones, potentially giving them information about military operations. The hack could allow the bad guys to evade coalition forces.

"The Wall Street Journal" reports that the program, called "Skygrabber", allowed insurgents, possibly with Iranian backing, to intercept the video from Predator UAVs being sent via an unencrypted link in remote areas of Iraq. An unnamed source with knowledge of the matter said the insurgents were not able to take control of the aircraft, or disrupt their flight, but that the hack could remove the element of surprise from some missions, and give insurgents information about which areas and roadways are being watched.

The problem was actually discovered in late 2008, when U.S. military forces captured a Shiite militant who had literally days worth of captured UAS video on his laptop computer. The discovery of additional video in July led U.S. officials to belive the militants were being funded by Iran.

The Pentagon has known about the potential vulnerability of the unencrypted links between UAVs and ground stations since the Bosnian campaign in the 1990's, but assumed that militants were unable to capture the information. One of the Russian designers of the software told the paper he created it to capture free music and video content online, and did not intend for it to have a military purpose.

Military officials say no U.S. service personnel have been injured or killed due to this security breech. Meanwhile, the Pentagon reportedly working towards encrypting all of its video feeds from Unmanned Aerial Systems, but it is not known whether the security hole has been closed.

FMI: www.dod.gov

Advertisement

More News

ANN's Daily Aero-Term (04.24.24): Runway Lead-in Light System

Runway Lead-in Light System Runway Lead-in Light System Consists of one or more series of flashing lights installed at or near ground level that provides positive visual guidance a>[...]

ANN's Daily Aero-Linx (04.24.24)

Aero Linx: Aviation Without Borders Aviation Without Borders uses its aviation expertise, contacts and partnerships to enable support for children and their families – at hom>[...]

Aero-FAQ: Dave Juwel's Aviation Marketing Stories -- ITBOA BNITBOB

Dave Juwel's Aviation Marketing Stories ITBOA BNITBOB ... what does that mean? It's not gibberish, it's a lengthy acronym for "In The Business Of Aviation ... But Not In The Busine>[...]

Classic Aero-TV: Best Seat in The House -- 'Inside' The AeroShell Aerobatic Team

From 2010 (YouTube Version): Yeah.... This IS A Really Cool Job When ANN's Nathan Cremisino took over the lead of our Aero-TV teams, he knew he was in for some extra work and a lot>[...]

Airborne Affordable Flyers 04.18.24: CarbonCub UL, Fisher, Affordable Flyer Expo

Also: Junkers A50 Heritage, Montaer Grows, Dynon-Advance Flight Systems, Vans' Latest Officially, the Carbon Cub UL and Rotax 916 iS is now in its 'market survey development phase'>[...]

blog comments powered by Disqus



Advertisement

Advertisement

Podcasts

Advertisement

© 2007 - 2024 Web Development & Design by Pauli Systems, LC