News:

Testimonial: "None of you seem aware of quite how bad you are. I mean I'm pretty outspoken on how bad the internet has gotten, but this is up there with the worst."

Main Menu

Insurgents Hack U.S. Drones

Started by Da6s, December 17, 2009, 03:50:46 PM

Previous topic - Next topic

Da6s

http://online.wsj.com/article/SB126102247889095011.html?mod=igoogle_wsj_gadgv1&


QuoteWASHINGTON -- Militants in Iraq have used $26 off-the-shelf software to intercept live video feeds from U.S. Predator drones, potentially providing them with information they need to evade or monitor U.S. military operations.

Senior defense and intelligence officials said Iranian-backed insurgents intercepted the video feeds by taking advantage of an unprotected communications link in some of the remotely flown planes' systems. Shiite fighters in Iraq used software programs such as SkyGrabber -- available for as little as $25.95 on the Internet -- to regularly capture drone video feeds, according to a person familiar with reports on the matter.

U.S. officials say there is no evidence that militants were able to take control of the drones or otherwise interfere with their flights. Still, the intercepts could give America's enemies battlefield advantages by removing the element of surprise from certain missions and making it easier for insurgents to determine which roads and buildings are under U.S. surveillance.

The drone intercepts mark the emergence of a shadow cyber war within the U.S.-led conflicts overseas. They also point to a potentially serious vulnerability in Washington's growing network of unmanned drones, which have become the American weapon of choice in both Afghanistan and Pakistan.

  :facepalm:



We appear to be doomed by our DNA to repeat the same destructive behaviors our forebears have repeated for millenia. If anything our problem solving skills have actually diminished with the advent of technology & our ubiquitous modern conveniences. & yet despite our predisposition towards fear-driven hostility; towards what we anachronistically term primitive behavior another instinct is just as firmly encoded in our make-up. We are capable as our ancestors were of incredible breathtaking acts of kindness. Every hour of every day a man risks his life at a moments notice to save another. Forget for a moment the belligerent benevolent billionaires who grant the unfortunate a crumb of costfree cake. I speak of pure acts of selflessness. A Mother who rushes into the street to save a child from a speeding vehicle. A person who runs into a burning building to reach a family trapped on the upper story. Such actions,such moments,such unconscious selfless decisions,define what it is to be human

Requia ☣

Inflatable dolls are not recognized flotation devices.

Shibboleet The Annihilator

I wouldn't really call this hacking. More like looking at an unencrypted feed.

Bebek Sincap Ratatosk

Quote from: Slanket the Destroyer on December 17, 2009, 06:07:49 PM
I wouldn't really call this hacking. More like looking at an unencrypted feed.

Correct motorcycle. Still funny as hell though! I bet the developers did an assessment and figured it encrypted video would be a greater operational risk than some smart Iraqi peeking at the video feed. way to underestimate your threats  :lulz:
- I don't see race. I just see cars going around in a circle.

"Back in my day, crazy meant something. Now everyone is crazy" - Charlie Manson

AFK

Were the drones running on Windows Vista?

RWHN,
-going for the low hanging fruit. 
Cynicism is a blank check for failure.

Elder Iptuous

Quote from: Doctor Rat Bastard on December 17, 2009, 06:42:00 PM
Quote from: Slanket the Destroyer on December 17, 2009, 06:07:49 PM
I wouldn't really call this hacking. More like looking at an unencrypted feed.

Correct motorcycle. Still funny as hell though! I bet the developers did an assessment and figured it encrypted video would be a greater operational risk than some smart Iraqi peeking at the video feed. way to underestimate your threats  :lulz:

I don't get it.
As it stands, I think there's more to this story than we are being told.
Why would they use an unencrypted feed?  Why would the military accept that?  My experience in the defense contractor field has shown me that military PMs are SERIOUS anal about classification/encryption/information security.
and the contractors are more than happy to oblige, because then we can hem and haw about how difficult the needed measures are, and how expensive it will be, etc.  so they throw more cash at us.
It just seems improbable to me....

Bebek Sincap Ratatosk

Quote from: Rev. What's-His-Name? on December 17, 2009, 07:12:49 PM
Were the drones running on Windows Vista?

RWHN,
-going for the low hanging fruit. 

Oh gods no... Not nearly enough new hardware to support Vista!!!


Quote from: Iptuous on December 17, 2009, 07:31:47 PM
Quote from: Doctor Rat Bastard on December 17, 2009, 06:42:00 PM
Quote from: Slanket the Destroyer on December 17, 2009, 06:07:49 PM
I wouldn't really call this hacking. More like looking at an unencrypted feed.

Correct motorcycle. Still funny as hell though! I bet the developers did an assessment and figured it encrypted video would be a greater operational risk than some smart Iraqi peeking at the video feed. way to underestimate your threats  :lulz:

I don't get it.
As it stands, I think there's more to this story than we are being told.
Why would they use an unencrypted feed?  Why would the military accept that?  My experience in the defense contractor field has shown me that military PMs are SERIOUS anal about classification/encryption/information security.
and the contractors are more than happy to oblige, because then we can hem and haw about how difficult the needed measures are, and how expensive it will be, etc.  so they throw more cash at us.
It just seems improbable to me....

Yes, but I have seen the millitary pull the 'security by obscurity' card a few times... They may have falsely assumed it would be 'too hard'.

Either that, or there was a bug in the code that left the feed unencrypted. I recently audited a security app for a side job... they had a script that was wiping data on a daily basis. Then they added code to encrypt the data while it was there for the one day.

The person that wrote the 'wipe' program though had written it to look for a specific string of characters... since those characters were encrypted... the wipe program did nothing and they had months of data on the system.
- I don't see race. I just see cars going around in a circle.

"Back in my day, crazy meant something. Now everyone is crazy" - Charlie Manson

Shibboleet The Annihilator

#7
Quote from: Iptuous on December 17, 2009, 07:31:47 PM
Quote from: Doctor Rat Bastard on December 17, 2009, 06:42:00 PM
Quote from: Slanket the Destroyer on December 17, 2009, 06:07:49 PM
I wouldn't really call this hacking. More like looking at an unencrypted feed.

Correct motorcycle. Still funny as hell though! I bet the developers did an assessment and figured it encrypted video would be a greater operational risk than some smart Iraqi peeking at the video feed. way to underestimate your threats  :lulz:

I don't get it.
As it stands, I think there's more to this story than we are being told.
Why would they use an unencrypted feed?  Why would the military accept that?  My experience in the defense contractor field has shown me that military PMs are SERIOUS anal about classification/encryption/information security.
and the contractors are more than happy to oblige, because then we can hem and haw about how difficult the needed measures are, and how expensive it will be, etc.  so they throw more cash at us.
It just seems improbable to me....

Well, I would argue that being able to see what the UCAV sees before it strikes is not going to do too much for you. You sure as shit can't outrun their missiles. They could also use satellites to do the initial monitoring, provided there wasn't a lot of cloud cover.

That said, they probably also figured that the odds of them doing this weren't too good to begin with. Considering the fact that it's taken them THIS long to figure out they could do this would lead me to believe that the military wasn't terribly inaccurate in that assessment.

The only technical reason I could think of why they might do this would be to keep the delay in the feed to a minimum, but I don't really know a lot about encrypted video feeds so this may or may not be a problem.

That said, I wouldn't be surprised if they did end up encrypting the feed or using the feed to trick their targets. That's what I would do anyways, make a false feed and lead them to believe that they're going to be attacked, encouraging them to make a run for it or otherwise tip their hand.

Elder Iptuous

Quote from: Slanket the Destroyer on December 17, 2009, 07:38:03 PM
That said, I wouldn't be surprised if they did end up encrypting the feed or using the feed to trick their targets. That's what I would do anyways, make a false feed and lead them to believe that they're going to be attacked, encouraging them to make a run for it or otherwise tip their hand.

This was my immediate thought as well.  I wondered if they, in fact, were not planting this story to cause the enemy to do just that...

Cain

Or someone is pushing the story in the hope that it'll cause a flurry of encryption and security related purchases.

Bebek Sincap Ratatosk

Quote from: Cain on December 17, 2009, 08:26:46 PM
Or someone is pushing the story in the hope that it'll cause a flurry of encryption and security related purchases.

I love the way you think.
- I don't see race. I just see cars going around in a circle.

"Back in my day, crazy meant something. Now everyone is crazy" - Charlie Manson

Shibboleet The Annihilator

Hehe, this ^

Also,
Quote from: Iptuous on December 17, 2009, 08:08:00 PM
Quote from: Slanket the Destroyer on December 17, 2009, 07:38:03 PM
That said, I wouldn't be surprised if they did end up encrypting the feed or using the feed to trick their targets. That's what I would do anyways, make a false feed and lead them to believe that they're going to be attacked, encouraging them to make a run for it or otherwise tip their hand.

This was my immediate thought as well.  I wondered if they, in fact, were not planting this story to cause the enemy to do just that...

I'd like to think that they are this clever. If not, I'd be happy to offer my services in this sort of thing in exchange for a commission.

Heh, Lieutenant Slanket. It does have a ring to it...

Triple Zero

Quote from: Slanket the Destroyer on December 17, 2009, 06:07:49 PM
I wouldn't really call this hacking. More like looking at an unencrypted feed.

Um, how's that not a hack?

As I explained in the other thread, it's like stage magic tricks, as soon as you know how it's done, it's no longer special?

If you'd frame it as "gathering information from an unexpected side channel", would it be hacking?

IMO, picking up communications from a military drone plane using a piece of cheap electronica is a hack.

"Van Eck phreaking" is also picking up an unencrypted signal using cheap electronica. Is that not a hack?

====

BTW my best guess about the reason why they didn't opt for encryption would be that they have certain legacy communication hardware that would not be able to process it. Just a guess, but it sounds like one of those very typical scenarios. "we're not going to replace all our field scanners."
Ex-Soviet Bloc Sexual Attack Swede of Tomorrow™
e-prime disclaimer: let it seem fairly unclear I understand the apparent subjectivity of the above statements. maybe.

INFORMATION SO POWERFUL, YOU ACTUALLY NEED LESS.

Requia ☣

My bet is that they either just didn't turn it on, or they cut it from the final product because cuts to the computing capability meant it couldn't handle the encryption.

Treating a final product like its the superior (and more expensive) prototype seems to be a theme with the military.
Inflatable dolls are not recognized flotation devices.

Cain

Quote from: Doctor Rat Bastard on December 17, 2009, 08:45:39 PM
Quote from: Cain on December 17, 2009, 08:26:46 PM
Or someone is pushing the story in the hope that it'll cause a flurry of encryption and security related purchases.

I love the way you think.

Well, it is the WSJ.  Its readers are mostly businessmen and think-tanks hawks (who are heavily invested in military-related corporations, but sssssssh!  its a secret) and anything that identifies a potential weakness which they can then sell solutions to will go down well.  Expect a flurry of articles from AEI and the Heritage Foundation on information security soon.

On the other hand, John Robb thinks it is real.  I suppose there probably are specific difficulties concerning encryption for each unit (they were rolled out in 2001....using pre-2000 tech), not to mention the military's constant ability to both overestimate and underestimate their enemies at the same time ("terrorists are gonna blow up THE WORLD!!!?!!/ we can easily defeat a bunch of ragheads"), so it seems possible.

Also, this software was originally designed in Russia to steal media files from peoples satellite internet downloads.  How cool is that?