Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Predator Drones Have No Encryption
#1
Apparently, from this article, the Predator UAV has less encryption than a tv set.

And the Americans thought their enemies would never find out...

Quote:Predator drones use less encryption than your TV, DVDs
Militants have been recording video from US Predator drones in Iraq and Afghanistan using laptops and $30 software, thanks to a total lack of encryption.

By Nate Anderson | Last updated December 17, 2009 11:13 AM
Text Size   
Print this article
Leave a comment

[Image: lol_drone.jpg]

What three-letter Internet acronym best fits the bizarre news out of Iraq and Afghanistan that militants there have been intercepting US Predator drone video feeds using laptops and a $30 piece of Russian software: LOL, WTF, or OMG?

Actually, all three are appropriate for something this farcical, horrible, and brain-numbing. The reason that the transmissions could be picked up easily by a cheap satellite recording program? They were broadcast in the clear between the drone and ground control. That's right—no encryption was used.

Perhaps, you might be thinking to yourself in a mental bid to make the military seem competent here, no one could have suspected this would happen. But they did suspect it, because it had been happening for a decade already. The Wall Street Journal, which broke the story, included this tidbit in its report: "The potential drone vulnerability lies in an unencrypted downlink between the unmanned craft and ground control. The US government has known about the flaw since the US campaign in Bosnia in the 1990s, current and former officials said. But the Pentagon assumed local adversaries wouldn't know how to exploit it, the officials said."

After finding various laptops containing hours of recorded drone footage, the military has at last moved to encrypt the downlink between the drone and ground control, but there are problems. Not with encryption technology, which is robust, but with the fact the military 1) did not use encryption at the beginning and retrofitting is hard, and 2) the Predator's maker uses some proprietary communications gear, so off-the-shelf encryption tools don't all work.

The sad but inevitable comparison has to be drawn here with consumer electronics. Blu-ray discs, which use the AACS control scheme, feature a new DRM scheme of bewildering complexity in an attempt to thwart pirates.

kinda funny if you ask me!.. time to head to focaljet and spread some love...
Contribute to focuscanada.net's future!

Donations of $20 and over get a custom title!







Reply
#2
Share the FJ link so we can all show the stupid american the love. LOL WTF OMG.
Focus man, Focus........ Team Psychological Disaster
2008 Taurus X to be modded.
2002 ZX5 parted out. Forever known as the "SLOCUS".

2010 Dyno #'s 102.96HP/105.84TQ
2011 Dyno #'s 111.44HP/115.17TQ
Still The Weakest LinkBlush

Dial 1-800-AUTO-PARTS for your local speed shop.
Reply
#3
Ah and yet again that infamous oxymoron of "Military Intelligence" rears its ugly head :P

NefCanuck
Reply


Forum Jump:


Users browsing this thread: 2 Guest(s)