PDA

View Full Version : Insurgents exploit vulnerability in US Drone aircraft



bryanr
12-17-09, 10:37
Interesting what a laptop, a little software and a DVB-S/DVB-S2 satellite card can do...

http://online.wsj.com/article/SB1261...le_wsj_gadgv1&

$26 Software Is Used to Breach Key Weapons in Iraq; Iranian Backing Suspected

Wall Street Journal - By SIOBHAN GORMAN, YOCHI J. DREAZEN and AUGUST COLE

WASHINGTON -- Militants in Iraq have used $26 off-the-shelf software to intercept live video feeds from U.S. Predator drones, potentially providing them with information they need to evade or monitor U.S. military operations.

Senior defense and intelligence officials said Iranian-backed insurgents intercepted the video feeds by taking advantage of an unprotected communications link in some of the remotely flown planes' systems. Shiite fighters in Iraq used software programs such as SkyGrabber -- available for as little as $25.95 on the Internet -- to regularly capture drone video feeds, according to a person familiar with reports on the matter.

U.S. officials say there is no evidence that militants were able to take control of the drones or otherwise interfere with their flights. Still, the intercepts could give America's enemies battlefield advantages by removing the element of surprise from certain missions and making it easier for insurgents to determine which roads and buildings are under U.S. surveillance.

The drone intercepts mark the emergence of a shadow cyber war within the U.S.-led conflicts overseas. They also point to a potentially potentially serious vulnerability in Washington's growing network of unmanned drones, which have become the American weapon of choice in both Afghanistan and Pakistan.

The Obama administration has come to rely heavily on the unmanned drones because they allow the U.S. to safely monitor and stalk insurgent targets in areas where sending American troops would be either politically untenable or too risky.

The stolen video feeds also indicate that U.S. adversaries continue to find simple ways of counteracting sophisticated American military technologies.

U.S. military personnel in Iraq discovered the problem late last year when they apprehended a Shiite militant whose laptop contained files of intercepted drone video feeds. In July, the U.S. military found pirated drone video feeds on other militant laptops, leading some officials to conclude that militant groups trained and funded by Iran were regularly intercepting feeds.

In the summer 2009 incident, the military found "days and days and hours and hours of proof" that the feeds were being intercepted and shared with multiple extremist groups, the person said. "It is part of their kit now."

A senior defense official said that James Clapper, the Pentagon's intelligence chief, assessed the Iraq intercepts at the direction of Defense Secretary Robert Gates and concluded they represented a shortcoming to the security of the drone network.

"There did appear to be a vulnerability," the defense official said. "There's been no harm done to troops or missions compromised as a result of it, but there's an issue that we can take care of and we're doing so."

Senior military and intelligence officials said the U.S. was working to encrypt all of its drone video feeds from Iraq, Afghanistan and Pakistan, but said it wasn't yet clear if the problem had been completely resolved.

Some of the most detailed evidence of intercepted feeds has been discovered in Iraq, but adversaries have also intercepted drone video feeds in Afghanistan, according to people briefed on the matter. These intercept techniques could be employed in other locations where the U.S. is using pilotless planes, such as Pakistan, Yemen and Somalia, they said.

The Pentagon is deploying record numbers of drones to Afghanistan as part of the Obama administration's troop surge there. Lt. Gen. David Deptula, who oversees the Air Force's unmanned aviation program, said some of the drones would employ a sophisticated new camera system called "Gorgon Stare," which allows a single aerial vehicle to transmit back at least 10 separate video feeds simultaneously.

Gen. Deptula, speaking to reporters Wednesday, said there were inherent risks to using drones since they are remotely controlled and need to send and receive video and other data over great distances. "Those kinds of things are subject to listening and exploitation," he said, adding the military was trying to solve the problems by better encrypting the drones' feeds.

The potential drone vulnerability lies in an unencrypted downlink between the unmanned craft and ground control. The U.S. government has known about the flaw since the U.S. campaign in Bosnia in the 1990s, current and former officials said. But the Pentagon assumed local adversaries wouldn't know how to exploit it, the officials said.

Last December, U.S. military personnel in Iraq discovered copies of Predator drone feeds on a laptop belonging to a Shiite militant, according to a person familiar with reports on the matter. "There was evidence this was not a one-time deal," this person said. The U.S. accuses Iran of providing weapons, money and training to Shiite fighters in Iraq, a charge that Tehran has long denied.

The militants use programs such as SkyGrabber, from Russian company SkySoftware. Andrew Solonikov, one of the software's developers, said he was unaware that his software could be used to intercept drone feeds. "It was developed to intercept music, photos, video, programs and other content that other users download from the Internet -- no military data or other commercial data, only free legal content," he said by email from Russia.

Officials stepped up efforts to prevent insurgents from intercepting video feeds after the July incident. The difficulty, officials said, is that adding encryption to a network that is more than a decade old involves more than placing a new piece of equipment on individual drones. Instead, many components of the network linking the drones to their operators in the U.S., Afghanistan or Pakistan have to be upgraded to handle the changes. Additional concerns remain about the vulnerability of the communications signals to electronic jamming, though there's no evidence that has occurred, said people familiar with reports on the matter.

Predator drones are built by General Atomics Aeronautical Systems Inc. of San Diego. Some of its communications technology is proprietary, so widely used encryption systems aren't readily compatible, said people familiar with the matter.

In an email, a spokeswoman said that for security reasons, the company couldn't comment on "specific data link capabilities and limitations."

Fixing the security gap would have caused delays, according to current and former military officials. It would have added to the Predator's price. Some officials worried that adding encryption would make it harder to quickly share time-sensitive data within the U.S. military, and with allies.

"There's a balance between pragmatics and sophistication," said Mike Wynne, Air Force Secretary from 2005 to 2008.

The Air Force has staked its future on unmanned aerial vehicles. Drones account for 36% of the planes in the service's proposed 2010 budget.

Today, the Air Force is buying hundreds of Reaper drones, a newer model, whose video feeds could be intercepted in much the same way as with the Predators, according to people familiar with the matter. A Reaper costs between $10 million and $12 million each and is faster and better armed than the Predator. General Atomics expects the Air Force to buy as many as 375 Reapers.

Link to software: www.skygrabber.com/en/index.html

Bryanr

Outlander Systems
12-17-09, 11:56
http://online.wsj.com/article/SB126102247889095011.html

Blunderous. Haaji's using off-the-shelf software to monitor signal feeds?

Someone make this make sense. My head hurts.

VooDoo6Actual
12-17-09, 12:12
Mission fail on OPSEC.


Instead of Pro Active counter measures, reactionary again....:eek:

Outlander Systems
12-17-09, 12:15
Mission fail on OPSEC.


Instead of Pro Active counter measures, reactionary again....:eek:

No shit, right?

"Senior military and intelligence officials said the U.S. was working to encrypt all of its drone video feeds from Iraq, Afghanistan and Pakistan, but said it wasn't yet clear if the problem had been completely resolved"

Ummm...Shouldn't this have been done BEFORE the hardware was operational and in-theatre? Just sayin'.

:rolleyes:

Safetyhit
12-17-09, 12:21
Not to Monday morning quarterback here, but it is rather pathetic.

Iraqgunz
12-17-09, 12:29
I am speechless.

SPARTAN HOPLITE ARMS
12-17-09, 12:34
Hate to break it to you guys but I read the article and senior people were quoted as saying that they "ASSumed" the local population (ie Hajjis) wouldn't have the technology or capability to intercept the unencrypted signals. I guess what they say about ASSumptions is very true.

Titleist
12-17-09, 12:35
I've been getting free cable off Predator drones for years...what's the big deal...HBO is 'spensive! :(

Abraxas
12-17-09, 12:57
I have wondered about this very thing for quite a while. So the question presents itself, how long before they persecute it to the point of taking control?

Outlander Systems
12-17-09, 13:02
""There's a balance between pragmatics and sophistication," said Mike Wynne, Air Force Secretary from 2005 to 2008."

There's also a rift between strategic planning and common sense.

Outlander Systems
12-17-09, 13:03
I've been getting free cable off Predator drones for years...what's the big deal...HBO is 'spensive! :(

Thanks for the dip on my keyboard, hoss!

HiggsBoson
12-17-09, 13:05
There was not much "hacking" involved. According to the article, the signal was broadcast unencrypted, for anyone to receive. The failures were of the procurement system and the design system that allowed this proprietary and insecure crap to make it onto such an important platform.

At some point some engineer said: "Gee guys, is it really a good idea to allow this stuff to be broadcast unencrypted?" and he was over-ridden by some guy in a suit in favor of a cheaper/faster solution.

/rant

M4arc
12-17-09, 13:16
Gents, since we had two threads on this subject I merged them together.

trandyd
12-17-09, 13:19
Officials stepped up efforts to prevent insurgents from intercepting video feeds after the July incident. The difficulty, officials said, is that the $26 software is quote "Pretty darned sophisticated." ;) :D

Alex V
12-17-09, 13:23
it makes me feel really safe to know that Comcast protects their signal more than the US Military...

LOL

Histerical!

That has got to be a major F-Up... someone has to get a good a$$ caning for that one...

M4arc
12-17-09, 13:26
Years ago I worked on a project that bounced info back to the US via satellite and IIRC the size of the packets were pretty small so I'm not sure encrypting the data would be possible. I'm sure satellite technology has come a long way but damn, this is unsat.

Given the fact that every other project I’ve worked on since has to be encrypted I’m not sure why drones are an exception

Palmguy
12-17-09, 13:31
There was not much "hacking" involved. According to the article, the signal was broadcast unencrypted, for anyone to receive. The failures were of the procurement system and the design system that allowed this proprietary and insecure crap to make it onto such an important platform.

At some point some engineer said: "Gee guys, is it really a good idea to allow this stuff to be broadcast unencrypted?" and he was over-ridden by some guy in a suit in favor of a cheaper/faster solution.

/rant

As a design engineer in military weapons systems development, I would damn near bet my life that the above bolded text is 100% accurate.

mmike87
12-17-09, 13:58
You can buy cheap video cameras online that send wireless, ENCRYPTED video. Not sure of the encryption strength in those cases, but certainly the military could have come up with something.

This is truly embarassing. Whoever said it was OK to "go live" with unencrypted video should be celebrating their newfound unemployment.

Thomas M-4
12-17-09, 14:16
Sounds like some asswhipe that makes way more money than he deserves had a decision in that. I don't think it was done because of bandwidth restrictions you can combine multiple channels to increase bandwidth.

1 more thing FUBAR:mad:

rickrock305
12-17-09, 14:48
Years ago I worked on a project that bounced info back to the US via satellite and IIRC the size of the packets were pretty small so I'm not sure encrypting the data would be possible. I'm sure satellite technology has come a long way but damn, this is unsat.

Given the fact that every other project I’ve worked on since has to be encrypted I’m not sure why drones are an exception


I'm sure it was due to performance issues. Live streaming video is no small amount of data.

Not excusing it, just giving a reason why it may have been left unencrypted.

ForTehNguyen
12-17-09, 14:52
AGM missile is online!

AGM missile is offline!

AGM missile is h4x0r3d!

Beendare
12-17-09, 15:49
that it takes a newspaper article to force them to do something about it

Redmanfms
12-17-09, 16:14
You can buy cheap video cameras online that send wireless, ENCRYPTED video. Not sure of the encryption strength in those cases, but certainly the military could have come up with something.

This is truly embarassing. Whoever said it was OK to "go live" with unencrypted video should be celebrating their newfound unemployment.

If he was civilian federal, he was probably promoted and given an award.





.gov, employing the otherwise completely unemployable for over a century.....

mattjmcd
12-17-09, 17:59
Now that this has been uncovered, I would want ti know if I could selectively "feed" Hajji bogus video..?

batgeek
12-17-09, 18:08
At some point some engineer said: "Gee guys, is it really a good idea to allow this stuff to be broadcast unencrypted?" and he was over-ridden by some guy in a suit in favor of a cheaper/faster solution.

as a senior systems engineer for Raytheon Systems, i can guarantee this happens.

the funny thing about it...the feeds are encrypted from the ground station to the VDC(video distribution center) stateside, then also encrypted to the various services that re-transmit(also encrypted) the feeds over satellite back into theatre.

weak chain in the link in right in theatre...WTF?

RogerinTPA
12-17-09, 18:11
As the article said, we've known about the flaw since Bosnia. My former Army Intelligence unit was the test bed for the Predator, running them in that AO, later handing over the entire program to the Air Force due to territorial issues (Strategic Air Assets VS Tactical).:rolleyes:

Move, Counter Move. It's a natural evolution of warfare.

Jer
12-19-09, 21:55
it makes me feel really safe to know that Comcast protects their signal more than the US Military...

LOL

Histerical!

That has got to be a major F-Up... someone has to get a good a$$ caning for that one...

...and that's not saying much. A child could hack Comcast. Ask me how I know.. :D