The Glade 4.0

"Turn the lights down, the party just got wilder."
It is currently Fri Nov 22, 2024 11:04 pm

All times are UTC - 6 hours [ DST ]




Post new topic Reply to topic  [ 47 posts ]  Go to page 1, 2  Next
Author Message
PostPosted: Thu Dec 17, 2009 8:41 am 
Offline

Joined: Fri Sep 04, 2009 10:27 am
Posts: 2169
Insurgents hack into video feeds from US Drones


Last edited by Ladas on Thu Dec 17, 2009 9:39 am, edited 1 time in total.

Top
 Profile  
Reply with quote  
PostPosted: Thu Dec 17, 2009 9:03 am 
Offline
Commence Primary Ignition
User avatar

Joined: Thu Sep 03, 2009 9:59 am
Posts: 15740
Location: Combat Information Center
Link seems to be bnroken, but I knew it would happen sooner or later. This is why I think going to an all-UAV air force is a pie in the sky idea. If insurgents can do it so can Russia or China.

_________________
"Hysterical children shrieking about right-wing anything need to go sit in the corner and be quiet while the adults are talking."


Top
 Profile  
Reply with quote  
 Post subject:
PostPosted: Thu Dec 17, 2009 9:11 am 
Offline
User avatar

Joined: Wed Sep 02, 2009 7:59 pm
Posts: 9412
I was hoping this was a misplaced StarCraft II update.

_________________
"Aaaah! Emotions are weird!" - Amdee
"... Mirrorshades prevent the forces of normalcy from realizing that one is crazed and possibly dangerous. They are the symbol of the sun-staring visionary, the biker, the rocker, the policeman, and similar outlaws." - Bruce Sterling, preface to Mirrorshades


Top
 Profile  
Reply with quote  
 Post subject:
PostPosted: Thu Dec 17, 2009 9:42 am 
Offline

Joined: Fri Sep 04, 2009 10:27 am
Posts: 2169
Fixed the link, sorry about that.


Top
 Profile  
Reply with quote  
PostPosted: Thu Dec 17, 2009 9:43 am 
Offline

Joined: Fri Sep 04, 2009 10:27 am
Posts: 2169
Diamondeye wrote:
Link seems to be bnroken, but I knew it would happen sooner or later. This is why I think going to an all-UAV air force is a pie in the sky idea. If insurgents can do it so can Russia or China.

They did it with software from the internet that can be bought for $26.00. Fortunately, at least according to the military, they weren't able to take control or disrupt operation of the drones, but by hacking the video links, were able to see what area were under surveillance, etc.


Top
 Profile  
Reply with quote  
PostPosted: Thu Dec 17, 2009 9:52 am 
Offline
Commence Primary Ignition
User avatar

Joined: Thu Sep 03, 2009 9:59 am
Posts: 15740
Location: Combat Information Center
Ladas wrote:
Diamondeye wrote:
Link seems to be bnroken, but I knew it would happen sooner or later. This is why I think going to an all-UAV air force is a pie in the sky idea. If insurgents can do it so can Russia or China.

They did it with software from the internet that can be bought for $26.00. Fortunately, at least according to the military, they weren't able to take control or disrupt operation of the drones, but by hacking the video links, were able to see what area were under surveillance, etc.


Can't say I'm surprised. This was bound to happen eventually. It's why the "everything is connected to the internet" you see in movies is so silly; ther's a lot of things that there's no reason to connect.

The worst example I cn think of is that "Eagle Eye" movie, where the computer makes the electric lines come apart at a specific point and kill a guy. Come on, why would you build the physical ability into a power line to be remotely separated, and then connect that ability to the internet or even to something like SIPRNET?

Or where it remotely ejects an F-16 pilot.. that system is totally mechanical. If you made it so it could be remote activeated hat would just create a way for enemy forces to ahck your fighters and eject the pilots.

_________________
"Hysterical children shrieking about right-wing anything need to go sit in the corner and be quiet while the adults are talking."


Top
 Profile  
Reply with quote  
 Post subject:
PostPosted: Thu Dec 17, 2009 12:37 pm 
Offline
User avatar

Joined: Fri Sep 25, 2009 8:22 pm
Posts: 5716
I'm so unsurprised that I'm actually very surprised. This is so obvious that I just assumed a solution had been developed.


Top
 Profile  
Reply with quote  
PostPosted: Thu Dec 17, 2009 1:07 pm 
Offline
Commence Primary Ignition
User avatar

Joined: Thu Sep 03, 2009 9:59 am
Posts: 15740
Location: Combat Information Center
I'm sure it would have happened sooner if there were no measures in place at all. It's just proof that absolute security is a myth.

_________________
"Hysterical children shrieking about right-wing anything need to go sit in the corner and be quiet while the adults are talking."


Top
 Profile  
Reply with quote  
 Post subject:
PostPosted: Thu Dec 17, 2009 1:20 pm 
Offline

Joined: Fri Sep 04, 2009 10:27 am
Posts: 2169
From what I have read, there were no measures in place... it probably took so long because even the insurgents figured it was too stupid to not be covered. This wasn't hacking as in compromising the security system, it was simply intercepting the video feed broadcasts... more akin to using your neighbors unsecured wireless connection.


Top
 Profile  
Reply with quote  
 Post subject: Re:
PostPosted: Thu Dec 17, 2009 1:23 pm 
Offline
Commence Primary Ignition
User avatar

Joined: Thu Sep 03, 2009 9:59 am
Posts: 15740
Location: Combat Information Center
Ladas wrote:
From what I have read, there were no measures in place... it probably took so long because even the insurgents figured it was too stupid to not be covered. This wasn't hacking as in compromising the security system, it was simply intercepting the video feed broadcasts... more akin to using your neighbors unsecured wireless connection.


I doubt that very much, since it's sent over SIPRNET in the first place. Probably what's meant is the actual video feed itself has no additional measures on top of the security of SIPRNET.

I'm not going to say more on this.

_________________
"Hysterical children shrieking about right-wing anything need to go sit in the corner and be quiet while the adults are talking."


Top
 Profile  
Reply with quote  
 Post subject: Re: Re:
PostPosted: Thu Dec 17, 2009 1:28 pm 
Offline

Joined: Fri Sep 04, 2009 10:27 am
Posts: 2169
Diamondeye wrote:
I doubt that very much, since it's sent over SIPRNET in the first place. Probably what's meant is the actual video feed itself has no additional measures on top of the security of SIPRNET.



From the article..

Quote:
Senior defense and intelligence officials said Iranian-backed insurgents intercepted the video feeds by taking advantage of an unprotected communications link in some of the remotely flown planes' systems. Shiite fighters in Iraq used software programs such as SkyGrabber -- available for as little as $25.95 on the Internet -- to regularly capture drone video feeds, according to a person familiar with reports on the matter.


Quote:
Senior military and intelligence officials said the U.S. was working to encrypt all of its drone video feeds from Iraq, Afghanistan and Pakistan, but said it wasn't yet clear if the problem had been completely resolved.


Top
 Profile  
Reply with quote  
 Post subject: Re: Re:
PostPosted: Thu Dec 17, 2009 3:01 pm 
Offline
Commence Primary Ignition
User avatar

Joined: Thu Sep 03, 2009 9:59 am
Posts: 15740
Location: Combat Information Center
Ladas wrote:
Diamondeye wrote:
I doubt that very much, since it's sent over SIPRNET in the first place. Probably what's meant is the actual video feed itself has no additional measures on top of the security of SIPRNET.



From the article..

Quote:
Senior defense and intelligence officials said Iranian-backed insurgents intercepted the video feeds by taking advantage of an unprotected communications link in some of the remotely flown planes' systems. Shiite fighters in Iraq used software programs such as SkyGrabber -- available for as little as $25.95 on the Internet -- to regularly capture drone video feeds, according to a person familiar with reports on the matter.


Quote:
Senior military and intelligence officials said the U.S. was working to encrypt all of its drone video feeds from Iraq, Afghanistan and Pakistan, but said it wasn't yet clear if the problem had been completely resolved.


Yes, I know what the article said.

_________________
"Hysterical children shrieking about right-wing anything need to go sit in the corner and be quiet while the adults are talking."


Top
 Profile  
Reply with quote  
 Post subject:
PostPosted: Thu Dec 17, 2009 3:27 pm 
Offline
Lean, Mean, Googling Machine
User avatar

Joined: Thu Sep 03, 2009 9:35 am
Posts: 2903
Location: Maze of twisty little passages, all alike
Uh...this really doesn't have anything to do with whether the UAVs were hooked up to SIPRNET, NIPRNET, or even the public Internet. That's a perfectly reasonable thing to do. They have to get the telemetry from these things somehow, and obviously that's going to require some kind of wireless data link -- satellite in this case. With the appropriate encryption mechanisms in place, this doesn't pose any significant security risk (for now).

The real issue is that they were broadcasting this data over an unencrypted satellite uplink. Considering the amount of SIGINT and COMINT business the feds have had their hands in, they damn well ought to know how inexcusably stupid that is.

_________________
Sail forth! steer for the deep waters only!
Reckless, O soul, exploring, I with thee, and thou with me;
For we are bound where mariner has not yet dared to go,
And we will risk the ship, ourselves and all.


Top
 Profile  
Reply with quote  
 Post subject: Re:
PostPosted: Thu Dec 17, 2009 3:29 pm 
Offline
User avatar

Joined: Tue Sep 08, 2009 9:36 am
Posts: 4320
Stathol wrote:
The real issue is that they were broadcasting this data over an unencrypted satellite uplink. Considering the amount of SIGINT and COMINT business the feds have had their hands in, they damn well ought to know how inexcusably stupid that is.


This. Especially the inexcusably stupid part.


Top
 Profile  
Reply with quote  
 Post subject:
PostPosted: Thu Dec 17, 2009 4:25 pm 
Offline
Mountain Man
User avatar

Joined: Thu Sep 10, 2009 4:15 pm
Posts: 3374
I need Skygrabber, just to play with. But, their website is pretty slammed today ... !

_________________
This cold and dark tormented hell
Is all I`ll ever know
So when you get to heaven
May the devil be the judge


Top
 Profile  
Reply with quote  
PostPosted: Thu Dec 17, 2009 8:44 pm 
Offline
Commence Primary Ignition
User avatar

Joined: Thu Sep 03, 2009 9:59 am
Posts: 15740
Location: Combat Information Center
Be careful believing what you read about exactly how this went down.

More to the point, think about what you'd do if you were managing damage control in the aftermath of this disaster.. pragmatically.

_________________
"Hysterical children shrieking about right-wing anything need to go sit in the corner and be quiet while the adults are talking."


Top
 Profile  
Reply with quote  
 Post subject:
PostPosted: Thu Dec 17, 2009 8:55 pm 
Offline
Bull Moose
User avatar

Joined: Wed Sep 02, 2009 7:36 pm
Posts: 7507
Location: Last Western Stop of the Pony Express
I'd be asking a lot of questions about why the security encryption wasn't secured so that the signal could not be ungarbled, why we were once again underestimating the enemy, and asking how we can improve the system so this doesn't happen again.

Then I would be asking the programmers to develop how to give them false broadcast feeds to gawk at while the Predator was somewhere else.

_________________
The U. S. Constitution doesn't guarantee happiness, only the pursuit of it. You have to catch up with it yourself. B. Franklin

"A mind needs books like a sword needs a whetstone." -- Tyrion Lannister, A Game of Thrones


Top
 Profile  
Reply with quote  
 Post subject: Re:
PostPosted: Thu Dec 17, 2009 8:58 pm 
Offline
Commence Primary Ignition
User avatar

Joined: Thu Sep 03, 2009 9:59 am
Posts: 15740
Location: Combat Information Center
Micheal wrote:
I'd be asking a lot of questions about why the security encryption wasn't secured so that the signal could not be ungarbled, why we were once again underestimating the enemy, and asking how we can improve the system so this doesn't happen again.

Then I would be asking the programmers to develop how to give them false broadcast feeds to gawk at while the Predator was somewhere else.


That's a good start. Now think more deviously. What assumption are you making here?

I know that normally here we go based on what information is available. I'm not saying we necessarily shouldn't here. I'm trying to point out something else.

How would you try to not just control the damage but gain an advantage from the situation?

_________________
"Hysterical children shrieking about right-wing anything need to go sit in the corner and be quiet while the adults are talking."


Top
 Profile  
Reply with quote  
 Post subject:
PostPosted: Thu Dec 17, 2009 10:39 pm 
Offline
Noli me calcare
User avatar

Joined: Thu Sep 03, 2009 10:26 am
Posts: 4747
Let it be known that they "hijacked" the info with easily available tech (whether that was the case or not) - that you can leverage your own knowledge of said tech in order to gain info about the "hijackers' when they try again?

_________________
"Dress cops up as soldiers, give them military equipment, train them in military tactics, tell them they’re fighting a ‘war,’ and the consequences are predictable." —Radley Balko

Image


Top
 Profile  
Reply with quote  
 Post subject:
PostPosted: Thu Dec 17, 2009 10:48 pm 
Offline
Bull Moose
User avatar

Joined: Wed Sep 02, 2009 7:36 pm
Posts: 7507
Location: Last Western Stop of the Pony Express
Start tracking the purchases of said 'low tech' equipment to get an idea about who wants to hack in to the system. Investigate buyers, discreetly, quietly, and put together a strike plan if you hit the jackpot.

_________________
The U. S. Constitution doesn't guarantee happiness, only the pursuit of it. You have to catch up with it yourself. B. Franklin

"A mind needs books like a sword needs a whetstone." -- Tyrion Lannister, A Game of Thrones


Top
 Profile  
Reply with quote  
 Post subject:
PostPosted: Fri Dec 18, 2009 4:17 am 
Offline
User avatar

Joined: Thu Sep 03, 2009 3:08 am
Posts: 6465
Location: The Lab
Encryption is highly over rated. It's easily compromised with brute force (in several different ways). Even if you created enough complexity in the encryption system to deter trying to break it, you still have to worry about the phyisical security of the equipment...

One downed drone, or captured mobility trailer, etc...


Top
 Profile  
Reply with quote  
 Post subject: Re:
PostPosted: Fri Dec 18, 2009 7:46 am 
Offline
Commence Primary Ignition
User avatar

Joined: Thu Sep 03, 2009 9:59 am
Posts: 15740
Location: Combat Information Center
Vindicarre wrote:
Let it be known that they "hijacked" the info with easily available tech (whether that was the case or not) - that you can leverage your own knowledge of said tech in order to gain info about the "hijackers' when they try again?


This, but even more devious.

Michael wrote:
Start tracking the purchases of said 'low tech' equipment to get an idea about who wants to hack in to the system. Investigate buyers, discreetly, quietly, and put together a strike plan if you hit the jackpot.


This too, but like I said, something more.

Let me give you a hint.. wouldn't you sort of dangle a carrot out there to lure people into trying again?

_________________
"Hysterical children shrieking about right-wing anything need to go sit in the corner and be quiet while the adults are talking."


Top
 Profile  
Reply with quote  
 Post subject:
PostPosted: Fri Dec 18, 2009 7:58 am 
Offline
Bull Moose
User avatar

Joined: Wed Sep 02, 2009 7:36 pm
Posts: 7507
Location: Last Western Stop of the Pony Express
Make them kind of trackable, targetable, so they can be fired upon, then have their silent shadow blow up the firing site.

_________________
The U. S. Constitution doesn't guarantee happiness, only the pursuit of it. You have to catch up with it yourself. B. Franklin

"A mind needs books like a sword needs a whetstone." -- Tyrion Lannister, A Game of Thrones


Top
 Profile  
Reply with quote  
 Post subject: Re:
PostPosted: Fri Dec 18, 2009 8:18 am 
Offline
Commence Primary Ignition
User avatar

Joined: Thu Sep 03, 2009 9:59 am
Posts: 15740
Location: Combat Information Center
Micheal wrote:
Make them kind of trackable, targetable, so they can be fired upon, then have their silent shadow blow up the firing site.


I suppose that could be done although their main defense against anything insurgents have is their small size. All you'd really do is fly lower, and if they could take a shot you'd inevitably lose some drones in the process of killing guys with MANPAD SAMs that really are pretty ubiquitous anyhow.

It's a possibility, but not what I was thinking of.

Wouldn't you maybe try to tempt people into trying the same thing, maybe by making it sound easier than it actually was so you can figure out where the smart, tech-savvy bad guys are?

_________________
"Hysterical children shrieking about right-wing anything need to go sit in the corner and be quiet while the adults are talking."


Top
 Profile  
Reply with quote  
 Post subject: Re: Re:
PostPosted: Fri Dec 18, 2009 9:05 am 
Offline
Noli me calcare
User avatar

Joined: Thu Sep 03, 2009 10:26 am
Posts: 4747
I thought that was what I suggested, heheh.

Diamondeye wrote:
Wouldn't you maybe try to tempt people into trying the same thing, maybe by making it sound easier than it actually was...

Quote:
Let it be known that they "hijacked" the info with easily available tech (whether that was the case or not)


Diamondeye wrote:
... so you can figure out where the smart, tech-savvy bad guys are?

Quote:
...you can leverage your own knowledge of said tech in order to gain info about the "hijackers' when they try again?

_________________
"Dress cops up as soldiers, give them military equipment, train them in military tactics, tell them they’re fighting a ‘war,’ and the consequences are predictable." —Radley Balko

Image


Top
 Profile  
Reply with quote  
Display posts from previous:  Sort by  
Post new topic Reply to topic  [ 47 posts ]  Go to page 1, 2  Next

All times are UTC - 6 hours [ DST ]


Who is online

Users browsing this forum: No registered users and 244 guests


You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot post attachments in this forum

Search for:
Jump to:  
Powered by phpBB® Forum Software © phpBB Group