TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Insurgents Hack U.S. Drones

177 pointsby bbgover 15 years ago

25 comments

tsallyover 15 years ago
I have a thought. How about next time the military just flies one of these things down to Defcon and lets people have a go. The hackers get a cool toy to play with a for a day and the military gets a free fairly sophisticated penetration test. I'm sure the flaw would have been found; instructions on how to intercept satellite data with about $100 worth of hardware have been floating around for years. I'll edit this post in a minute with details for anyone that's interested.<p>EDIT:<p>* One possible LNB: <a href="http://bit.ly/7AGe7e" rel="nofollow">http://bit.ly/7AGe7e</a><p>* Possible dishes: <a href="http://bit.ly/4NfMN1" rel="nofollow">http://bit.ly/4NfMN1</a><p>* One possible receiver (for digital, you'll need a different one for analog): <a href="http://bit.ly/4zHyND" rel="nofollow">http://bit.ly/4zHyND</a><p>* Useful forum: <a href="http://www.satelliteguys.us/free-air-fta-discussion/" rel="nofollow">http://www.satelliteguys.us/free-air-fta-discussion/</a><p>That setup is enough to pick up signals from satellites (locations: <a href="http://www.google.com/#hl=en&#38;q=satellite+index" rel="nofollow">http://www.google.com/#hl=en&#38;q=satellite+index</a>). If you do this as a hobby you might want to spend the money on a motor to tilt/pan your dish for you. ;-) The article implies that such a setup is pretty much what the insurgents used to intercept video from the drones. The drone bounces its video up to a satellite and the satellite bounces back down to the operator. The insurgents just grab it when it's coming down to the operator from the satellite. I'm pretty sure (or at least I hope) the receiver would have to be modified to decompress/decrypt the drone data properly. It'll do just fine if you're scanning for legit TV signals.
评论 #1000528 未加载
评论 #1000603 未加载
评论 #1000553 未加载
评论 #1000533 未加载
评论 #1000532 未加载
conaniteover 15 years ago
<i>the U.S. military found pirated drone video feeds on other militant laptops</i><p>What is the meaning of "pirated" here? Are they going to sue militants for copyright infringement?
评论 #1001028 未加载
评论 #1001057 未加载
评论 #1001205 未加载
评论 #1001171 未加载
评论 #1000911 未加载
评论 #1002362 未加载
mottersover 15 years ago
Having an unencrypted video broadcast on a military drone is just a dumb idea by whoever manufactured it. Encryption would seem to be the most minimal requirement for such an application.
评论 #1002312 未加载
评论 #1001188 未加载
noonespecialover 15 years ago
Part of the problem is that the military awards contracts that are sometimes decades long. What was "good enough" security in 1990 is not looking so hot 20 years on. The US military machine may not perform as well as it has in the past in the new era of betas, hotfixes and patches.<p>I will not be at all surprised when insurgent "rc-plane" drones start showing up with cell phones, arduinos, grenades and duct-tape.
评论 #1000712 未加载
评论 #1000696 未加载
Shamiqover 15 years ago
Instead of hack, it should read "Insurgents intercept U.S. Drone video feeds"
评论 #1000485 未加载
eliover 15 years ago
<i>"The military [is] trying to solve the problems by better encrypting the drones' feeds."</i><p>Where by "better encrypting" they mean "using any encryption at all"
评论 #1001333 未加载
tlrobinsonover 15 years ago
It's amusing that they consider the lack of encryption a mere "flaw". Seems like a huge oversight to me.
slackerIIIover 15 years ago
Sounds like a great opportunity to feed some false information to the insurgents.
naveensundarover 15 years ago
<i>The potential drone vulnerability lies in an unencrypted downlink between the unmanned craft and ground control.</i><p>What about the uplink?
评论 #1000919 未加载
jsm386over 15 years ago
<i>The potential drone vulnerability lies in an unencrypted downlink between the unmanned craft and ground control. The U.S. government has known about the flaw since the U.S. campaign in Bosnia in the 1990s, current and former officials said. But the Pentagon assumed local adversaries wouldn't know how to exploit it, the officials said.</i>
评论 #1000640 未加载
评论 #1000647 未加载
scotty79over 15 years ago
War machine sending data through unprotected channel? In XXI century? After two world wars and a cold war?<p>How?
评论 #1004204 未加载
marltodover 15 years ago
The problem is that the people in charge of deciding what to approve/buy for the Military are not qualified. They get the position of authority by being successful in the military not by proving they understand the technology of the things they are buying.<p>I can see how this happened. Say the military guy had two choices of what to buy for video feed products.<p>Product 1. Fully encrypted video 15 frames per second and a 5 second delay.<p>Product 2. No encryption video at 30 fps and 1 second delay.<p>At the demo he says "product 2 is much better lets get that". When product 2 is questioned about security they say something like "we have proprietary codecs". From the miliary guy's point a view a codec is just as good as encryption.
joe_the_userover 15 years ago
Whether this particular mistake was avoidable or not, the event raises bigger issues.<p>The military is building more and more lethal, radio-controlled robots.<p>No networked device can be <i>guaranteed</i> to be secure. Computers have been hacked since they existed. The hacking of satellites is endemic. A civilian hacker was supposedly holding a military satellite hostage a while back.<p>Thus this strategy makes it likely that hackers will get the ability to command a lethal device sooner or later.<p>The risks of this might be worth the rewards in terms of avoiding casualties, projecting power, etc.<p>But there hasn't been much public discussion of the choices that are involved here. There should be.
androver 15 years ago
That poses an interesting technical question - how do you achieve military-grade encryption over a communications line with heavy packet loss (assuming the drone-&#62;satellite connection is like that)? Most self-synchronizing ciphers would have too much of a lag for real time operation.<p>Perhaps two synchronized pseudo-random number generators, driven by synchronized clocks, could be used for variable key generation for a symmetric cipher.
评论 #1001381 未加载
ashwinlover 15 years ago
As @noonespecial alludes to, some of the comments on the WSJ site and (less so) here are made incognizant of the complexities of the systems and timelines of procurement, testing and deployment.<p>@tsally the DEF CON suggestion is a good point. Because of ITAR, it is unlikely that the actual "toy" will be provided, but a comparable subsystem wouldn't be out of the question. E.g. The DoD regularly operates rapid reaction challenges with a simulated problem from theater - see <a href="http://www.kirtland.af.mil/news/story.asp?id=123120737" rel="nofollow">http://www.kirtland.af.mil/news/story.asp?id=123120737</a> Something similar could be done with DEF CON.<p>I think it is important to maintain perspective when stories like this come out. Contrary to some of the comments, defense contractors and researchers/engineers at gov't R&#38;D labs do put the priorities of the warfighter first. Consider that many of the engineers/contractors/researchers/etc working on technology development are combat veterans themselves.<p>The issue is that we face adaptive adversaries.
arsover 15 years ago
I hope instead of shutting it down, the military feeds them false information. If done right, it could make a good trap.
评论 #1000781 未加载
评论 #1000777 未加载
lallysinghover 15 years ago
Note that "skygrabber" is the #5 search phrase on google right now. <a href="http://www.google.com/trends/hottrends?sa=X&#38;oi=prbx_hot_trends&#38;ct=title&#38;q=skygrabber" rel="nofollow">http://www.google.com/trends/hottrends?sa=X&#38;oi=prbx_hot_...</a>
Klimentover 15 years ago
"said people familiar with the matter"<p>WSJ is really going down in journalistic quality, it seems. But seriously, problem known for a decade, "they're dumber than us so they can't use it" attitudes, in a device at that price point, you'd expect they'd think about these things. Reminds me of the Boeing report on Columbia. ( <a href="http://www.edwardtufte.com/bboard/q-and-a-fetch-msg?msg_id=0001yB&#38;topic_id=1" rel="nofollow">http://www.edwardtufte.com/bboard/q-and-a-fetch-msg?msg_id=0...</a> )
评论 #1000948 未加载
评论 #1000840 未加载
rapindover 15 years ago
Do you think obsfucation and spam could solve this problem? Could they setup cheap broadcasters all over the place that constantly send out fake videos and develeop a sophisticated filter they can use themselves that the insurgents wouldn't have access to? Then they wouldn't have to rework the drones themselves, and they could constantly rework the spam and the filter to stay ahead of them.
评论 #1001681 未加载
johnwatson11218over 15 years ago
Is anyone talking about the potential to not just grab video but to send control signals? What if the enemy could actually take control of one of these drones? Is that channel encrypted? How about sending back false video to not allow the true operators to know what is really going on or to generate false positives.
评论 #1001528 未加载
TallGuyShortover 15 years ago
They say there's "no evidence" that they were able to take control of the plane's in flight. Since nobody bothered to encrypt the video feed, and they're saying there's "no evidence", it sounds to me like they also didn't bother to encrypt the control signals. Nice...
jac_no_kover 15 years ago
Anybody remember the movie Body of Lies? Would be interesting to feed the insurgents a different video feed from what is actually be used.
评论 #1000702 未加载
richardwover 15 years ago
Is there any chance the problem is technical? Encryption increasing latency (at least for the pilot's view), anything like that?
ruslanover 15 years ago
Wonder how soon they find a way to spoof drone video streams with some open sourced software, probably VLC ;-)
Devilboyover 15 years ago
'Fixing the security gap would have caused delays'<p>'... it would have added to the Predator's price'<p>If you're paying $20 million each you'd think another million to ensure your targets don't see you coming would be a no-brainer?
评论 #1000540 未加载