Feeds

Iraqi insurgents hack US drones with $26 software

Video feed intercept

Using blade systems to cut costs and sharpen efficiencies

Updated Iraqi militants are intercepting sensitive video feeds from US predator drones using $26 off-the-shelf software, and the same technique leaves feeds from most military aircraft vulnerable to snooping, according to published reports.

Insurgents backed by Iran have regularly accessed the unencrypted video feeds of the unmanned planes, which the Obama administration has increasingly relied on to monitor and attack militants. The insurgents then share the footage with multiple extremist groups, according to a report from The Wall Street Journal, which was published Thursday. It's not clear if the problem has been fixed.

The security lapse was discovered late last year when US military personnel in Iraq apprehended a Shiite militant with a laptop that contained intercepted drone video feeds. In July, personnel found additional feeds on other militant laptops, leading some officials to believe that groups tied to Iran were regularly tapping in to the unprotected communications link used by the drones.

The military found "days and days and hours and hours of proof" that the feeds were being intercepted and shared with a variety of militant groups, the WSJ said, citing an unnamed person familiar with the reports.

The network linking the drones to operators in the US, Afghanistan, or Pakistan is more than a decade old, and many of its components will have to be upgraded to prevent insurgents from intercepting feeds. Officials have stepped up efforts to protect the system, but "it wasn't yet clear if the problem had been completely resolved," according to the WSJ.

To access the feeds, the militants have been using SkyGrabber, a publicly available program that pulls movies and music off satellites and sells for $26.

In an article published later Thursday, Wired.com reported that the US military's primary system for sharing overhead surveillance with soldiers and Marines on the ground is also suscepible to the electronic interception using SkyGrabber. The system - known as ROVER, short for remotely operated video enhanced receiver - is installed on "nearly every airplane in the American fleet," the report said.

Military officials are working to close the massive security hole, but one of them cautions: "This is not a trivial solution. Almost every fighter/bomber/ISR [intelligence surveillance reconnaissance] platform we have in theater has a ROVER downlink."

US officials say there is no evidence that militants have been able to take control of the drones. Still, the interception is a significant because it could give enemies considerable battlefield advantages.

The WSJ article is here, and the Wired.com article is here. ®

This article was updated to include details reported by Wired.com.

The smart choice: opportunity from uncertainty

More from The Register

next story
NEW, SINISTER web tracking tech fingerprints your computer by making it draw
Have you been on YouPorn lately, perhaps? White House website?
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Black Hat anti-Tor talk smashed by lawyers' wrecking ball
Unmasking hidden users is too hot for Carnegie-Mellon
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Own a Cisco modem or wireless gateway? It might be owned by someone else, too
Remote code exec in HTTP server hands kit to bad guys
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.