Feeds

Iraqi insurgents hack US drones with $26 software

Video feed intercept

Securing Web Applications Made Simple and Scalable

Updated Iraqi militants are intercepting sensitive video feeds from US predator drones using $26 off-the-shelf software, and the same technique leaves feeds from most military aircraft vulnerable to snooping, according to published reports.

Insurgents backed by Iran have regularly accessed the unencrypted video feeds of the unmanned planes, which the Obama administration has increasingly relied on to monitor and attack militants. The insurgents then share the footage with multiple extremist groups, according to a report from The Wall Street Journal, which was published Thursday. It's not clear if the problem has been fixed.

The security lapse was discovered late last year when US military personnel in Iraq apprehended a Shiite militant with a laptop that contained intercepted drone video feeds. In July, personnel found additional feeds on other militant laptops, leading some officials to believe that groups tied to Iran were regularly tapping in to the unprotected communications link used by the drones.

The military found "days and days and hours and hours of proof" that the feeds were being intercepted and shared with a variety of militant groups, the WSJ said, citing an unnamed person familiar with the reports.

The network linking the drones to operators in the US, Afghanistan, or Pakistan is more than a decade old, and many of its components will have to be upgraded to prevent insurgents from intercepting feeds. Officials have stepped up efforts to protect the system, but "it wasn't yet clear if the problem had been completely resolved," according to the WSJ.

To access the feeds, the militants have been using SkyGrabber, a publicly available program that pulls movies and music off satellites and sells for $26.

In an article published later Thursday, Wired.com reported that the US military's primary system for sharing overhead surveillance with soldiers and Marines on the ground is also suscepible to the electronic interception using SkyGrabber. The system - known as ROVER, short for remotely operated video enhanced receiver - is installed on "nearly every airplane in the American fleet," the report said.

Military officials are working to close the massive security hole, but one of them cautions: "This is not a trivial solution. Almost every fighter/bomber/ISR [intelligence surveillance reconnaissance] platform we have in theater has a ROVER downlink."

US officials say there is no evidence that militants have been able to take control of the drones. Still, the interception is a significant because it could give enemies considerable battlefield advantages.

The WSJ article is here, and the Wired.com article is here. ®

This article was updated to include details reported by Wired.com.

Mobile application security vulnerability report

More from The Register

next story
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
NEW, SINISTER web tracking tech fingerprints your computer by making it draw
Have you on YouPorn lately, perhaps? White House website?
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
NUDE SNAPS AGENCY: NSA bods love 'showing off your saucy selfies'
Swapping other people's sexts is a fringe benefit, says Snowden
Own a Cisco modem or wireless gateway? It might be owned by someone else, too
Remote code exec in HTTP server hands kit to bad guys
British data cops: We need greater powers and more money
You want data butt kicking, we need bigger boots - ICO
prev story

Whitepapers

Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.