A Hack of the Drones: Insurgents Spy on Spy Planes With $26 Software

80beatsBy Brett IsraelDec 18, 2009 2:51 AM


Sign up for our email newsletter for the latest science news

The U.S. military does not think much of Iraqi militants' technological capabilities. How else to explain the fact that their Predator drone surveillance planes used unencrypted links to send down to their military operators? The lack of encryption means that the drones' data is less secure than most home wireless internet networks, a serious vulnerability in the unmanned aerial network. According to a story in The Wall Street Journal today, video feeds from Predator drones have been intercepted by militants in Iraq.

Senior defense and intelligence officials said Iranian-backed insurgents intercepted the video feeds by taking advantage of an unprotected communications link in some of the remotely flown planes' systems. Shiite fighters in Iraq used software programs such as SkyGrabber -- available for as little as $25.95 on the Internet -- to regularly capture drone video feeds, according to a person familiar with reports on the matter [The Wall Street Journal]

. Officials are saying that they don't believe militants were able to take control of the drones, but by downloading the videos they were able to keep up with which areas were being monitored. The Defense Department has responded by saying they discovered the vulnerability a year ago, and are working to encrypt all drone communications links in Iraq, Afghanistan, and Pakistan. However, there are at least 600 unmanned vehicles and thousands of ground stations to upgrade, so the security improvement will not happen overnight. However, officials say they have made technical adjustments to systems in key threat areas to block the signal interception. The

breach arose because the Predator unmanned aerial vehicles do not use encryption in the final link to their operators on the ground. (By contrast, every time you log on to a bank or credit card Web site, or make a phone call on most modern cellular networks, your communications are protected by encryption technology) [CBS News]. After

a Shiite militant was captured in Iraq with a laptop full of intercepted drone feeds, and following similar discoveries, officials concluded that groups were trained and funded by Iran to intercept and share video feeds.

The problem is similar to street criminals listening to police scanners, according to Dale Meyerrose, former chief information officer for the U.S. intelligence community.

The military has known about the vulnerability for more than a decade, but assumed adversaries would not be able to exploit it [AP]

.The surveillance network described in most news reports

suggests that the final link between the drone and the operator is between a satellite flying around in space and that that final link is unencrypted for reasons unfathomable to anyone with even cursory knowledge of network communications. Maybe they wanted to save on bandwidth costs [Crunch Gear]?

Following the publication of The Wall Street Journal's story on the security breach,

Bryan Whitman, a U.S. defense official and Pentagon spokesman, said on Thursday that

they have fixed the leak, but declined to discuss any details.

Related Content: 80beats: “Laser Avenger” Shoots Down Unmanned Plane in a Test of Future Weaponry 80beats: Autonomous, Snooping Robots Almost Ready for the Front Line 80beats: Scientists Glean Secrets of Flight From Birds, Bats, and Bugs

Image: U.S. Air Force

1 free article left
Want More? Get unlimited access for as low as $1.99/month

Already a subscriber?

Register or Log In

1 free articleSubscribe
Discover Magazine Logo
Want more?

Keep reading for as low as $1.99!


Already a subscriber?

Register or Log In

More From Discover
Recommendations From Our Store
Shop Now
Stay Curious
Our List

Sign up for our weekly science updates.

To The Magazine

Save up to 70% off the cover price when you subscribe to Discover magazine.

Copyright © 2023 Kalmbach Media Co.