• IP addresses are NOT logged in this forum so there's no point asking. Please note that this forum is full of homophobes, racists, lunatics, schizophrenics & absolute nut jobs with a smattering of geniuses, Chinese chauvinists, Moderate Muslims and last but not least a couple of "know-it-alls" constantly sprouting their dubious wisdom. If you believe that content generated by unsavory characters might cause you offense PLEASE LEAVE NOW! Sammyboy Admin and Staff are not responsible for your hurt feelings should you choose to read any of the content here.

    The OTHER forum is HERE so please stop asking.

US military high tech cheaply defeated by poor Taliban

AhLeePaPa

Alfrescian
Loyal
Joined
Sep 17, 2008
Messages
174
Points
18
http://www.csmonitor.com/USA/2009/1...-US-drones-shows-how-quickly-insurgents-adapt


1217_Drone_SkyGrabber_Hack_full_380.jpg


SkyGrabber: hack of US drones shows how quickly insurgents adapt

Iraqi insurgents reportedly used $26 SkyGrabber software to tap into video feeds from US drones in the region. It's the latest sign of the speed at which insurgents are adapting to US military and technological advances.


San Francisco

Revelations that Iraqi Shiite militants use cheap software available online to tap into live video feeds from Predator drones is just the latest indication of insurgents’ tech savvy – and ability to adapt to American military advances.
Skip to next paragraph
Related Stories

* Blog: SkyGrabber: Is hacking military drones too easy?
* Drone aircraft in a stepped-up war in Afghanistan and Pakistan
* The Air Force's new poster boys: drone jocks

The Wall Street Journal reported Thursday that militants used a $25.95 program called SkyGrabber – software meant to give users the ability to snatch music and videos that others are downloading – to see what the $4.5 million Predators flying over the region were sending back to US military command. (Read more about how it was done here.)

The insurgents weren’t able to hack into the Predator system or disrupt the video feeds, according to military officials. The Pentagon is now taking steps to encrypt the video recorded by the spy planes.

Drones have become a key tool in the US wars in Iraq and Afghanistan – as well as counterterrorism operations in Pakistan and Somalia – because they can monitor targets for a long period of time and deploy missiles by remote, with pilots sitting in bases as far away as Arizona.

The tapping into the video feeds – which gives Iraqi militants valuable insights into the targets the US military is watching – is not the only reported flaw in the pricey US military fighting system. In a March 16 article, The New York Times reported that the controls in the Predator command centers were “clunky” as the “missile-firing button sits dangerously close to the switch that shuts off the plane’s engine.”

Many Predator drones have crashed in Iraq and Afghanistan and drone strikes in Pakistan that have led to civilian deaths have drawn sharp criticism. Despite this, Predators are part of a first wave of an increasingly-used technology.

But as US military technology advances, its enemies find innovative ways to keep up.

Insurgents in Iraq have long used the Internet in their fight against the Americans – not only to recruit new militants but also to quickly spread and distribute training manuals. Roadside bomb-makers adapted to US military detection methods by employing bigger bombs and deadlier explosively-formed penetrators, or EFPs. When it became difficult for male suicide bombers to get close to key targets, militants started deploying women who were less likely to be searched.

“If anything, I think the enemy, being smaller and less bureaucratic, tends to be more technologically agile than us," writes Thomas Ricks, the former Washington Post military reporter, on his national security blog. He writes of seeing solar collectors in an Al Qaeda command and control bunker in Afghanistan in 2001.

"From the wires I could see it looked to me like they used it to power their communications. Anyway, solar power sure beats carry hauling batteries up the pathways along those 10,000-foot-high razorback ridges,” he added.

In fact, the Wall Street Journal report suggests that military officials knew about the problem for years but "the Pentagon assumed local adversaries wouldn't know how to exploit it."

In a 2007 USA Today article about the evolution of the improvised explosive device, or IED, retired Marine Gen. Anthony Zinni reflected on the pace at which insurgents adapted in Iraq.

"This is the first war where we've faced an enemy that's adapted better than we have at a tactical and operational level.”
 
http://www.middle-east-online.com/english/?id=36247


First Published 2009-12-17


Cheap software against expensive intelligence technology


Iraqi militants track US drones


Insurgents use cheap software programs such as SkyGrabber to capture US-operated drone feeds.



WASHINGTON - Iraqi militants have regularly used cheap and widely-available software to intercept the feeds of US-operated drones, the Wall Street Journal reported on Thursday.

Citing senior defense and intelligence officials, the Journal said Iranian-backed Shiite insurgents used software programs such as SkyGrabber - available online for 25.95 dollars (18 euros) - to capture drone feeds.

The practice was uncovered in July 2009, when the US military found files of intercepted drone video feeds on the laptop of a captured militant.

They discovered "days and days and hours and hours of proof," a person described as familiar with the situation told the Journal. "It is part of their kits now."

Some of the most detailed examples of drone intercepts have been uncovered in Iraq, but the same technique is known to have been employed in Afghanistan and could easily be used in other areas where US drones operate.

The SkyGrabber program and others take advantage of the unencrypted downlink between the drone and ground control.

The US government has known about the flaw since the 1990s, but assumed its adversaries would not be able to take advantage of it, the Journal said.

US officials said there was no evidence that militants could control the drones or otherwise interfere with their flights, but the vulnerability would allow the unmanned craft to be monitored and tracked.

Defense officials told the Journal efforts were being made to fix the flaw, but noted that adding encryption to a decade-old system is tricky and requires upgrading several components of the system linking drones to ground control.

One of the developers of SkyGrabber, which is made by Russian company SkySoftware, told the Journal he had no idea the program could be used to intercept drone feeds.

"It was developed to intercept music, photos, video, programs and other content that other users download from the Internet -- no military data or other commercial data, only free legal content," Andrew Solonikov told the Journal.
 
http://www.csmonitor.com/Innovation...kyGrabber-Is-hacking-military-drones-too-easy


Horizons
SkyGrabber: Is hacking military drones too easy?

Insurgents in Iraq used SkyGrabber – cheap Windows software – to hack unmanned Predator planes, the Pentagon says.

*

SkyGrabber and similar software has been used to capture military feeds from Predator unmanned aerial vehicles, such as this one in Ali Base, Iraq.

Jonathan Snyder / US Air Force / Sipa Press / File
Enlarge



By Chris Gaylord / December 17, 2009

Hollywood makes it look as if terrorists need complicated equipment and a criminal super-genius to tap into US military drones. In fact, a $26 computer program would do the trick.
Skip to next paragraph
Recent posts


US defense officials admitted to The Wall Street Journal that insurgents in Iraq have used SkyGrabber, a downloadable program, to hack into video feeds from Predators planes. According to unnamed sources cited by the Journal, Iranian-backed groups have intercepted satellite data, allowing them to view, record, and share video relayed by these pilotless vehicles. While the information could be used to spy on military intelligence and troop locations, there's no reason to believe the hackers can affect the Predators nor access anything other than raw video.

The setup requires a PC, satellite dish, satellite modem, and software such as SkyGrabber, which was developed by the Russian firm SkySoftware. Because of Iraq and Afghanistan's rough terrain, military officials cannot assume the Predators will have a clean, line-of-sight connection with the bases that send them orders. To work around the problem, the drones switch to satellite linkups. However, unlike credit card payments and cellphone calls, this military satellite data is not encrypted.

Once the insurgents learned the Predator video was unencrypted, they basically pitched their TV antennas and enjoyed the show. The information was unprotected because of financial and technical inertia delaying network upgrades, the Journal article said, but the Pentagon is now securing all of its feeds in Iraq, Afghanistan, and Pakistan.

This summer, the US uncovered "days and days and hours and hours" of intercepted video on militants' laptops, according to one of the Journal's anonymous sources. "It is part of their kit now."

And a dastardly simple part at that. Secretly tapping into satellite feeds has been a trick played by teenage would-be hackers for some time, although they rarely – if ever – snatched anything as sensitive as these Predator videos. As with many things online, the software falls in a moral gray area. SkySoftware's website says the program "intercepts satellite data (movie, music, pictures) that downloadind [sic.] by other users and saves information in your hard disk. So, you'll get new movie, best music and funny pictures for free."

A company programmer told the Journal that SkyGrabber was never designed to target unmanned planes – "no military data or other commercial data, only free legal content."

––
 
http://www.myfoxillinois.com/dpps/news/dpgo-SkyGrabber-Used-Hack-Drone-Videos-fc-20091217_5137233

Report: SkyGrabber Software Used to Hack Drones

800px-CBP_Unmanned_aerial_vehicle_20091217141307_320_240.JPG


Updated: Thursday, 17 Dec 2009, 2:26 PM EST
Published : Thursday, 17 Dec 2009, 2:26 PM EST

By FRANK CARNEVALE

(MYFOX NATIONAL) - Insurgents in Iraq may have hacked into the live video feeds sent from Predator drones using an off-the-shelf software program called SkyGrabber -- available for as little as $25.95 on the Internet.

The Wall Street Journal reported that Shiite fighters in Iraq regularly used SkyGrabber, made by Russian company SkySoftware, to capture drone video feeds. The hacking was possible because some of the remotely flown planes have an unprotected communications link.

U.S. officials said there is no evidence that militants were able to take control of the drones or otherwise interfere with their flights.

The Journal reported that Andrew Solonikov, one of SkyGrabber's developers, said he was unaware that the software could be used to intercept drone feeds. "It was developed to intercept music, photos, video, programs and other content that other users download from the Internet -- no military data or other commercial data, only free legal content," he said by e-mail.

CBS News reported that information can be captured when a Predator drone, or unmanned aerial vehicle (UAV), is far from its base and terrain prohibits it from transmitting directly to its operator. Instead it switches to a satellite link. In that situation, a hacker can use a satellite dish, a satellite modem and a copy of SkyGrabber to intercept and display the UAV's transmissions.

The SkyGrabber Web site is currently offline.

Meanwhile TechCrunch is questioning both The Journal report and the U.S. military: "Either the WSJ hasn't taken their anti-crazy pills or there is something severely wrong with the military industrial complex. I’m betting on both."

While the drones may have been comprised, defense company Raytheon announced plans to launch a new range of military-oriented, iPhone applications intended to help soldiers track insurgents on the battlefield, reported The Guardian .
 
This has no technical significance. Merely able to download video streams from the relay satellite does not compromise any security or tactical advanatge the US military have. The information is practically useless to the Taliban. Thats why it is so easy to
download and access.

Nor does it indicate any technical savvy or sofistication by the Taliban or Al Qaeda.
Although it can be used as a great propaganda and sensational tool on the naive and moronic followers and supporters.

The all critical command and guidance information is heavily encrypted and impossible
to monitor and decipher.
 
This has no technical significance. Merely able to download video streams from the relay satellite does not compromise any security or tactical advanatge the US military have. The information is practically useless to the Taliban. Thats why it is so easy to
download and access.

Nor does it indicate any technical savvy or sofistication by the Taliban or Al Qaeda.
Although it can be used as a great propaganda and sensational tool on the naive and moronic followers and supporters.

The all critical command and guidance information is heavily encrypted and impossible
to monitor and decipher.

You are naive.

Taliban & Al Qaeda knows the game.

The know where are the US spying, they know what is the US looking at and thus also know what the US is not looking at.

The know what they can play up or down in order to mislead the enemy, this is call interception and deception in military world.

US paid through their nose to get these high tech rubbish, because they coward and afraid to die and scared to face Taliban, but their high tech betrayed them, sold them to the Taliban and Al Qaeda FOC.

The US is defeated.

The enemies of US don't need to spend through their nose. US high tech helped them FOC.

The US military and tax payers are suckers.
 
Just because the Gringoes are fighting a guerilla movement with inferior technology and firepower does not mean that their enemies are not adapt at using 21st century technology. The last time they underestimated their enemy in the jungles of Veet-nam (as Lyndon B Johnson pronounced it), they got their ass kicked.

The Taliban don't need to defeat them in Afghanistan, they just need to keep bleeding the americans till they had enough and pack up and go home just like the Russians.
 
Can I use the SW in Spore to get TV satellite signals :confused:

Software only grab video into your PC. You can not do so without the the dish antenna and the satellites coving with adequate signal over your geographic area. It is nothing so much more than a video capture software, you still have to connect it to the TVRO set top boxes which is connected to the parabolic dishes outside your house.

In SG you will get IDA going to your house to summon you when there is a dish without license.:p
 
You are naive.

Taliban & Al Qaeda knows the game.

The know where are the US spying, they know what is the US looking at and thus also know what the US is not looking at.

The know what they can play up or down in order to mislead the enemy, this is call interception and deception in military world.

US paid through their nose to get these high tech rubbish, because they coward and afraid to die and scared to face Taliban, but their high tech betrayed them, sold them to the Taliban and Al Qaeda FOC.

The US is defeated.

The enemies of US don't need to spend through their nose. US high tech helped them FOC.

The US military and tax payers are suckers.

If I did know what I was talking about, I would not have commented
what I did. Just leave it at that.

probably it would be a good idea for you to read up on how and what
the Predator drones are capable of doing and how it is done.

Here are some tags for you to search out..maybe in google.

RF Vectoring. LatLong co-ods, RF source tagret acquisition / locking,
RF homing guidance, Lock On.

You will get a better idea then why the so called Taliban and Al Queda
expertise in receiving a video stream from a relay SAT has not much use.

Even I can also buy online the software Skygrabber for 25 USD and with a sat dish do the same. In fact 90% of the people here in this forum can do it.

The US military scientists are not fools - like the Taliban and AlQaeda
pinheads.
 
If I did know what I was talking about, I would not have commented
what I did. Just leave it at that.

probably it would be a good idea for you to read up on how and what
the Predator drones are capable of doing and how it is done.

Here are some tags for you to search out..maybe in google.

RF Vectoring. LatLong co-ods, RF source tagret acquisition / locking,
RF homing guidance, Lock On.

You will get a better idea then why the so called Taliban and Al Queda
expertise in receiving a video stream from a relay SAT has not much use.

Even I can also buy online the software Skygrabber for 25 USD and with a sat dish do the same. In fact 90% of the people here in this forum can do it.

The US military scientists are not fools - like the Taliban and AlQaeda
pinheads.

OK cheers.

My point is NEVER got carried away by blind faith with high tech.

Can always be defeated very unexpectedly and easily.
 
OK cheers.

My point is NEVER got carried away by blind faith with high tech.

Can always be defeated very unexpectedly and easily.

Encrypted signals can be decrypted...:D

If they can buy a software to grab those signals..surely they could spend a few more bucks to decrypt the signals too? :D

But for Singaporeans, you must first get the dish okay? :D
 
Encrypted signals can be decrypted...:D

If they can buy a software to grab those signals..surely they could spend a few more bucks to decrypt the signals too? :D

But for Singaporeans, you must first get the dish okay? :D

Precisely!
 
they only access the feed send to troop on the ground.
there are a new system coming online.

even if you see picture, so what? what is tactic advantage, there are so many drone, which is which?

if taliban can control the drone then it will impress me.

useless hacking.
 
Encrypted signals can be decrypted...:D

If they can buy a software to grab those signals..surely they could spend a few more bucks to decrypt the signals too? :D

But for Singaporeans, you must first get the dish okay? :D

data encryption commercial grade is not the same as military grade.
secondly it is not software exclusive..there are certain modulation
techniques used that are not availiable on the commercial market.

about the video streaming..it is not the main tool used to do the job.
the video is only for observation and to provide visual outlay of the
terrain and its structures.

the main killer tool is the homing device technology and how it is
implemented in conjunction with the missile.

If you have a 16 inch dish ant, you can also use the same SW to
do the same thing..view the video, provided you are in the footprint
zone of the specific satellite.
 
In SG you will get IDA going to your house to summon you when there is a dish without license.:p


Looks like it voting out the PAP is the only way to get more free channels. One more reason to vote for the opposition :)
 
Software only grab video into your PC. You can not do so without the the dish antenna and the satellites coving with adequate signal over your geographic area. It is nothing so much more than a video capture software, you still have to connect it to the TVRO set top boxes which is connected to the parabolic dishes outside your house.

In SG you will get IDA going to your house to summon you when there is a dish without license.:p

No need to putting it outside the house. Neighbours very kaypoh one will reporting you. Satellites can working very well indoors too, just be putting it near the windows can do already. :D Reception and signalling is very good :p
 
Pentagon plays down security breach with US drones

<table border="0" cellpadding="0" cellspacing="0" width="560"><tbody><tr><td colspan="2" valign="top" width="550">
Pentagon plays down security breach with US drones <!-- TITLE : end--> <!--
Shiite insurgents had used cheap software programs to capture live video footage from the unmanned aircraft. -AFP --> </td> </tr> <tr></tr><tr> <td colspan="2" align="left" valign="top" width="550"> <table> <tbody><tr> <td> <table> <tbody><tr><td>
blank.gif
</td> </tr> <tr><td class="content_subtitle" align="left"> Fri, Dec 18, 2009
AFP </td> </tr> </tbody></table> </td> <td align="right" width="400"> <table border="0" cellpadding="0" cellspacing="0"> <tbody><tr> <td align="right" valign="top">
but_printfriendly.gif
</td> <td height="15">
blank.gif
</td> <td align="right" valign="top"> <form action="emailToFriend.jsp" method="POST" name="emailToFriendForm"> <input name="emailToFriendPageURL" value="/vgn-ext-templating/asiaone/emailToFriend.jsp?vgnextoid=864d54b5f50a5210VgnVCM100000430a0a0aRCRD&vgnextchannel=8179adbd2b722110VgnVCM100000bd0a0a0aRCRD" type="hidden"> <input name="emailToFriendStoryLink" value="http://www.asiaone.com/News/Latest%2BNews/Tech/Story/A1Story20091218-186719.html" type="hidden">
but_email.gif
</form> <script> function openEmailA1AdminWindow(emailToFriendForm) { var emailToFriendPageURL = emailToFriendForm.emailToFriendPageURL.value; emailToFriendForm.action = emailToFriendPageURL; emailToFriendForm.target="_blank"; emailToFriendForm.submit(); } </script> </td> </tr> </tbody></table> </td><td>
</td></tr> </tbody></table> </td> </tr> <tr><td colspan="3" class="bodytext_10pt"> <!-- CONTENT : start -->
WASHINGTON - Pentagon officials on Thursday sought to play down security concerns over US drones after acknowledging Iraqi militants used cheap software to intercept video feeds from the unmanned aircraft. "This is an old issue that's been addressed," a defense official, who spoke on condition of anonymity, told reporters. The problem has been "taken care of," he said, without offering more details. Officials confirmed a Wall Street Journal report that Iranian-backed Shiite insurgents had used software programs such as SkyGrabber - available online for US$25.95 dollars (S$36.41) - to capture live video footage from the unmanned aircraft.

Some sensitive video feeds from drones are routinely encrypted, another defense official, who asked not to be named, told AFP. But the extent of the encryption remained unclear. Even as officials insisted the problem had been rectified, a military technology blog reported the vulnerability extended to video transmissions for an array of other US aircraft - both manned and unmanned. Video footage from US drones, fighter jets and bombers is transmitted to receivers that use unencrypted signals, Wired magazine's Danger Room blog reported, citing unnamed Air Force officials. The unprotected signal used by the receivers, or Remotely Operated Video Enhanced Receivers (ROVERS), means outsiders could hack into a video feed or jam it, an official told the blog. Thousands of the ROVER receivers have been distributed to troops and the military was working to fix the security breach, it said. Last month at a conference of the Army Aviation Association of America, a military official said the current ROVER device "receives only unencrypted" satellite bands, according to a presentation posted online.

The reports exposed a possible weak link in the US military's growing use of unmanned vehicles and live video feeds, which are crucial for combat operations in Afghanistan and Iraq as well as CIA manhunts against Al-Qaeda figures in Pakistan. The Pentagon is deploying more armed and unarmed drones to Afghanistan to back up a surge of US forces there, and has placed a high priority on expanding and improving the fleet of unmanned aircraft. James Clapper, the undersecretary of defense for intelligence, reviewed the Iraqi episode on orders from Defense Secretary Robert Gates and concluded the hacking by Iraqi insurgents revealed a flaw in the security of the drone fleet, the Wall Street Journal reported.
The Defense Department said in a statement that it "constantly evaluates and seeks to improve the performance and security of our various" drone systems. "As we identify shortfalls, we correct them as part of a continuous process of seeking to improve capabilities and security. As a matter of policy, we don't comment on specific vulnerabilities or intelligence issues," it said. There was no evidence that militants could control the drones or otherwise interfere with their flights, but the vulnerability would allow the unmanned craft to be monitored and tracked.
The problem was uncovered in July 2009, when the US military found files of intercepted drone video feeds on the laptop of a captured militant, intelligence and defense officials told the Journal.

They discovered "days and days and hours and hours of proof," an unnamed source told the Journal. "It is part of their kits now." Some of the most detailed examples of drone intercepts have been uncovered in Iraq, but the same technique is known to have been employed in Afghanistan and could easily be used in other areas where US drones operate. The US government has known about the flaw since the 1990s, but assumed its adversaries would not be able to take advantage of it, the Journal said. Questions over intercepted feeds came a day after Lieutenant General David Deptula, Air Force deputy chief of staff for intelligence, surveillance and reconnaissance, told reporters that some unmanned aircraft in Afghanistan soon would be equipped with a new hi-tech camera system called "Gorgon Stare" - allowing a drone to beam back at least 10 separate video feeds at the same time. Earlier Thursday, two separate missile strikes by US drones killed at least 14 militants in northwest Pakistan, security officials there said.



</td></tr></tbody></table>
 
Back
Top