SS-18 ICBM
Oscillator
The only armament drones have are a few Hellfire missiles. Those aren't a complete substitute for a ground attack.
Clearly the solution is obvious: We must train our troops to be masters of Jarate.So this is kind of like stealing my Predator drone care package in Call of Duty, complete with the terrorist on the little laptop and everything. That is SO annoying.
It even stated so in the OP article.some points of Clarification
1) it was Predator Drones, not exactly disposable
Hmm.They are obviously talking about hand held tactical or locally launched drone type used by tactical units, not Global Hawk and the like. These are like little remote controlled planes built to be cheap, disposable, and easily usable by the lowest common denominator. I would like confirmation of this however.
I think what is actually surreal are the military apologists who spring into action no matter the story to try to do damage control.It is actually hilarious to watch some of the same people here who talk about the US having a bloated military with too many and too expensive toys jump on every instance of the US not having the most advanced and expensive equipment in use for every little thing be some sort of blunder. Its sureal actually.
http://www.nytimes.com/2009/03/17/business/17uav.html?_r=1&em=&pagewanted=allAnd even though 13 of the 70 Predator crashes have occurred over the last 18 months, officials said the accident rate has fallen as flying hours have shot up.
All told, 55 have been lost because of equipment failure, operator errors or weather.
http://online.wsj.com/article/SB126102247889095011.html?mod=WSJ_hpp_MIDDLETopStoriesOfficials stepped up efforts to prevent insurgents from intercepting video feeds after the July incident...
A senior defense official said that James Clapper, the Pentagon's intelligence chief, assessed the Iraq intercepts at the direction of Defense Secretary Robert Gates and concluded they represented a shortcoming to the security of the drone network.
"There did appear to be a vulnerability," the defense official said. "There's been no harm done to troops or missions compromised as a result of it, but there's an issue that we can take care of and we're doing so."
Senior military and intelligence officials said the U.S. was working to encrypt all of its drone video feeds from Iraq, Afghanistan and Pakistan, but said it wasn't yet clear if the problem had been completely resolved.
Except according to all sources, this problem was well known, the security implications were judged to be minimal because of the very specific circumstances necessary for insurgents to make use of it, and doing without encryption both saved costs and more importantly time to get the system deployed, which has undeniably saved many lives.
It's a case of a calculated risk where the downsides have now come to pass, not of stupid military officers suddenly realizing it was unencrypted.
Pentagon spokesman Bryan Whitman said the US military continually evaluated the technologies it used and quickly corrected any potential problems it discovered.
"There's potential vulnerabilities in all of our systems," he said.
http://news.bbc.co.uk/2/hi/middle_east/8419147.stmResponding to the reports, a Pentagon spokesman said: "The Department of Defense constantly evaluates and seeks to improve the performance and security of our various systems and platforms.
"As we identify shortfalls, we correct them as part of a continuous process of seeking to improve capabilities and security. As a matter of policy, we don't comment on specific vulnerabilities or intelligence issues."
Did you guys know the military compound I work in doesn't have armed patrols securing the perimeter? No guard dogs either. No electric fences. No fences at all actually. In fact not a single member of the military is even armed! On top of that there are no fire arms here period!
It is actually hilarious to watch some of the same people here who talk about the US having a bloated military with too many and too expensive toys jump on every instance of the US not having the most advanced and expensive equipment in use for every little thing be some sort of blunder. Its sureal actually.
Did you know that I, a member of the US military, is forced to use ball point pens instead of gel!![]()
It was just a matter of coming up with the properly vetted excuse to be delivered by a retired general on Fox News, as usual.
A glaring design error like this is far from being a "mistake".
An you have absolutely no idea whether or not it "compromised a mission".
An you have absolutely no idea whether or not it "compromised a mission".
http://online.wsj.com/article/SB126102247889095011.html?mod=WSJ_hpp_MIDDLETopStories"There did appear to be a vulnerability," the defense official said. "There's been no harm done to troops or missions compromised as a result of it, but there's an issue that we can take care of and we're doing so."
So, anyone care to speculate how the US military could have been so stupid as to leave this link unprotected?
I wonder what else is left unprotected by the US military...
This is a blunder.
Sometimes the military makes stupid errors, and this is a stupid error.
The U.S. official, who asked not to be identified because he was not authorized to discuss the information, said no U.S. troops or combat missions had been compromised because of the intrusion...
A senior defense official who was not authorized to speak about the security breach said, "This was an old issue for us and it has been taken care of," but he would not elaborate on what specifically had been taken care of.
The official said that many of the UAV feeds need to be sent out live to numerous people at one time, and encryption was found to slow the real-time link. The encryption therefore was removed from many feeds...
One U.S. official said special operations troops identified the threat "years ago" in Iraq and over the past two years have been "vastly improving" encryption on their various communications systems, including full-motion video.
some points of Clarification...
4) The Afghanis did this
The breach by Iranian-backed Shiite militants was discovered late last year, according to U.S. military and defense officials...
Iran has been pushing the SkyGrabber-like technology to Shiite militants in Iraq essentially to see what the United States is looking at because Iranians believe they will be invaded next.
"Duh" indeed. That's why you encrypt it.[/quote]Tapping into drones video feeds was just the start. The U.S. militarys primary system for bringing overhead surveillance down to soldiers and Marines on the ground is also vulnerable to electronic interception, multiple military sources tell Danger Room. That means militants have the ability to see through the eyes of all kinds of combat aircraft from traditional fighters and bombers to unmanned spy planes. The problem is in the process of being addressed. But for now, an enormous security breach is even larger than previously thought.
The military initially developed the Remotely Operated Video Enhanced Receiver, or ROVER, in 2002. The idea was let troops on the ground download footage from Predator drones and AC-130 gunships as it was being taken. Since then, nearly every airplane in the American fleet from F-16 and F/A-18 fighters to A-10 attack planes to Harrier jump jets to B-1B bombers has been outfitted with equipment that lets them transmit to ROVERs. Thousands of ROVER terminals have been distributed to troops in Afghanistan and Iraq.
But those early units were fielded so fast that it was done with an unencrypted signal. It could be both intercepted (e.g. hacked into) and jammed, e-mails an Air Force officer with knowledge of the program. In a presentation last month before a conference of the Army Aviation Association of America, a military official noted that the current ROVER terminal receives only unencrypted L, C, S, Ku [satellite] bands.
So the same security breach that allowed insurgent to use satellite dishes and $26 software to intercept drone feeds can be used the tap into the video transmissions of any plane.
The military is working to plug the hole introducing new ROVER models that communicate without spilling its secrets. Recognizing the potential for future exploitation the Air Force has been working aggressively to encrypt these ROVER downlink signals. It is my understanding that we have already developed the technical encryption solutions and are fielding them, the Air Force officer notes.
But it wont be easy. An unnamed Pentagon official tells reporters that this is an old issue thats been addressed. Air Force officers contacted by Danger Room disagree, strongly.
This is not a trivial solution, one officer observes. Almost every fighter/bomber/ISR [intelligence surveillance reconnaissance] platform we have in theater has a ROVER downlink. All of our Tactical Air Control Parties and most ground TOCs [tactical operations centers] have ROVER receivers. We need to essentially fix all of the capabilities before a full transition can occur and in the transition most capabilities need to be dual-capable (encrypted and unencrypted).
Which presents all sorts of problems. Lets say a drone or an A-10 is sent to cover soldiers under fire. If the aircraft has an encrypted transmitter and the troops have an unencrypted ROVER receiver, that surveillance footage cant be passed down to the soldiers who need it most.
Can these feeds be encrypted with 99.5 percent chance of no compromise? Absolutely! Can you guarantee that all the encryption keys make it down to the lowest levels in the Army or USMC [United States Marine Corps]? No way, adds a second Air Force officer, familiar with the ROVER issue. Do they trust their soldiers/Marines with these encryption keys? Dont know that.
Since the top commander in Afghanistan, General Stanley McChrystal, issued strict new guidelines on the use of airstrikes, the United States has turned nearly every plane in its inventory into an eye in the sky. Sending video down to those ROVER terminals has become job No. 1 for most American air crews flying today.
And U.S. troops fighting in Iraq and Afghanistan have come to depend on the feeds. For sure, Lt. Col. Greg Harbin told the Los Angeles Times, I would be dead without this technology.
Still, some Air Force officers downplayed the significance of the ROVERs security hole. If youre an insurgent, you need to know when and where [aircraft] are flying and then be within the line-of-sight footprint of the feed for any chance of successfully using the information real-time, one officer writes. This is much to do about nothing. You have bigger fish to fry.
The ranges on these signals is not very great, they are low-power and intended for line-of sight communications. A risk has been identified, [but] it poses limited immediate operational or tactical risk, and certainly does not outweigh the value of thee capabilities, a second notes.
I have immense respect for both of these officers. But Im not sure I buy their arguments. If real-time video feeds are valuable to U.S. troops, then it stands to reason that the footage is valuable to insurgent forces, as well. Either this is important data and worth protecting or it isnt.
UPDATE: Some military drones are particularly susceptible to having their video tapped, a senior military officer tells Danger Room. Thats because these smaller unmanned aircraft like the Shadow, Hunter, and Raven broadcast their surveillance footage constantly and in every direction. All you have to do, basically, is stand within line of sight of the drone, and you can tap in. Its like criminals using radio scanners to pick up police communications, the senior officer says.
Larger aircraft both manned and unmanned are a little less vulnerable. They can shut off their video feeds if no friendly forces are watching at the time. And they can neck down those omnidirectional signals a bit. So its more difficult to intercept the transmission. The officer contends that there have not been any significant not any impact on operations as a result of this.
Still, systems like the ROVER (and the Predator, for that matter) were built to be cheap. They used commercial off-the-shelf hardware. We wanted to get stuff out there. So its not gonna be perfect, the officer adds. So yeah, if were broadcasting in the electromagnetic spectrum and youre underneath the footprint, you can receive it. Duh-uhhhh.