0
Gawain

This Perturbs Me Greatly - Unsecured video from UAV Drones?

Recommended Posts

http://online.wsj.com/article/SB126102247889095011.html?mod=yhoofront

Quote

..by taking advantage of an unprotected communications link ...



I don't know who the genius is on the side of the Pentagon is, and I don't know who the genius is on the manufacturer side, but how this got through spec, I'll never understand, and cannot be justified.

The whole focus, and purpose of these drones is to provide visual reconnaissance, real time...how that transmission is deemed okay to sent unencrypted....

...of course now they say they're fixing it, but what the hell?
So I try and I scream and I beg and I sigh
Just to prove I'm alive, and it's alright
'Cause tonight there's a way I'll make light of my treacherous life
Make light!

Share this post


Link to post
Share on other sites

I was reading the SlashDot posts on the topic;

One interesting theory is that they might be sending bogus video feeds in the clear to mislead the enemy.

Then there was this:

Quote



Turns out the drones use bluetooth. Just the other day my laptop asked me to sync to one when I was put a pringles can on the antenna.

"Windows has found a MQ-9 Reaper, would you like to connect?"

At this point I was (a.) terrified and (b.) glad that somebody with some clout was going to do something about the increased crime in the area.

:D
"There are only three things of value: younger women, faster airplanes, and bigger crocodiles" - Arthur Jones.

Share this post


Link to post
Share on other sites
If a unit was in the field and one of these cameras was
supplying support video... the insurgents would effectively
have video of the battlefield and see the deployment of
US troops. An obvious advantage.

Worst example - mountaintop camps. Having a snapshot of the layout of the camp defenses before an attack.

Share this post


Link to post
Share on other sites
Quote

http://online.wsj.com/article/SB126102247889095011.html?mod=yhoofront

Quote

..by taking advantage of an unprotected communications link ...



I don't know who the genius is on the side of the Pentagon is, and I don't know who the genius is on the manufacturer side, but how this got through spec, I'll never understand, and cannot be justified.

The whole focus, and purpose of these drones is to provide visual reconnaissance, real time...how that transmission is deemed okay to sent unencrypted....

...of course now they say they're fixing it, but what the hell?



"Use only reliable, thoroughly tested technology that serves your people and processes."
Math tutoring available. Only $6! per hour! First lesson: Factorials!

Share this post


Link to post
Share on other sites
Quote

Quote

http://online.wsj.com/article/SB126102247889095011.html?mod=yhoofront

Quote

..by taking advantage of an unprotected communications link ...



I don't know who the genius is on the side of the Pentagon is, and I don't know who the genius is on the manufacturer side, but how this got through spec, I'll never understand, and cannot be justified.

The whole focus, and purpose of these drones is to provide visual reconnaissance, real time...how that transmission is deemed okay to sent unencrypted....

...of course now they say they're fixing it, but what the hell?



"Use only reliable, thoroughly tested technology that serves your people and processes."



By which you mean there is no thoroughly reliable video encryption technology out there? Um...no....
So I try and I scream and I beg and I sigh
Just to prove I'm alive, and it's alright
'Cause tonight there's a way I'll make light of my treacherous life
Make light!

Share this post


Link to post
Share on other sites
the pentagon wants war, the arms maunfacturers want war, who cares what these things do or dont do, they will make more war and thats what counts right?
"When the power of love overcomes the love of power, then the world will see peace." - 'Jimi' Hendrix

Share this post


Link to post
Share on other sites
Quote

Quote

By which you mean there is no thoroughly reliable video encryption technology out there?



Nope, that not what I mean.



I don't understand the context of your quote then. It's sarcasm then?
So I try and I scream and I beg and I sigh
Just to prove I'm alive, and it's alright
'Cause tonight there's a way I'll make light of my treacherous life
Make light!

Share this post


Link to post
Share on other sites
Quote

Quote

Quote

By which you mean there is no thoroughly reliable video encryption technology out there?



Nope, that not what I mean.



I don't understand the context of your quote then. It's sarcasm then?



It appears that the system was sent into operations before being thoroughly tested, a violation of one of the principles of a management system I've been studying lately. Allowing intel to be grabbed from the air by the enemy is a pretty big deal, potentially.

Streaming video encryption isn't my forte, so I have no idea whether there is sufficiently reliable technology out there right now or not. Thorough testing should have identified the exploit potential of the technology being used.
Math tutoring available. Only $6! per hour! First lesson: Factorials!

Share this post


Link to post
Share on other sites
The very first thing that came to my mind the moment I heard this was "disinformation."

Send up a Predator and have it fly overhead at a lower than normal altitude so that it actually IS heard and seen. Allow the bad guys to tap into a bogus feed showing goats on a hilltop while you're looking directly at them. When they get confident they can move freely outside; BOOM!
quade -
The World's Most Boring Skydiver

Share this post


Link to post
Share on other sites
Quote

Streaming video encryption isn't my forte, so I have no idea whether there is sufficiently reliable technology out there right now or not. Thorough testing should have identified the exploit potential of the technology being used.



Streaming encryption can be bought off the shelf. It's used every day by networks and film companies and is good enough to prevent this sort of thing from happening. It's trivial to put in-line.
quade -
The World's Most Boring Skydiver

Share this post


Link to post
Share on other sites
Quote

wrong



explain, there is no need for these wars, yet they are called 'just'.

How is the USA's current foriegn policy not responsabkle for unecessary deaths ofhundreds of thousands, and the destruction of thousands of communities?

The reasons for invading have been proven false numerous times by qualified people, with legal documents.

US 'intellegence' disregards the views and suggestions from your intellectual and experienced citizens and placed the responsability in the hands of wall street beurocrats, with no consequnce for thier actions.

There are hundereds of people, if not thousands starting, completing and reseraching books, peer reveiwed journals, and thesis' on the subject, yet no one listens?

It is taboo to discuss, or question, well it was...


The opposition to any official story is silenced from Law. The truth and evidence violently opposed by willingly subdued and falsly patriotic people such as yourself.

[url"http://noliesradio.org/archives/9296" ]Americas New Threat: it;s own secrecy[/url]

If you are interested, click this lonk and listen to the radio interview, his reasearch started decades ago, well before 911 yet his studies are consistent with post 911 actions.

To be a patriot, is to ask questions and take responsability;

Quote

pa⋅tri⋅ot
  /ˈpeɪtriət, -ˌɒt or, especially Brit., ˈpætriət/ Show Spelled Pronunciation [pey-tree-uht, -ot or, especially Brit., pa-tree-uht] Show IPA
Use patriot in a Sentence
See web results for patriot
See images of patriot
–noun
1. a person who loves, supports, and defends his or her country and its interests with devotion.
2. a person who regards himself or herself as a defender, esp. of individual rights, against presumed interference by the federal government.
3. (initial capital letter) Military. a U.S. Army antiaircraft missile with a range of 37 mi. (60 km) and a 200-lb. (90 kg) warhead, launched from a tracked vehicle with radar and computer guidance and fire control.



Are you a patriot or a lemming?
"When the power of love overcomes the love of power, then the world will see peace." - 'Jimi' Hendrix

Share this post


Link to post
Share on other sites
I can't do streaming media.

You claimed that 'the Pentagon wants war, arms manufacturers want war' and that 'they will make more war and that's what counts'.

I say you are incorrect.

Of course, if you HAVE documents showing how the Pentagon and the arms manufacturers are controlling Congress and the President, by all means show them.

Oh - and you can provide proof for the claims in the post I'm answering, too.
Mike
I love you, Shannon and Jim.
POPS 9708 , SCR 14706

Share this post


Link to post
Share on other sites
More on the story, the technology, and analysis from Wired's Danger Room:

Excerpts: "The military initially developed the Remotely Operated Video Enhanced Receiver, or ROVER, in 2002. The idea was let troops on the ground download footage from Predator drones and AC-130 gunships as it was being taken. Since then, nearly every airplane in the American fleet — from F-16 and F/A-18 fighters to A-10 attack planes to Harrier jump jets to B-1B bombers has been outfitted with equipment that lets them transmit to ROVERs. Thousands of ROVER terminals have been distributed to troops in Afghanistan and Iraq.

"But those early units were 'fielded so fast that it was done with an unencrypted signal. It could be both intercepted (e.g. hacked into) and jammed,' e-mails an Air Force officer with knowledge of the program. In a presentation last month before a conference of the Army Aviation Association of America, a military official noted that the current ROVER terminal 'receives only unencrypted L, C, S, Ku [satellite] bands.'

"So the same security breach that allowed insurgent to use satellite dishes and $26 software to intercept drone feeds can be used the tap into the video transmissions of any plane.

"The military is working to plug the hole — introducing new ROVER models that communicate without spilling its secrets. 'Recognizing the potential for future exploitation the Air Force has been working aggressively to encrypt these ROVER downlink signals. It is my understanding that we have already developed the technical encryption solutions and are fielding them,' the Air Force officer notes.

"But it won’t be easy. An unnamed Pentagon official tells reporters that 'this is an old issue that’s been addressed.' Air Force officers contacted by Danger Room disagree, strongly.

"'This is not a trivial solution,' one officer observes. 'Almost every fighter/bomber/ISR [intelligence surveillance reconnaissance] platform we have in theater has a ROVER downlink. All of our Tactical Air Control Parties and most ground TOCs [tactical operations centers] have ROVER receivers. We need to essentially fix all of the capabilities before a full transition can occur and in the transition most capabilities need to be dual-capable (encrypted and unencrypted).'

"Which presents all sorts of problems. Let’s say a drone or an A-10 is sent to cover soldiers under fire. If the aircraft has an encrypted transmitter and the troops have an unencrypted ROVER receiver, that surveillance footage can’t be passed down to the soldiers who need it most.

"'Can these feeds be encrypted with 99.5 percent chance of no compromise? Absolutely! Can you guarantee that all the encryption keys make it down to the lowest levels in the Army or USMC [United States Marine Corps][acronym expanded in original story - nerdgirl]? No way,' adds a second Air Force officer, familiar with the ROVER issue. 'Do they trust their soldiers/Marines with these encryption keys? Don’t know that.'



"And U.S. troops fighting in Iraq and Afghanistan have come to depend on the feeds. 'For sure,' Lt. Col. Greg Harbin told the Los Angeles Times, 'I would be dead without this technology.'



"Still, systems like the ROVER (and the Predator, for that matter) were 'built to be cheap. They used commercial off-the-shelf hardware. We wanted to get stuff out there. So it’s not gonna be perfect,' the officer adds. 'So yeah, if we’re broadcasting in the electromagnetic spectrum and you’re underneath the footprint, you can receive it. Duh-uhhhh.'"


If one accepts that report and analysis as factual, it looks like the prime driver was getting technology out to the warfighter as fast as possible.

Altho' not mentioned in the piece, I also strongly suspect that another major contributing factor was the predominance of Network Centric Warfare (NCW) ideas during the time the technology was put into the acquisition process (2002). Before COIN, RMA & Transformation (RIP Adm Cebrowski) were the novel, dominant paradigms. It was all about networked technology and information sharing.

As far as the behavior of the insurgents, I think it's just further validation of the concepts of 4GW. Still is all about networks just have a different frame of reference and different strategy.

/Marg

Act as if everything you do matters, while laughing at yourself for thinking anything you do matters.
Tibetan Buddhist saying

Share this post


Link to post
Share on other sites
One of the chief issues confronting any communications on the battlefield is bandwidth. There is only so much bandwidth available. Unencrypted data can be compressed with little cpu overhead, but once encrypted, the data stream is basically un-compressible.

In addition, adding off the shelf encryption gear is not as simple as many make it out to be. many of the components used in field communications are custom and don't necessarily conform to open standards.

PhreePhly

Share this post


Link to post
Share on other sites
Quote

One of the chief issues confronting any communications on the battlefield is bandwidth. There is only so much bandwidth available. Unencrypted data can be compressed with little cpu overhead, but once encrypted, the data stream is basically un-compressible.

In addition, adding off the shelf encryption gear is not as simple as many make it out to be. many of the components used in field communications are custom and don't necessarily conform to open standards.

PhreePhly



Are you speaking to military equipment, or civilian? Military equipment *is* standardized.
Mike
I love you, Shannon and Jim.
POPS 9708 , SCR 14706

Share this post


Link to post
Share on other sites
Quote

One of the chief issues confronting any communications on the battlefield is bandwidth. There is only so much bandwidth available. Unencrypted data can be compressed with little cpu overhead, but once encrypted, the data stream is basically un-compressible.



Unless encryption in itself adds significantly to the data-size, you're wrong. One could just compress first, and then encrypt. ;)
HF #682, Team Dirty Sanchez #227
“I simply hate, detest, loathe, despise, and abhor redundancy.”
- Not quite Oscar Wilde...

Share this post


Link to post
Share on other sites
Quote

Quote

One of the chief issues confronting any communications on the battlefield is bandwidth. There is only so much bandwidth available. Unencrypted data can be compressed with little cpu overhead, but once encrypted, the data stream is basically un-compressible.



Unless encryption in itself adds significantly to the data-size, you're wrong. One could just compress first, and then encrypt. ;)


No, he's not. Once it's encrypted, compression would corrupt the datastream.
Mike
I love you, Shannon and Jim.
POPS 9708 , SCR 14706

Share this post


Link to post
Share on other sites
Quote

One of the chief issues confronting any communications on the battlefield is bandwidth. There is only so much bandwidth available. Unencrypted data can be compressed with little cpu overhead, but once encrypted, the data stream is basically un-compressible.



You're very correct that bandwidth insufficiency continues to be one of the biggest challenges in military across many fields not just UAVs. I'm not sure that's the critical hurdle (or even a specific hurdle) here.

If I'm reading the secondary reports correctly, the causative variable is less technological and more a function of acquisitions process and bad assumptions w/r/t adversaries capabilities or inclination to adapt.

This story includes specific links to CIA reports and DoD transcript suggesting that potential vulnerabilities with unencrypted data transmission date back to the 1990s. I'm not sure I agree (or disagree, for that matter) with the conclusions in that story. The linked primary documents do suggest that the potential for a problem was not recognized and acted on ... or perhaps it was recognized but the capabilities that the ROVER system enabled were determined to be greater. Sometimes one has to make hard decisions. Or sometimes bad decisions get made without good reasons. I don't have enough information to speculate in the situation with any confidence.

/Marg

Act as if everything you do matters, while laughing at yourself for thinking anything you do matters.
Tibetan Buddhist saying

Share this post


Link to post
Share on other sites
Quote

Quote

Unless encryption in itself adds significantly to the data-size, you're wrong. One could just compress first, and then encrypt. ;)



No, he's not. Once it's encrypted, compression would corrupt the datastream.


Ehm... read my post again. Other way around. Run whichever compression algorithm you will (say mpeg4), then run the resulting stream through an encryption algorithm. Exactly where am I corrupting anything?
HF #682, Team Dirty Sanchez #227
“I simply hate, detest, loathe, despise, and abhor redundancy.”
- Not quite Oscar Wilde...

Share this post


Link to post
Share on other sites
Quote

If I'm reading the secondary reports correctly, the causative variable is less technological and more a function of acquisitions process and bad assumptions w/r/t adversaries capabilities or inclination to adapt.



And that is what needs to be weeded out, and should have been weeded out 9/11/01.
So I try and I scream and I beg and I sigh
Just to prove I'm alive, and it's alright
'Cause tonight there's a way I'll make light of my treacherous life
Make light!

Share this post


Link to post
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

0