It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
Originally posted by K1771gnorance
Originally posted by intrptr
I don't care how sophisticated the software is, you see a drone, listen for the encrypted data link. Debug it, amplify it and take over control.
Maybe you should care how sophisticated the software is because what you just said is impossible with the correct challenge-response authentication combined with the implementation of zero-knowledge password proof methods.
You will have better odds listening in on a phone conversation between two people using a language that nobody knows, and trying to impersonate one of the people in the conversation in order to fool the other person while simultaneously guessing the ever changing password they both use before every sentence they speak.
Originally posted by JoeGuitar
Exclusive: Iran hijacked US drone, says Iranian engineer
www.csmonitor.com
(visit the link for the full news article)
Iranian electronic warfare specialists were able to cut off communications links of the American bat-wing RQ-170 Sentinel, says the engineer, who works for one of many Iranian military and civilian teams currently trying to unravel the drone’s stealth and intelligence secrets, and who could not be named for his safety.
Iran displayed the drone on state-run TV last week, with a dent in the left wing and the undercarriage and landing gear hidden by anti-American banners.
The Iranian engineer explains why: "If you look at the location where we made it land and the bird's home base, they both have [almost] the same altitude," says the Iranian engineer. "There was a problem [of a few meters] with the exact altitude so the bird's underbelly was damaged in landing; that's why it was covered in the broadcast footage."
Originally posted by intrptr
Any signal going by the drone containing any authorization can be eavesdropped and decrypted. Lets not measure - countermeasure like the nerds do with "super secret code that can't be hacked".
Originally posted by SLAYER69
Originally posted by THE_PROFESSIONAL
The “spoofing” technique that the Iranians used – which took into account precise landing altitudes, as well as latitudinal and longitudinal data – made the drone “land on its own where we wanted it to, without having to crack the remote-control signals and communications” from the US control center, says the engineer.
Are these the same type of Iranian Engineers that blew themselves up recently at the missile facility? Also, if they were able to land it so precisely why are they hiding the under carriage damage? And the drone in question shows obvious signs of wing damage? [which they poorly taped up for the photo op]
I think the Iranians are grandstanding/showboating and trying to milk this for all it's worth and many here at ATS [Supposedly outside the box thinkers] are falling hook, line and sinker for it.
Originally posted by K1771gnorance
Originally posted by intrptr
Any signal going by the drone containing any authorization can be eavesdropped and decrypted. Lets not measure - countermeasure like the nerds do with "super secret code that can't be hacked".
Maybe you missed my post earlier on this topic.
"Jamming" does not work on drones. The drones will just think it lost signal and will return to base like it is built to do when it loses a signal. It will also use internal navigation and not rely on GPS just incase GPS satellites are shot down.
No, you can NOT just eavesdrop on a signal, magically decrypt it, and magically figure out how to send authorized commands to the drone, it doesn't work like that. Obviously you don't know much about how any of this works or you wouldn't be making such a silly statement.
The drone is a flying computer, and you have to first connect to the computer before you can send it any commands. Connecting to it is the first hurdle, and not an easy one. You have to know the correct encrypted password, and the commands to send to actually handshake with the drone. That would be the single hardest part. The second hardest part would be figuring out all the available commands the drone would accept, and the format at which to send the commands, and how to authenticate each command (really hard to do), and keep track of the sequence number a.k.a. queue of commands sent and received. Then you need to know how to respond to commands sent back from the drone. On top of that you need to maintain an uplink with the drone so you can constantly receive navigation info from the drone if you actually want to fly it manually, you will need to know it's heading, altitude, speed, throttle settings, flap position, gear position, etc., and that isn't just sent in plain text over the radio waves either. And to top it all off, you need to correctly encrypt all of the above commands, and have knowledge of the SALT which is used to encrypt the commands, and trust me, you would need a super computer crunching away for a few years just to even break the encryption.
Once 2 way communication is started with the drone a sequence is started. You can't just send commands from a 3rd party because it would be out of sequence. Depending on how they designed the sequence method, it could me IMPOSSIBLE to predict what sequence packet the drone expects to receive. A simply sequence would just be a counter 1, 2, 3, 4, 5, 6... In that case it would be easy for a 3rd party to predict that sequence 7 is next. But with advanced software, sequences can be passwords that need to be encrypted a certain way every single sequence (a constantly changing password). You would basically have to have answers for questions that you haven't been asked, you just have to know the question, and how to answer it. That is something you can't learn just by eavesdropping on a signal, you would have to reverse engineer the software on the drone itself.
Anyway, this subject is hard to express to people with little to know knowledge of software engineering and communications.
Tehran - An Iranian engineer has said that specialists in his country captured the U.S. spy drone by exploiting what they knew was its weakest point. They hacked into its GPS system and re-configured its coordinates to make it land at a chosen location.
recent statements by an Iranian scientist who spoke with The Christian Science Monitor in an exclusive interview, suggests that what appeared to the American controllers of the drone as malfunction really might have been a cyber attack. Observers are pointing out that the fact that the drone was recovered by the Iranians in almost perfect condition suggests it really may have been downed by hacking into its electronic controls.
According to the Iranian engineer, "The GPS navigation is the weakest point. By putting noise [jamming] on the communications, you force the bird into autopilot.This is where the bird loses its brain." The electronic specialists then used a "spoofing" technique which took into "account precise landing altitudes as well as latitudinal and longitudinal data" and made the drone “land on its own where we wanted it to, without having to crack the remote-control signals and communications." The engineer asserted that once the "bird loses its brain" reprogramming it to land at another location is a simple process.
Originally posted by K1771gnorance
reply to post by intrptr
If you want to believe the propaganda, go for it. I don't believe it one bit. Iran is just trying to scare people.
I could make server/client application that is unhackable from 3rd parties. I'm sure the military can as well.edit on 16-12-2011 by K1771gnorance because: (no reason given)
Originally posted by verschickter
Originally posted by K1771gnorance
Originally posted by intrptr
Any signal going by the drone containing any authorization can be eavesdropped and decrypted. Lets not measure - countermeasure like the nerds do with "super secret code that can't be hacked".
Maybe you missed my post earlier on this topic.
"Jamming" does not work on drones. The drones will just think it lost signal and will return to base like it is built to do when it loses a signal. It will also use internal navigation and not rely on GPS just incase GPS satellites are shot down.
No, you can NOT just eavesdrop on a signal, magically decrypt it, and magically figure out how to send authorized commands to the drone, it doesn't work like that. Obviously you don't know much about how any of this works or you wouldn't be making such a silly statement.
The drone is a flying computer, and you have to first connect to the computer before you can send it any commands. Connecting to it is the first hurdle, and not an easy one. You have to know the correct encrypted password, and the commands to send to actually handshake with the drone. That would be the single hardest part. The second hardest part would be figuring out all the available commands the drone would accept, and the format at which to send the commands, and how to authenticate each command (really hard to do), and keep track of the sequence number a.k.a. queue of commands sent and received. Then you need to know how to respond to commands sent back from the drone. On top of that you need to maintain an uplink with the drone so you can constantly receive navigation info from the drone if you actually want to fly it manually, you will need to know it's heading, altitude, speed, throttle settings, flap position, gear position, etc., and that isn't just sent in plain text over the radio waves either. And to top it all off, you need to correctly encrypt all of the above commands, and have knowledge of the SALT which is used to encrypt the commands, and trust me, you would need a super computer crunching away for a few years just to even break the encryption.
Once 2 way communication is started with the drone a sequence is started. You can't just send commands from a 3rd party because it would be out of sequence. Depending on how they designed the sequence method, it could me IMPOSSIBLE to predict what sequence packet the drone expects to receive. A simply sequence would just be a counter 1, 2, 3, 4, 5, 6... In that case it would be easy for a 3rd party to predict that sequence 7 is next. But with advanced software, sequences can be passwords that need to be encrypted a certain way every single sequence (a constantly changing password). You would basically have to have answers for questions that you haven't been asked, you just have to know the question, and how to answer it. That is something you can't learn just by eavesdropping on a signal, you would have to reverse engineer the software on the drone itself.
Anyway, this subject is hard to express to people with little to know knowledge of software engineering and communications.
Good explanation Everybody should read it, this is how it is! I was about to write along the same but you clearly know what your saying and do this much better then me with my bad grammar.
edit on 17-12-2011 by verschickter because: (no reason given)
Originally posted by zippy70
You'll probably find that its the connection thats encrypted(ssl), not the commands, probably over a ssh tunnel. The computer on-board probably communicates over one specific port (where firewall rules drop(silently) any ping attempt (icmp) or any port scanning software (like nmap)) However once connection is established the on-board computer is owned.(this process would be VERY difficult by NOT impossible depending on what level of encryption is used.)
TCP/IP packets dont need to arrive in sequence, so what protocol would the drone use? just as a matter if interest?
Originally posted by K1771gnorance
Originally posted by intrptr
Any signal going by the drone containing any authorization can be eavesdropped and decrypted. Lets not measure - countermeasure like the nerds do with "super secret code that can't be hacked".
Maybe you missed my post earlier on this topic.
"Jamming" does not work on drones. The drones will just think it lost signal and will return to base like it is built to do when it loses a signal. It will also use internal navigation and not rely on GPS just incase GPS satellites are shot down.
No, you can NOT just eavesdrop on a signal, magically decrypt it, and magically figure out how to send authorized commands to the drone, it doesn't work like that. Obviously you don't know much about how any of this works or you wouldn't be making such a silly statement.
The drone is a flying computer, and you have to first connect to the computer before you can send it any commands. Connecting to it is the first hurdle, and not an easy one. You have to know the correct encrypted password, and the commands to send to actually handshake with the drone. That would be the single hardest part. The second hardest part would be figuring out all the available commands the drone would accept, and the format at which to send the commands, and how to authenticate each command (really hard to do), and keep track of the sequence number a.k.a. queue of commands sent and received. Then you need to know how to respond to commands sent back from the drone. On top of that you need to maintain an uplink with the drone so you can constantly receive navigation info from the drone if you actually want to fly it manually, you will need to know it's heading, altitude, speed, throttle settings, flap position, gear position, etc., and that isn't just sent in plain text over the radio waves either. And to top it all off, you need to correctly encrypt all of the above commands, and have knowledge of the SALT which is used to encrypt the commands, and trust me, you would need a super computer crunching away for a few years just to even break the encryption.
Once 2 way communication is started with the drone a sequence is started. You can't just send commands from a 3rd party because it would be out of sequence. Depending on how they designed the sequence method, it could me IMPOSSIBLE to predict what sequence packet the drone expects to receive. A simply sequence would just be a counter 1, 2, 3, 4, 5, 6... In that case it would be easy for a 3rd party to predict that sequence 7 is next. But with advanced software, sequences can be passwords that need to be encrypted a certain way every single sequence (a constantly changing password). You would basically have to have answers for questions that you haven't been asked, you just have to know the question, and how to answer it. That is something you can't learn just by eavesdropping on a signal, you would have to reverse engineer the software on the drone itself.
Anyway, this subject is hard to express to people with little to know knowledge of software engineering and communications.