blog trackingRealtime Web Statistics drone Archives - Gregory D. Evans | Worlds No. 1 Security Consultant

Posts Tagged ‘drone’

Triathlete injured by “hacked” drone !


  Australia : A Drone owned and operate by a film company Crashed at Triathlete. The Drone was collecting Photos of the event from 30 feet high. The Drone Operator Warren Abrams of New Era Photography and Films told the news agencies that Suddenly he loose control on the Drone and his equipment was jammed , while the drone was in control of someone else. He further added “an attacker using a “channel hop” attack to take control away from me. a similar incident caused me to lose control over the drone earlier”. Triathlete Raji Ogdensaid ” the drone hit …continue reading

For more information go to, http://www., or

The post Triathlete injured by “hacked” drone ! appeared first on National Cyber Security.

View full post on National Cyber Security

Drone Survival Guide

Drone Survival Guide: Here it is. Your free, and downloadable, drone survival guide. View full post on Your Anon News Read More….

View full post on The Cyber Wars

Aren’t Drone Strikes Terrorism? Obama Admin Answers

“No military tactic has been more employed, and more controversial, in the “Global War on Terror” than the “air strike” — whether from drones, jets, or even …

________________________ – – –

True mission of US drone Did Iran hack a stealth US drone?

The drone recently downed in Iran really was spying on the country. Chris Lawrence reportsU.S. officials confirm what the drone was really doing inside Iranian airspace. Chris Lawrence reports.

View full post on The Cyber Wars

Highly secret stealth drone RQ-170 downed in Iran

NBC News: “Drone that crashed in Iran last Thursday was on a mission for the CIA, and is now in the hands of Iran’s military” Iranian PressTV says that it happened on Dec. 4 : “On Sunday December 4, the […] ↓ Read the rest of this entry…

View full post on The Cyber Wars

US killer spy drone controls switch to Linux

The control of US military spy drones appears to have shifted from Windows to Linux following an embarrassing malware infection.

Ground control systems at Creech Air Force Base in Nevada, which commands the killer unmanned aircraft, became infected with a virus last September. In a statement at the time the Air Force dismissed the electronic nasty as a nuisance and said it posed no threat to the operation of Reaper drones, but the intrusion was nonetheless treated seriously.

“The ground system is separate from the flight control system Air Force pilots use to fly the aircraft remotely; the ability of the pilots to safely fly these aircraft remained secure throughout the incident,” it said.

The discovery of the virus was nonetheless hugely embarrassing for the Air Force. The credential-stealing malware, first reported by Wired, made its way from a portable hard drive onto ground systems, which control the drones’ weapons and surveillance functions. Portable disks are used to load map updates and transfer mission videos from one computer to another, Defense News added.

“The malware was detected on a standalone mission support network using a Windows-based operating system,” a US Air Force statement at the time explained. “The malware in question is a credential stealer, not a keylogger, found routinely on computer networks and is considered more of a nuisance than an operational threat. It is not designed to transmit data or video, nor is it designed to corrupt data, files or programs on the infected computer. Our tools and processes detect this type of malware as soon as it appears on the system, preventing further reach.”

Drone units were advised to stop using the removable drives to prevent another outbreak. Behind the scenes other changes appear to have been made: screenshots of drone control computers uploaded by security researcher Mikko Hypponen suggest that at least some of the consoles have been migrated from Microsoft Windows to open source Linux.

Photos of US drone control systems taken in 2009 (here) and 2011 (here) provide evidence of the change – in the earlier picture the Windows desktop GUI can be easily discerned whereas the latter slide indicates the new systems are Linux-based and have “improved displays”.

The 2009 photo originally came from the air force base’s website but the image has since been removed. A cropped copy can be found here. The 2010 slide came from an unclassified presentation on the US’s unmanned drone operations.

Hypponen told The Reg: “If I would need to select between Windows XP and a Linux based system while building a military system, I wouldn’t doubt a second which one I would take.” ®

Article source:

View full post on National Cyber Security » Virus/Malware/Worms

Video: Obama asks Iran to return downed drone

The White House has asked the Iranian government for the drone that was downed in their country as military officials claim they have retrieved the data necessary to reproduce the aircraft. Scott Pelley reports.

View full post on obama hacking government – Yahoo! News Search Results

View full post on National Cyber Security

Video: Obama asks Iran to return downed drone

The White House has asked the Iranian government for the drone that was downed in their country as military officials claim they have retrieved the data necessary to reproduce the aircraft. Scott Pelley reports.

View full post on obama hacking government – Yahoo! News Search Results

View full post on National Cyber Security

Iranian Engineer Says GPS Hack Tricked Drone into Landing (December 15, 2011)

According to a report in The Christian Science Monitor, the US military drone aircraft that was captured by Iran last week may have been forced to make its unplanned landing in that country through a GPS spoofing attack…….

View full post on SANS NewsBites

View full post on National Cyber Security

Spy drone GPS spoofing claims doubted by security analysts

Reports that Iranian electronic warfare experts may have succeeded in intercepting and capturing a sophisticated US spy drone has been received with some skepticism by security analysts.

While it is certainly possible that the drone was electronically ambushed as reported, more details are needed to know what exactly might have happened to the RQ-170 Sentinel drone, they said.

A report last week suggested that the recent US spy drone captured by Iran may have been intercepted and tricked into landing in that country by Iranian electronic warfare experts.

The story quoted an unnamed Iranian engineer as saying that Iran was able to cut off the communications links to the Lockheed-Martin-made drone and reconfigure its GPS coordinates to trick it into landing in Iran.

The engineer was quoted as saying that Iranian engineers developed the attack by reverse engineering US drones that had been previously captured or shot down, and by taking advantage of its weak GPS navigation system.

John Pescatore, an analyst with market research firmGartner, and a former analyst with the National Security Agency (NSA), said the supposed attack, while possible, was not plausible.

He noted that the Air Force in October had said that some of its drones had been hit with a virus. “If a virus could get in, then targeted malware surely could,” Pescatore said.

However, to pull off the attack, the Iranians would have needed to have detailed knowledge of the drone’s software, and it’s doubtful they did, he said.

Two more likely scenarios are that the drone was simply lost, as a result of a command and control failure, or it’s possible that some kind of jamming disrupted command and control, and that failsafe mechanisms that should have kicked in, did not, he said.

James Lewis, director and senior fellow at the Center for Strategic and International Studies in Washington said that it’s possible the Iranians got help from the Russians. “They’ve recently said they’re worried about electronic warfare,” said Lewis, who led a team that prepared a set of national cybersecurity recommendations for President Obama in 2008.

According to Lewis, Russia has been focused on beating GPS security at least since the Bosnian War in the 1990s. “They monitor our telephone and computer networks and probably radio in the Air Force,” he said. “So they could have heard DOD blabbing about any problems,” related to its drone, he said. “Russia helped the Iranian nuke programme, so why not electronic warfare?” he asked. Lewis said the US is ahead in the GPS race with Russia.

China also cannot be ruled out as playing a role, although China appears to have fewer capabilities than the Russians in this arena, he said.

Ira Winkler, author of Spies Among Us, said that the Iranian drone incident is reminiscent of a previous incident in which attackers intercepted live video feeds from US Predator drones operating in Afghanistan and Iraq.

In that case, the attacks were enabled via the use of a $26 off-the-shelf software product called SkyGrabber made by a Russian company.

In the most recent instance, it is likely that the drone’s capture was not the result of a direct hacking of the drone.

“For example, if you know where a drone is, and you can beam a stronger GPS signal at the drone than it would get from a satellite, it would pick up the fake signal and think it is somewhere else,” he said. “If signals aren’t encrypted, the people with the strongest transmitter win.”

Article source:

View full post on National Cyber Security » Computer Hacking

Page 1 of 41234»

Get The New Book By Gregory Evans

Everyone Is Talking About!

Are You Hacker Proof?

Find Out More, Click Here!