view counter

U.S. Army working to encrypt UAV video feeds

that was highly technical, highly sophisticated. It was more sophisticated than any other equipment we’d seen Iraqi insurgents use.”

The militia, known as Kata’ib Hezbollah based out of Sadr City, Baghdad, has long been suspected of being a surrogate for Iran’s Quds Force, the wing of the Iranian Army responsible for conducting clandestine warfare outside of Iran via various insurgent groups. “It was the technological know-how to make the antennas, computers and software go together and pick up the appropriate bands that was impressive,” the officer said.

Hoffman, Reed, and Gould write that soon after the raid, top commanders in Iraq convened a task force to identify the extent of the threat and how best to deal with it, according to the officer. Initial findings showed the threat was isolated to Kata’ib Hezbollah. “They knew that we were flying Predators over their heads 24/7, so it’s easy to say, ‘yeah, I know that I’m going to do a signals analysis search for [the drone] and take advantage of it,” the officer said.

The laptops loaded with the SkyGrabber software also had footage filmed by smaller Army UAVs as well as the Predators. “We are well aware, and [Office of the Secretary of Defense] is well aware, and we have a well-researched response set in motion,” said Col. Robert Sova, the Army’s capability manager for unmanned aerial systems. “This ability, this is not new information.”

Ground units get the Predator feeds through a Remotely Operated Video Enhanced Receiver, or ROVER, a mobile device that looks like a laptop that can either be carried by hand or mounted in a ground vehicle. An encryption package can be added to the ROVER; however, not all troops have the encryption package. The latest ROVER model being tested by the Pentagon comes equipped with two advanced encryption packages.

The military has not implemented encryption for drones for “various reasons,” according to Sova.

Sova, however, said that the ability to hack a drone’s video feed is a “very low risk” since the insurgents haven’t figured how to hack into the command and control systems of the drones. “It’s not like they’re going to control the payload or move it off,” Sova said. “They’re able to see a specific interval, like a camera system in the mall.”

Sova considers it unlikely that an insurgent could tap into a specific drone overhead. “It’s happenstance, if they were able to tap into that feed,” Sova said. “Only in the best scenario, and only for a short period of time.”

The Defense Department’s Office of Acquisition, Technology and Logistics directed the services to beef up encryption. Prior to his departure last year, Pentagon acquisitions czar John Young oversaw such a push, across all services, according to Gonzalez. “Since these systems were first introduced, we’ve known [the risks of unencrypted video feeds],” Gonzalez said. “Your average off-the-street person isn’t able to get these feeds, but with enough effort you can. The risk to the Department of Defense seemed low. Now, for whatever reason, the Office of the Secretary of Defense has decided to reduce that risk.”

According to Gonzalez, by the first of the year, the Army will field encryption-capable Ravens, and other UAV systems will follow over the coming months and years. “The priority is to give it to every unit in theater or going into theater, so that they will have encryption,” said Gonzalez. “The whole process will take a year, and within a year, several units will have encryption.”

Air Force officers and defense analysts caution that video broadcasts from manned aircraft to U.S. ground troops are vulnerable to hacking as well because they have technology similar to that of UAVs.

Hoffman, Reed, and Gould write that the Air Force has known for more than a decade that the live video feeds from its unmanned aerial vehicles can be intercepted by the enemy but opted not to do anything about it until this year. An official document puts a completion date to secure the feeds at 2014.

The Air Force first flew the RQ-1 Predator, the MQ-1’s predecessor, in combat over Bosnia. In published reports, local residents with satellite television told of watching Predator video feeds on their televisions. Defense analyst Peter Singer, author of Wired for War: The Robotics Revolution and Conflict in the 21st Century, said, “I remember that some of the people there said it was harder to get the Disney Channel than watch U.S. military operations.”

view counter
view counter