伊拉克武装分子成功拦截美国无人机信号

来源:百度文库 编辑:超级军网 时间:2024/05/04 12:29:52
-------华尔街日报报道:伊拉克武装分子成功拦截美国无人机信号---不知真假
http://chinese.wsj.com/gb/20091217/bas161039.asp?source=whatnews2

伊拉克武装分子使用了售价26美元的现成软件拦截美国捕食者(Predator)无人机发出的实时视频信号,可能藉此获得了所需信息,以躲避或监控美军的军事行动。

美国高级防卫和情报官员们说,武装分子在伊朗的支持下,抓住一些遥控飞机系统所使用未受保护通信线路的弱点,拦截这些飞机发出的视频信号。据一位熟知有关该事件报告的知情人士说,伊拉克什叶派武装分子使用了SkyGrabber等软件程序,经常性地拦截无人机发出的视频信号。SkyGrabber在网上的售价仅为25.95美元。

美国官员们说,目前没有证据显示武装分子能够操控无人机或是干扰飞机的飞行。不过,拦截视频信号可能使美国的敌人在战场上获得优势,他们可以让美军的一些任务失去突然性,更为容易地确定哪些道路或建筑物处在美国的监视下。

无人机信号遭拦截标志着网络战争正出现在美国领导的海外战争中。这还表明,美国不断扩大的无人机网络可能存在着严重的缺陷;无人机已经成为了美国在阿富汗和巴基斯坦特别使用的武器。

奥巴马政府目前非常依赖无人机,因为无人机可以飞到美军力所不能及的地区安全地监视和跟踪武装分子目标,美国要么因为政治上站不住脚,要么因为过于危险而无法向这些地区派兵。

视频图像被窃也表明,美国的敌人继续在寻找简单手段应对美国精密的军事技术。-------华尔街日报报道:伊拉克武装分子成功拦截美国无人机信号---不知真假
http://chinese.wsj.com/gb/20091217/bas161039.asp?source=whatnews2

伊拉克武装分子使用了售价26美元的现成软件拦截美国捕食者(Predator)无人机发出的实时视频信号,可能藉此获得了所需信息,以躲避或监控美军的军事行动。

美国高级防卫和情报官员们说,武装分子在伊朗的支持下,抓住一些遥控飞机系统所使用未受保护通信线路的弱点,拦截这些飞机发出的视频信号。据一位熟知有关该事件报告的知情人士说,伊拉克什叶派武装分子使用了SkyGrabber等软件程序,经常性地拦截无人机发出的视频信号。SkyGrabber在网上的售价仅为25.95美元。

美国官员们说,目前没有证据显示武装分子能够操控无人机或是干扰飞机的飞行。不过,拦截视频信号可能使美国的敌人在战场上获得优势,他们可以让美军的一些任务失去突然性,更为容易地确定哪些道路或建筑物处在美国的监视下。

无人机信号遭拦截标志着网络战争正出现在美国领导的海外战争中。这还表明,美国不断扩大的无人机网络可能存在着严重的缺陷;无人机已经成为了美国在阿富汗和巴基斯坦特别使用的武器。

奥巴马政府目前非常依赖无人机,因为无人机可以飞到美军力所不能及的地区安全地监视和跟踪武装分子目标,美国要么因为政治上站不住脚,要么因为过于危险而无法向这些地区派兵。

视频图像被窃也表明,美国的敌人继续在寻找简单手段应对美国精密的军事技术。
这个软件还26美刀阿……XP多少美刀来着,vista 和win7都多少美刀来着。
手段进步了阿
这个强。
敢情无人机视频不加密的?

不是说定向传输的么?好像还有卫星链路?
真能这样就太好了
迷信美军的人可以洗洗睡觉了!呵呵
连美军无人机都被黑客制服, 美帝就杯具了.:D
很怀疑消息真伪,无人机是通过数据链传输数据的,米帝数据链可是加密的,
难道伊拉克武装分子能截获加密数据?!!
拦截伊朗自己的无人机还差不多
用美国的计算机,在美国产的硬盘装上美国的操作系统,按照美国的教程从美国的网络上下载美国的软件,拦截美国的信号

有一套
恐怕软件还是盗版的
我估计会有人说 MD又要问元老院要钱了;P
MD又要问元老院要钱了
美国的情报部门为什么主动把这个消息透露给媒体?
SkyGrabber  不就一款微星电视接收解码软件嘛  ??   得佩块卫星接收卡
介是SkyGrabber打的广告:D
派点人过去卖光盘赚外汇啊!!提个篮子走在巴格达街头:“要光盘不?”
greatmatch 发表于 2009-12-17 17:02
估计这种大数据流的上不了卫星,索性直接传了
哎。。。。什么样的轶闻都有。。。。
TG要不要派人去取一下经啊?
没有打不破的防线,只有磨不利的锋芒
这可能吗,有些不可思议
TG还是毛子的干活?
要不,会不会伊拉克的海龟干的?


SkyGrabber XP 是一款离线卫星下载工具,你不需要连接到Internet上,只需要配置你的卫星天线就可以了。

SkyGrabber XP v2.7.5 特别版(CR)


www.skygrabber.com/

官网被河蟹

SkyGrabber XP 是一款离线卫星下载工具,你不需要连接到Internet上,只需要配置你的卫星天线就可以了。

SkyGrabber XP v2.7.5 特别版(CR)


www.skygrabber.com/

官网被河蟹
什么都要和谐{:3_82:}
yahoo上的新闻

WASHINGTON -- Militants in Iraq have used $26 off-the-shelf software to intercept live video feeds from U.S. Predator drones, potentially providing them with information they need to evade or monitor U.S. military operations.

Senior defense and intelligence officials said Iranian-backed insurgents intercepted the video feeds by taking advantage of an unprotected communications link in some of the remotely flown planes' systems. Shiite fighters in Iraq used software programs such as SkyGrabber -- available for as little as $25.95 on the Internet -- to regularly capture drone video feeds, according to a person familiar with reports on the matter.

The State of U.S. Intelligence

Drone Kills a Leader of Al Qaeda,
Dec. 12, 2009
Terrorists Are Likely Testing Cyber Attacks,
Nov. 19, 2009
U.S. Spy Efforts Have Improved,
Sept. 17, 2009
White House Cybersecurity Czar Steps Down,
Aug. 4, 2009
Cyber Blitz Hits U.S., Korea,
July 9, 2009
Troubles Plague Cyberspy Defense,
July 3, 2009
U.S. Cyber Infrastructure Vulnerable to Attacks,
May 6, 2009
U.S. officials say there is no evidence that militants were able to take control of the drones or otherwise interfere with their flights. Still, the intercepts could give America's enemies battlefield advantages by removing the element of surprise from certain missions and making it easier for insurgents to determine which roads and buildings are under U.S. surveillance.

The drone intercepts mark the emergence of a shadow cyber war within the U.S.-led conflicts overseas. They also point to a potentially serious vulnerability in Washington's growing network of unmanned drones, which have become the American weapon of choice in both Afghanistan and Pakistan.

The Obama administration has come to rely heavily on the unmanned drones because they allow the U.S. to safely monitor and stalk insurgent targets in areas where sending American troops would be either politically untenable or too risky.

The stolen video feeds also indicate that U.S. adversaries continue to find simple ways of counteracting sophisticated American military technologies.

U.S. military personnel in Iraq discovered the problem late last year when they apprehended a Shiite militant whose laptop contained files of intercepted drone video feeds. In July, the U.S. military found pirated drone video feeds on other militant laptops, leading some officials to conclude that militant groups trained and funded by Iran were regularly intercepting feeds.

In the summer 2009 incident, the military found "days and days and hours and hours of proof" that the feeds were being intercepted and shared with multiple extremist groups, the person said. "It is part of their kit now."

A senior defense official said that James Clapper, the Pentagon's intelligence chief, assessed the Iraq intercepts at the direction of Defense Secretary Robert Gates and concluded they represented a shortcoming to the security of the drone network.

"There did appear to be a vulnerability," the defense official said. "There's been no harm done to troops or missions compromised as a result of it, but there's an issue that we can take care of and we're doing so."

Senior military and intelligence officials said the U.S. was working to encrypt all of its drone video feeds from Iraq, Afghanistan and Pakistan, but said it wasn't yet clear if the problem had been completely resolved.

View Full Image

U.S. Air Force
U.S. enemies in Iraq and Afghanistan have used off-the-shelf programs to intercept video feeds from Predator unmanned aircraft.
Some of the most detailed evidence of intercepted feeds has been discovered in Iraq, but adversaries have also intercepted drone video feeds in Afghanistan, according to people briefed on the matter. These intercept techniques could be employed in other locations where the U.S. is using pilotless planes, such as Pakistan, Yemen and Somalia, they said.

The Pentagon is deploying record numbers of drones to Afghanistan as part of the Obama administration's troop surge there. Lt. Gen. David Deptula, who oversees the Air Force's unmanned aviation program, said some of the drones would employ a sophisticated new camera system called "Gorgon Stare," which allows a single aerial vehicle to transmit back at least 10 separate video feeds simultaneously.

Gen. Deptula, speaking to reporters Wednesday, said there were inherent risks to using drones since they are remotely controlled and need to send and receive video and other data over great distances. "Those kinds of things are subject to listening and exploitation," he said, adding the military was trying to solve the problems by better encrypting the drones' feeds.

The potential drone vulnerability lies in an unencrypted downlink between the unmanned craft and ground control. The U.S. government has known about the flaw since the U.S. campaign in Bosnia in the 1990s, current and former officials said. But the Pentagon assumed local adversaries wouldn't know how to exploit it, the officials said.

Journal CommunityDISCUSS
“Who were the lame engineers who came up with a system that runs without encryption? Even the graduates of the local high school programming courses know better than to leave to chance an important security hole. ”
— John Cierra
Last December, U.S. military personnel in Iraq discovered copies of Predator drone feeds on a laptop belonging to a Shiite militant, according to a person familiar with reports on the matter. "There was evidence this was not a one-time deal," this person said. The U.S. accuses Iran of providing weapons, money and training to Shiite fighters in Iraq, a charge that Tehran has long denied.

The militants use programs such as SkyGrabber, from Russian company SkySoftware. Andrew Solonikov, one of the software's developers, said he was unaware that his software could be used to intercept drone feeds. "It was developed to intercept music, photos, video, programs and other content that other users download from the Internet -- no military data or other commercial data, only free legal content," he said by email from Russia.

Related Iraq Videos

Iraqi Oil Up For Auction
News Hub: Bombs Target Government Symbols
Seven Children Killed at Bombed Baghdad School
Obama Welcomes Iraq Election Law
U.S. Troops to be Pulled From Iraq
Isolationism Grows in America
Officials stepped up efforts to prevent insurgents from intercepting video feeds after the July incident. The difficulty, officials said, is that adding encryption to a network that is more than a decade old involves more than placing a new piece of equipment on individual drones. Instead, many components of the network linking the drones to their operators in the U.S., Afghanistan or Pakistan have to be upgraded to handle the changes. Additional concerns remain about the vulnerability of the communications signals to electronic jamming, though there's no evidence that has occurred, said people familiar with reports on the matter.

Predator drones are built by General Atomics Aeronautical Systems Inc. of San Diego. Some of its communications technology is proprietary, so widely used encryption systems aren't readily compatible, said people familiar with the matter.

In an email, a spokeswoman said that for security reasons, the company couldn't comment on "specific data link capabilities and limitations."

Fixing the security gap would have caused delays, according to current and former military officials. It would have added to the Predator's price. Some officials worried that adding encryption would make it harder to quickly share time-sensitive data within the U.S. military, and with allies.

"There's a balance between pragmatics and sophistication," said Mike Wynne, Air Force Secretary from 2005 to 2008.

The Air Force has staked its future on unmanned aerial vehicles. Drones account for 36% of the planes in the service's proposed 2010 budget.

Today, the Air Force is buying hundreds of Reaper drones, a newer model, whose video feeds could be intercepted in much the same way as with the Predators, according to people familiar with the matter. A Reaper costs between $10 million and $12 million each and is faster and better armed than the Predator. General Atomics expects the Air Force to buy as many as 375 Reapers.


===随着技术性能的大幅提高,尤其是滞空时间的大大延长,无人机战场侦察能力得到了进一步加强。美军大部分无人机捕获的视频情报都以 GOP(全球广播系统)卫星单向广播方式传输给各战场作战中心,并且由于 MPEG-2 适用于广播级数字电视的编码和传送,压缩后再显示的图像可满足CIR601的视频质量的要求,美军规定无人机视频情报传输统一采用 MPEG-2压缩编码标准。

====全球卫星广播系统GBS全称为Global- -BroadcasService,它是在商用卫星直播业务DBS的基础上发展起来的军用信息传输业务。 它可为广大军事用户提供多媒体信息(如图像、地图、气象数据、后勤供应、空中飞行管制等)连续、高速、单向的传输。GBS将对战场用户提供宽带、非对称数据和视频通信能力。利用GBS可提高数据传输能力,从而提高信息传输的实效性。

GBS卫星广播管理系统多协议封装技术探讨
简单介绍了GBS(全球广播服务)卫星广播管理系统,提出其中所涉及到的多协议封装技术,并对MPE多协议
封装技术进行了探讨。在LAN上利用Sniffer工具采集MPE数据包,分析其数据封装的格式,利用UltraEdit软件对MPE 包进行逐字段的详细分析,提取数据载荷。



这个这个,大家该明白伊拉克武装分子成功拦截美国无人机信号是怎么一回事了吧

===随着技术性能的大幅提高,尤其是滞空时间的大大延长,无人机战场侦察能力得到了进一步加强。美军大部分无人机捕获的视频情报都以 GOP(全球广播系统)卫星单向广播方式传输给各战场作战中心,并且由于 MPEG-2 适用于广播级数字电视的编码和传送,压缩后再显示的图像可满足CIR601的视频质量的要求,美军规定无人机视频情报传输统一采用 MPEG-2压缩编码标准。

====全球卫星广播系统GBS全称为Global- -BroadcasService,它是在商用卫星直播业务DBS的基础上发展起来的军用信息传输业务。 它可为广大军事用户提供多媒体信息(如图像、地图、气象数据、后勤供应、空中飞行管制等)连续、高速、单向的传输。GBS将对战场用户提供宽带、非对称数据和视频通信能力。利用GBS可提高数据传输能力,从而提高信息传输的实效性。

GBS卫星广播管理系统多协议封装技术探讨
简单介绍了GBS(全球广播服务)卫星广播管理系统,提出其中所涉及到的多协议封装技术,并对MPE多协议
封装技术进行了探讨。在LAN上利用Sniffer工具采集MPE数据包,分析其数据封装的格式,利用UltraEdit软件对MPE 包进行逐字段的详细分析,提取数据载荷。



这个这个,大家该明白伊拉克武装分子成功拦截美国无人机信号是怎么一回事了吧
刚查了,这软件有破解版的,呵呵,下个玩玩。
有點意思啊!
连收费卫星电视的信号都加密
文章说了,MD认为这活不是土八路能干的,有伊朗的支持

另外我感兴趣的是现在伊拉克什么地方是“美军力所不能及”“过于危险”的地方?
看起来像广告,能用卫星数据链传输无人机数据的没有几个国家,这么说来其他国家的无人机都完蛋了?难得一帮人还有心思嘲笑米国[:a1:]
大林 发表于 2009-12-18 09:09

除了美军军营以外的所有地方:D
[:a9:] 美国人竟然用单向卫星广播传输电视数据~~

虽说卫星链路设备比较贵 信道又小 但好歹这也是军用数据诶 怎么可以直接广播呢。。。。
不加密?MD不会这么小白吧,应该是共建和谐社会,提前通知一下恐怖分子吧
revolutionzz 发表于 2009-12-17 18:06
以色列军方证实,在2006的黎以冲突中,黎巴嫩真主党依赖于从伊朗那里得到的电子战技术,破译了以军通信密码,并跟踪、拦截以军无线电通信中迅速变化的频率,进而截取了以军的情报、战场行动指令、监测以军的动向。
美国前国家安全顾问加里·斯科说:“真主党的能力接触到了核心技术之一。通常认为,西方国家在电子战方面比对手占有优势。我们总是假定我们能够破解和截取他们的通信信息,反之则不然。很多策略和战术都是以此为基础的。”
另外我感兴趣的是现在伊拉克什么地方是“美军力所不能及”“过于危险”的地方?
==============================================
绿区以外.;P
屠城校尉 发表于 2009-12-17 18:01
理论上只要是软件,黑客都能破,不要把军方的东西想的太厉害,军方的东西也是地球人开发的,地球人开发的东西地球人当然能破,关键是想不想破和怎么破,需要多少时间才能破的问题

举个简单的例子,乔布斯号称safari多好,安全性多好,黑客30秒就破了它
chanjian5582 发表于 2009-12-17 20:24
有什么不可以的?只要是人写的代码就可能被破