So? They key is part of a key pair which is discarded if the drone is lost or presumed lost. It is never reused.
Not a problem if the data is encrypted with the video channel’s public key before it’s written to the hard drive.
So? They key is part of a key pair which is discarded if the drone is lost or presumed lost. It is never reused.
Not a problem if the data is encrypted with the video channel’s public key before it’s written to the hard drive.
Only if it’s an attack drone. Most are surveillance drones.
The warhead could certainly be command detonated while it’s still on the wing.
The thing about anti-aircraft missles and so on is that they don’t make the target explode into a giant fireball like in the movies. Instead, the goal is to damage the target to make it unflyable, and let the ground do the work of smashing the target into tiny bits.
So telling the autopilot to auger at into the ground is a lot more effective method of self destruction than detonating missiles on their rails, since all that will do is blow a hole in the wing, and all that will do is cause the drone to crash.
But Iran surely does not have the chops for this. They trade it to China, North Korea, Russia…?
Of course.
The problems of living in a global economy…
Suppose the Iranians copy the memroy in the drone’s computer-could it infect their computers?
There have been several mysterious explosions at Iranian military facilities-could this be another phase in a cyber war?
You must watch too much TV…
Well, consider the alternative. These drones are not small machines. Having a drone, with its load of AV gas, slam into an inhabited area is a Bad Thing. Japan figured out in WW2 that the distinction between a missile and an airplane is slim at best. If you lose control of a drone, you really don’t want it to turn into a missile that fires itself at a random target.
Seems like an awfully expensive way to go about it, when history suggests that all you need to do is leave a few infected USB flash drives scattered in parking lots and public spaces.
How come iranian video shows an intact drone? Was it a smooth landing?:dubious:
The Iranians are claiming that they commandeered the control signal and flew the craft to a soft landing themselves. Short of their having previously obtained significant (and obviously classified) documentation about the craft’s systems this isn’t credible. We all assume that the control signals were encrypted, and even without encryption it is hard to imagine that they knew how to command it to do their bidding. If the US had lost craft previously we might believe some reverse engineering was possible.
I do wonder how the plane would react to a totally jammed GPS signal. It may not have a useful backup nav system, and it might end up aimlessly flying about until it ran out of fuel. Given that the US has already said that they assumed that such drones were at risk, they may well not have included a P channel GPS receiver, so it is possible the the drone could have had its GPS signal spoofed rather than just jammed. That could raise all sorts of interesting possibilities as to how you could effectively take command. Much would depend upon how autonomous its operations are. (I’m assuming that spoofing the P channel is still infeasible - this may no longer be true.)
The video doesn’t show the bottom of the craft, indeed it is rather carefully covered up. A lot of this is quite a game, so it would not surprise me if they have reconstructed it from a crashed plane, and shown this off to stir things up. The goal will be to make the US stop flying drones over Iran, believing them to be now at risk. These games always involve subterfuge and bluff.
Why? Can’t it be assumed that both China and Russia would have an interest in knowing how to Jam or take control of american drones and would supply personnel and equipment in order to study this. They’ve had 3 or 4 years of drone operations over Iran to eavesdrop on the signals and try and decrypt them and the real possibility of getting human intel from Lockheed-Martin employees or contractors as well.
That is why I wrote “short of” - it really assumes that level of application of intelligence operations - and indeed help from other powers. Still makes breaking the encryption a problem. Modern encryption systems are really really hard to crack. But if they did manage to reverse out the private key of the command channel it could be possible to take command. That would imply lax procedures on the part of the plane’s controllers (by not changing keys) - but that is exactly the sort of thing that code breakers look for. So I would agree that there is a possibility.
There remains a real chance that some, or all, of the control systems used are derived from off the self, and even off the self commercial, equipment. In which case things would be much easier, once any encryption was broken.
Other sources have widely reported this differently, that the drones are programmed to return to base if they lose radio contact. (Reuters, Associated Press, etc.)
From what’s been said I don’t see much sense in including any mechanism for destroying the hard elements (design, materials, etc) of a surveillance drone. But for all the sensitive electronics coding, couldn’t that include scripting that would erase or leave unintelligable everything if it didn’t continue to receive authorized inputs within short, reasonable periods of time?
We do NOT all assume that. Unencrypted comms is a multi-platform platform, with this being just an example.
Crypto functions place fairly high demands on comms hardware. For most data transmission, it’s not too big a deal. But if comms are broken or compromise detected, session re-negotiation can cause a lot of things to go wrong. Think about it this way, if your PC/MAC loses its association with a wireless AP with crypto protection, there’s a good chance you’ve got to restart the router to perform re-negotiation of the keys (as well as DHCP, etc). No big deal - you can run to wherever the router is and kickstart the box. Tougher to do when the box is 10,000 miles away.
I would think changing key pairs (which I surely do not understand well) would be done automatically in millisecond intervals.
If you can set off a self-destruct device, then somebody else can hack your system, & set off a self-destruct device.
BTW–bets the Iranians used a virus to get control of a drone?:smack:
The danger seems to lie not so much on what’s on the devices inside the drone as on the devices themselves. This is an AP article that I found on an Israeli news site:
Here’s the site: Lost drone exposes covert US-Iran conflict
I also read a Wall Street Journal article last Wednesday that said US officials considered using covert operations to destroy the drone; possibilities included sending in a team to blow up the drone, sending in a team to retrieve the drone, or targeting the drone with air strikes.
Thanks for the many interesting and informative answers. The US military could use you guys; they apparently didn’t think of any of this stuff beforehand.