{"id":2354,"date":"2009-12-17T14:46:16","date_gmt":"2009-12-17T14:46:16","guid":{"rendered":"http:\/\/euvolution.com\/futurist-transhuman-news-blog\/iraqi-militants-hack-4-5m-predator-drones-with-windows-shareware-war\/"},"modified":"2009-12-17T14:46:16","modified_gmt":"2009-12-17T14:46:16","slug":"iraqi-militants-hack-4-5m-predator-drones-with-windows-shareware-war","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/futurist\/iraqi-militants-hack-4-5m-predator-drones-with-windows-shareware-war.php","title":{"rendered":"Iraqi Militants Hack $4.5m Predator Drones With Windows Shareware [War]"},"content":{"rendered":"<p><a rel=\"lytebox\" href=\"http:\/\/cache.gawker.com\/assets\/images\/4\/2009\/12\/untitled-11.jpg\"><img decoding=\"async\" src=\"http:\/\/euvolution.com\/futurist-transhuman-news-blog\/wp-content\/plugins\/wp-o-matic\/cache\/02c67_500x_untitled-11.jpg\" class=\"left image500\" width=\"500\" style=\"padding-left:10px; padding-right: 10px;\"><\/a>Today, in terrifying things about the world: Iraqi militants have been able to intercept video feeds from the Predator surveillance drones with a simple Windows app. To rephrase, an iconic symbol of our military superiority can be foiled for <em>$26.<\/em><\/p><p>The software, as far as I can tell, is a simple data-leeching utility. With a satellite dish and a few parameters (Packet IDs and transponder codes, which you can evidently <em>scan<\/em> for) you can tap into downstream data feeds, and essentially recording whatever data is transmitted to (specific) other users on a satellite network. How the insurgents got the proper parameters for predator drone, I have no idea&mdash;but apparently it's not that hard. Says a senior defense official:<\/p><blockquote><p>There did appear to be a vulnerability. There's been no harm done to troops or missions compromised as a result of it, but there's an issue that we can take care of and we're doing so.<\/p><\/blockquote><p>If twelve-year-olds can encrypt their torrent downloads, I think it's a reasonably fair expectation for the US military to be able to encrypt mission-critical data transmissions, the insecurity of which could <em>kill people<\/em>. (Or, alternatively, the security of which ensures that that <em>we<\/em> can kill people. Someone's got to die, right? Right? Right.)<\/p><p><a rel=\"lytebox\" href=\"http:\/\/cache.gawker.com\/assets\/images\/4\/2009\/12\/screencap_2009-12-17_at_10.04.31_am.jpg\"><img decoding=\"async\" src=\"http:\/\/euvolution.com\/futurist-transhuman-news-blog\/wp-content\/plugins\/wp-o-matic\/cache\/02c67_500x_screencap_2009-12-17_at_10.04.31_am.jpg\" class=\"left image500\" width=\"500\" style=\"padding-left:10px; padding-right: 10px;\"><\/a><br> Also worrying: reports that the new <em>Battleship<\/em> <a href=\"http:\/\/gizmodo.com\/tag\/battleship\">iPhone app<\/a> has, due to a small programming error, destroyed most of the Navy's pacific fleet.<\/p><p>At the time of posting, SkyGrabber's <a href=\"http:\/\/www.skygrabber.com\/en\/download.php\">website<\/a> is down. [<a href=\"http:\/\/online.wsj.com\/article\/SB126102247889095011.html\">WSJ<\/a>]<\/p><p><a href=\"http:\/\/ads.pheedo.com\/click.phdo?s=4874c3b3388576c259c8e4aa3a662ccd&amp;p=1\"><img decoding=\"async\" alt=\"\" style=\"padding-left:10px; padding-right: 10px;\" border=\"0\" src=\"http:\/\/euvolution.com\/futurist-transhuman-news-blog\/wp-content\/plugins\/wp-o-matic\/cache\/96c41_img.phdo?s=4874c3b3388576c259c8e4aa3a662ccd&amp;p=1\"><\/a><br><img loading=\"lazy\" decoding=\"async\" alt=\"\" height=\"0\" width=\"0\" border=\"0\" src=\"http:\/\/a.rfihub.com\/eus.gif?eui=2226\" style=\"padding-left:10px; padding-right: 10px;\"><\/p><p><a href=\"http:\/\/feedads.g.doubleclick.net\/~a\/omy-Ie1xnqIuyyYXWOx_ZIdkrqk\/0\/da\"><img decoding=\"async\" src=\"http:\/\/euvolution.com\/futurist-transhuman-news-blog\/wp-content\/plugins\/wp-o-matic\/cache\/96c41_di\" border=\"0\" style=\"padding-left:10px; padding-right: 10px;\"><\/a><br><a href=\"http:\/\/feedads.g.doubleclick.net\/~a\/omy-Ie1xnqIuyyYXWOx_ZIdkrqk\/1\/da\"><img decoding=\"async\" src=\"http:\/\/euvolution.com\/futurist-transhuman-news-blog\/wp-content\/plugins\/wp-o-matic\/cache\/3cf56_di\" border=\"0\" style=\"padding-left:10px; padding-right: 10px;\"><\/a><\/p><div><a href=\"http:\/\/feeds.gawker.com\/~ff\/gizmodo\/full?a=hD7lwrc4WBU:jXRTNk1n0MA:H0mrP-F8Qgo\"><img decoding=\"async\" src=\"http:\/\/euvolution.com\/futurist-transhuman-news-blog\/wp-content\/plugins\/wp-o-matic\/cache\/3cf56_full?d=H0mrP-F8Qgo\" border=\"0\" style=\"padding-left:10px; padding-right: 10px;\"><\/a> <a href=\"http:\/\/feeds.gawker.com\/~ff\/gizmodo\/full?a=hD7lwrc4WBU:jXRTNk1n0MA:yIl2AUoC8zA\"><img decoding=\"async\" src=\"http:\/\/euvolution.com\/futurist-transhuman-news-blog\/wp-content\/plugins\/wp-o-matic\/cache\/3cf56_full?d=yIl2AUoC8zA\" border=\"0\" style=\"padding-left:10px; padding-right: 10px;\"><\/a> <a href=\"http:\/\/feeds.gawker.com\/~ff\/gizmodo\/full?a=hD7lwrc4WBU:jXRTNk1n0MA:D7DqB2pKExk\"><img decoding=\"async\" src=\"http:\/\/euvolution.com\/futurist-transhuman-news-blog\/wp-content\/plugins\/wp-o-matic\/cache\/3cf56_full?i=hD7lwrc4WBU:jXRTNk1n0MA:D7DqB2pKExk\" border=\"0\" style=\"padding-left:10px; padding-right: 10px;\"><\/a> <a href=\"http:\/\/feeds.gawker.com\/~ff\/gizmodo\/full?a=hD7lwrc4WBU:jXRTNk1n0MA:V_sGLiPBpWU\"><img decoding=\"async\" src=\"http:\/\/euvolution.com\/futurist-transhuman-news-blog\/wp-content\/plugins\/wp-o-matic\/cache\/3cf56_full?i=hD7lwrc4WBU:jXRTNk1n0MA:V_sGLiPBpWU\" border=\"0\" style=\"padding-left:10px; padding-right: 10px;\"><\/a><\/div><p><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/euvolution.com\/futurist-transhuman-news-blog\/wp-content\/plugins\/wp-o-matic\/cache\/3cf56_hD7lwrc4WBU\" height=\"1\" width=\"1\" style=\"padding-left:10px; padding-right: 10px;\"><\/p>","protected":false},"excerpt":{"rendered":"<p>Today, in terrifying things about the world: Iraqi militants have been able to intercept video feeds from the Predator surveillance drones with a simple Windows app. To rephrase, an iconic symbol of our military superiority can be foiled for $26.The &hellip; <a href=\"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/futurist\/iraqi-militants-hack-4-5m-predator-drones-with-windows-shareware-war.php\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"limit_modified_date":"","last_modified_date":"","_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[10],"tags":[],"class_list":["post-2354","post","type-post","status-publish","format-standard","hentry","category-futurist"],"modified_by":null,"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/2354"}],"collection":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/comments?post=2354"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/2354\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/media?parent=2354"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/categories?post=2354"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/tags?post=2354"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}