AGL 40.00 No Change ▼ 0.00 (0%)
AIRLINK 127.04 No Change ▼ 0.00 (0%)
BOP 6.67 No Change ▼ 0.00 (0%)
CNERGY 4.51 No Change ▼ 0.00 (0%)
DCL 8.55 No Change ▼ 0.00 (0%)
DFML 41.44 No Change ▼ 0.00 (0%)
DGKC 86.85 No Change ▼ 0.00 (0%)
FCCL 32.28 No Change ▼ 0.00 (0%)
FFBL 64.80 No Change ▼ 0.00 (0%)
FFL 10.25 No Change ▼ 0.00 (0%)
HUBC 109.57 No Change ▼ 0.00 (0%)
HUMNL 14.68 No Change ▼ 0.00 (0%)
KEL 5.05 No Change ▼ 0.00 (0%)
KOSM 7.46 No Change ▼ 0.00 (0%)
MLCF 41.38 No Change ▼ 0.00 (0%)
NBP 60.41 No Change ▼ 0.00 (0%)
OGDC 190.10 No Change ▼ 0.00 (0%)
PAEL 27.83 No Change ▼ 0.00 (0%)
PIBTL 7.83 No Change ▼ 0.00 (0%)
PPL 150.06 No Change ▼ 0.00 (0%)
PRL 26.88 No Change ▼ 0.00 (0%)
PTC 16.07 No Change ▼ 0.00 (0%)
SEARL 86.00 No Change ▼ 0.00 (0%)
TELE 7.71 No Change ▼ 0.00 (0%)
TOMCL 35.41 No Change ▼ 0.00 (0%)
TPLP 8.12 No Change ▼ 0.00 (0%)
TREET 16.41 No Change ▼ 0.00 (0%)
TRG 53.29 No Change ▼ 0.00 (0%)
UNITY 26.16 No Change ▼ 0.00 (0%)
WTL 1.26 No Change ▼ 0.00 (0%)
BR100 10,010 Increased By 126.5 (1.28%)
BR30 31,023 Increased By 422.5 (1.38%)
KSE100 94,192 Increased By 836.5 (0.9%)
KSE30 29,201 Increased By 270.2 (0.93%)

Iraqi militants have regularly used cheap and widely-available software to intercept the feeds of US-operated drones, the Wall Street Journal reported on Thursday. Citing senior defence and intelligence officials, the Journal said Iranian-backed Shiite insurgents used software programs such as SkyGrabber - available online for 25.95 dollars (18 euros) - to capture drone feeds.
The practice was uncovered in July 2009, when the US military found files of intercepted drone video feeds on the laptop of a captured militant. They discovered "days and days and hours and hours of proof," a person described as familiar with the situation told the Journal. "It is part of their kits now."
Some of the most detailed examples of drone intercepts have been uncovered in Iraq, but the same technique is known to have been employed in Afghanistan and could easily be used in other areas where US drones operate. The SkyGrabber program and others take advantage of the unencrypted downlink between the drone and ground control.
The US government has known about the flaw since the 1990s, but assumed its adversaries would not be able to take advantage of it, the Journal said. US officials said there was no evidence that militants could control the drones or otherwise interfere with their flights, but the vulnerability would allow the unmanned craft to be monitored and tracked.
Defence officials told the Journal efforts were being made to fix the flaw, but noted that adding encryption to a decade-old system is tricky and requires upgrading several components of the system linking drones to ground control.
One of the developers of SkyGrabber, which is made by Russian company SkySoftware, told the Journal he had no idea the program could be used to intercept drone feeds. "It was developed to intercept music, photos, video, programs and other content that other users download from the Internet - no military data or other commercial data, only free legal content," Andrew Solonikov told the Journal.

Copyright Agence France-Presse, 2009

Comments

Comments are closed.