12.07.2015 Views

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

C H A P T E R10How Iraqi Insurgents Watched U.S.Preda<strong>to</strong>r Video—Information Theft onthe Tactical BattlefieldO U T L I N E<strong>Introduction</strong> 186The Preda<strong>to</strong>r UAV 186Hacking the Preda<strong>to</strong>r Feed 187The Preda<strong>to</strong>r’s Vulnerability 188Wireless Networks 189Attribution and the Kata’ib Hezbollah 191The His<strong>to</strong>ry of the Preda<strong>to</strong>r Vulnerability 193Summary 194Suggested Further Reading 194INFORMATIONINTHISCHAPTER• The Preda<strong>to</strong>r UAV• Hacking the Preda<strong>to</strong>r feed• The Preda<strong>to</strong>r’s vulnerability• Attribution and the Kata’ib Hezbollah• The his<strong>to</strong>ry of the Preda<strong>to</strong>r vulnerability185

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!