12.07.2015 Views

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

HACKING THE PREDATOR FEED187FIGURE 10.1 The Preda<strong>to</strong>r RQ-1 takes off at Balad Air Base, Iraq in September 2004 supporting Operation IraqiFreedom. Pho<strong>to</strong>graph from DARPA, www.darpa.mil.Affairs” and further development followed. The aircraft was modified with a longer fuselageand a greater wingspan and became the Preda<strong>to</strong>r—which first flew in July 1994 (Figure 10.1). 3The Preda<strong>to</strong>r was first employed for combat by the U.S. Air Force in support of OperationNomad Vigil in late 1995 with flights over Albania. This was followed by the support comba<strong>to</strong>peration in the Balkans for the remainder of the 1990s. 4 All the early missions of the Preda<strong>to</strong>rwere reconnaissance; however, over time the UAV evolved in<strong>to</strong> a targeting <strong>to</strong>ol. After spottingan enemy target in the Balkans, the Preda<strong>to</strong>r could use its laser <strong>to</strong> mark the target in orderfor another aerial platform—such as an F-16 fighter—<strong>to</strong> launch munitions. Hence, weaponizingthe Preda<strong>to</strong>r so it could attack targets appeared as a natural progression for the aircraft.By mid-2001, the U.S. Air Force began test-firing Hellfire missiles from the Preda<strong>to</strong>r. After theterrorist attacks on 9/11, the armed Preda<strong>to</strong>rs were employed in Afghanistan <strong>to</strong> conduct kineticoperations. By 2008, the Preda<strong>to</strong>rs were logging a <strong>to</strong>tal of 10,000 flight hours per monthin Iraq and Afghanistan. 5 HACKING THE PREDATOR FEEDIn late 2008, U.S. military personnel operating in Iraq arrested a Shi’ite militant in whosepossession a lap<strong>to</strong>p was found that contained video footage of Preda<strong>to</strong>r feeds. 6 In July 2009,further finds of insurgent lap<strong>to</strong>ps with recorded Preda<strong>to</strong>r feeds followed. At the time, it waswidely suspected that many of the Shi’ite militant groups operating in Iraq were being fundedand trained in Iran—which led some officials <strong>to</strong> conclude that the ability <strong>to</strong> acquire such videofeeds had become standard practice by then. One group in particular, the Kata’ib Hezbollahoperating out of Sadr City, which was known <strong>to</strong> have been supported by Iran at the time, wasalso found <strong>to</strong> be in possession of feeds and the necessary equipment <strong>to</strong> obtain them. 7 Further,reports of Preda<strong>to</strong>r intercepts in Afghanistan also surfaced. The s<strong>to</strong>ry was first reported in thenews media by the Wall Street Journal, initiating a media fire-s<strong>to</strong>rm. In this section, we describe

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!