Page 2 of 3 FirstFirst 123 LastLast
Results 11 to 20 of 26

Thread: Insurgents Hack U.S. Drones

  1. #11
    Dissident 4dm1n brokencrow's Avatar
    Join Date
    Feb 2004
    Location
    Shawnee country
    Posts
    1,243
    You can take off the tin foil hat, Linen0ise. The nice thing about the web is you can do your own defense analysis these days. It doesn't hurt if you used to work in an ITAR facility.

    1) to date, the US has not exported UAV's to anyone. "MTCR" issues. So far, only Australia and Italy are cleared for unarmed units:

    http://www.forexyard.com/en/reuters_...ROSPACE-DRONES

    2) Iran builds their own drones. Undoubtedly pieces of chit compared to US machines:

    http://www.spacewar.com/reports/Iran...Fleet_999.html

    3) Israel does export them (no comment):

    http://defense-update.com/products/h/harop.html

    It does raise the question as to what kind of physical proximity one needs to intercept satellite data. It sounds like satellites pretty much spray an area. How big an area, and does data up and data down coverage vary?

    You got to hand it to those crazy Iraqi Shias. Those boys ain't stupid. Hezbollah (also Iranian-funded Shias) handed IDF their arses in southern Lebanon in '05 by studying up on Merkavas (Israeli MBT's) to find a weak spot. Did it using the web from what I've heard (BBC documentary).

    HTH, BC
    Last edited by brokencrow; December 18th, 2009 at 11:27 AM.
    “Everybody is ignorant, only on different subjects.” — Will Rogers

  2. #12
    Maybe you or someone else can answer this question. I have plenty of DVB software to play with. I currently using DVB-T. Can those cards pick up other signals other than digital over-the-air tv?

    If I installed a DVB-S2 card into the computer, would it be possible to use a dish inside a home or building rather than drilling holes for placement on the roof?

    http://en.wikipedia.org/wiki/DVB-S2

    South Korea's military said Friday it was investigating a hacking attack that netted secret defense plans with the United States and may have been carried out by North Korea.
    first hacked climate emails, predators, 911 leaks, and now this. Too much is happening. I'm glad for the disclosure but it sounds like somebody or some organization is really pissed off.

    http://news.yahoo.com/s/ap/20091218/...as_cyberattack

    Hackers briefly blocked access to the popular Internet messaging service Twitter, steering traffic to another Web site where a group reportedly calling itself the "Iranian Cyber Army" claimed responsibility.
    Military is not alone with lax security it seems.

    http://news.yahoo.com/s/ap/20091218/...twitter_hacked
    Last edited by t34b4g5; December 19th, 2009 at 04:42 AM.

  3. #13
    Dissident 4dm1n brokencrow's Avatar
    Join Date
    Feb 2004
    Location
    Shawnee country
    Posts
    1,243
    Quote Originally Posted by Linen0ise View Post
    If I installed a DVB-S2 card into the computer, would it be possible to use a dish inside a home or building rather than drilling holes for placement on the roof?
    Can't help you, Linen0ise. Personally, I do not own a TV. I can troubleshoot
    PC's in my sleep, but I'm lost when it comes to working a remote. The power
    of forgetting.

    Computer security? What a great concept...
    “Everybody is ignorant, only on different subjects.” — Will Rogers

  4. #14
    Senior Member nihil's Avatar
    Join Date
    Jul 2003
    Location
    United Kingdom: Bridlington
    Posts
    17,188
    1. military knew about this flaw for years. Notice it's not a big thing when told to the fake media.
    Sort of reminds me of back in the day when I was using Netmeeting.......... you could encrypt text and files but not video links?

    Guess there is still a problem there?

  5. #15
    Quote Originally Posted by nihil View Post
    Sort of reminds me of back in the day when I was using Netmeeting.......... you could encrypt text and files but not video links?

    Guess there is still a problem there?
    Got a better one. I liked how while in the military in a recreational facility, you had to pay to use the computers by the minute. It was for web usage only. The computers were locked down but I managed to telnet my azz all around the world even use notepad to dumb stuff to the commandline in less than a minute. If I wanted to, i could of connected to a open mail relay and called Bush an azzhole. Everytime you slipped a money amount, you had the option to use a previously recorded user ID or create a new one. You can't trace money. In a dark arcade with a bar and loud music with people getting wasted on Yeager bombs\7 up, who actually cared on personal time. People around looking like...WTF. I was IT in that piece... anyone that snitched made me look good.
    Last edited by Linen0ise; December 20th, 2009 at 11:13 AM.

  6. #16
    Senior Member nihil's Avatar
    Join Date
    Jul 2003
    Location
    United Kingdom: Bridlington
    Posts
    17,188
    I liked how while in the military in a recreational facility
    I think I can understand that...............because it was a "recreational facility" it didn't seem to count?

    I have certainly seen the same in the private sector............nobody took responsibility for the kit in training rooms, conference rooms and libraries. Yet they were frequently connected to the network or could be?

    Back then I believe the problem was that each department or functional unit was responsible for its own IT budget and the IT Department mainly provided advice and support. These shared facilities could easily get missed as nobody actually had a budget for them.

    Thankfully we have moved on a lot since then...................

  7. #17
    Quote Originally Posted by nihil View Post
    Thankfully we have moved on a lot since then...................
    *checkmate* again! GAME OVER?

    Somethings in life when you take it too far there is no way back. I'm talking about cellphone hacking is back but with a _killer hack_. Cracking encryption all your popular cellphone companys and chip suppliers use. I'm sure you can't turn everyone cell device in the world now. Guess what...it is posted all over the internet. How many military and contracters using their chit on military bases Hackers are getting this stuff from being fired and going through patent databases.

    A German security expert has raised the ire of the cell phone industry after he and a group of researchers posted online a how-to guide for cracking the encryption that keeps the calls of billions of cell phone users secret.
    http://preview.tinyurl.com/ydo6vdz
    Last edited by Linen0ise; December 31st, 2009 at 04:25 AM.

  8. #18
    excuse me.... bump. I created this post in the Newbie section of security. WTF? this chit is tainted. Watch all you want. Happy New Year!
    Last edited by Linen0ise; January 1st, 2010 at 02:57 AM.

  9. #19
    Senior Member t34b4g5's Avatar
    Join Date
    Sep 2003
    Location
    Australia.
    Posts
    2,391
    Quote Originally Posted by Linen0ise View Post
    excuse me.... bump. I created this post in the Newbie section of security. WTF? this chit is tainted. Watch all you want. Happy New Year!
    think you may be mistaken, it's been in Cryptography section the entire time.

  10. #20
    Quote Originally Posted by t34b4g5 View Post
    think you may be mistaken, it's been in Cryptography section the entire time.
    sorry....I really am. The topic "microcrap coffee" was posted in the newbie section. You a good mod.... you noticed that the small things.

Similar Threads

  1. TTL and traceroute: The forgotten hack.
    By Tiger Shark in forum The Security Tutorials Forum
    Replies: 19
    Last Post: May 29th, 2004, 04:55 PM
  2. A Professional Hack
    By Lone1337 in forum AntiOnline's General Chit Chat
    Replies: 7
    Last Post: August 23rd, 2002, 04:16 PM
  3. Rant: How do I hack Hotmail?
    By smirc in forum AntiOnline's General Chit Chat
    Replies: 21
    Last Post: June 7th, 2002, 04:03 PM
  4. hehe...for those who hate AO newbies...
    By zigar in forum AntiOnline's General Chit Chat
    Replies: 10
    Last Post: February 22nd, 2002, 02:24 PM
  5. how to hack cisco a router... wow
    By NUKEM6 in forum Non-Security Archives
    Replies: 1
    Last Post: February 3rd, 2002, 11:28 PM

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •