SkyGrabber: hack of US drones shows how quickly insurgents adapt

Iraqi insurgents reportedly used $26 SkyGrabber software to tap into video feeds from US drones in the region. It's the latest sign of the speed at which insurgents are adapting to US military and technological advances.

By , Staff writer

  • close
    SkyGrabber and similar software has been used to capture military feeds from Predator unmanned aerial vehicles, such as this one in Ali Base, Iraq.
    View Caption

Revelations that Iraqi Shiite militants use cheap software available online to tap into live video feeds from Predator drones is just the latest indication of insurgents’ tech savvy – and ability to adapt to American military advances.

The Wall Street Journal reported Thursday that militants used a $25.95 program called SkyGrabber – software meant to give users the ability to snatch music and videos that others are downloading – to see what the $4.5 million Predators flying over the region were sending back to US military command. (Read more about how it was done here.)

The insurgents weren’t able to hack into the Predator system or disrupt the video feeds, according to military officials. The Pentagon is now taking steps to encrypt the video recorded by the spy planes.

Recommended: Could you pass a US citizenship test?

Drones have become a key tool in the US wars in Iraq and Afghanistan – as well as counterterrorism operations in Pakistan and Somalia – because they can monitor targets for a long period of time and deploy missiles by remote, with pilots sitting in bases as far away as Arizona.

The tapping into the video feeds – which gives Iraqi militants valuable insights into the targets the US military is watching – is not the only reported flaw in the pricey US military fighting system. In a March 16 article, The New York Times reported that the controls in the Predator command centers were “clunky” as the “missile-firing button sits dangerously close to the switch that shuts off the plane’s engine.”

Many Predator drones have crashed in Iraq and Afghanistan and drone strikes in Pakistan that have led to civilian deaths have drawn sharp criticism. Despite this, Predators are part of a first wave of an increasingly-used technology.

But as US military technology advances, its enemies find innovative ways to keep up.

Insurgents in Iraq have long used the Internet in their fight against the Americans – not only to recruit new militants but also to quickly spread and distribute training manuals. Roadside bomb-makers adapted to US military detection methods by employing bigger bombs and deadlier explosively-formed penetrators, or EFPs. When it became difficult for male suicide bombers to get close to key targets, militants started deploying women who were less likely to be searched.

“If anything, I think the enemy, being smaller and less bureaucratic, tends to be more technologically agile than us," writes Thomas Ricks, the former Washington Post military reporter, on his national security blog. He writes of seeing solar collectors in an Al Qaeda command and control bunker in Afghanistan in 2001.

"From the wires I could see it looked to me like they used it to power their communications. Anyway, solar power sure beats carry hauling batteries up the pathways along those 10,000-foot-high razorback ridges,” he added.

In fact, the Wall Street Journal report suggests that military officials knew about the problem for years but "the Pentagon assumed local adversaries wouldn't know how to exploit it."

In a 2007 USA Today article about the evolution of the improvised explosive device, or IED, retired Marine Gen. Anthony Zinni reflected on the pace at which insurgents adapted in Iraq.

"This is the first war where we've faced an enemy that's adapted better than we have at a tactical and operational level.”

---

Follow us on Twitter.

Share this story:

We want to hear, did we miss an angle we should have covered? Should we come back to this topic? Or just give us a rating for this story. We want to hear from you.

Loading...

Loading...

Loading...