07 June 2014

MIS750_2: How to Steal a UAV?


I confessed that I’m a kind of a movie buff, especially if the movies or TV series are with a spy-thriller genre, the intelligent ones off course ...

In my last MIS750 blog entry, I did mention about the UAV. This time I wanted to elucidate a little more with regard to this wonderful piece of high technology and how actually MIS works in practice.

In Chapter 5 of MIS750, we learned a bit about what is called as the Enterprise Information Systems (EIS). An example of the deployment of EIS is by the United States (US) Military to enhance communications by allowing quick dispersal of combat intelligence and connecting support applications with tactical applications.
In the recent and on-going ‘24:Live Another Day’ shown every Tuesday 10.00 pm on AXN, the tv series plot is about a group of terrorist who managed to capture 10 drones (UAV) that belongs to the US Military and wanted to launch attacks at designated targets in London as possibly creating catastrophic disasters.
Actually at first the plot seems strange enough, as how a group of terrorist could hijacked sophisticated US Military drones. However,  the fact is, this has been done before by Iran in December 2011. Iran’s cyber warfare unit stationed near a city of Kashmar managed to brought  a US Military  drone down with minimum damage. 

According to one report, the drone was captured by jamming both satellite and land-originated control signals to the UAV, followed up by a GPS spoofing attack that fed the UAV false GPS data to make it land in Iran at what the drone thought was its home base in Afghanistan.

There is also an unconfirmed news that the very same drone technology is said to have undergone reverse engineering, fully decoded and was being smuggled from Iran to China via a supposedly safe route i.e. MH370 flight, and the rest is history (yet to be uncovered).

A typical US Military drone like the MQ-9 Reaper and RQ-170 Sentinel (the model captured by Iran) posses highly advanced avionics and complex mechanical systems technology to perform in any airspace environment.  These drones are equipped with precise and independent inertial position information for navigation, targeting and attitude reference. The drone power plant for example was designed for low size, weight and power consumption operating across the spectrum of rugged military environments.

For the US Military the EIS workload is largely handled by their Defense Information Systems Agency (DISA). The DISA provides, operates, and assures command and control, information sharing capabilities, and a globally accessible enterprise information infrastructure in direct support to the US national interests.

As for the case of mobilizing the drones, the DISA provides support to engineer, develop, maintain, and operate a global net-centric enterprise in direct support to joint and coalition across the full spectrum of the drones’ operations. This includes designing and implementing a high-capacity, strategic communication network to ensure reliable communications and less dependency on satellite communications and tactical microwave links, which had limited bandwidth capacity and other limitations including possibly exposed to hostile cyber warfare attacks similar to what Iran has done in 2011.

No comments:

Al Buraq: Through the Scientific Lenses

(17:1) Glory be to Him, Who transported His Servant one night from the Masjid-i-Haram to the distant Temple, whose surroundings We have bles...