Quote:
Originally Posted by Joe Ross
I think if someone was able to walk up to an Apache Helicopter and plug a network cable in, undetected, the Army has much bigger problems then a single Apache being rebooted in flight.
|
Several years ago, photos and videos from the Predator drone cameras were found on insurgents' computers in Iraq and Afghanistan.
The Predator drone used an unencrypted communication protocol so ground troops could view the video on portable video receivers.
They never counted on anyone else "flipping through the channels", and then googling how to fix a scrambled video feed.
The lesson?
NEVER rely on security through obscurity.