11 thoughts on “Iran Hacks Azerbaijan’s Israeli-Made Drone Fleet – Tikun Olam תיקון עולם إصلاح العالم
task-attention.png
Comments are published at the sole discretion of the owner.
 

  1. Could you explain the following ? in the explanation “Fang” the fresh forum admin released yesterday (@ 7:26 PM IST – 9:26 AM PST) he states under section1 paragraph 5: (http://www.fresh.co.il/vBulletin/showthread.php?t=580940#post4448637)

    ה. נוצר דיון באתר שלו עם סירפד אשר הייתם עדים לו כשבמקביל עוד באותו היום המקור שלח אליו את החלק השלישי אשר טרם פורסם, אנו מניחים שסילברסטיין כבר נזהר יותר בעקבות מה שקורה באשכול הזה (אם יפרסם חפשו את המילים: אזרבייג’ן, הרמס 450, קרון שליטה וקישור לכתבה שהופיעה באתר איראני(

    An exchange between “Sirpad” and Richard was established on Silverstein’s thread, during the same day “the source” sent Silverstein the third part of the story which was not yet published. We assumed that after reading this thread Silverstein would exercise a bit more caution, but if he does publish the story: look for the keywords “Hermes 450, Battle Management & Control Unit, And a link to the Iranian presstv website”

    Could you explain that ?

    1. Don’t forget the key word Azerbaijan. RS has no mention of the Elbit Systems’ Battle Management & Control Unit (WINBMS). Should he have? Of course Azerbaijan was a key territory for launching an Israeli attack on Iran in 2012. Not only Israeli but also the most advanced US Sentinel RQ-170 drone was picked out of the sky.

      What is the practical joke? The performance of the Elbit Systems’ Hermes-450 is worse than Israeli “experts” admit. Looks to me Elbit Systems has some tooling up to do or some wars will be on hold.

    2. I don’t read Fresh unless I have to. I have no idea what’s being claimed here nor much interest in engaging with Sirpad in a food fight. You can look for conspiracies & proof of whatever you wish regarding my reporting or source. But I’m afraid it won’t do you much good.

      By the way, I enjoy the notoriety Sirpad provides me & hope he keeps it up.

      1. So you wrote 554 words over a subject you don’t really care about ? It doesn’t add up.

        What was claimed by the goons at fresh was that they new ahead of time what you are going to publish.
        doesn’t that mean their claim for setting you up is true ?

  2. Israel and Azerbaijan signed a $1.4 billion arms deal

    (TOI) – Azerbaijani drones, constructed with the aid of Israel, are being used to conduct spy missions along the Azeri-Iranian border, Iran claimed. Azerbaijan has acquired a fleet of Orbiter ultra-light drones and Hermes-450 drones, the latter of which can be outfitted with missiles and electronic warfare capability, and are using them to monitor Iran’s northern regions.

    Press-TV reported that Israeli satellites were being used in conjunction with the drones to run surveillance along the Iranian border. Azerbaijan denied reports that it had agreed to allow Israel to use its territory as a staging ground for a possible attack on Iran.

    In 2012, top Azeri officials had denied reports that bases near the Caspian would be loaned to Israel for a strike. Israeli officials blamed the White House for leaking the attack plans to warn Israel against taking unilateral action.

    Reports of Israeli drones operating in Azerbaijan spark Iranian condemnation, threats

    Iran releases decoded footage from captured U.S stealth RQ-170 drone

  3. This all reminds me of another story, an old one, namely, the original security hole in the internet which was originally put there, on purpose, to allow internet admin to access internet nodes (for instance, if they “went down”) to debug them from afar. Well, as is by now well known, hackers somehow manage to learn all the wiggly ways into computers which allow the outside world to get in. And remote-debugging requires a remote “way in”. So hackers were guaranteed a means to det in. PERIOD.

    Same with these DRONES which require an ability to be controlled from afar while in flight. If Israel (or USA or Azerbaijan) has the means to contact the drone, then so has anyone else (who has broken the codes, naturally) (Ay, there’s the rub).

    Now if you could pre-program these babies to perform an in-flight termination of their willingness to hear new instructions, then you could prevent hackers (here, Iranians) from getting in the way. The cost is high — you also terminate your own ability to re-direct the drone.

  4. @Pabloe The HAPY is a suicide drone that is basically fire
    and forget because it blows itself up if it doesn’t find a radar
    emitting targeting. From what I understand it shouldn’t be hard to
    adjust the software to only permit transmissions from it and not to
    it.

  5. Richard; I don’t claim to have any expertise in missile technology, but do know that it is suspicious that the Iranians have the technology to “hack” American/Israeli missile technology. All of which, leads me to speculate whether there is a “third party” acting on Iran’s behalf OR whether the U.S. is playing both sides against the middle, just to keep the war mongers happy.

    1. Belief in American exceptionalism and one will never understand the high level of Russian theoretical math and physics. Starting a cyber war, the US and Israel most likely will face defeat. Another reason for the US and Five Eyes to spy on other nations for economic gain and knowledge of business patents. Pure global theft for US (in)security?

      “Crypto-systems provide integrity & assurance, so we are either assured that the drone was not landed with GPS spoofing, or we are assured that the use of classified red-key RSA is compromised.”

      RQ-170 Sentinel Drone – How Was it Hacked?
      Iranian and possibly Russian and Chinese scientists have penetrated the RQ-170′s memory banks

    2. Cyber warfare

      RSA hack effects expand : Northrop Gruman and L-3 may also be compromised

      (ITsecurity.be) June 2, 2011 – Another defense contractor appears to have been hit by a cyber-attack, and a leaked memo indicates company executives believe attackers used information stolen from RSA Security earlier this year. If true, RSA’s SecurID technology may be irrevocably compromised.

      Attackers hit major defense contractor L-3 Communications Holdings by spoofing pass codes from a cloned RSA SecurID token. The attackers may have used a similar method to target another defense contractor, Lockheed Martin. The second-largest U.S. defense contractor Northrop Grumman may also have been hacked, as the company shut down remote access to its network without warning.

Leave a Reply

Your email address will not be published. Required fields are marked *