SlideShare a Scribd company logo
1 of 3
Download to read offline
Reading Mission Control Data out of Predator Drone video feeds
By Kingcope

Introduction

There have been recent reports [1] of insurgents intercepting unencrypted U.S. Predator drone
video feeds in Iraq and Afghanistan. The predator drone video feeds were sent in some cases
from the predator drones without any encryption technology so the insurgents were in a rather
simple situation to intercept the video feeds and save them to hard disks and share them
among each other. WSJ [1] states that a software called “SkyGrabber” was used to read the
video feeds. The intention of this software is to read images and videos off the air by using
satellite antennas.

After doing some research on the issue we found that in the predator video feeds aside from
image data there is also mission control data carried inside the satellite signal to the ground
control stations. It is theoretically possible to read off this mission control data both in the
intercepted video feed and saved video data on harddisks.


Technology used by the drones

There is a control and command link to communicate from a control station to the drone.
Further there is a data link that sends mission control data and video feeds back to the ground
control station. Here one has to distinguish between line-of-sight communication paths and
beyond line-of-sight communication paths. The operation of the line-of-sight link is limited to
approx. 81-138 miles. This operating range can be extended by for example using mobile
ground control stations, which are locally deployed. Line-of-sight links are critical for
takeoffs and landings of the drone. These links utilize a C-Band communication path.
Beyond line-of-sight communication links operate in the Ku-Band satellite frequency. This
allows the UAV (Unmanned Arial Vehicle) to cover approx. 1500 miles of communication
capability.
Figure: C-Band and Ku-Band Communication



So this explains somewhat why the insurgents were able to intercept the Predator video feeds
when they were sent unencrypted to the ground station. The only thing needed is a C-Band or
Ku-Band antenna which can read traffic. Sending traffic to a satellite for example is not
needed in this case.

The drones normally use MPEG-TS (MPEG Transport Stream) to send video and data to the
ground station. Motions Imagery Standards Board (MISB) [2] has developed several
standards on how to embed the control data into MPEG streams.




Figure: Excerpt of metadata sent with the MPEG Transport Stream taken off a public MISB Standard document

An important note is that our research shows that most if not all metadata inside the MPEG
Stream is for its own not encrypted if the MPEG Stream itself is not encrypted.
How to read the control data with publicly available tools

During our research we found a suitable tool to read the mission control data off the air video
feeds and also off saved video feeds. The tool is programmed by LEADTOOLS [3] and is
capable of reading KLV metadata out of MPEG-TS. Inside the LEADTOOLS Multimedia
SDK package a programmer finds source code and binaries of the needed tool.

The following screenshot shows the tool in action. The loaded file is a saved MPEG-TS UAV
video with private metadata embedded.




References
[1] Insurgents Hack U.S. Drones, Wall Street Journal
http://online.wsj.com/article/SB126102247889095011.html
[2] MISB, http://www.gwg.nga.mil/misb/stdpubs.html
[3] LEADTOOLS, http://leadtools.com/SDK/Multimedia/mpeg2-transport-stream.htm

More Related Content

Similar to Reading Mission Control Data out of Predator Drone video feeds

SIGNALING PROTOCOLS FOR LOCAL AREA NETWORKS OF DRONES
SIGNALING PROTOCOLS FOR LOCAL AREA NETWORKS OF DRONESSIGNALING PROTOCOLS FOR LOCAL AREA NETWORKS OF DRONES
SIGNALING PROTOCOLS FOR LOCAL AREA NETWORKS OF DRONESIJCNCJournal
 
INTEGRATION_ASPECTS_OF_TELEMETRY_SYSTEM_FOR_A_SURVEILLANCE_UAV.pdf
INTEGRATION_ASPECTS_OF_TELEMETRY_SYSTEM_FOR_A_SURVEILLANCE_UAV.pdfINTEGRATION_ASPECTS_OF_TELEMETRY_SYSTEM_FOR_A_SURVEILLANCE_UAV.pdf
INTEGRATION_ASPECTS_OF_TELEMETRY_SYSTEM_FOR_A_SURVEILLANCE_UAV.pdfPARNIKA GUPTA
 
White paper: Enhance mobility and driver experience with multihop data exchan...
White paper: Enhance mobility and driver experience with multihop data exchan...White paper: Enhance mobility and driver experience with multihop data exchan...
White paper: Enhance mobility and driver experience with multihop data exchan...Yaroslav Domaratsky
 
Advanced vehicle/vehcile and vehicle/UAV collaboration sude cases enabled by ...
Advanced vehicle/vehcile and vehicle/UAV collaboration sude cases enabled by ...Advanced vehicle/vehcile and vehicle/UAV collaboration sude cases enabled by ...
Advanced vehicle/vehcile and vehicle/UAV collaboration sude cases enabled by ...Yaroslav Domaratsky
 
Use Case and Requirements for Broadband Direct Air to Ground Communications (...
Use Case and Requirements for Broadband Direct Air to Ground Communications (...Use Case and Requirements for Broadband Direct Air to Ground Communications (...
Use Case and Requirements for Broadband Direct Air to Ground Communications (...Yi-Hsueh Tsai
 
data communication using unmanned aerial vehicle
data communication using unmanned aerial vehicledata communication using unmanned aerial vehicle
data communication using unmanned aerial vehicleSreejesh TR
 
Feng_Gao_Presentation.pdf
Feng_Gao_Presentation.pdfFeng_Gao_Presentation.pdf
Feng_Gao_Presentation.pdfFabianToh2
 
[CB20] Drones' Cryptanalysis - Detecting Spying Drones by Ben Nassi
[CB20] Drones' Cryptanalysis - Detecting Spying Drones by Ben Nassi[CB20] Drones' Cryptanalysis - Detecting Spying Drones by Ben Nassi
[CB20] Drones' Cryptanalysis - Detecting Spying Drones by Ben NassiCODE BLUE
 
IRJET- Autonomous Operation and Controlling of Unmanned Ariel Vehicle (UA...
IRJET-  	  Autonomous Operation and Controlling of Unmanned Ariel Vehicle (UA...IRJET-  	  Autonomous Operation and Controlling of Unmanned Ariel Vehicle (UA...
IRJET- Autonomous Operation and Controlling of Unmanned Ariel Vehicle (UA...IRJET Journal
 
Radar CDU Testing- A Case Study from Oak Systems Pvt Ltd
Radar CDU Testing- A Case Study from Oak Systems Pvt LtdRadar CDU Testing- A Case Study from Oak Systems Pvt Ltd
Radar CDU Testing- A Case Study from Oak Systems Pvt LtdOak Systems
 
Sybil Attack Detection in Internet of Flying Things-IoFT A Machine Learning ...
Sybil Attack Detection in Internet of Flying Things-IoFT  A Machine Learning ...Sybil Attack Detection in Internet of Flying Things-IoFT  A Machine Learning ...
Sybil Attack Detection in Internet of Flying Things-IoFT A Machine Learning ...Shakas Technologies
 
DEVELOPING A REAL TIME DATA ACQUISITION , FLY-BY-WIRE COMMUNICATION SYSTEM FO...
DEVELOPING A REAL TIME DATA ACQUISITION , FLY-BY-WIRE COMMUNICATION SYSTEM FO...DEVELOPING A REAL TIME DATA ACQUISITION , FLY-BY-WIRE COMMUNICATION SYSTEM FO...
DEVELOPING A REAL TIME DATA ACQUISITION , FLY-BY-WIRE COMMUNICATION SYSTEM FO...IRJET Journal
 
IRJET- - Control Center Viewing of UAS-based Real-Time Sensor and Video Measu...
IRJET- - Control Center Viewing of UAS-based Real-Time Sensor and Video Measu...IRJET- - Control Center Viewing of UAS-based Real-Time Sensor and Video Measu...
IRJET- - Control Center Viewing of UAS-based Real-Time Sensor and Video Measu...IRJET Journal
 
IRJET - Display for Crew Station of Next Generation Main Battle Tank
IRJET - Display for Crew Station of Next Generation Main Battle TankIRJET - Display for Crew Station of Next Generation Main Battle Tank
IRJET - Display for Crew Station of Next Generation Main Battle TankIRJET Journal
 
Air Traffic Control Using Ad Hoc Networking
Air Traffic Control Using Ad Hoc NetworkingAir Traffic Control Using Ad Hoc Networking
Air Traffic Control Using Ad Hoc NetworkingSharad Saurabh
 

Similar to Reading Mission Control Data out of Predator Drone video feeds (20)

SIGNALING PROTOCOLS FOR LOCAL AREA NETWORKS OF DRONES
SIGNALING PROTOCOLS FOR LOCAL AREA NETWORKS OF DRONESSIGNALING PROTOCOLS FOR LOCAL AREA NETWORKS OF DRONES
SIGNALING PROTOCOLS FOR LOCAL AREA NETWORKS OF DRONES
 
INTEGRATION_ASPECTS_OF_TELEMETRY_SYSTEM_FOR_A_SURVEILLANCE_UAV.pdf
INTEGRATION_ASPECTS_OF_TELEMETRY_SYSTEM_FOR_A_SURVEILLANCE_UAV.pdfINTEGRATION_ASPECTS_OF_TELEMETRY_SYSTEM_FOR_A_SURVEILLANCE_UAV.pdf
INTEGRATION_ASPECTS_OF_TELEMETRY_SYSTEM_FOR_A_SURVEILLANCE_UAV.pdf
 
White paper: Enhance mobility and driver experience with multihop data exchan...
White paper: Enhance mobility and driver experience with multihop data exchan...White paper: Enhance mobility and driver experience with multihop data exchan...
White paper: Enhance mobility and driver experience with multihop data exchan...
 
Advanced vehicle/vehcile and vehicle/UAV collaboration sude cases enabled by ...
Advanced vehicle/vehcile and vehicle/UAV collaboration sude cases enabled by ...Advanced vehicle/vehcile and vehicle/UAV collaboration sude cases enabled by ...
Advanced vehicle/vehcile and vehicle/UAV collaboration sude cases enabled by ...
 
Flying with SAVES
Flying with SAVESFlying with SAVES
Flying with SAVES
 
Use Case and Requirements for Broadband Direct Air to Ground Communications (...
Use Case and Requirements for Broadband Direct Air to Ground Communications (...Use Case and Requirements for Broadband Direct Air to Ground Communications (...
Use Case and Requirements for Broadband Direct Air to Ground Communications (...
 
data communication using unmanned aerial vehicle
data communication using unmanned aerial vehicledata communication using unmanned aerial vehicle
data communication using unmanned aerial vehicle
 
Defeating Drones
Defeating DronesDefeating Drones
Defeating Drones
 
Feng_Gao_Presentation.pdf
Feng_Gao_Presentation.pdfFeng_Gao_Presentation.pdf
Feng_Gao_Presentation.pdf
 
[CB20] Drones' Cryptanalysis - Detecting Spying Drones by Ben Nassi
[CB20] Drones' Cryptanalysis - Detecting Spying Drones by Ben Nassi[CB20] Drones' Cryptanalysis - Detecting Spying Drones by Ben Nassi
[CB20] Drones' Cryptanalysis - Detecting Spying Drones by Ben Nassi
 
IRJET- Autonomous Operation and Controlling of Unmanned Ariel Vehicle (UA...
IRJET-  	  Autonomous Operation and Controlling of Unmanned Ariel Vehicle (UA...IRJET-  	  Autonomous Operation and Controlling of Unmanned Ariel Vehicle (UA...
IRJET- Autonomous Operation and Controlling of Unmanned Ariel Vehicle (UA...
 
Radar CDU Testing- A Case Study from Oak Systems Pvt Ltd
Radar CDU Testing- A Case Study from Oak Systems Pvt LtdRadar CDU Testing- A Case Study from Oak Systems Pvt Ltd
Radar CDU Testing- A Case Study from Oak Systems Pvt Ltd
 
Sybil Attack Detection in Internet of Flying Things-IoFT A Machine Learning ...
Sybil Attack Detection in Internet of Flying Things-IoFT  A Machine Learning ...Sybil Attack Detection in Internet of Flying Things-IoFT  A Machine Learning ...
Sybil Attack Detection in Internet of Flying Things-IoFT A Machine Learning ...
 
RPAS and Manned Aircraft
RPAS and Manned AircraftRPAS and Manned Aircraft
RPAS and Manned Aircraft
 
DEVELOPING A REAL TIME DATA ACQUISITION , FLY-BY-WIRE COMMUNICATION SYSTEM FO...
DEVELOPING A REAL TIME DATA ACQUISITION , FLY-BY-WIRE COMMUNICATION SYSTEM FO...DEVELOPING A REAL TIME DATA ACQUISITION , FLY-BY-WIRE COMMUNICATION SYSTEM FO...
DEVELOPING A REAL TIME DATA ACQUISITION , FLY-BY-WIRE COMMUNICATION SYSTEM FO...
 
IRJET- - Control Center Viewing of UAS-based Real-Time Sensor and Video Measu...
IRJET- - Control Center Viewing of UAS-based Real-Time Sensor and Video Measu...IRJET- - Control Center Viewing of UAS-based Real-Time Sensor and Video Measu...
IRJET- - Control Center Viewing of UAS-based Real-Time Sensor and Video Measu...
 
IRJET - Display for Crew Station of Next Generation Main Battle Tank
IRJET - Display for Crew Station of Next Generation Main Battle TankIRJET - Display for Crew Station of Next Generation Main Battle Tank
IRJET - Display for Crew Station of Next Generation Main Battle Tank
 
Air Traffic Control Using Ad Hoc Networking
Air Traffic Control Using Ad Hoc NetworkingAir Traffic Control Using Ad Hoc Networking
Air Traffic Control Using Ad Hoc Networking
 
manoj_resume
manoj_resumemanoj_resume
manoj_resume
 
Avionics Test Station Setup
Avionics Test Station Setup Avionics Test Station Setup
Avionics Test Station Setup
 

Recently uploaded

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 

Reading Mission Control Data out of Predator Drone video feeds

  • 1. Reading Mission Control Data out of Predator Drone video feeds By Kingcope Introduction There have been recent reports [1] of insurgents intercepting unencrypted U.S. Predator drone video feeds in Iraq and Afghanistan. The predator drone video feeds were sent in some cases from the predator drones without any encryption technology so the insurgents were in a rather simple situation to intercept the video feeds and save them to hard disks and share them among each other. WSJ [1] states that a software called “SkyGrabber” was used to read the video feeds. The intention of this software is to read images and videos off the air by using satellite antennas. After doing some research on the issue we found that in the predator video feeds aside from image data there is also mission control data carried inside the satellite signal to the ground control stations. It is theoretically possible to read off this mission control data both in the intercepted video feed and saved video data on harddisks. Technology used by the drones There is a control and command link to communicate from a control station to the drone. Further there is a data link that sends mission control data and video feeds back to the ground control station. Here one has to distinguish between line-of-sight communication paths and beyond line-of-sight communication paths. The operation of the line-of-sight link is limited to approx. 81-138 miles. This operating range can be extended by for example using mobile ground control stations, which are locally deployed. Line-of-sight links are critical for takeoffs and landings of the drone. These links utilize a C-Band communication path. Beyond line-of-sight communication links operate in the Ku-Band satellite frequency. This allows the UAV (Unmanned Arial Vehicle) to cover approx. 1500 miles of communication capability.
  • 2. Figure: C-Band and Ku-Band Communication So this explains somewhat why the insurgents were able to intercept the Predator video feeds when they were sent unencrypted to the ground station. The only thing needed is a C-Band or Ku-Band antenna which can read traffic. Sending traffic to a satellite for example is not needed in this case. The drones normally use MPEG-TS (MPEG Transport Stream) to send video and data to the ground station. Motions Imagery Standards Board (MISB) [2] has developed several standards on how to embed the control data into MPEG streams. Figure: Excerpt of metadata sent with the MPEG Transport Stream taken off a public MISB Standard document An important note is that our research shows that most if not all metadata inside the MPEG Stream is for its own not encrypted if the MPEG Stream itself is not encrypted.
  • 3. How to read the control data with publicly available tools During our research we found a suitable tool to read the mission control data off the air video feeds and also off saved video feeds. The tool is programmed by LEADTOOLS [3] and is capable of reading KLV metadata out of MPEG-TS. Inside the LEADTOOLS Multimedia SDK package a programmer finds source code and binaries of the needed tool. The following screenshot shows the tool in action. The loaded file is a saved MPEG-TS UAV video with private metadata embedded. References [1] Insurgents Hack U.S. Drones, Wall Street Journal http://online.wsj.com/article/SB126102247889095011.html [2] MISB, http://www.gwg.nga.mil/misb/stdpubs.html [3] LEADTOOLS, http://leadtools.com/SDK/Multimedia/mpeg2-transport-stream.htm