Hacking the Tracking Point via WiFi

Of course no one is terribly worried because hardly anyone can afford it. LOL

I wouldn't be surprised if there are a few in service somewhere. As the Iranian's amply demonstrated by taking over one of our most advanced and secret UAVs and safely landing it within their country, electronic warfare is no long only the domain of countries like the US, Russia, China, and Israel.

Every device the US fields needs to be looked at from the perspective of its vulnerabilities to hacking or data leakage. During the first few years of the GWOT, Predator UAVs did not even encrypt their video feeds.
 
what sort of idiot engineer uses a standard WiFi connection for such a weapon? Of COURSE it can be jammed. Why not a custom Xband or millimeter wave frequency data link using antijam frequency hopping or bandwidth spreading by coding? Or is that TOO MUCH TO ASK for a $13,000 riffle?

Heck, even a high gain antenna boresighted on the target and a 1 watt transmitter should make quick work out of any routine jammer.
 
Because then you can't link it to a piece of COTS hardware like an ipad or iphone. (I'm not saying this is important. But it created a lot of sizzle when gun reporters could watch the shot real time on an ipad)

It would be one thing if all that could be done was jam the connection. But the core operating logic is accessible from an in-bound connection via unencrypted Wi-Fi, which allows the hackers to introduce errors into the calcs by changing critical information like bullet weight or BC.

It would seem that something as simple as requiring WPA2 encryption for all WiFi connectivity would mitigate the problem although it wouldn't solve the structural problem of presenting the logical part of the software to an inbound WiFi connection.
 
Back
Top Bottom