1. crypto gear? any encryption/decryption would be done at the connection level between the drone and receiver. it would most likely just be firmware built in to the system to encrypt the data link. encryption is no longer a time-consuming process, especially with the speed of today's processors. there would be no need to carry anything extra.FEOS wrote:
1. The video link goes to ground forces, many/most of whom do not carry crypto gear with them
2. Cost/benefit analysis: what's the likelihood of the adversary intercepting it and being able to use it to their purposes (it took 6 years)
3. How much benefit does it really give the bad guys? Jury's still out on that one
It's kind of like the other "hacking" stories in the news: So what? The relevance of the story (to the reporter) is that it happened...the true impact/value of what was taken is never really questioned/investigated by the reporter.
Edit: FEOS' opinion: it should've been encrypted with at least non-mil encryption. By the time the bad guys decrypted it, it wouldn't have any value and the ground forces could use commercially-available IT encryption tools.
2. cost/benefit? if the insurgents can download software from the internet to intercept our feeds, what do you think china has the capability to do? this is a major oversight on the part of whomever made the decision not to use encryption. it's flat-out embarrassing to be honest. our billions of dollars of research has been foiled by 25 dollar shareware.
3. it could be a huge benefit to an enemy! did you not read the article? it has already provided an advantage to the insurgents, giving them the ability to know where we are and see the advance of friendly forces.
all low altitude, surveillance uav flights need to be grounded until they encrypt the video feed.