Tag Archives: Suite B

“US Drones Hacked” says Wall Street Journal — What happens next?

In the 17 December 2009 issue of the Wall Street Journal, the front page article discusses how Shiite insurgents in Iraq have used commercial-off-the-shelf software to intercept and utilize sensitive reconnaissance videos to coordinate their movements and assess the threat of US forces in their strongholds.

This article asks the primary question we should all ask of those executing war strategy and tactics in Iraq: “How were such critical information assets fielded without encryption?” However, there are larger and even more far-reaching questions about the incident that were not asked in this article. This response intends to ask those questions and share them with our systems integrator and Government customers, as these are some of the same questions CPU Tech asked ourselves in developing our secure and anti-tamper processor devices for sensitive data operations. Continue reading