Blown To Bits

How Much Did We Pay for These Drones?

Thursday, December 17th, 2009 by Harry Lewis
According buy cheapest artane to the American Psychiatric Nurse Association, PMHNs may work with order natural allopurinol no prescription individuals, groups, families, and communities. Evidence suggests that lymphocytic colitis vibramycin for order does not increase a person's risk of developing colon cancer. buy free prozac best price jelly Drinking more than two drinks per day can increase the quinine for order risks of various postoperative complications. Although a high lymphocyte count buy cheap nexium online can indicate chronic lymphocytic leukemia, it can also occur due discount diclofenac without prescription to other conditions. The app allows people to record their best price cialis migraine episode frequency and duration, pain location and intensity, symptoms order cheap (metacam) online including migraine aura, and medications. Doctors treat the underlying causes cialis approved of stomach ulcers to help them heal and prevent them cheapest accutane from returning. A radiologist will review the scans, interpret the buying cheapest zoloft effects results, and send a report to the ordering physician. While clonidine sale vegetables and other plant foods may contain ALA, the body cialis for order cannot use it as readily as DHA or EPA. To learn.

Incredibly, the signals between the unmanned drones being used in Iraq and Afghanistan and their base stations are transmitted in the clear — unencrypted. The insurgents have figured that out and are watching the same scenes that our military is watching. The Wall Street Journal says the system has been “hacked,.” Not really — no more, as a colleague put it to me, than someone who buys a police scanner is “hacking” the police radio system.

Encrypting signals is easy, obvious, and taken for granted. How could the system have been designed and deployed without it?

3 Responses to “How Much Did We Pay for These Drones?”

  1. Alan Fekete Says:

    See the more sophisticated discussion by Bruce Schneier at http://www.schneier.com/blog/archives/2009/12/intercepting_pr.html This points to the mix of bureaucratic rules and tradition, as well as technology.

  2. Harry Lewis Says:

    Thanks for that link, Alan. Schneier makes a good argument, though its details are challenged a bit in the comment thread. As one who has never experienced the command and control of a military operation, I’ll gladly defer to those who have.

  3. Chris Bush Says:

    Encryption is easy. However, you must understand that there are times when operations has a need over security. Encryption takes time and resources that would hinder the performance of drones out in the battle field. I take it that the one making the decision to have the drones communicate in the clear was taking that in to account.

    Have you ever seen a movie called the hitchhikers guide to the rest of the galaxy? If you have, then you might recall a race of people who put policy and paper work over operations. As a result, their units performed poorly. This is do to the long waits for the paper work to come in. I liken this wait to the encrypt/decrypt time secure communication requires. Now to go in the clear is a mission by mission and case by case decision.I assume not every drone mission is unencrypted. All and all, as CPU power increases, the benefits of going in the clear will decrease. Until that day, one must have a balance of security and operations.

    The views expressed in this posts are the authors and do not represent the views of the United States Navy or the United States Department of Defense.