So let's get one thing straight. To use "Twitter"vernacular, I would absolutely label this as a . How did this happen? The Raptor system is often touted as one of the key components of the future of the military. Unmanned drones that can be controlled from thousands of miles away. They allow our military personnel to safely (because they can be thousands of miles away) either perform reconaissance missions and/or blow stuff up. Very cool when you think about it. Too bad the system got hacked with a piece of software you can buy for less than $30. You heard me. Less than $30. Did I mention the Predator costs $4 million a pop?
So how did this happen? Quite simply actually (don't forget, the application cost less than $30). The data connection between the command center and the Predator was not encrypted from end to end, specifically the connection back to the control center. Let me retweet and say #Fail.
This makes me think about how mobile security is critical to whatever application is being used, whether it's blowing people up (assuming you're doing that legally) or just sending email. Mobility is a beautful thing. We all know how it can provide so much flexibility and so many benefits to a workforce and the organization the people are working for. However, organizations - including the military - need to always think about security. Device encryption is great, but not enough. Encryption must exist throughout the connection between the mobile device (or $4 million machine of death) and the back end infrastructure that it is connecting to, as well as the people who are using those solutions.
In fact, this makes me think about how it's not just end to end encryption that we should be talking about, but end to end to end...back end, remote device and operator.