Predator drones hacked in Iraq operations

Moderators: Elvis, DrVolin, Jeff

Postby barracuda » Mon Dec 21, 2009 1:19 pm

Battlefield robot had security hole

Insurgents could steal video before local firm made fix

The same security weakness that allowed Iraqi insurgents to record video from unmanned US surveillance aircraft might also have let them spy on American battlefield robots produced by a local firm.

For years, Talon robots, made by Qinetiq North America Operations LLC in Waltham, transmitted analog video images without the encryption that scrambles signals to prevent them from being intercepted. As a result, videos from the robots could have been viewed and recorded by anybody with a laptop and a television receiver, including adversaries.

The US military has purchased more than 3,000 Talon robots. Many are used for video surveillance patrols in Iraq and Afghanistan.

Qinetiq officials said the security hole was plugged in 2007, when Talons received upgraded video equipment.

Last week, the Wall Street Journal reported that laptop computers belonging to captured Iraqi insurgents contained video images from US surveillance drones. The insurgents had used TV receiving gear and a cheap piece of software purchased on the Internet to record unencrypted video from the aircraft.

There’s no evidence that enemy forces actually tapped into video feeds from the Talon robots. But Eric Rosenbach, executive director of research at the Belfer Center for Science and International Affairs at Harvard University, expressed surprise that the military would ever transmit battlefield data over an insecure channel. “It’s common practice and standard operating procedure that any communication from the military is encrypted if it’s even remotely sensitive,’’ said Rosenbach, who served as an Army intelligence officer in Bosnia.

Bob Quinn, Qinetiq’s vice president of Talon robot operations, said that in 2007, the company refitted the robots with new digital video systems and added encryption. “Over 2,000 robots, in our case, have been upgraded,’’ Quinn said, but he added that the upgrade was not prompted in any way by concerns about spying.

Instead, the change was a consequence of the military’s efforts to reduce the terrible toll inflicted on US troops by roadside bombs in Iraq. Many of the bombs were detonated remotely by radio transmitters such as cellphones. The US Army responded by deploying Talon robots along key roadways to seek out the bombs and by equipping supply convoys with powerful radio jammers. The jammers created a sort of electronic bubble around the convoy, so that nearby radio-controlled bombs could not be detonated.

“The robots have to be able to work inside that protective electronic bubble,’’ said Quinn. But the jamming blocked the robots’ analog video signals, making them useless for surveillance. The 2007 digital video upgrade solved the problem and also ensured that insurgents couldn’t view the videos with conventional equipment.

Quinn said that there was never any risk that an enemy hacker could have taken command of a Talon, because the robot’s remote control system has always used an encrypted digital radio system. Letting a Talon come under enemy control could have deadly consequences, as some are equipped with remotely-controlled machine guns.

But just being able to see surveillance video could be very useful to an enemy. “It gives them the ability to know where and how the US is surveilling targets,’’ said Rosenbach. For instance, an insurgent could use intercepted video to warn his comrades that one of their “safe houses’’ was actually being watched by the Americans.

The US military has purchased thousands of robots from another Massachusetts company, iRobot Corp. of Bedford. Like the Qinetiq Talon, iRobot’s PackBot is frequently equipped with video cameras for surveillance work. But the company won’t say whether its video feeds are encrypted. IRobot spokeswoman Nancy Dussault-Smith said the company “does not comment on communications security or other operational security topics.’’
The most dangerous traps are the ones you set for yourself. - Phillip Marlowe
User avatar
barracuda
 
Posts: 12890
Joined: Thu Sep 06, 2007 5:58 pm
Location: Niles, California
Blog: View Blog (0)

Postby barracuda » Mon Dec 21, 2009 1:22 pm

The most dangerous traps are the ones you set for yourself. - Phillip Marlowe
User avatar
barracuda
 
Posts: 12890
Joined: Thu Sep 06, 2007 5:58 pm
Location: Niles, California
Blog: View Blog (0)

Postby American Dream » Sun Dec 27, 2009 12:24 am

http://antifascist-calling.blogspot.com ... mpire.html

Hackable Drones, Crumbling Empire


On the eve of the 2003 American invasion of Iraq, historian Chalmers Johnson observed in The Sorrows of Empire: "At this late date ... it is difficult to imagine how Congress, much like the Roman senate in the last days of the republic, could be brought back to life and cleansed of its endemic corruption."

Drawing striking analogies between the fall of the Roman republic and America's decline as a global capitalist power, Johnson wrote: "Failing such a reform, Nemesis, the goddess of retribution and vengeance, the punisher of pride and hubris, waits impatiently for her meeting with us."

Judging by the fragile state of American sociopolitical life, that meeting may not be as far off as most of us think.

America's Hackable Drones

In this light, it was hardly surprising to read in The Wall Street Journal last week that "Militants in Iraq have used $26 off-the-shelf software to intercept live video feeds from U.S. Predator drones, potentially providing them with information they need to evade or monitor U.S. military operations."

The Journal revealed that the Pentagon's "potential drone vulnerability lies in an unencrypted downlink between the unmanned craft and ground control." Investigative journalists Siobhan Gorman, Yochi Dreazen and August Cole disclosed that the "U.S. government has known about the flaw since the U.S. campaign in Bosnia in the 1990s."

But since feeding the corporatist beast, in this case General Atomics Inc., is priority number one for grifters in Congress, the problem was allowed to fester until the boil finally popped.

Considering that the Obama administration "has come to rely heavily on the unmanned drones" for imperial machinations across the entire Eurasian "Arc of Crisis" or any number of other "theaters" where the U.S. military and the corporate masters they serve, steal other people's resources (known as "Keeping America Safe" in our debased political lexicon), this news will probably come as quite a shock.

After all, we've been to led to believe that the heimat's occupying armies, like ancient Roman legionnaires, are "invincible."

But as the Journal reported "the stolen video feeds also indicate that U.S. adversaries continue to find simple ways of counteracting sophisticated American military technologies." (emphasis added)

Contemplate and savor that phrase, dear readers. While wags in the Pentagon Borg hive may believe "resistance is futile," insurgent hackers using off-the-shelf software and cheap, easy to rig antennas were able to determine, in real-time no less, tactical information transmitted to U.S. troops on the ground. As the Journal noted, unencrypted video feeds from drones in Afghanistan and Pakistan also "appear to have been compromised."

Another surveillance drone deployed both in Iraq and Afghanistan, the ScanEagle manufactured by Boeing subsidiary Insitu, is plagued by similar problems.

In a follow-up piece, the Journal reported that the ScanEagle "can stay aloft for 24 hours and carries electro-optical and infrared cameras up to an altitude of 16,000 feet."

But as with the Predator and Reaper attack drones, the ScanEagle's "video feed hasn't been encrypted," primarily "because military officials have long assumed no one would make the effort to try to intercept it."

An Insitu spokesperson told the Journal that the firm was in the "advanced stages of development of a technical solution for video data encryption for ScanEagle."

Writing in Wired For War, analyst P.W. Singer describes the "next generation of the Predator," the MQ-9 Reaper as "four times bigger and nine times more powerful" than its predecessor. Claiming that the attack drone comes "close to flying itself," Singer touts the ability of the aircraft to "recognize and categorize human and human-made objects. It can even make sense of the changes in the target it is watching, such as being able to interpret and retrace footprints or even lawn mover tracks."

"As of 2008," Singer informs us, "two Reaper prototypes were already deployed to Afghanistan" and we can presume Pakistan as well. Investigative journalist Jeremy Scahill revealed last month in The Nation that the mercenary firm Blackwater is working on the CIA and Joint Special Operations Command's "drone bombing program in Pakistan."

According to Scahill's military intelligence source, while CIA operations are subject to congressional oversight, "parallel JSOC bombing are not." The source told Scahill, "Contractors and especially JSOC personnel working under a classified mandate are not [overseen by Congress], so they just don't care. If there's one person they're going after and there's thirty-four people in the building, thirty-five people are going to die. That's the mentality."

What other "mentality" is operative here, particularly amongst journalists wowed by the technology but indifferent to the death and destruction they inflict on defenseless civilians? Aviation Week's Bill Sweetman told Singer when queried about Reaper deployments in the "Afpak" theater: "It may not be unreasonable to assume they are standing alert somewhere in case a certain high-priority target pops his head out of his cave."

Leaving aside Sweetman's dubious stab at humor, in light of last week's revelations one must ask, why bother to pop your head out of a cave, when a small, commercially-available satellite dish and a cheap laptop will do the trick? But what make these reports so telling is that "the Pentagon assumed local adversaries wouldn't know how to exploit it." Where have we heard that before? Dien Bien Phu? The Bay of Pigs? The "cakewalk" In Iraq, perhaps?

While history doesn't repeat, although tragedies and farces abound, the Joint Chiefs of Staff, and the giant defense firms who line their pockets upon retirement, as USA Today revealed last month, mix their whiskeys with net-centric kool-aid, and have staked their careers (and the lives of their economic conscripts and the victims of these indiscriminate drone attacks) on quixotic, dubious theories of robowar.

But with a U.S. Defense Department budget that tops $685 billion for fiscal year 2010, and considering that drones will account for a whopping 36% of the Air Force's acquisition budget, why would Pentagon policy planners assume otherwise? After all, how could a motley crew of shepherds, day laborers and "Saddam dead-enders" outfox America's mighty imperial army? How, indeed!

According to Air Force Times, although the Pentagon knew that UAV feeds were being hacked since 2008 and probably earlier, top Air Force generals, acceding to the wishes of their political masters in the Defense Department, notably former Secretary of Defense Donald Rumsfeld and his coterie of neocon yes-men, did nothing to upset the high-tech apple cart and sought instead to hit the corporate "sweet spot."

Former Air Force Secretary Michael Wynne was fired in 2008 when it was revealed that a B-52 Stratofortress bomber flew some 1,500 miles from Minot Air Force base in North Dakota to Barksdale Air Force base in Louisiana with nuclear-tipped cruise missiles fixed to its wings. Compounding the scandal, for nearly six hours the Air Force was unable to account for the weapons. Commenting on the hacked UAV drone feeds, Air Force Times disclosed:

Wynne took part in meetings with the Office of the Secretary of Defense in 2004 and 2005 about concerns with the links, but the consensus from the meetings was to field the UAVs as quickly as possible.

"I would say people were aware of it [the vulnerability], but it wasn't disturbing," Wynne said. "It wasn't yet dangerous; it certainly didn't disrupt an operation, so why make a huge deal of it?"
(Michael Hoffman, John Reed and Joe Gould, "Fixes on the Way for Nonsecure UAV Links," Air Force Times, December 20, 2009)

Meanwhile, former Air Force Chief of Staff General T. Michael Moseley, fired along with Wynne over the loose nuke incident, attended the same DoD conclave with his boss and capo tutti capo Rumsfeld. Moseley told the publication "his worry" was "about the security of the aircraft's datalinks."

"My question from the beginning was ... 'What is our confidence level that links are secure?' Not just the imaging that comes off, but also the command and flying links. The answer was 'We're working that' from the General Atomics folks," Moseley said.

San Diego-based General Atomics Inc., No. 36 on Washington Technology's "2009 Top 100 List of Prime Federal Contractors" is plush with revenue totaling $593,742,395. Major customers include the Navy, Air Force, Army, the Department of Homeland Security and NASA, and the bulk of their business these days comes from manufacturing the MQ-1 Predator and MQ-9 Reaper drones.

When queried by Journal reporters about the UAV's vulnerabilities, a company spokeswoman told the journalists that for "security reasons," the firm couldn't comment on "specific data link capabilities and limitations."

Could their lack of transparency have something to do perhaps with the fact that the Air Force plans to buy some 375 Reaper drones at a cost of some $10-12 million each? I guess they're "working that" too!

Other Systems Vulnerable

But the problem is worse, far worse than the Pentagon has acknowledged. Wired reported that "tapping into drones' video feeds was just the start."

Investigative journalists Noah Shachtman and Nathan Hodge disclosed that the "U.S. military's primary system for bringing overhead surveillance down to soldiers and Marines on the ground is also vulnerable to electronic interception, multiple military sources tell Danger Room." According to Wired, this means "militants have the ability to see through the eyes of all kinds of combat aircraft--from traditional fighters and bombers to unmanned spy planes."

The military initially developed the Remotely Operated Video Enhanced Receiver, or ROVER, in 2002. The idea was let troops on the ground download footage from Predator drones and AC-130 gunships as it was being taken. Since then, nearly every airplane in the American fleet--from F-16 and F/A-18 fighters to A-10 attack planes to Harrier jump jets to B-1B bombers has been outfitted with equipment that lets them transmit to ROVERs. Thousands of ROVER terminals have been distributed to troops in Afghanistan and Iraq.

But those early units were "fielded so fast that it was done with an unencrypted signal. It could be both intercepted (e.g. hacked into) and jammed," e-mails an Air Force officer with knowledge of the program. In a presentation last month before a conference of the Army Aviation Association of America, a military official noted that the current ROVER terminal "receives only unencrypted L, C, S, Ku [satellite] bands.
" (Noah Shachtman and Nathan Hodge, "Not Just Drones: Militants Can Snoop on Most U.S. Warplanes," Wired, December 17, 2009)

The Pentagon discovered this "problem" late last year when a Shiite militant's laptop "contained files of intercepted drone video feeds."

And last summer, unnamed "senior officials" told the Journal that the military found "days and days and hours and hours of proof" that video feeds from Predator drones, but also from other U.S. systems, including attack aircraft, were vulnerable to interception.

In a follow-up piece December 21, Shachtman reported that Air Force officers initially claimed the video intercepts "were no big deal." Why? Because "without the metadata to go along with, the footage was extremely hard to interpret."

"Well," Shachtman writes, "now it turns out that intercepting the metadata isn't much harder than tapping the video itself. Because 'there is also mission control data carried inside the satellite signal to the ground control stations,' according to an analysis carried by Wikileaks."

The Wikileaks document avers: "It is theoretically possible to read off this mission control data both in the intercepted video feed and saved video data on harddisks." This means that the "control and command link to communicate from a control station to the drone" and the "data link that sends mission control data and video feeds back to the ground control station," for both "line-of-sight communication paths and beyond line-of- sight communication paths" are hackable by whomever might be listening.

Indeed, "line-of-sight links are critical for takeoffs and landings of the drone. These links utilize a C-Band communication path." We are told that "beyond line-of-sight communication links operate in the Ku-Band satellite frequency. This allows the UAV to cover approx. 1500 miles of communication capability."

"So this explains somewhat" the analyst continues, "why the insurgents were able to intercept the Predator video feeds when they were sent unencrypted to the ground station." Therefore, "the only thing needed" by a savvy technoguerrilla "is a C-Band or Ku-Band antenna which can read traffic. Sending traffic to a satellite for example is not needed in this case."

"An important note," and what make Pentagon planners' assumptions about their adversaries all the more ludicrous "is that our research shows that most if not all metadata inside the MPEG Stream is for its own not encrypted if the MPEG Stream itself is not encrypted."

In other words Wired concludes, "everything, from target locations to drone headings to sensor angles can be pulled off of the satellite transmission, too." Shachtman writes, "the more this security breach is examined, the bigger it becomes."

And considering that an "unnamed senior official" told Journal reporters that the simple software package is "part of their kit now," is it only a matter of time before militant groups figure out how to hijack a drone and crash it, or even launch a Hellfire missile or two at a U.S. ground station?

We are told by military experts this is not possible; however, who would have thought that the Achilles heel of Pentagon robo warriors, blinded by their own arrogance and racist presumptions about the "Arab Mind" was something as simple as their own hubris.

The neocon Middle East Quarterly assures us that "Arab resentment of the West ... particularly in terms of the technology invasion" is "at every level," according to the absurdist meme of Raphael Patai, author of The Arab Mind, "a daily reminder of the inability of the Middle East to compete."

Claiming that the "Arab view of technology" reflects an inherent "cultural weakness" that "has been amply supported over the last decades," we are told that "Arabs" while "clearly enthusiastic users of technology, particularly in war weaponry ... nevertheless remain a lagging producer of technology."

Indeed, Patai's book is assigned reading at the John F. Kennedy Special Warfare School. Col. Norvell B. De Atkine, an instructor in Middle East studies, informs us that in order "to begin a process of understanding the seemingly irrational hatred that motivated the World Trade Center attackers, one must understand the social and cultural environment in which they lived and the modal personality traits that make them susceptible to engaging in terrorist actions."

Col. De Atkine avers "at the institution where I teach military officers, The Arab Mind forms the basis of my cultural instruction."

Judging by the coverage in corporate media, endlessly repeating similar imperial tropes, this hilarious security breach, one I might add of the Pentagon's own creation, has come as quite a shock. It shouldn't have. After all, the same "hajis" who were able to grind the American military machine to a halt by their imaginative use of decades' old ordnance, garage door openers (!) and cell phones fabricated into IEDs have created a "Revolution in Military Affairs" (RMA) of their own.

Talk about unintended consequences!

Net-Centric Warfare, Meet the Countermeasures!

Dr. Andrew Marshall, the Director of the Defense Department's Office of Net Assessment, defines RMA as "a major change in the nature of warfare brought about by the innovative application of new technologies which, combined with dramatic changes in military doctrine and operational and organizational concepts, fundamentally alters the character and conduct of military operations."

But as Durham University professor of geography Stephen Graham points out, in light of the Iraq debacle, RMA theorists sought to get a handle on complex urban geographies to attain what they believed would be "Persistent Area Dominance" through the use of satellites, drones and an array of sensors "networked" onto the battlefield. Graham writes:

The first involves programmes designed to saturate such cities with myriads of networked surveillance systems. ...

This leads neatly to the second main area of defence research and development to help assert the dominance of US forces over global south cities: a shift towards robotic air and ground weapons. When linked to the persistent surveillance and target identification systems ... these weapons will be deployed to continually and automatically destroy purported targets in potentially endless streams of state killing. Here, crucially, fantasies of military omniscience and omnipotence, which blur seamlessly into wider sci-fi and cyberpunk imaginations of future military technoscience, become indistinguishable from major US military research and development programmes. The fantasies of linking sentient, automated and omnipotent surveillance--which bring God-like levels of 'situational awareness' to US forces attempting to control intrinsically devious global south megacities--to automated machines of killing, pervades the discourses of the urban turn in the RMA.
(Stephen Graham, "Surveillance, urbanization, and the 'Revolution in Military Affairs'," in David Lyon (ed) Theorizing Surveillance: The Panopticon and Beyond, London: Willan, 2006, pp. 251, 254-255)

But what happens when global resistance forces get a handle on the game America and their allies are playing and begin leveraging the weaknesses of such systems, not of least of which are the ideological blind spots plaguing their developers, into a wholly subversive high-tech détournement in a bid to level the playing field?

This is no idle speculation, but rather a possible glimpse into the future of what has been called by military theorists "asymmetric warfare." The classic examples of this type of uneven combat between states and insurgent forces are the various communist guerrilla armies that toppled colonial or neocolonial governments backed by the United States, e.g. China, Vietnam, Cuba, Angola, Zimbabwe, Nicaragua.

Today however, the same "persistent surveillance and target identification systems" that have seemingly given the U.S. military an edge over their adversaries, e.g. the development of robotic killing machines capable of "compressing the kill chain" as Airforce Magazine describes the process in near pornographic terms fail to mention that "in Iraq," as Stephen Graham reminds us, "even rudimentary high-tech devices have routinely failed due to technical malfunctions or extreme operating conditions."

As a result of Pentagon-sponsored research, contemporary military operations aim for "defined effects" through "kinetic" and "non-kinetic" means: leadership decapitation through preemptive strikes combined with psychological operations designed to pacify (terrorize) insurgent populations. This deadly combination of high- and low tech tactics is the dark heart of the Pentagon's Unconventional Warfare doctrine.

But as Graham points out, the "often wild and fantastical discourses" of high-tech military theorists have run into a brick, not a silicon, wall: the will to resist. Graham writes: "The relatively high casualty rates of US forces--forced to come down from 40,000 ft, or withdraw from ceramic armour, to attempt to control and 'pacify' violent insurgencies within sprawling Iraqi cities--are a testament to the dangerous wishful thinking that pervades all military fantasies of 'clean', 'automated' or 'cyborganized' urban 'battlespace'."

Nevertheless, such fantasies persist and will continue to drive military spending and American strategies of conquest even as imperialism's political project goes to ground.

And so we return to Chalmers Johnson's warning. "We are on the cusp of losing our democracy" Johnson laments, "for the sake of keeping our empire."

"Once a nation is started down that path" the historian cautions, "the dynamics that apply to all empires come into play--isolation, overstretch, the uniting of forces opposed to imperialism, and bankruptcy.

Barring a dramatic transformation of American economic, political and social relations, not the ersatz "change" promised by the current regime, a rank mendacity that amounts to little more than a band-aid over gangrene, "Nemesis stalks our life as a free nation."
American Dream
 
Posts: 19946
Joined: Sat Sep 15, 2007 4:56 pm
Location: Planet Earth
Blog: View Blog (0)

Postby barracuda » Sun Dec 27, 2009 1:36 am

UAV operators suffer war stress

MARCH AIR RESERVE BASE, Calif. — The Air National Guardsmen who operate Predator drones over Iraq via remote control, launching deadly missile attacks from the safety of Southern California 7,000 miles away, are suffering some of the same psychological stresses as their comrades on the battlefield.

Working in air-conditioned trailers, Predator pilots observe the field of battle through a bank of video screens and kill enemy fighters with a few computer keystrokes. Then, after their shifts are over, they get to drive home and sleep in their own beds.

But that whiplash transition is taking a toll on some of them mentally, and so is the way the unmanned aircraft’s cameras enable them to see people getting killed in high-resolution detail, some officers say.

In a fighter jet, “when you come in at 500-600 mph, drop a 500-pound bomb and then fly away, you don’t see what happens,” said Col. Albert K. Aimar, who is commander of the 163rd Reconnaissance Wing here and has a bachelor’s degree in psychology. But when a Predator fires a missile, “you watch it all the way to impact, and I mean it’s very vivid, it’s right there and personal. So it does stay in people’s minds for a long time.”

He said the stresses are “causing some family issues, some relationship issues.” He and other Predator officers would not elaborate.

But the 163rd has called in a full-time chaplain and enlisted the services of psychologists and psychiatrists to help ease the mental strain on these remote-control warriors, Aimar said. Similarly, chaplains have been brought in at Predator bases in Texas, Arizona and Nevada.

The North Dakota Air National Guard wing in Fargo flew its first Predator mission overseas last year. The Grand Forks Air Force Base also is getting an unmanned aircraft mission, and the University of North Dakota is preparing to provide Predator training.

In interviews with five of the dozens of pilots and sensor operators at the various bases, none said they had been particularly troubled by their mission, but they acknowledged it comes with unique challenges, and sometimes makes for a strange existence.

“It’s bizarre, I guess,” said Lt. Col. Michael Lenahan, a Predator pilot and operations director for the 196th Reconnaissance Squadron here. “It is quite different, going from potentially shooting a missile, then going to your kid’s soccer game.”

Among the stresses cited by the operators and their commanders: the exhaustion that comes with the shift work of this 24-7 assignment; the classified nature of the job that demands silence at the breakfast table; and the images transmitted via video.

A Predator’s cameras are powerful enough to allow an operator to distinguish between a man and a woman, and between different weapons on the ground. While the resolution is generally not high enough to make out faces, it is sharp, commanders say.
The most dangerous traps are the ones you set for yourself. - Phillip Marlowe
User avatar
barracuda
 
Posts: 12890
Joined: Thu Sep 06, 2007 5:58 pm
Location: Niles, California
Blog: View Blog (0)

Re: Predator drones hacked in Iraq operations

Postby justdrew » Wed Aug 25, 2010 11:56 pm

remember this?
Afghanistan war logs: Out-of-control drone shot down by US jet plane before it flew into Tajikistan
Source: Wikileaks war diaries
Date 2009-09-13 02:17:00
Type Non-Combat Event
Category Equipment Failure
Tracking no. 42SXG25489672552009-09#1296.01
Title (NON-COMBAT EVENT) EQUIPMENT FAILURE RPT ISAF HQ : 0 INJ/DAM
Summary An F15 was ordered to shoot down a REAPER UAV that had lost its control link in the south of Afghanistan. All efforts were made to re-establish the link before a decision was made to shoot the UAV down prior it crossing into TAJIKISTAN. The CAOC selected an unpopulated area over which to down the aircraft. An F15 fired on the REAPER and it destroyed its engine, however the link was re-established and the controller was able to guide it into a mountain in RAGH District. The GRID of the downed REAPER is Lat 3738.64N Long 07025.345E // Keypad: 97cs9. There were no sensitive items on board the REAPER but it did go down with its ordnance (Hellfire and GBU-12). NFTR.


now...

Navy drone wanders into restricted D.C. airspace
Aug. 2. incident involves out-of-control surveillance helicopter
An out-of-control Navy drone entered into restricted airspace around the U.S. capital earlier this month, according to media and government reports.

An unmanned Fire Scout helicopter — about 31 feet long and 10 feet high — was on a test flight when the incident occurred on Aug. 2, the Navy Times reported.

Some 75 minutes into the routine flight, Navy operations in Maryland lost control of the aircraft and it eventually wandered 23 miles on a north-by-northwest course into the restricted airspace surrounding Washington, D.C.

Operators were able to shift to another ground control station, get the helicopter under control, and return it to Webster Field in southern Maryland, according to a Navy statement. There were no injuries or damage to the aircraft.

After the incident, all six of the Navy’s Fire Scouts were grounded and an inquiry was started into what went wrong. The Navy called the problem a "software issue," The New York Times reported.

“When they lose contact with the Fire Scout, there’s a program that’s supposed to have it immediately return to the airfield to land safely. That did not happen as planned,” Cmdr. Danny Hernandez, a Navy spokesman, said.

The Fire Scout is designed as a surveillance aircraft that can take off from Navy warships. It has been used in the past for drug busts in Central America.

Incursions into the protected airspace around the nation's capital are not uncommon, according to the General Accounting Office, but most involve civilian aircraft.
By 1964 there were 1.5 million mobile phone users in the US
User avatar
justdrew
 
Posts: 11966
Joined: Tue May 24, 2005 7:57 pm
Location: unknown
Blog: View Blog (11)

Previous

Return to General Discussion

Who is online

Users browsing this forum: No registered users and 176 guests