Israeli Drone Hacked By Five Eyes Intelligence

IAI Heron, an unmanned aerial vehicle developed by the Malat (UAV) division of Israel Aerospace Industries

British and American spies collected live video from Israeli drones as part of a classified program code-named “Anarchist,” which operated from a mountaintop listening post on the Mediterranean island of Cyprus.

Among the files provided by former National Security Agency contractor Edward Snowden are a series of “snapshots” from Israeli drone feeds, which offer a rare glimpse at the closely guarded secret of Israel’s drone fleet.

The images show several different types of unmanned planes, including what appear to be rare public images of Israeli drones carrying missiles. Although Israeli drone strikes have been widely reported, officially the government refuses to confirm the use of armed drones.

These and other images from Anarchist will be on view as part of Intercept co-founder Laura Poitras’ solo exhibition at the Whitney Museum of American Art in New York. 

On January 28, 2010, GCHQ analysts on Cyprus captured six minutes of video from what appears to be a Heron TP, a giant drone manufactured by the state-owned Israel Aerospace Industries (IAI).

In a snapshot still from the video, a large missile-shaped object is clearly visible on the left side. A GCHQ report mentions “regular collects of Heron TP carrying weapons” in 2009. A very similar image, likely from the same intercept, is named Heron_TP_Payload. 

“It certainly looks like the missile-shaped objects are weapons,” said Bill Sweetman, an editor at Aviation Week. “The bodies appear to have cruciform tail fins. The distortion makes it a bit to hard to tell size but — assuming they are bombs — these are definitely less than 500-pound class.”

He added that because the Heron-TP is an Israeli strategic intelligence system, the objects could be decoys, used to “force a response from Iran’s air defenses, while the UAV orbits and hoovers up signals.”

The Intercept

« Creating A Working Culture Of Computer Security (£)
Super High-Speed Internet »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

QATestLab

QATestLab

QATestLab is a leading International software testing company offering a full range of software testing services including security testing.

CyberSource

CyberSource

CyberSource provides online payment and fraud management services for medium and large-sized merchants.

App-Ray

App-Ray

App-Ray provides fully automated security analysis of mobile applications to find security issues, privacy breaches and data leaking potentials.

Careers in Cyber Security (CiCS)

Careers in Cyber Security (CiCS)

CareersinCyberSecurity is a leading global job board and career resource for Cyber Security, IT Audit, Technology Risk and Data Protection professionals.

Cyber Security Specialists

Cyber Security Specialists

Cyber Security Specialists Limited provide Security services across a wide range of markets, from multi-national Corporate Organisations and Government Agencies, through to smaller Businesses.

QOMPLX

QOMPLX

QOMPLX integrate, contextualize, and analyze data from virtually any source to help you identify operational risk and inefficiencies throughout the enterprise.

AXA XL

AXA XL

AXA XL is the P&C and Specialty Risk Division of AXA. Professional insurance products include Cyber Insurance.

Farsight Security

Farsight Security

Farsight Security provides the world’s largest real-time actionable threat intelligence on how the Internet is changing.

Radically Open Security

Radically Open Security

Radically Open Security is the world's first not-for-profit computer security consultancy company.

Nominet

Nominet

Nominet's cyber division offers network detection and response services to governments and enterprises worldwide.

Kingston Technology

Kingston Technology

Kingston is a leading global manufacturer of memory and storage solutions including encrypted storage solutions to protect data inside and outside the firewall.

CertiProf

CertiProf

CertiProf has been enhancing professional lives since 2015, offering a wide range of IT certifications and agile framework training.

Avrem Technologies

Avrem Technologies

Avrem Technologies is a business IT and cybersecurity consulting firm. We design, implement, manage and monitor the networks, servers, computers and software that our clients rely on each day.

Schillings

Schillings

Shillings defends your rights to privacy, reuptation and security. We fight passionately against breaches of your privacy, attacks on your reputation and threats to your security.

G-71

G-71

G-71 LeaksID is a cutting-edge ITM technology aimed at safeguarding sensitive documents from insider threats.

InnovateHer

InnovateHer

At InnovateHer, our vision is to make the tech sector more equitable, by increasing diversity across the spectrum and creating more inclusive workplaces.