Israeli Drone Hacked By Five Eyes Intelligence

IAI Heron, an unmanned aerial vehicle developed by the Malat (UAV) division of Israel Aerospace Industries

British and American spies collected live video from Israeli drones as part of a classified program code-named “Anarchist,” which operated from a mountaintop listening post on the Mediterranean island of Cyprus.

Among the files provided by former National Security Agency contractor Edward Snowden are a series of “snapshots” from Israeli drone feeds, which offer a rare glimpse at the closely guarded secret of Israel’s drone fleet.

The images show several different types of unmanned planes, including what appear to be rare public images of Israeli drones carrying missiles. Although Israeli drone strikes have been widely reported, officially the government refuses to confirm the use of armed drones.

These and other images from Anarchist will be on view as part of Intercept co-founder Laura Poitras’ solo exhibition at the Whitney Museum of American Art in New York. 

On January 28, 2010, GCHQ analysts on Cyprus captured six minutes of video from what appears to be a Heron TP, a giant drone manufactured by the state-owned Israel Aerospace Industries (IAI).

In a snapshot still from the video, a large missile-shaped object is clearly visible on the left side. A GCHQ report mentions “regular collects of Heron TP carrying weapons” in 2009. A very similar image, likely from the same intercept, is named Heron_TP_Payload. 

“It certainly looks like the missile-shaped objects are weapons,” said Bill Sweetman, an editor at Aviation Week. “The bodies appear to have cruciform tail fins. The distortion makes it a bit to hard to tell size but — assuming they are bombs — these are definitely less than 500-pound class.”

He added that because the Heron-TP is an Israeli strategic intelligence system, the objects could be decoys, used to “force a response from Iran’s air defenses, while the UAV orbits and hoovers up signals.”

The Intercept

« Creating A Working Culture Of Computer Security (£)
Super High-Speed Internet »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Kaseya

Kaseya

Kaseya is a premier provider of unified IT management and security software for managed service providers (MSPs) and small to medium-sized businesses (SMBS).

MetricStream

MetricStream

MetricStream provide integrated GRC solutions across business, IT, and security functions.

National Information Security & Safety Authority (NISSA) - Libya

National Information Security & Safety Authority (NISSA) - Libya

NISSA is responsible for safeguarding the integrity, availability and resilienceof ICT infrastructure, resources, services and data in Libya.

Haystax Technology

Haystax Technology

Haystax’s security analytics platform applies artificial intelligence techniques to identify and prioritize threats in real time.

e-Crime Bureau

e-Crime Bureau

e-Crime Bureau is a specialized company offering cyber/computer forensics, cyber security consulting services, forensic audit and investigations services and training to clients across Africa.

TUV Rheinland Group

TUV Rheinland Group

TUV Rheinland Group is a testing services company with nearly 145 years of technological experience. We help you to protect your systems comprehensively, proactively and permanently.

Very Good Security (VGS)

Very Good Security (VGS)

VGS is the modern approach to data security. Our SaaS solution gives you all the benefits of interacting with sensitive and regulated data without the liability of securing it.

North European Cybersecurity Cluster (NECC)

North European Cybersecurity Cluster (NECC)

NECC promotes information security and cybersecurity-related cooperation and collaboration in the Northern European region in order to enhance integration into the European Digital Single Market.

Seekurity

Seekurity

Seekurity is an information security consulting firm specialized in all areas of Cyber Security including Penetration Testing, Vulnerability Assessments and Risk Management.

Kentik

Kentik

Kentik - one platform for Network Visibility, Performance, and Security.

CAT Labs

CAT Labs

CAT Labs is building digital asset recovery and cybersecurity tools to enable governments to fight crypto crime and to protect investors from hacks, fraud and scams.

Var Group

Var Group

Var Group is one of the main partners for innovation in the ICT sector in Italy.

PRE Security

PRE Security

PRE Security is leading the transition into the next era of AI cybersecurity with a new model: Predict & Prevent.

NeuroID

NeuroID

NeuroID combines the power of industry-leading behavioral analytics with advanced device and network intelligence to create your first line of defense against malicious bots, bad actors, and fraud.

Cynch Security

Cynch Security

Cynch Security are passionate about building a world where every business is resilient to cybersecurity risks, no matter what their size.

Infodot Technologies

Infodot Technologies

Infodot Technologies specialize in a co-managed IT support and services approach, where businesses share their IT responsibilities with a skilled Managed IT Services Provider (MSP).