Israeli Drone Hacked By Five Eyes Intelligence

IAI Heron, an unmanned aerial vehicle developed by the Malat (UAV) division of Israel Aerospace Industries

British and American spies collected live video from Israeli drones as part of a classified program code-named “Anarchist,” which operated from a mountaintop listening post on the Mediterranean island of Cyprus.

Among the files provided by former National Security Agency contractor Edward Snowden are a series of “snapshots” from Israeli drone feeds, which offer a rare glimpse at the closely guarded secret of Israel’s drone fleet.

The images show several different types of unmanned planes, including what appear to be rare public images of Israeli drones carrying missiles. Although Israeli drone strikes have been widely reported, officially the government refuses to confirm the use of armed drones.

These and other images from Anarchist will be on view as part of Intercept co-founder Laura Poitras’ solo exhibition at the Whitney Museum of American Art in New York. 

On January 28, 2010, GCHQ analysts on Cyprus captured six minutes of video from what appears to be a Heron TP, a giant drone manufactured by the state-owned Israel Aerospace Industries (IAI).

In a snapshot still from the video, a large missile-shaped object is clearly visible on the left side. A GCHQ report mentions “regular collects of Heron TP carrying weapons” in 2009. A very similar image, likely from the same intercept, is named Heron_TP_Payload. 

“It certainly looks like the missile-shaped objects are weapons,” said Bill Sweetman, an editor at Aviation Week. “The bodies appear to have cruciform tail fins. The distortion makes it a bit to hard to tell size but — assuming they are bombs — these are definitely less than 500-pound class.”

He added that because the Heron-TP is an Israeli strategic intelligence system, the objects could be decoys, used to “force a response from Iran’s air defenses, while the UAV orbits and hoovers up signals.”

The Intercept

« Creating A Working Culture Of Computer Security (£)
Super High-Speed Internet »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CERT-FR

CERT-FR

CERT-FR is the French national government computer security incident response team.

Future of Cyber Security Europe

Future of Cyber Security Europe

Future of Cyber Security Europe is a European wide event examining the latest cyber security strategies and technologies.

CyberSeek

CyberSeek

CyberSeek provides detailed, actionable data about supply and demand in the cybersecurity job market.

Me Learning

Me Learning

Me Learning provides engaging, informative and clearly explained learning materials for complex and challenging professional environments in areas including GDPR and Information Governance.

Cervello

Cervello

Cervello is a leading provider of comprehensive and proven solutions to protect railways against cyber attacks.

Ashley Page

Ashley Page

Ashley Page offer a unique cyber insurance and risk management solution - Cyber+Insure.

K2 Cyber Security

K2 Cyber Security

K2 Cyber Security delivers the Next Generation Application Workload Protection Platform to secure web applications and container workloads against sophisticated attacks.

Eureka Technology Partners

Eureka Technology Partners

Eureka Technology Partners are committed to helping you focus on your business by taking care of your IT infrastructure and data security needs.

Center for Infrastructure Assurance and Security (CIAS)

Center for Infrastructure Assurance and Security (CIAS)

CIAS is developing the world's foremost center for multidisciplinary education and development of operational capabilities in the areas of infrastructure assurance and security.

Pentest Limited

Pentest Limited

Pentest Limited provide information security consultation, penetration testing & red teaming services to companies across the globe.

Periculus

Periculus

Periculus makes managing digital risk simple. Its integrated platform offers access to purchase cyber insurance and cyber security solutions uniquely tailored to fit the needs of every business.

Coviant Software

Coviant Software

Coviant Software delivers secure managed file transfer (MFT) software that integrates smoothly and easily with business processes.

Zorus

Zorus

Zorus provides best-in-class cybersecurity products to MSP partners to help them grow their business and protect their clients.

OSP Cyber Academy

OSP Cyber Academy

OSP Cyber Academy are a managed service provider of cyber, information security and data protection training.

Kong

Kong

Kong - powering the API world. Increase developer productivity, security, and performance at scale with the unified platform for API management, service mesh, and ingress controller.

Codenotary

Codenotary

Codenotary provide a comprehensive suite of verification and enforcement services to guarantee the integrity of your software throughout its entire lifecycle.