Israeli Drone Hacked By Five Eyes Intelligence

IAI Heron, an unmanned aerial vehicle developed by the Malat (UAV) division of Israel Aerospace Industries

British and American spies collected live video from Israeli drones as part of a classified program code-named “Anarchist,” which operated from a mountaintop listening post on the Mediterranean island of Cyprus.

Among the files provided by former National Security Agency contractor Edward Snowden are a series of “snapshots” from Israeli drone feeds, which offer a rare glimpse at the closely guarded secret of Israel’s drone fleet.

The images show several different types of unmanned planes, including what appear to be rare public images of Israeli drones carrying missiles. Although Israeli drone strikes have been widely reported, officially the government refuses to confirm the use of armed drones.

These and other images from Anarchist will be on view as part of Intercept co-founder Laura Poitras’ solo exhibition at the Whitney Museum of American Art in New York. 

On January 28, 2010, GCHQ analysts on Cyprus captured six minutes of video from what appears to be a Heron TP, a giant drone manufactured by the state-owned Israel Aerospace Industries (IAI).

In a snapshot still from the video, a large missile-shaped object is clearly visible on the left side. A GCHQ report mentions “regular collects of Heron TP carrying weapons” in 2009. A very similar image, likely from the same intercept, is named Heron_TP_Payload. 

“It certainly looks like the missile-shaped objects are weapons,” said Bill Sweetman, an editor at Aviation Week. “The bodies appear to have cruciform tail fins. The distortion makes it a bit to hard to tell size but — assuming they are bombs — these are definitely less than 500-pound class.”

He added that because the Heron-TP is an Israeli strategic intelligence system, the objects could be decoys, used to “force a response from Iran’s air defenses, while the UAV orbits and hoovers up signals.”

The Intercept

« Creating A Working Culture Of Computer Security (£)
Super High-Speed Internet »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Ascentor

Ascentor

Ascentor specialises in independent information and cyber security consultancy. We’re experienced industry experts, providing cyber security services since 2004.

Torsion Information Security

Torsion Information Security

Torsion is an innovative information security and compliance engine, which runs either in the cloud or your data centre.

TrainACE

TrainACE

TrainACE, is a professional computer training school offering courses in information technology with a focus on Advanced Security training.

Modulo Security

Modulo Security

Modulo provides automated Governance, Risk, and Compliance (GRC) solutions.

Emsisoft

Emsisoft

Emsisoft protects your devices against all types of malware, ransomware and other threats with no-bloat anti-malware & antivirus solutions.

Odyssey

Odyssey

Odyssey is an ISO 27001 certified, Cyber -Security, Infrastructure and Risk Management Solutions integrator and a Managed Security Services Provider.

Corvus Insurance

Corvus Insurance

Corvus' mission is to create a safer, more productive world through technology-enabled commercial insurance.

Coveware

Coveware

Coveware helps businesses remediate ransomware. We help companies recover after files have been encrypted, and our analytic, monitoring and alerting tools help companies prevent ransomware incidents.

Xopero Software

Xopero Software

Xopero Software develops a comprehensive range of professional tools for protecting and restoring critical business data.

Eunetic

Eunetic

Eunetic IT security solutions - we secure your websites, emails, domains and data.

SignalFire

SignalFire

SignalFire invest across both enterprise and consumer sectors at the seed and early growth stages.

Moro Hub

Moro Hub

Moro Hub, a subsidiary of Digital DEWA, is a UAE-based digital data hub focused on digital transformation and operational services.

Zama

Zama

Zama - pioneering homomorphic encryption. We believe people shouldn't care about privacy. Not because it doesn't matter, but because it shouldn't be an issue!

Frontal

Frontal

Frontal is a specialized unit in Blockchain and Web3.0 cybersecurity. Securing Digital Assets, Cryptocurrency, DeFi, Blockchain and Web3.0 ecosystem.

Fusion5

Fusion5

Fusion5 is a leading ANZ Business Services and IT Solutions provider. Our customers trust us to make their potential reality by providing advisory, IT project deployment, and managed services.

Konsulko Group

Konsulko Group

Konsulko Group offers embedded Linux software and hardware development and Yocto Project services.