Israeli Drone Hacked By Five Eyes Intelligence

IAI Heron, an unmanned aerial vehicle developed by the Malat (UAV) division of Israel Aerospace Industries

British and American spies collected live video from Israeli drones as part of a classified program code-named “Anarchist,” which operated from a mountaintop listening post on the Mediterranean island of Cyprus.

Among the files provided by former National Security Agency contractor Edward Snowden are a series of “snapshots” from Israeli drone feeds, which offer a rare glimpse at the closely guarded secret of Israel’s drone fleet.

The images show several different types of unmanned planes, including what appear to be rare public images of Israeli drones carrying missiles. Although Israeli drone strikes have been widely reported, officially the government refuses to confirm the use of armed drones.

These and other images from Anarchist will be on view as part of Intercept co-founder Laura Poitras’ solo exhibition at the Whitney Museum of American Art in New York. 

On January 28, 2010, GCHQ analysts on Cyprus captured six minutes of video from what appears to be a Heron TP, a giant drone manufactured by the state-owned Israel Aerospace Industries (IAI).

In a snapshot still from the video, a large missile-shaped object is clearly visible on the left side. A GCHQ report mentions “regular collects of Heron TP carrying weapons” in 2009. A very similar image, likely from the same intercept, is named Heron_TP_Payload. 

“It certainly looks like the missile-shaped objects are weapons,” said Bill Sweetman, an editor at Aviation Week. “The bodies appear to have cruciform tail fins. The distortion makes it a bit to hard to tell size but — assuming they are bombs — these are definitely less than 500-pound class.”

He added that because the Heron-TP is an Israeli strategic intelligence system, the objects could be decoys, used to “force a response from Iran’s air defenses, while the UAV orbits and hoovers up signals.”

The Intercept

« Creating A Working Culture Of Computer Security (£)
Super High-Speed Internet »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

IGEL Technology

IGEL Technology

IGEL Technology is one of the world's leading thin client vendors. Thin clients increase data security and compliance.

Cloud53

Cloud53

Cloud53 specialise in improving operational IT through strategic use of Cloud technologies and services.

ManagedMethods

ManagedMethods

ManageMethods Cloud Access Monitor is the only Cloud Access Security Broker (CASB) that can be deployed in minutes, with no special training, and with no impact on users or networks.

HID Global

HID Global

HID Global is a trusted leader in products, services and solutions related to the creation, management, and use of secure identities.

CyberDef

CyberDef

CyberDef is a consulting company specialising in cyber defence services for small and medium enterprises.

Cybonet

Cybonet

Cybonet is committed to empowering organizations of all sizes with the tools and capabilities to detect and engage cyber security threats.

Ritz

Ritz

Ritz is the largest holistic pure-play cyber security solutions provider in Myanmar.

CERT.lu

CERT.lu

CERT.lu is an initiative to enhance cyber security practices and techniques, and support security professionals in Luxembourg.

CyberGRX

CyberGRX

The CyberGRX Exchange and our risk assessments-as-a-service help Enterprises and Third Parties cost-effectively identify, prioritize and mitigate risk.

IAmI Authentications

IAmI Authentications

IAmI is a first in Tokenization Cloud-based IAM Security Services, delivering the most advanced form of Two-Factor Authentication.

ICT Reverse

ICT Reverse

ICT Reverse is one of the UK’s leading, fully accredited providers of ICT asset disposal and secure data erasure.

Servian

Servian

Servian is one of Australia's leading IT consultancies, with expertise in cloud, data, machine learning, DevOps and cybersecurity.

IDX

IDX

IDX is the leading consumer privacy platform built for agility in the digital age.

Filigran

Filigran

Filigran provides threat intelligence, adversary simulation and crisis response open solutions to thousands of cybersecurity and crisis management teams across the world.

Standard Notes

Standard Notes

Standard Notes is a secure digital notes app that protects your notes and files with audited, industry-leading end-to-end encryption.

Cloudsmith

Cloudsmith

Cloudsmith is the only cloud-native, global, universal artifact management platform for securely developing and distributing software.