Chapter 10

How Iraqi Insurgents Watched U.S. Predator Video—Information Theft on the Tactical Battlefield

Outline

Information in This Chapter

• The Predator UAV

• Hacking the Predator feed

• The Predator’s vulnerability

• Attribution and the Kata’ib Hezbollah

• The history of the Predator vulnerability

Introduction

In Chapter 7, we discussed acts of cyber espionage that suggest Chinese involvement. These operations focused on either massive data exfiltration for the purposes of stealing intellectual property and industrial information ...

Get Introduction to Cyber-Warfare now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.