Army taps civilian hackers to test drone comms in first-of-its-kind exercise | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #hacker


“The output appeared like random data, with no visible patterns or markers to indicate how it was encoded. In effect, while the data could be intercepted, it could not be read or understood,” an Army official explained.

He added that the systems are part of a broader push towards “quantum-safe” encryption, meant to remain secure even against future quantum computers, which could challenge existing encryption standards as early as 2030.

The exercise also saw teams attempt more advanced approaches, including analysing transmission timing and data volumes and using machine learning (ML) models to detect hidden patterns. While these approaches did not reveal the encryption, they pointed to a different kind of vulnerability.

The Army acknowledged this as a future risk, with adversaries potentially focusing on traffic patterns rather than breaking encryption itself and said communication schedules would be made less predictable to mitigate it.

“The results have provided confidence that even if drone communications are intercepted, they would not easily yield useful information,” the official added.

The test was conducted by the Army’s 515 Army Base Workshop as part of a hackathon intended to secure drone-to-ground communications using indigenous quantum-safe technology. 

Globally, involving civilian experts to test such secure systems is not new. Agencies such as DARPA and the National Security Agency in the US, the UK’s Government Communications Headquarters, as well as Israel’s cyber ecosystem led by the Israel National Cyber Directorate, have used similar approaches, though largely focused on software and network systems.



Click Here For The Original Source.

——————————————————–

..........

.

.

National Cyber Security

FREE
VIEW