Unencrypted drone video advantageous to U.S. military, despite risks

18.12.2009

Classified data would have to be encrypted using hardware encryption, which would require upgrades of a significant amount of equipment, and the military might have determined it just wasn’t worth the effort. The military likes to minimize hardware encryption especially in devices used in the field in case the gear falls into the hands of the enemy, Kahn says. “The answer to the question of why people know about the hole and allowed it to persist is that it was so difficult to plug the hole,” he says. “There was a legitimate need for people without clearance to see the data, so a decision was made to let it continue. Now they know it was exploited, they need to close it.”

Kahn says his company offers a middle ground that supports a software sandbox for secure end-to-end encryption of data and issuance of public and private keys to all the devices that need to communicate with each other during a particular mission. When the mission is over, the keys are revoked and the devices lose the ability to communicate with each other, he says.