Vote 2020 graphic
Everything you need to know about and expect during
the most important election of our lifetimes

Report: NSA Hacked Israeli Drones

Illustration for article titled Report: NSA Hacked Israeli Drones

The National Security Agency hacked Israeli drones, working with the UK’s Government Communications Headquarters to surreptitiously track developments in the Middle East, according to a new report from The Intercept.


The Intercept published a report on this mission, code-named “Anarchist,” using files obtained by Edward Snowden. The NSA and GCHQ watched for operations in Palestine, and watched the drones for movement against Iran:

GCHQ files provided by former NSA contractor Edward Snowden include a series of “Anarchist snapshots” — thumbnail images from videos recorded by drone cameras. The files also show location data mapping the flight paths of the aircraft. In essence, U.S. and British agencies stole a bird’s-eye view from the drones.


If you’re used to thinking of Israel and the US as buddies, this might seem like an unusual move. While Israel and the US are counterintelligence allies, and have a “memo of understanding” from 2009 that allows Israel access to raw data from the NSA, which doesn’t preclude the US from spying. In fact, Israel is considered the US’s number one counterintelligence threat in the Middle East, according to an AP report from 2012.

The Intercept’s report includes snapshots of Israeli drones from 2008 and 2009 that lend credence to reports that Israel has missiles and attack capabilities on its UAVs—which Israel does not publicly acknowledge. You can read the detailed report here.

[The Intercept]

Image: AP (An Israeli drone flying over Gaza)


Share This Story

Get our newsletter


Fleet Admiral Josh

While I’m sure people who hate the NSA probably love revelations like this, I still don’t know what this accomplishes.

We know we spy on Israel. We know Israel spies on us. What does releasing this do other than increase tension and let people know what the NSA can do and how they operate in intelligence gathering?