First Technique To Detect Illicit Drone Video Filming Demonstrated | Aero-News Network
Aero-News Network
RSS icon RSS feed
podcast icon MP3 podcast
Subscribe Aero-News e-mail Newsletter Subscribe

Airborne Unlimited -- Most Recent Daily Episodes

Episode Date

Airborne-Monday

Airborne-Tuesday

Airborne-Wednesday Airborne-Thursday

Airborne-Friday

Airborne On YouTube

Airborne-Unlimited-05.06.24

Airborne-NextGen-05.07.24

Airborne-Unlimited-05.08.24 Airborne-FlightTraining-05.09.24

Airborne-Unlimited-05.10.24

Tue, Jan 16, 2018

First Technique To Detect Illicit Drone Video Filming Demonstrated

Ben-Gurion University And Weizmann Institute Researchers Release Research

The first technique to detect a drone camera illicitly capturing video is revealed in a new study published by Ben-Gurion University of the Negev (BGU) and Weizmann Institute of Science cyber security researchers. The study addresses increasing concerns about the proliferation of drone use for personal and business applications and how it is impinging on privacy and safety.

In a new paper, "Game of Drones - Detecting Captured Target from an Encrypted Video Stream," the researchers demonstrate techniques for detecting if a targeted subject or house is being recorded by a drone camera.

"The beauty of this research is that someone using only a laptop and an object that flickers can detect if someone is using a drone to spy on them," says Ben Nassi, a Ph.D. student of Prof. Yuval Elovici's in BGU's Department of Software and Information Systems Engineering and a researcher at the BGU Cyber Security Research Center. Elovici is the Center's director as well as the director of Telekom Innovation Labs at BGU. "While it has been possible to detect a drone, now someone can also tell if it is recording a video of your location or something else."

In the first demo, researchers show how a privacy invasion against a house can be detected. They used smart film placed on a window and entered a few software commands on a laptop to access the encrypted video the drone operator sees, called the FPV channel. This enabled the researchers to demonstrate how they detect that a neighbor is using a DJI Mavic drone to capture images of his own home and then illicitly stream video of his neighbor's house, as well.

In a second outdoor test, researchers demonstrate how an LED strip attached to a person wearing a white shirt can be used to detect targeted drone activity. When researchers flickered the LED lights on the cyber-shirt, it caused the FPV channel to send an "SOS" by modulating changes in data sent by the flickering lights.

"This research shatters the commonly held belief that using encryption to secure the FPV channel prevents someone from knowing they are being tracked," Nassi says. "The secret behind our method is to force controlled physical changes to the captured target that influence the bitrate (data) transmitted on the FPV channel."

This method can be used on any laptop that runs Linux OS and does not require any sophisticated hacking or cryptographic skills.

"Our findings may help thwart privacy invasion attacks that are becoming more common with increasing drone use," Nassi says. “This could have significant impact for the military and for consumers because a victim can now legally prove that a neighbor was invading their privacy."

In previous research, Nassi showed how a laser mounted to a DJI Inspire 1 drone can use malware installed on an isolated (air-gapped) network scanner.

The research team also included Raz Ben-Netanel, a student in the BGU Department of Communication Systems Engineering. Prof. Adi Shamir from the Weizmann Institute of Science conceived the Game of Drones technique.  

(Source: Ben-Gurion University. Image from video posted with news release)

FMI: in.bgu.ac.il

Advertisement

More News

Aero-News: Quote of the Day (05.09.24)

"Fly-by-wire flight, coupled with additional capability that are being integrated into ALFA, provide a great foundation for Bell to expand on its autonomous capabilities. This airc>[...]

ANN's Daily Aero-Term (05.09.24): Hold Procedure

Hold Procedure A predetermined maneuver which keeps aircraft within a specified airspace while awaiting further clearance from air traffic control. Also used during ground operatio>[...]

ANN's Daily Aero-Linx (05.09.24)

Aero Linx: B-21 Raider The B-21 Raider will be a dual-capable penetrating strike stealth bomber capable of delivering both conventional and nuclear munitions. The B-21 will form th>[...]

Airborne 05.03.24: Advanced Powerplant Solutions, PRA Runway Woes, Drone Racing

Also: Virgin Galactic, B-29 Doc to Allentown, Erickson Fire-Fighters Bought, FAA Reauthorization After dealing with a big letdown after the unexpected decision by Skyreach to disco>[...]

Airborne-NextGen 05.07.24: AI-Piloted F-16, AgEagle, 1st 2 WorldView Sats

Also: Skydio Chief, Uncle Sam Sues, Dash 7 magniX, OR UAS Accelerator US Secretary of the Air Force Frank Kendall was given a turn around the patch in the 'X-62A Variable In-flight>[...]

blog comments powered by Disqus



Advertisement

Advertisement

Podcasts

Advertisement

© 2007 - 2024 Web Development & Design by Pauli Systems, LC