Texas College Researchers Hijack Drone On A 'Dare' | Aero-News Network
Aero-News Network
RSS icon RSS feed
podcast icon MP3 podcast
Subscribe Aero-News e-mail Newsletter Subscribe

Airborne Unlimited -- Most Recent Daily Episodes

Episode Date

Airborne-Monday

Airborne-Tuesday

Airborne-Wednesday Airborne-Thursday

Airborne-Friday

Airborne On YouTube

Airborne-Unlimited-04.01.24

Airborne-Unlimited-04.16.24

Airborne-FlightTraining-04.17.24 Airborne-Unlimited-04.11.24

Airborne-Unlimited-04.12.24

Join Us At 0900ET, Friday, 4/10, for the LIVE Morning Brief.
Watch It LIVE at
www.airborne-live.net

Fri, Jun 29, 2012

Texas College Researchers Hijack Drone On A 'Dare'

Reportedly 'Spoofed' A UAV With A $1,000 Device

Sometimes, the words "don't dare me" carry some pretty significant meaning.

Take the example of researchers at the Austin Radionavigation Lab at the University of Texas, who were in essence "dared" to try to hack a supposedly hackproof drone by the Department of Homeland Security.

A variety of media sources, including MSC Now, Fox News, and the Russian news service RT are reporting that the researchers did just that; repeatedly taking control of a UAV in a controlled test using a piece of equipment worth about $1,000.

Professor Todd Humphrey of UT's Radionavigation Lab managed to scramble the flight plan of a small drone flying over Austin stadium. It was reportedly following its pre-programmed flight plan perfectly, until it wasn't. The drone dove towards the ground, but a crash was avoided when the team altered the course a few feet above the ground.

Humphrey told Fox News that the process is called "spoofing," and it's not very difficult for someone with the right equipment.

Spoofing involves jamming the UAV's GPS signals, but recent developments allow the spoofer to actually take over the drone and re-direct it. Humphrey said his spoofing device, which is the most advanced available, is at that $1,000 price point. It works by overpowering the weak signals coming from satellites with stronger ones emitted from the device.

The professor said finding a way to beat the spoofing devices is akin to reinforcing and locking the cockpit doors of commercial airliners. "We have to adopt that mentality as far as the navigation systems for the UAVs," he said.

(Predator UAV file photo)

FMI: www.dhs.gov

Advertisement

More News

ANN's Daily Aero-Linx (04.16.24)

Aero Linx: International Business Aviation Council Ltd IBAC promotes the growth of business aviation, benefiting all sectors of the industry and all regions of the world. As a non->[...]

Aero-News: Quote of the Day (04.16.24)

"During the annual inspection of the B-24 “Diamond Lil” this off-season, we made the determination that 'Lil' needs some new feathers. Due to weathering, the cloth-cove>[...]

Airborne 04.10.24: SnF24!, A50 Heritage Reveal, HeliCycle!, Montaer MC-01

Also: Bushcat Woes, Hummingbird 300 SL 4-Seat Heli Kit, Carbon Cub UL The newest Junkers is a faithful recreation that mates a 7-cylinder Verner radial engine to the airframe offer>[...]

Airborne 04.12.24: SnF24!, G100UL Is Here, Holy Micro, Plane Tags

Also: Seaplane Pilots Association, Rotax 916’s First Year, Gene Conrad After a decade and a half of struggling with the FAA and other aero-politics, G100UL is in production a>[...]

Airborne-Flight Training 04.17.24: Feds Need Controllers, Spirit Delay, Redbird

Also: Martha King Scholarship, Montaer Grows, Textron Updates Pistons, FlySto The FAA is hiring thousands of air traffic controllers, but the window to apply will only be open for >[...]

blog comments powered by Disqus



Advertisement

Advertisement

Podcasts

Advertisement

© 2007 - 2024 Web Development & Design by Pauli Systems, LC