Texas College Researchers Hijack Drone On A 'Dare' | Aero-News Network
Aero-News Network
RSS icon RSS feed
podcast icon MP3 podcast
Subscribe Aero-News e-mail Newsletter Subscribe

Airborne Unlimited -- Recent Daily Episodes

Episode Date






Airborne On ANN

Airborne 11.23.15

Airborne 11.24.15

Airborne 11.25.15

Airborne 11.19.15

Airborne 11.20.15

Airborne Hi-Def On YouTube

Airborne 11.23.15

Airborne 11.24.15

Airborne 11.25.15

Airborne 11.19.15

Airborne 11.20.15

EAA/ANN AirVenture Innovation Preview

AIP-#1 Vimeo

AIP-#2 Vimeo

AIP-Part 1 YouTube

AIP-Part 2 YouTube

Fri, Jun 29, 2012

Texas College Researchers Hijack Drone On A 'Dare'

Reportedly 'Spoofed' A UAV With A $1,000 Device

Sometimes, the words "don't dare me" carry some pretty significant meaning.

Take the example of researchers at the Austin Radionavigation Lab at the University of Texas, who were in essence "dared" to try to hack a supposedly hackproof drone by the Department of Homeland Security.

A variety of media sources, including MSC Now, Fox News, and the Russian news service RT are reporting that the researchers did just that; repeatedly taking control of a UAV in a controlled test using a piece of equipment worth about $1,000.

Professor Todd Humphrey of UT's Radionavigation Lab managed to scramble the flight plan of a small drone flying over Austin stadium. It was reportedly following its pre-programmed flight plan perfectly, until it wasn't. The drone dove towards the ground, but a crash was avoided when the team altered the course a few feet above the ground.

Humphrey told Fox News that the process is called "spoofing," and it's not very difficult for someone with the right equipment.

Spoofing involves jamming the UAV's GPS signals, but recent developments allow the spoofer to actually take over the drone and re-direct it. Humphrey said his spoofing device, which is the most advanced available, is at that $1,000 price point. It works by overpowering the weak signals coming from satellites with stronger ones emitted from the device.

The professor said finding a way to beat the spoofing devices is akin to reinforcing and locking the cockpit doors of commercial airliners. "We have to adopt that mentality as far as the navigation systems for the UAVs," he said.

(Predator UAV file photo)

FMI: www.dhs.gov


More News

Blue Origin Makes History, But Is The System Practical

Only Time Will Tell If The Booster Is Truly Reusable On November 23, 2015 Blue Origin achieved a first in rocketry and spaceflight history when their New Shepard launch vehicle suc>[...]

Dassault Falcon Jet Completes New Little Rock Expansion

Facility Earmarked For Work On Falcon 8X And Falcon 5X Airplanes Dassault Falcon Jet has completed another major expansion of its Little Rock Completion Center that will add 350,00>[...]

ICAO World Aviation Forum Charts Course To Sustainable Aviation Benefits

First-Ever Forum Of Its Type Draws Over 800 International Officials Over 800 Ministers and senior officials from States, UN and international organizations have gathered at the Hea>[...]

Russian Warplane Shot Down By Turkey On Syrian Border

Kremlin Say There Was No Violation Of Turkish Airspace Tensions between Russia and Turkey, and by extension NATO, escalated Tuesday when a Russian Su-24 was shot down by Turkey aft>[...]

AD: Airbus Airplanes

AD NUMBER: 2015-23-06 PRODUCT: Certain Airbus Model A330-200, A330-300, and A340-300 series airplanes.>[...]

blog comments powered by Disqus





© 2007 - 2015 Web Development & Design by Pauli Systems, LC