Texas College Researchers Hijack Drone On A 'Dare' | Aero-News Network
Aero-News Network
RSS icon RSS feed
podcast icon MP3 podcast
Subscribe Aero-News e-mail Newsletter Subscribe

Airborne Unlimited -- Recent Daily Episodes

Episode Date

Airborne Unlimited-
Monday

Airborne-Unmanned w/AUVSI-
Tuesday

Airborne Unlimited-
Wednesday

AMA Drone Report-
Thursday

Airborne Unlimited-
Friday

Airborne On ANN

Airborne 11.13.17

Airborne-Unmanned 11.14.17

Airborne 11.15.17

AMA Drone Report 11.16.17

Airborne 11.17.17

Airborne-YouTube

Airborne 11.13.17

Airborne-Unmanned 11.14.17

Airborne 11.15.17

AMA Drone Report 11.16.17

Airborne 11.17.17

Fri, Jun 29, 2012

Texas College Researchers Hijack Drone On A 'Dare'

Reportedly 'Spoofed' A UAV With A $1,000 Device

Sometimes, the words "don't dare me" carry some pretty significant meaning.

Take the example of researchers at the Austin Radionavigation Lab at the University of Texas, who were in essence "dared" to try to hack a supposedly hackproof drone by the Department of Homeland Security.

A variety of media sources, including MSC Now, Fox News, and the Russian news service RT are reporting that the researchers did just that; repeatedly taking control of a UAV in a controlled test using a piece of equipment worth about $1,000.

Professor Todd Humphrey of UT's Radionavigation Lab managed to scramble the flight plan of a small drone flying over Austin stadium. It was reportedly following its pre-programmed flight plan perfectly, until it wasn't. The drone dove towards the ground, but a crash was avoided when the team altered the course a few feet above the ground.

Humphrey told Fox News that the process is called "spoofing," and it's not very difficult for someone with the right equipment.

Spoofing involves jamming the UAV's GPS signals, but recent developments allow the spoofer to actually take over the drone and re-direct it. Humphrey said his spoofing device, which is the most advanced available, is at that $1,000 price point. It works by overpowering the weak signals coming from satellites with stronger ones emitted from the device.

The professor said finding a way to beat the spoofing devices is akin to reinforcing and locking the cockpit doors of commercial airliners. "We have to adopt that mentality as far as the navigation systems for the UAVs," he said.

(Predator UAV file photo)

FMI: www.dhs.gov

Advertisement

More News

Garmin Pilot Grows Feature Set For iOS And Android Mobile Devices

Multiple Features Added For Both Platforms Garmin has announced the addition of new features for the Garmin Pilot application for Android and iOS mobile devices. Garmin Pilot 6.2 f>[...]

AMA Drone Report 11.16.17: Drone Registration, Drone Journalists Jailed

Also: Terror Advisory, DRL Sim, SureFly Octocopter, Space Needle Drone Pilot, FAI-ASFC World Fly-In Expo A bill that includes a return to civilian drone registration has been inclu>[...]

Airborne-Unmanned 11.14.17: Drone Registration, AT&T's Flying COW, Pilot Charged

Also: Boeing Completes Acquisition, Drones For LAFD, DJI Seeks Transport Canada’s Help, Uber and NASA A defense authorization bill that includes a return to civilian drone re>[...]

Airborne 11.17.17: Cabri G2 Heli-Upgrade, NBAA/KSMO, USAF Pilot Shortage

Also: Electronic Flight Bags, SNC's Dream Chaser, flydubai Buys 225 737 MAX, Scottish Airshow Nixed The FAA has approved Service Bulletin 17-009 for the Guimbal Cabri G2 that allow>[...]

Airborne 11.15.17: XCOR BK, V-22 Osprey Milestone, GAMA 3rd Quarter Stats

Also: UK Airport Cancellation, Gone West: Robert Wagstaff, EASA Certifies Bell 505, USN's 1st MQ-4C Triton This is a heartbreaker, as we were big fans of XCOR Aerospace -- which fi>[...]

blog comments powered by Disqus



Advertisement

Advertisement

Podcasts

Advertisement

© 2007 - 2017 Web Development & Design by Pauli Systems, LC