Texas College Researchers Hijack Drone On A 'Dare' | Aero-News Network
Aero-News Network
RSS icon RSS feed
podcast icon MP3 podcast
Subscribe Aero-News e-mail Newsletter Subscribe

Airborne Unlimited -- Recent Daily Episodes

Episode Date

Monday

Tuesday

Wednesday

Thursday

Friday

Airborne On ANN

Oshkosh Day One

Oshkosh Day Two

Oshkosh Day Three

Airborne 07.21.16

Airborne 07.22.16

Airborne Hi-Def On YouTube

Oshkosh Day One

Oshkosh Day Two

Oshkosh Day Three

Airborne 07.21.16

Airborne 07.22.16

Tweet Us The Coolest Things You See @OSH16!
#OSH16Coolest!

It's Alive!: AirVenture 2016 Innovation Preview on Vimeo!

It's Alive!: AirVenture 2016 Innovation Preview on YouTube!

 

Fri, Jun 29, 2012

Texas College Researchers Hijack Drone On A 'Dare'

Reportedly 'Spoofed' A UAV With A $1,000 Device

Sometimes, the words "don't dare me" carry some pretty significant meaning.

Take the example of researchers at the Austin Radionavigation Lab at the University of Texas, who were in essence "dared" to try to hack a supposedly hackproof drone by the Department of Homeland Security.

A variety of media sources, including MSC Now, Fox News, and the Russian news service RT are reporting that the researchers did just that; repeatedly taking control of a UAV in a controlled test using a piece of equipment worth about $1,000.

Professor Todd Humphrey of UT's Radionavigation Lab managed to scramble the flight plan of a small drone flying over Austin stadium. It was reportedly following its pre-programmed flight plan perfectly, until it wasn't. The drone dove towards the ground, but a crash was avoided when the team altered the course a few feet above the ground.

Humphrey told Fox News that the process is called "spoofing," and it's not very difficult for someone with the right equipment.

Spoofing involves jamming the UAV's GPS signals, but recent developments allow the spoofer to actually take over the drone and re-direct it. Humphrey said his spoofing device, which is the most advanced available, is at that $1,000 price point. It works by overpowering the weak signals coming from satellites with stronger ones emitted from the device.

The professor said finding a way to beat the spoofing devices is akin to reinforcing and locking the cockpit doors of commercial airliners. "We have to adopt that mentality as far as the navigation systems for the UAVs," he said.

(Predator UAV file photo)

FMI: www.dhs.gov

Advertisement

More News

Airborne 07.26.16-Oshkosh Day 2: Solar Impulse, Sun Flyer, Stemme S-12

Also: AEA $$Giveaway$$, LAM Aviation, Able Flight, Jack Pelton On Aero-Medical Reform We start our report this morning with something that has very little to do with the EAA AirVen>[...]

ONE Aviation Provides Singular Support For Coverage of AirVenture 2016!

ONE Aviation: Let’s Fly Together ONE Aviation delivers innovative access to general aviation by bringing together a line of products suited to the missions and budgets of ind>[...]

It's ALIVE! 2016 AirVenture Innovation Preview Program Debuting RIGHT NOW!

Get The EARLY Inside Details On THE Most Exciting NEW Innovations And Product Announcements From OSHKOSH... The staff of EAA and the Aero-News Network are pleased to announce that >[...]

Only Sporty's!!! Sporty's Pilot Shop Helps ANN Cover Oshkosh 2016!

Sporty's Pilot Shop Is A Pivotal GA Resource! Sporty’s Pilot Shop was founded over 50 years ago by a flight instructor, and ever since has been for pilots and by pilots. Hal >[...]

Aspen Avionics, True Innovators, Present OSH2016 Special Event Coverage!

OSH2016 Sponsor: Always-Innovative Aspen Avionics Based in Albuquerque, New Mexico, Aspen Avionics specializes in bringing the most advanced display and sensor technology from the >[...]

blog comments powered by Disqus



Advertisement

Advertisement

Podcasts

Advertisement

© 2007 - 2016 Web Development & Design by Pauli Systems, LC