Texas College Researchers Hijack Drone On A 'Dare' | Aero-News Network
Aero-News Network
RSS icon RSS feed
podcast icon MP3 podcast
Subscribe Aero-News e-mail Newsletter Subscribe

Airborne Unlimited -- Recent Daily Episodes

Episode Date

AMA Drone Report

Airborne-Monday

Airborne-Tuesday

Airborne-Wednesday

Airborne-Thursday

Airborne-Friday

Airborne-Unmanned w/AUVSI

Airborne On ANN

AMA 09.21.17

Airborne 09.25.17

Airborne 09.26.17

Airborne 09.20.17

Airborne 09.21.17

Airborne 09.22.17

Airborne-Unmanned 09.19.17

Airborne-YouTube

AMA 09.21.17

Airborne 09.25.17

Airborne 09.26.17

Airborne 09.20.17

Airborne 09.21.17

Airborne 09.22.17

Airborne-Unmanned 09.19.17

NEW!!! 2017 AirVenture Innovation Preview -- YouTube Presentation / Vimeo Presentation

Fri, Jun 29, 2012

Texas College Researchers Hijack Drone On A 'Dare'

Reportedly 'Spoofed' A UAV With A $1,000 Device

Sometimes, the words "don't dare me" carry some pretty significant meaning.

Take the example of researchers at the Austin Radionavigation Lab at the University of Texas, who were in essence "dared" to try to hack a supposedly hackproof drone by the Department of Homeland Security.

A variety of media sources, including MSC Now, Fox News, and the Russian news service RT are reporting that the researchers did just that; repeatedly taking control of a UAV in a controlled test using a piece of equipment worth about $1,000.

Professor Todd Humphrey of UT's Radionavigation Lab managed to scramble the flight plan of a small drone flying over Austin stadium. It was reportedly following its pre-programmed flight plan perfectly, until it wasn't. The drone dove towards the ground, but a crash was avoided when the team altered the course a few feet above the ground.

Humphrey told Fox News that the process is called "spoofing," and it's not very difficult for someone with the right equipment.

Spoofing involves jamming the UAV's GPS signals, but recent developments allow the spoofer to actually take over the drone and re-direct it. Humphrey said his spoofing device, which is the most advanced available, is at that $1,000 price point. It works by overpowering the weak signals coming from satellites with stronger ones emitted from the device.

The professor said finding a way to beat the spoofing devices is akin to reinforcing and locking the cockpit doors of commercial airliners. "We have to adopt that mentality as far as the navigation systems for the UAVs," he said.

(Predator UAV file photo)

FMI: www.dhs.gov

Advertisement

More News

FAA Continuing Resolution Defeated In Late Monday Vote

245-171 Vote Fails To Attain 2/3rd's Majority Needed For Extension In a Monday vote to authorize a six-month extension of funding for the FAA, something strange happened... With a >[...]

RFP: ANN Seeking New Site/Facility For Major Studio Upgrade

It's Official: Aggressive Upgrades For New Airborne Programs WILL Require New Digs It's been in development for years, but we're getting to a point where we think we can pull off s>[...]

Airborne-Unmanned 09.19.17: FAA OKs FL Drone Ops, ICAO Registry?, No Pot Drones

Also: FAA Reauthorization, Medical Drone Transport, USMC Quadcopters, Canister Launched UAS, Atlas Dynamics Airborne, primarily based in Jacksonville, FL is starting to recover fro>[...]

AMA Drone Report 09.21.17: AMA Expo West, Parrot Mambo, No Drone Pot Delivery

Also: Drone Injury Study, Cook County-IL, Northeastern Drone Society, Propel Star Wars Drones, GA UAS Integration One of the pinnacle model aviation events of the year is coming up>[...]

Airborne 09.25.17: PAL-V 'Flying Car', Tecnam P2012, G650 TC Anniversary

Also: Virgin Atlantic, SpaceX Video, Wipaire, Women And Drones, Boeing 787, Ameri-King, BelugaXL A PAL-V vice president plans to fly around the world in his personal "flying car", >[...]

blog comments powered by Disqus



Advertisement

Advertisement

Podcasts

Advertisement

© 2007 - 2017 Web Development & Design by Pauli Systems, LC