Hacker Says NextGen Is Vulnerable To Attack | Aero-News Network
Aero-News Network
RSS icon RSS feed
podcast icon MP3 podcast
Subscribe Aero-News e-mail Newsletter Subscribe

Airborne Unlimited -- Recent Daily Episodes

Episode Date

Monday

Tuesday

Wednesday

Thursday

Friday

Airborne On ANN

Airborne 07.20.15

Airborne 07.21.15

Airborne 07.22.15

Airborne 07.23.15

Airborne 07.24.15

Airborne Hi-Def On YouTube

Airborne 07.20.15

Airborne 07.21.15

Airborne 07.22.15

Airborne 07.23.15

Airborne 07.24.15

EAA/ANN AirVenture Innovation Preview

AIP-#1 Vimeo

AIP-#2 Vimeo

AIP-Part 1 YouTube

AIP-Part 2 YouTube

Fri, Aug 17, 2012

Hacker Says NextGen Is Vulnerable To Attack

'Ghost Planes' Could Appear On Your ADS-B-Equipped EFIS

Every time new technology comes along, someone somewhere begins an effort to see how it can be compromised, manipulated, and sometimes even destroyed. And apparently NextGen is no exception.

In a story appearing on NPR, a Canadian computer hacker named Brad Haines said that the data transmitted by ADS-B is unencrypted and unauthenticated. Those are bad words in the computer security world. Haines, who is known in the online community as RenderMan, found he could "spoof" the signals and make your TIS see airplanes where there are none.

Haines imagined a scenario where a hacker suddenly added 50 "ghost airplanes" to an ATC screen. He said that such an attack could make a pilot swerve to miss airplanes that aren't there, or potentially shut down an airport. An hours worth of disruption at a major airport could have ripple effects that could spread worldwide, he said.

Haines and another hacker named Nick Foster created an ADS-B spoof using the FlightGear flightsim game. They say if they had hooked the game up to a low-power transmitter, they could have convinced controllers that they were an actual airplane. The experiment has reportedly been duplicated in France. Both Haines and the French hacker ... Romanian grad student Andrei Costin ... have published papers and made presentations about their work.

The U.S. Air Force has expressed concerns about the potential for "spoofing" NextGen. One cyberwarfare student ... Maj. Donald McCallie ... wrote in a paper last year that NextGen is "on a collision course with history." The FAA has reportedly not yet released the results, or even initial data, from its own security tests. It has been mostly quiet on the reports coming from the Air Force and the hackers. In a one-paragraph statement, the FAA said that an "ADS-B security action plan identified and mitigated risks and monitors the progress of corrective action. These risks are security sensitive and are not publicly available."

The FAA told NPR that it will use a system called "multilateration" to discriminate between real and fake airplanes on ADS-B receivers. But the system requires multiple receivers analyzing every ADS-B signal.

FMI: www.faa.gov

Advertisement

More News

Airborne At OSH15 Day 5 Redux: Inhofe's Mission, NextGen GA Fund, New Kitfox

Also: Cicare 8, Switchblade Update, Beringer Alaskan Bush Gear, Jack Pelton Interview - Final E-I-C Note: Regularly Daily Airborne Unlimited Programming will resume this Monday now>[...]

ANN's Daily Aero-Linx (08.01.15)

The BD-5 Web Site The official home of the BD-5 network, the purpose of this web site is to provide information about the Bede Aircraft BD-5, an experimental, homebuilt, single-sea>[...]

ANN's Daily Aero-Term (08.01.15): Notice To Airmen (NOTAM)

A notice containing information (not known sufficiently in advance to publicize by other means) concerning the establishment, condition, or change in any component (facility, servi>[...]

Aero-News: Quote Of The Day (08.01.15)

"The fairing separation is one of our very first critical events. If it doesn't work as planned, it's probable the mission cannot continue." Source: Mike Hawes, Lockheed Martin Ori>[...]

ANN FAQ: Aero-Twitters Offer Instant Alerts For Breaking News

Say Hello To Aero-Twitter! Twitter is designed to work on a mobile phone as well as on a computer (and can be accessed via your IM clients). All Twitter messages (called "Tweets", >[...]

blog comments powered by Disqus



Advertisement

Advertisement

Podcasts

Advertisement

© 2007 - 2015 Web Development & Design by Pauli Systems, LC