Print 33 comment(s) - last by Reclaimer77.. on Jun 27 at 12:35 PM

Team repeatedly takes over flying drone using $1000 DIY spoofer

Professor Todd Humphreys and his team from the University of Texas at Austin's Radionavigation Laboratory recently demonstrated the ease with which hackers can take over drones that rely on GPS signals. The ability to control a flying unmanned aircraft by spoofing the GPS signal should come as no surprise, considering it was used against the United States by Iran. In that instance, the U.S. drone was tricked into simply landing where the Iranian hackers wanted it.
According to the University of Texas team, there is a concern that compromised drones could be turned into weapons. The FAA is set to open skies over the United States to drone fleets for different uses including surveillance by law enforcement officials.
Humphreys opines, "Spoofing a GPS receiver on a UAV is just another way of hijacking a plane."
The scary part of the demonstration given by the professor and his team is that anyone with the right tools can take over the GPS-guided drone. Spoofing is when technology is used against drone that is able to manipulate navigation computers with false information that the drone sees as real. Humphreys and his team used what they call the most advanced spoofer ever built, and it costs only $1,000 to construct.
The GPS spoofer is able to send signals to the flying drone that are stronger than those from GPS satellites in orbit. The attack Humphreys demonstrated begins by matching the signal of the GPS system so the drone believes nothing has changed. Once the drone is fooled into following his GPS signal, his own commands are sent to the onboard computer, giving the team complete control of the drone.
Humphreys told Fox News, "In 5 or 10 years you have 30,000 drones in the airspace. Each one of these could be a potential missile used against us."
Humphreys and his team made a trip to the White Sands Missile Range in New Mexico where officials from the FAA and the Department of Homeland Security watched as Humphrey and his team repeatedly took control of over a drone from a nearby hilltop. The Department of Homeland Security is currently working with researchers like Humphreys and others to identify and mitigate the possibility of GPS interference.

Source: Fox News

Comments     Threshold

This article is over a month old, voting and posting comments is disabled

RE: That's pretty bad
By gamerk2 on 6/26/2012 11:50:34 AM , Rating: 2
Thinking too small. How about Iran hijacking an Isrieli drone, moving it inside Isriel, and having it shoot its payload into Iran itself. Headlines around the world will read "Isriel attacks Iran", givng Iran all the justification it needs to go to war with Isriel.

RE: That's pretty bad
By nolisi on 6/26/2012 12:23:35 PM , Rating: 2
I'm sorry, can you point which country Isriel is on a map?

RE: That's pretty bad
By Reclaimer77 on 6/26/2012 12:32:42 PM , Rating: 5
South of Derka Derkastan!

RE: That's pretty bad
By Azethoth on 6/26/2012 1:21:08 PM , Rating: 2
So just north of and bordering on Iran itself then? (5 mile range on a Hellfire)

RE: That's pretty bad
By GrammarPolice on 6/26/2012 3:04:09 PM , Rating: 1
Perhaps you could first learn to spell Israel.

"Can anyone tell me what MobileMe is supposed to do?... So why the f*** doesn't it do that?" -- Steve Jobs

Copyright 2016 DailyTech LLC. - RSS Feed | Advertise | About Us | Ethics | FAQ | Terms, Conditions & Privacy Information | Kristopher Kubicki