What's new

Researchers use spoofing to 'hack' into a flying drone

Safriz

BANNED
Joined
Aug 30, 2010
Messages
20,845
Reaction score
-1
Country
Pakistan
Location
United Kingdom
OLD NEWS BUT CAN PAKISTAN DEVELOP A SIMILAR TECHNIQUE TO GET RID OF THE DRONE MESS WE ARE FACING?

American researchers took control of a flying drone by "hacking" into its GPS system - acting on a $1,000 (£640) dare from the US Department of Homeland Security (DHS).

A University of Texas at Austin team used "spoofing" - a technique where the drone mistakes the signal from hackers for the one sent from GPS satellites.

The same method may have been used to bring down a US drone in Iran in 2011.

Analysts say that the demo shows the potential danger of using drones.

Drones are unmanned aircraft, often controlled from a hub located thousands of kilometres away.

They are mostly used by the military in conflict zones such as Afghanistan.

Todd Humphreys and his colleagues from the Radionavigation Lab at the University of Texas at Austin hacked the GPS system of a drone belonging to the university.

They demonstrated the technique to DHS officials, using a mini helicopter drone, flown over a stadium in Austin, said Fox News, who broke the story.

Continue reading the main story
SPOOFING EXPLAINED

"Imagine you've got a plane in the air and it sends back information to the person controlling it on the ground.

So if I wanted to fly my drone on a route between London and Birmingham, delivering mail for instance, I would get continuous signals coming back telling me where it is at all times.

And I would get GPS co-ordinates, using a signal from the satellite to navigate.

But if the drone is near Birmingham, but it receives GPS co-ordinates for Gloucester, it would then think it is in Gloucester and make an adjustment to go further north, changing the course."

Noel Sharkey

"What if you could take down one of these drones delivering FedEx packages and use that as your missile?" Fox News quoted Mr Humphreys.

"That's the same mentality the 911 attackers had."

Potential dangers
The spoofed drone used an unencrypted GPS signal, which is normally used by civilian planes, says Noel Sharkey, co-founder of the International Committee for Robot Arms Control.

"It's easy to spoof an unencrypted drone. Anybody technically skilled could do this - it would cost them some £700 for the equipment and that's it," he told BBC News.

"It's very dangerous - if a drone is being directed somewhere using its GPS, [a spoofer] can make it think it's somewhere else and make it crash into a building, or crash somewhere else, or just steal it and fill it with explosives and direct somewhere.

"But the big worry is - it also means that it wouldn't be too hard for [a very skilled person] to work out how to un-encrypt military drones and spoof them, and that could be extremely dangerous because they could turn them on the wrong people.

_48461757_how_drones_work_464.gif
 
"But the big worry is - it also means that it wouldn't be too hard for [a very skilled person] to work out how to un-encrypt military drones and spoof them, and that could be extremely dangerous because they could turn them on the wrong people.

Spoofing an encrypted signal, created with a private key, is pretty much impossible, if the encryption is reasonably strong.
 
Spoofing an encrypted signal, created with a private key, is pretty much impossible, if the encryption is reasonably strong.

No its not impossible...Time consuming and difficult...
Although there is no cure for "White noise".
Satellite frequency can be noted and a stronger signal of exact same frequency can be directed towards the drones,blocking the satellite signal.
 
OLD NEWS BUT CAN PAKISTAN DEVELOP A SIMILAR TECHNIQUE TO GET RID OF THE DRONE MESS WE ARE FACING?

We don't want to get rid of the mess, thats the whole point. Spoofing is the same as shooting the drone down, US will always come to know which specific people were responsible for it.
 
We don't want to get rid of the mess, thats the whole point. Spoofing is the same as shooting the drone down, US will always come to know which specific people were responsible for it.

Not really...
Hacking and confusing the drone by white noise and spoof signals is far less detectable to the source than a PAF plane firing Bullets on the drone..
 
Not really...
Hacking and confusing the drone by white noise and spoof signals is far less detectable to the source than a PAF plane firing Bullets on the drone..

Yes of course but still, they would get to know who did it, from input by other intelligence sources too. Besides, how many could be taken down before they start striking deeper (on the source of spoofing) or make the comms more secure?
 
its has been done by some groups in Iraq for very cheap amont. i read in norwegain newspapir. They used a russian software which was meant to rip/steal/copy music from sat. channel and with a computer they managed to get video and all others stuff drone operator was seeing. By that they knew were drones are , what they are searching for and there targets. I will try to find link. i think ut cost them 10 kr

http://online.wsj.com/article/SB126102247889095011.html


December 17, 2009

Insurgents Hack U.S. Drones
$26 Software Is Used to Breach Key Weapons in Iraq; Iranian Backing Suspected
 
It can be done and Drones are not the only system which are prone nor it is the only technique .

That is reason why many countries including U.S.A , China , EU etc are raising Cyber troops .

Its still a hush hush activity but people in infosec community know this everywhere .

In last couple of years APT's ( advanced persistent Threats ) Targeted attacks ( stuxnet , shamon , duqu ) etc has risen significantly . Everyone has doubts who is behind Stuxnet , Shamoon , duqu , U.S. banks DDOS , saudi armaco attacks et all .

And Iran is quite Big when it comes to Cyber angle .
 
Back
Top Bottom