A drone was successfully hacked in the White sands Missile Range in New Mexico by a group of researchers. These researchers were given the opportunity to prove they could hack a drone outside of the lab and in the field using GPS spoofing. Who gave the University of Texas researchers this opportunity? The Department of Homeland Security extended the invitation to see if the hacking could be done.
Even though the BBC suggested that Iran may have used the same kind of hacking technology to gain control of a spy drone flying over their country, it’s thought it was more likely jamming tech. Jamming GPS is different than spoofing it as jamming tries to remove the signals and spoofing tries to hijack the signal and pretend to be the original one.
The drone was successfully hacked by UT researchers using a spoofing method they detailed in an article titled, “Straight Talk on Anti-Spoofing.” It was in this article that attention started to arise of the methods that Professor Todd E. Humphreys and his researchers were referencing.
Now the article released in GPS World wasn’t exactly a how to spoof a drone expose article but a warning and things one can do to stop spoofing of GPS devices. In the GPS World article it started out saying, “Disruption created by intentional generation of fake GPS signals could have serious economic consequences. This article discusses how typical civil GPS receivers respond to an advanced civil GPS spoofing attack, and four techniques to counter such attacks.” The four ways someone can deploy anti-spoofing for GPS devices are listed as SSSC, NMA, Dual-Receiver and VSD.
Using the techniques warned about in the article, the UT researchers were successful in taking over control of the drone while the Department of Homeland Security watched and prove the possibility of drone hacking. The exact way they did it is explained from their article as drone GPS spoofing, “the transmission of matched-GPS-signal-structure interference in an attempt to commandeer the tracking loops of a victim receiver and thereby manipulate the receiver’s timing or navigation solution. A spoofer can transmit its counterfeit signals from a stand-off distance of several hundred meters or it can be co-located with its victim.”
While the drone program expands across the United States fears are building that they could be taken down, commandeered and used to hurt people or much more serious consequences. Wait, did you think drones couldn’t fly over US territory? No, that was taken care of when a bill was passed in Congress around February 7th, 2012 when the Washington Post claimed, “Drones over U.S. get OK by Congress.” So get ready, the drones are coming in full force and by 2015 there will be licensing of commercial drones.
Now don’t think that this drone hacking or spoofing tactic just ends with unmanned aerial vehicles in the sky. Remember all that research that Google and other automakers are doing with Unmanned Vehicle Systems? Well those cars that are driven by computers are using GPS and spoofing and jamming can effect all those cars that will eventually be on our roads as well.
Who would have know that hacking a drone in the US could have such implications to many of our new technologies coming down the pipeline. If you think it’s out of reach of many people the UT researchers state that it costs them $1000 in equipment costs to get the job done.
Domestic drones can be hacked by “terrorists”
Iran: US Drone Hacked, not Crashed
The U.S. drone which crashed in Iran has been all over the media and even came up in the Iowa GOP debates. Now Iranian intelligence is claiming that they used a cyber attack to hack the drone, which explains why it’s in better condition than a prized Star Wars toy. So what will the U.S. do about Iran now?
Iran Hacked Stealth Drone GPS Forced RQ-170 to land in Iran
The U.S. Military and CIA may have a serious security flaw to deal with if an Iranian engineer’s story proves to be true. An Iranian specialists reportedly figured out that the RQ-170 Sentinel’s weakest point is its GPS by examining previously downed American drones back in September. Using this knowledge, they designed a trap for one of the drones doing reconnaissance work “by putting noise jamming on the communications, you force the bird into autopilot. This is where the bird loses its brain,” the engineer says. The team then simply programmed it to “land on its own where they wanted it to.” The engineer asserts that the whole process is as easy as hacking into a Google, Yahoo or Facebook account.” The attack was ultimately successful, leading the unmanned vehicle to land in Iran instead of its home base in Afghanistan.
A 2003 study on GPS vulnerability indicates that the U.S. Military has known about the problem for nearly a decade. If the RQ-170 in Iran’s possession was indeed hacked, it means the susceptibility is yet to be fixed.
Drones hit American universities
We are drawing close to the end of the school year and millions of high school seniors will be moving on to college. Across America, several universities are adding drones degrees to their curriculum. The Federal Aviation Administration has already approved 25 universities to fly drones in its airspace, and Amie Stepanovich, a member of the National Security Council for the Electronic Privacy Information Center (EPIC).
(FAA List) Why are So Many Universities Using Spy Drones? : FAA List Of Drones Approved America
Congress opens US airspace for drones
The US Congress has just passed the bill that allows private and commercial use of drones. This entails lots of questions as the arcraft that untill now have been used solely by the military and intelligence is now available for an average citizen. How this bill implementation could harm your privacy and safety is one of the main
concerns. To talk more about the implications of the bill Scott Norton of Harper’s Magazine joins RT’s Liz Wahl.
Drones to patrol US protests?
In January of 2012, the US Congress passed legislation that will open up the US sky to unmanned drones. The robotic aircraft will be used for military and police operations and will add to America’s current arsenal of around 7,000 drones. According to some accounts, peaceful protest might be a reason that feds would deploy the unmanned craft. There are currently 300 active drone permits in the US, but will that soon swell out of control? Amie Stepanovich, a member of the National Security Council for EPIC, joins us for more.
The Pirate Bay DDOS Attack Fixed By Proxies
Whoever is attacking the The Pirate Bay is pretty serious with this current DDOS attack hitting the torrent sharing website that is popular among file sharers. The file sharing community flocks so much to ThePirateBay.org (more recently ThePirateBay.se) that governments around the world have started blocking access.
The access to TPB file sharing site is done at the ISP level and many sites like TorrentFreak.com have provided tricks to get around these government ISP blocks. One method mentioned by Torrent Freak references UK ISP Virgin Media users the ability to access The Pirate Bay using Google Translate with the following search: http://translate.google.com/translate?prev=hp&hl=en&js=n&u=thepiratebay.se&sl=es&tl=en
The Pirate Bay DDOS Attack was well chronicled by The Pirate Bay’s Facebook Page at: www.facebook.com/ThePirateBayWarMachine “The Pirate Bay War Machine”
On May 15th, 2012 at 2:14pm The Pirate Bay posted on their Facebook Page:
“Apparently TPB is down, for some people. But up and running for some. Oh it’s so hard with all this computery stuffy stuff!
We’ll look into it.
Meanwhile you should:”
This post alone got 119 likes on Facebook along with 272 comments and 16 shares.
On May 15th, 2012 at 2:20pm The Pirate Bay posted a temporary fix for their broken site being DDOSed:
“Can’t wait for us to fix the broken stuff?
Looks like the proxy at http://tpb.fl.ax/ works fine.”
On May 15th, 2012 at 4:11pm they posted:
“Just to clarify:
Use proxies at own risk.
Don’t login unless you trust the proxy supplier.
Don’t freak out. You’ll get your TPB fix tomorrow.
Take a walk and hug a friend :)”
Then today, May 16th, 2012 about 19 hours ago TPB confirmed the DDOS attack and that they have suspicions on who’s attacking them:
“We’re under a quite big ddos attack. We don’t know who’s behind it but we have our suspicions…
Once we’ve awaken our tech guru Winston Q we’ll get on the issue.
Meanwhile, go have a lol at: dontevenreply.com”
The DDOS on The Pirate Bay started to get fixed later today with the use of proxies and TPB confirmed it was starting to all come online and be provided. They posted:
“We were loling just like you, then we took a ddos to the knee.
But now we’re getting back up! Stronger than ever!
Proxy list: http://about.piratereverse.info/proxy/list.html“
It was this proxy list that is now allowing users around the world to access the full list of magnet links and torrent sharing power that The Pirate Bay normally provides. These proxy lists don’t only fix TPB DDOS attack but they also fix access for people in countries that have ISP blocking for torrent sharing.
If you feel your country is blocking The Pirate Bay you should have no problem accessing one of the sites on the proxy list that TPB is making available. People from different countries all around the world are claiming TPB has been blocked for them, like the comments we saw on Facebook below:
The comments below were encouraged with this post by The Pirate Bay Facebook Page:
“We need your help!
We’re making a list of internet service providers that block us.
If you are blocked, write the providers name and your country.
If someone else already wrote yours, like their status instead.”
“f**k colombian government , they blocked the piratebay !! :(”
“Ian Gelderman Telkom, South Africa – BLOCKED”
“Witek Adamus Down in Poland (isp: UPC)”
“Lewis Spiers Sky (BSKYB) – England – BLOCKED”
“Jorge Bonilla TelMex – Mexico”
“Davor Dobrovodski Iskon – Croatia”
“Miguel Reis Distributel in Canada”
“Richard Schimelfenig thepiratebay.se blocked by Verizon FiOS East Coast USA”
“Vinny Murphy Vigin Media (United Kingdom) Are bum suckers. Oh, also they blocked you.”
Nearly 210 people shared their blocked locations to ThePirateBay.se on Facebook and TPB is trying to build proxies around the world to solve the problem.
So far it seems most people’s problems are being solved by the current list of proxies being shared at the Proxy List shared by The Pirate Bay. This Proxy list is also fixing the site for all people not able to access TPB because of the DDOS attacks that are ongoing.
- ‘Young Sheldon’ Season 2 Finale: What’s Meant To Be Will Always Find Its Way To You
- How Tech Companies Affect Communities In Places They Call ‘Home’
- Groundbreaking Discovery Paves Way To A New Understanding Of Lupus
- Cancer Research Infra Built To End Cancer Evolution
- Nissan-Renault’s Ghosn: From Hero To Zero
- Spotify Goes Big On Podcasts
- ‘John Wick 3’: Parabellum Has The Best Fight Scenes
How Tech Companies Affect Communities In Places They Call ‘Home’
Tech companies are today’s driving forces in the economic world, mostly because of the introduction of the Internet. It allows...
RingCentral VoIP Review
VoIP has had a significant shift from a technology exclusively used by the early adopters or hobbyist to a widely...
April Fools Jokes Aren’t Just “Jokes”
April Fools is undoubtedly a fun day, exceptionally if you have crafted the most elaborate prank on your friends and...
Facebook Should Do Better At Processing Community Standard Violations, And They Should Do It Fast
A few months ago, I saw a photo of myself used by another Facebook account with a “R.I.P. (Rest in...
Supporting Problematic Artists And Their Arts, An Opinion
As the world becomes swarmed by reports of famous artists – musicians, comedians, actors, painters – being alleged or in...
Ethical Regulation Of ‘Facial Recognition’ Is A Shared Responsibility
There is an ongoing discussion both in online and offline spaces regarding the growth of facial recognition technology and its...
Data Breach Epidemic: Solving The Problem In SMBs Will Solve The Problem For All
In the last two weeks, we’ve witnessed a vast amount of data breaches and information leaks, and the issue has...
We Agree To PM Ardern Of Keeping Christchurch Murderer Nameless, And The Media Should Listen
In the wake of Christchurch mosques shooting in New Zealand that killed 50 people at two mosques, the shooter is...
Apple vs. Police Authorities; A Cold War Against iPhone’s Anti-Snooping Patent
To protect its customers from hackers and illegal surveillance, Apple is developing an anti-snooping technology that would impede police and...
An Epidemic: Measles Or Misinformation?
2018 was the year when people started asking the question: ‘should I get my child vaccinated?’ Most people answered yes,...
Take A Look At The Predicted Future Of The VoIP Industry
For the past 20 years, VoIP has become an integral part of the lives of millions of people around the...
Choose The Right Call Center And The Best Contact Center Solutions of 2019
The Ins And Outs Of Business Communication Management For your business to exist in today’s world, you must know how...
How Instagram Corrupts Famous Locations In The World
Is Instagram corrupting the beauty of breathtakingly beautiful locations and sucking all the joy out of traveling? With the era...
Ways To Earn Cryptocurrency
Cryptocurrency is one of the growing medium for exchange in most countries as it offers a more convenient and safer...
Can We End Payday Loans?
We can’t neglect the fact that debt is one of the pressing problems in the country, especially in today’s economy....
Jumping From 4G To 5G: Here’s What 5G Can Do For You
One of the most awaited advancements in technology is the cellular industry. With its monthly updates on software, model and...
What are the cost factors of VoIP?
In the next few years, we might be saying goodbye to traditional telephone systems in exchange for Voice over Internet...
Manufacturing Firms are Investing More on Technology
Based on the recent research on how manufacturing companies are coming up in the market industry, they have been increasing...
Technology innovation in companies—for the better or the worse?
Technology has significantly impacted both homes and workplaces in the last years. As much as we want to keep our...
Arts & Entertainment2 days ago
The CW And Netflix Break Up Means No More Riverdale?
Google2 weeks ago
Pixel 3A And 3A XL Is Coming And Its Better Than We Thought
Cybersecurity5 days ago
Apple, Google, And Microsoft Started Protecting You From ZombieLoad Threat
Facebook2 weeks ago
New Feature Updates That Are Coming To Facebook Messenger And Instagram In The Near Future
Politics2 weeks ago
Michael Cohen: President Trump’s Loyal Lawyer and ‘Fixer’ to Serve a Three-year Sentence at the Federal Correctional Institution in Otisville, New York.
Google2 weeks ago
Smarter And More Practical ‘Google AI’ Techs?
Cybersecurity3 days ago
Ransomware Are Plaguing American Cities And Experts Warn That It Will Get Worse
Cryptocurreny3 days ago
Hacked Crypto Exchange ‘Cryptopia’ Is Selling Their Assets