Connect with us


Drone Hacked With Spoofing on Approval of DHS by University of Texas Researchers



GPS Spoofing Drones

A drone was successfully hacked in the White sands Missile Range in New Mexico by a group of researchers. These researchers were given the opportunity to prove they could hack a drone outside of the lab and in the field using GPS spoofing. Who gave the University of Texas researchers this opportunity? The Department of Homeland Security extended the invitation to see if the hacking could be done.

Even though the BBC suggested that Iran may have used the same kind of hacking technology to gain control of a spy drone flying over their country, it’s thought it was more likely jamming tech. Jamming GPS is different than spoofing it as jamming tries to remove the signals and spoofing tries to hijack the signal and pretend to be the original one.

The drone was successfully hacked by UT researchers using a spoofing method they detailed in an article titled, “Straight Talk on Anti-Spoofing.” It was in this article that attention started to arise of the methods that Professor Todd E. Humphreys and his researchers were referencing.

Now the article released in GPS World wasn’t exactly a how to spoof a drone expose article but a warning and things one can do to stop spoofing of GPS devices. In the GPS World article it started out saying, “Disruption created by intentional generation of fake GPS signals could have serious economic consequences. This article discusses how typical civil GPS receivers respond to an advanced civil GPS spoofing attack, and four techniques to counter such attacks.” The four ways someone can deploy anti-spoofing for GPS devices are listed as SSSC, NMA, Dual-Receiver and VSD.

Using the techniques warned about in the article, the UT researchers were successful in taking over control of the drone while the Department of Homeland Security watched and prove the possibility of drone hacking. The exact way they did it is explained from their article as drone GPS spoofing, “the transmission of matched-GPS-signal-structure interference in an attempt to commandeer the tracking loops of a victim receiver and thereby manipulate the receiver’s timing or navigation solution. A spoofer can transmit its counterfeit signals from a stand-off distance of several hundred meters or it can be co-located with its victim.”

While the drone program expands across the United States fears are building that they could be taken down, commandeered and used to hurt people or much more serious consequences. Wait, did you think drones couldn’t fly over US territory? No, that was taken care of when a bill was passed in Congress around February 7th, 2012 when the Washington Post claimed, “Drones over U.S. get OK by Congress.” So get ready, the drones are coming in full force and by 2015 there will be licensing of commercial drones.

Now don’t think that this drone hacking or spoofing tactic just ends with unmanned aerial vehicles in the sky. Remember all that research that Google and other automakers are doing with Unmanned Vehicle Systems? Well those cars that are driven by computers are using GPS and spoofing and jamming can effect all those cars that will eventually be on our roads as well.

Who would have know that hacking a drone in the US could have such implications to many of our new technologies coming down the pipeline. If you think it’s out of reach of many people the UT researchers state that it costs them $1000 in equipment costs to get the job done.

Domestic drones can be hacked by “terrorists”

Iran: US Drone Hacked, not Crashed

The U.S. drone which crashed in Iran has been all over the media and even came up in the Iowa GOP debates. Now Iranian intelligence is claiming that they used a cyber attack to hack the drone, which explains why it’s in better condition than a prized Star Wars toy. So what will the U.S. do about Iran now?

Iran Hacked Stealth Drone GPS Forced RQ-170 to land in Iran

The U.S. Military and CIA may have a serious security flaw to deal with if an Iranian engineer’s story proves to be true. An Iranian specialists reportedly figured out that the RQ-170 Sentinel’s weakest point is its GPS by examining previously downed American drones back in September. Using this knowledge, they designed a trap for one of the drones doing reconnaissance work “by putting noise jamming on the communications, you force the bird into autopilot. This is where the bird loses its brain,” the engineer says. The team then simply programmed it to “land on its own where they wanted it to.” The engineer asserts that the whole process is as easy as hacking into a Google, Yahoo or Facebook account.” The attack was ultimately successful, leading the unmanned vehicle to land in Iran instead of its home base in Afghanistan.

A 2003 study on GPS vulnerability indicates that the U.S. Military has known about the problem for nearly a decade. If the RQ-170 in Iran’s possession was indeed hacked, it means the susceptibility is yet to be fixed.

Drones hit American universities

We are drawing close to the end of the school year and millions of high school seniors will be moving on to college. Across America, several universities are adding drones degrees to their curriculum. The Federal Aviation Administration has already approved 25 universities to fly drones in its airspace, and Amie Stepanovich, a member of the National Security Council for the Electronic Privacy Information Center (EPIC).

(FAA List) Why are So Many Universities Using Spy Drones? : FAA List Of Drones Approved America

Congress opens US airspace for drones

The US Congress has just passed the bill that allows private and commercial use of drones. This entails lots of questions as the arcraft that untill now have been used solely by the military and intelligence is now available for an average citizen. How this bill implementation could harm your privacy and safety is one of the main
concerns. To talk more about the implications of the bill Scott Norton of Harper’s Magazine joins RT’s Liz Wahl.

Drones to patrol US protests?

In January of 2012, the US Congress passed legislation that will open up the US sky to unmanned drones. The robotic aircraft will be used for military and police operations and will add to America’s current arsenal of around 7,000 drones. According to some accounts, peaceful protest might be a reason that feds would deploy the unmanned craft. There are currently 300 active drone permits in the US, but will that soon swell out of control? Amie Stepanovich, a member of the National Security Council for EPIC, joins us for more.

Environmentalist. Consumer Tech Journalist. Science Explorer. And, a dreamer. I've been contributing informative news content since 2010. Follow me on all socials!

Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *


The Pirate Bay DDOS Attack Fixed By Proxies



Pirate Bay DDOS Fixed

Whoever is attacking the The Pirate Bay is pretty serious with this current DDOS attack hitting the torrent sharing website that is popular among file sharers. The file sharing community flocks so much to (more recently that governments around the world have started blocking access.

The access to TPB file sharing site is done at the ISP level and many sites like have provided tricks to get around these government ISP blocks. One method mentioned by Torrent Freak references UK ISP Virgin Media users the ability to access The Pirate Bay using Google Translate with the following search:

The Pirate Bay DDOS Attack was well chronicled by The Pirate Bay’s Facebook Page at: “The Pirate Bay War Machine”

On May 15th, 2012 at 2:14pm The Pirate Bay posted on their Facebook Page:

“Apparently TPB is down, for some people. But up and running for some. Oh it’s so hard with all this computery stuffy stuff!
We’ll look into it.
Meanwhile you should:”

This post alone got 119 likes on Facebook along with 272 comments and 16 shares.

On May 15th, 2012 at 2:20pm The Pirate Bay posted a temporary fix for their broken site being DDOSed:

“Can’t wait for us to fix the broken stuff?
Looks like the proxy at works fine.”

On May 15th, 2012 at 4:11pm they posted:

“Just to clarify:
Use proxies at own risk.
Don’t login unless you trust the proxy supplier.
Don’t freak out. You’ll get your TPB fix tomorrow.
Take a walk and hug a friend :)”

Then today, May 16th, 2012 about 19 hours ago TPB confirmed the DDOS attack and that they have suspicions on who’s attacking them:

“We’re under a quite big ddos attack. We don’t know who’s behind it but we have our suspicions…
Once we’ve awaken our tech guru Winston Q we’ll get on the issue.
Meanwhile, go have a lol at:”

The DDOS on The Pirate Bay started to get fixed later today with the use of proxies and TPB confirmed it was starting to all come online and be provided. They posted:

“We were loling just like you, then we took a ddos to the knee.
But now we’re getting back up! Stronger than ever!

Proxy list:

It was this proxy list that is now allowing users around the world to access the full list of magnet links and torrent sharing power that The Pirate Bay normally provides. These proxy lists don’t only fix TPB DDOS attack but they also fix access for people in countries that have ISP blocking for torrent sharing.

If you feel your country is blocking The Pirate Bay you should have no problem accessing one of the sites on the proxy list that TPB is making available. People from different countries all around the world are claiming TPB has been blocked for them, like the comments we saw on Facebook below:

The comments below were encouraged with this post by The Pirate Bay Facebook Page:

“We need your help!
We’re making a list of internet service providers that block us.
If you are blocked, write the providers name and your country.
If someone else already wrote yours, like their status instead.”

“f**k colombian government , they blocked the piratebay !! :(”
“Ian Gelderman Telkom, South Africa – BLOCKED”
“Witek Adamus Down in Poland (isp: UPC)”
“Lewis Spiers Sky (BSKYB) – England – BLOCKED”
“Jorge Bonilla TelMex – Mexico”
“Davor Dobrovodski Iskon – Croatia”
“Miguel Reis Distributel in Canada”
“Richard Schimelfenig blocked by Verizon FiOS East Coast USA”
“Vinny Murphy Vigin Media (United Kingdom) Are bum suckers. Oh, also they blocked you.”

Nearly 210 people shared their blocked locations to on Facebook and TPB is trying to build proxies around the world to solve the problem.

So far it seems most people’s problems are being solved by the current list of proxies being shared at the Proxy List shared by The Pirate Bay. This Proxy list is also fixing the site for all people not able to access TPB because of the DDOS attacks that are ongoing.

Continue Reading

Today’s Latest

Our Voices

Silicon Valley Silicon Valley
Our Voice7 hours ago

How Tech Companies Affect Communities In Places They Call ‘Home’

Tech companies are today’s driving forces in the economic world, mostly because of the introduction of the Internet. It allows...

We reviewed RingCentral's VoIP offers We reviewed RingCentral's VoIP offers
Our Voice4 days ago

RingCentral VoIP Review

VoIP has had a significant shift from a technology exclusively used by the early adopters or hobbyist to a widely...

April Fools April Fools
Our Voice2 months ago

April Fools Jokes Aren’t Just “Jokes”

April Fools is undoubtedly a fun day, exceptionally if you have crafted the most elaborate prank on your friends and...

Facebook Facebook
Facebook2 months ago

Facebook Should Do Better At Processing Community Standard Violations, And They Should Do It Fast

A few months ago, I saw a photo of myself used by another Facebook account with a “R.I.P. (Rest in...

With reports of artists committing harassments, should you separate the art from the artist? With reports of artists committing harassments, should you separate the art from the artist?
Our Voice2 months ago

Supporting Problematic Artists And Their Arts, An Opinion

As the world becomes swarmed by reports of famous artists – musicians, comedians, actors, painters – being alleged or in...

How to regulate facial recognition without possible risks How to regulate facial recognition without possible risks
Our Voice2 months ago

Ethical Regulation Of ‘Facial Recognition’ Is A Shared Responsibility

There is an ongoing discussion both in online and offline spaces regarding the growth of facial recognition technology and its...

Solving Data Breachs, must focus on SMBs Solving Data Breachs, must focus on SMBs
Cybersecurity2 months ago

Data Breach Epidemic: Solving The Problem In SMBs Will Solve The Problem For All

In the last two weeks, we’ve witnessed a vast amount of data breaches and information leaks, and the issue has...

Here's why we agree to Jacinda Ardern, New Zealand Prime Minister words of not naming mass shooter suspects Here's why we agree to Jacinda Ardern, New Zealand Prime Minister words of not naming mass shooter suspects
Our Voice2 months ago

We Agree To PM Ardern Of Keeping Christchurch Murderer Nameless, And The Media Should Listen

In the wake of Christchurch mosques shooting in New Zealand that killed 50 people at two mosques, the shooter is...

Apple Anti-Snooping Paten Apple Anti-Snooping Paten
Apple2 months ago

Apple vs. Police Authorities; A Cold War Against iPhone’s Anti-Snooping Patent

To protect its customers from hackers and illegal surveillance, Apple is developing an anti-snooping technology that would impede police and...

Fighting misinformation over measles outbreak Fighting misinformation over measles outbreak
Our Voice2 months ago

An Epidemic: Measles Or Misinformation?

2018 was the year when people started asking the question: ‘should I get my child vaccinated?’ Most people answered yes,...

Join us as we delve into the future of the VoIP industry Join us as we delve into the future of the VoIP industry
Our Voice3 months ago

Take A Look At The Predicted Future Of The VoIP Industry

For the past 20 years, VoIP has become an integral part of the lives of millions of people around the...

Contact Center Solutions Contact Center Solutions
Business3 months ago

Choose The Right Call Center And The Best Contact Center Solutions of 2019

The Ins And Outs Of Business Communication Management For your business to exist in today’s world, you must know how...

Instagram poses as a threat to some of the world's most famous location Instagram poses as a threat to some of the world's most famous location
Our Voice3 months ago

How Instagram Corrupts Famous Locations In The World

Is Instagram corrupting the beauty of breathtakingly beautiful locations and sucking all the joy out of traveling? With the era...

How one can earn crypto How one can earn crypto
Our Voice4 months ago

Ways To Earn Cryptocurrency

Cryptocurrency is one of the growing medium for exchange in most countries as it offers a more convenient and safer...

Ending Payday Loans Ending Payday Loans
Our Voice4 months ago

Can We End Payday Loans?

We can’t neglect the fact that debt is one of the pressing problems in the country, especially in today’s economy....

How will 5G change our lives -- Our Voice How will 5G change our lives -- Our Voice
Our Voice4 months ago

Jumping From 4G To 5G: Here’s What 5G Can Do For You

One of the most awaited advancements in technology is the cellular industry. With its monthly updates on software, model and...

VoIP vs Traditional Telephones: Cost Factors to consider VoIP vs Traditional Telephones: Cost Factors to consider
Our Voice4 months ago

What are the cost factors of VoIP?

In the next few years, we might be saying goodbye to traditional telephone systems in exchange for Voice over Internet...

Manufacturing Firms Investment on Technology Manufacturing Firms Investment on Technology
Our Voice5 months ago

Manufacturing Firms are Investing More on Technology

Based on the recent research on how manufacturing companies are coming up in the market industry, they have been increasing...

How to properly take Technology Innovation in companies How to properly take Technology Innovation in companies
Our Voice5 months ago

Technology innovation in companies—for the better or the worse?

Technology has significantly impacted both homes and workplaces in the last years. As much as we want to keep our...