-->
â�¢ GWM Souo S2000: The World’s First 2,000cc 8-Cylinder Cruiser Motorcycle  Ã¢�¢ Ferrari 312 P: The Hidden Racing Legend  Ã¢�¢ Ultimate Tribute: The 1958 Plymouth Fury 'Christine'  Ã¢�¢ The Lost Countach Successor: Lamborghini L150  Ã¢�¢ Ferrari Fioravanti SP1: A Unique Masterpiece of Custom Automotive Design  Ã¢�¢ Reviving Retro: The Rare AAT 1954 Corvette Sport Wagon  Ã¢�¢ Etna: Stunning Gallardo Restomod by Tedson Motors  Ã¢�¢ One-of-a-Kind Fiat 500 D Coupè Built by Varis Vegni  Ã¢�¢ The Forgotten South Korean Supercar: de Macross Epique GT1  Ã¢�¢ 1979 Corvette Transformed into the Iconic Mach 5  Ã¢�¢ Meet the Subaru Tortoise: A One-of-a-Kind 1968 Sci-Fi Microcar  Ã¢�¢ De Bruyn Ferox V8: Lightweight Power Meets Timeless Design  Ã¢�¢ American Condor Stinger: A Rare 1970s Kit Car Icon  Ã¢�¢ Spyker Silvestris: A Bold Revival of Dutch Automotive Heritage  Ã¢�¢ Tommy Kaira ZZ: The Japanese Sports Car That Struggled at Home  Ã¢�¢ SCG 003 Hypercar: A New Era of Performance  Ã¢�¢ Nissan GT-R R33 LM: The One-of-a-Kind Godzilla Behind Glass  Ã¢�¢ The Enigmatic AREx: Unraveling IDR's Supercar Legacy  Ã¢�¢ Timeless Icons: Exploring Japan's Top 3 Sports Cars Through History  Ã¢�¢ Turbocharged Beats: The '80s Sbarro Hot Hatch with Ferrari V8 Power  
Drop Down MenusCSS Drop Down MenuPure CSS Dropdown Menu
Tuesday, April 29, 2025

Monday, July 16, 2012

Drone Technology Sabotage-Prone?

No ivory that is not cracked. That proverb is right for unmanned fighter aircraft technology the United States. Advanced fighter aircraft, unmanned remotely controlled or drone, used in the United States reconnaissance and attack missions in the war was easily sabotaged.

Drones are mostly used for 
military operations. (Picture from:  
http://www.bbc.co.uk/)
The research team, which also came from America, uncover the secrets of sabotage that could cripple the unmanned reconnaissance aircraft. Scientists from the University of Texas at Austin found a "spoofing" method, ie, plowing techniques of satellite signals GPS (global positioning system) that are sent from the control station for unmanned aircraft.

The team of scientists that serve the challenges of the U.S. Department of Homeland Security (DHS) in mengulik weakness of drones. Todd Humphreys and a team of Radio Navigation Laboratory indicate the "spoofing" method in front of DHS officials. He uses a plane-sized unmanned mini helicopter that was flown over the stadium in the City of Austin.

Humphreys managed to hijack a GPS system drone university. Control of unmanned aircraft can be taken over after the aircraft GPS system is compromised and manipulated.
How drones.work. (Picture from: http://www.bbc.co.uk/)
"What if you could take over a drone sending FedEx packages and use them as the sender of a missile?" Humphreys said. "It's the same mentality as that of the attackers on 9 September 2001."

The U.S. military now often use this multifunctional drone because it can be controlled from a central headquarters are located thousands of kilometers away. Drones are often deployed in conflict zones like Afghanistan and Pakistan.

Military analysts said the "spoofing" method demo is displayed by Humphreys shows the potential hazards of the use of drones in the military mission. This method was allegedly used to bring down a U.S. military drone in Iran in 2011.

Noel Sharkey, founder of the International Committee for Robot Arms Control, said the "spoofing" method utilizing GPS signals are not encrypted. This signal is typically used civil aircraft.

"It's easy to fool an unencrypted signals from unmanned aircraft," said Sharkey. He added that anyone who is skilled can do and only requires equipment worth U.S. $ 1,000.

Sabotage drone with the method of "spoofing" proved to be very effective and dangerous. Sharkey said a hijacker can make drones as if "thinking" sliding into a specified location of the military headquarters. Though the plane was shot to another location that has been determined by hijackers.

The hijackers also can cripple drone, stealing, and filled it with explosives and pointed it somewhere else. "It becomes very dangerous because they can change direction and launched at the innocent peoples," said Sharkey. *** [FOXNEWS | MAHARDIKA SATRIA HADI | KORAN TEMPO 3928]
Note: This blog can be accessed via your smart phone.Enhanced by Zemanta
Kindly Bookmark and Share it:

Comments

Loading... Logging you in...
  • Logged in as
There are no comments posted yet. Be the first one!

Post a new comment

Comments by