GPS ‘hack’ throws $80M superyacht off course.
A University of Texas team has shown how a relatively low cost small software radio device can be used to trick GPS receivers into believing false signals. Because all GPS signals are sent to Earth without any authentication or encryption, the team was able to send a false signal which was perfectly aligned with what the receiving unit would have been expecting.
In this case the signal was sent from on board the yacht with permission from the captain, however the team says it could easily be used maliciously:

What we did was out in the open, it was against a live vehicle, a vessel—an $80 million superyacht, controlling it with a $2,000 box,” he told Ars. “This is unprecedented. This has never been shown in this kind of demonstration. That’s what so sinister about the attack that we did. There were no alarms on the bridge. The GPS receiver showed a strong signal the whole time. You just need to have approximate line of sight visibility. Let’s say you had an unmanned drone, you could do it from 20 to 30 kilometers away or on the ocean you could do two to three kilometers.”

GPS ‘hack’ throws $80M superyacht off course.

A University of Texas team has shown how a relatively low cost small software radio device can be used to trick GPS receivers into believing false signals. Because all GPS signals are sent to Earth without any authentication or encryption, the team was able to send a false signal which was perfectly aligned with what the receiving unit would have been expecting.

In this case the signal was sent from on board the yacht with permission from the captain, however the team says it could easily be used maliciously:

What we did was out in the open, it was against a live vehicle, a vessel—an $80 million superyacht, controlling it with a $2,000 box,” he told Ars. “This is unprecedented. This has never been shown in this kind of demonstration. That’s what so sinister about the attack that we did. There were no alarms on the bridge. The GPS receiver showed a strong signal the whole time. You just need to have approximate line of sight visibility. Let’s say you had an unmanned drone, you could do it from 20 to 30 kilometers away or on the ocean you could do two to three kilometers.”

165 notes

Show

  1. the-jamjam reblogged this from 8bitfuture
  2. things-running-through-my-mind reblogged this from 8bitfuture
  3. swforshort reblogged this from 8bitfuture
  4. evelark reblogged this from monsieurbombardier
  5. klaatu reblogged this from bornofanatombomb
  6. bornofanatombomb reblogged this from howstuffworks
  7. strayblossoms reblogged this from emergentfutures
  8. monsieurbombardier reblogged this from howstuffworks
  9. bwansen reblogged this from elfboi and added:
    I think I had posted this news already, but I’m too lazy to check. XD
  10. bseverns reblogged this from emergentfutures
  11. dmitry999 reblogged this from emergentfutures
  12. gorillamedic reblogged this from gmsurvival and added:
    I suppose it was only a matter of time before this was tried—any signal can be spoofed; and any unencrypted one can be...
  13. thebluesalamanderspeaks reblogged this from howstuffworks and added:
    Encryption time!
  14. fieryone reblogged this from crossbonegundam
  15. floorwildcat reblogged this from jlcoburn and added:
    And this is how “Tomorrow Never Dies” happened. #GPS #Meaconing
  16. grimroth reblogged this from howstuffworks
  17. kammartinez reblogged this from howstuffworks
  18. gmsurvival reblogged this from howstuffworks
  19. crossbonegundam reblogged this from jlcoburn
  20. jlcoburn reblogged this from howstuffworks
  21. howstuffworks reblogged this from emergentfutures
  22. sustainingtoronto reblogged this from emergentfutures
  23. casaq25 reblogged this from emergentfutures
  24. eli-juggernaut reblogged this from reafan
  25. iamthemonolith reblogged this from reafan
  26. reafan reblogged this from emergentfutures

Blog comments powered by Disqus