1. GPS ‘hack’ throws $80M superyacht off course.
A University of Texas team has shown how a relatively low cost small software radio device can be used to trick GPS receivers into believing false signals. Because all GPS signals are sent to Earth...

    GPS ‘hack’ throws $80M superyacht off course.

    A University of Texas team has shown how a relatively low cost small software radio device can be used to trick GPS receivers into believing false signals. Because all GPS signals are sent to Earth without any authentication or encryption, the team was able to send a false signal which was perfectly aligned with what the receiving unit would have been expecting.

    In this case the signal was sent from on board the yacht with permission from the captain, however the team says it could easily be used maliciously:

    What we did was out in the open, it was against a live vehicle, a vessel—an $80 million superyacht, controlling it with a $2,000 box,” he told Ars. “This is unprecedented. This has never been shown in this kind of demonstration. That’s what so sinister about the attack that we did. There were no alarms on the bridge. The GPS receiver showed a strong signal the whole time. You just need to have approximate line of sight visibility. Let’s say you had an unmanned drone, you could do it from 20 to 30 kilometers away or on the ocean you could do two to three kilometers.”

  2. Source:
    blog comments powered by Disqus

    172 notes

    1. things-running-through-my-mind reblogged this from 8bitfuture
    2. swforshort reblogged this from 8bitfuture
    3. evelark reblogged this from mademoisellebombardier
    4. klaatu-blog reblogged this from bornofanatombomb
    5. bornofanatombomb reblogged this from howstuffworks
    6. strayblossoms reblogged this from emergentfutures
    7. mademoisellebombardier reblogged this from howstuffworks
    8. bwansen reblogged this from elfboi and added:
      I think I had posted this news already, but I’m too lazy to check. XD
    9. bseverns reblogged this from emergentfutures
    10. dmitry999 reblogged this from emergentfutures
    11. gorillamedic reblogged this from gmsurvival-old and added:
      I suppose it was only a matter of time before this was tried—any signal can be spoofed; and any unencrypted one can be...
    12. thebluesalamanderspeaks reblogged this from howstuffworks and added:
      Encryption time!
    13. grimroth reblogged this from howstuffworks
    14. kammartinez reblogged this from howstuffworks
    15. gmsurvival-old reblogged this from howstuffworks
    16. howstuffworks reblogged this from emergentfutures
    17. talking2clouds reblogged this from emergentfutures
    18. 8bitfuture posted this