User:
Pass:
Remember Me
Forgot Pass Register

Our educational work is entirely supported by people like you. Your donations directly add new exhibits and new features to the website, and even helps us open the Prehistoria Natural History Center!




eXTReMe Tracker

Articles / Technology


Cyber warfare is getting more and more attention from the United States military. With the skyrocketing number of unmanned drones flying over hot zones, it's very possible to blind their employer with a well placed hack. That is why the Department of Homeland Security dared a team of students from the University of Texas in Austin to hack one of their drones.

The students were successful in accomplishing the task by using a technique known as spoofing, which basically disguises signals sent by the hackers as those sent by the original operators. This is the same technique that is believed to have brought down the United States drone in Iran last year and rightfully so. When Iranian officials displayed the drone on live television, it appeared practically unharmed except for the reasonable dents from the rough landing.

Having a drone taken down by the military of your number one potential enemy is one thing, but when students have the ability to do it, there is reason to be worried. The Pentagon will be sure to take note of this and greatly increase efforts to render this technique less effective. Still, every time a new security system is implemented, it's only a matter of time until hackers find a way to bypass it. The UT Austin students are very likely to be the first batch of the many brilliant engineers the DoD is going to need to keep its cyber assets safe.

By Denis Ivanov

Source: rt.com
  • Currently 2.76/5
  • 1
  • 2
  • 3
  • 4
  • 5
Rating: 2.8 / 5 (971 votes)

Comments

There are no comments on this item.
User: Pass: Remember Me

To comment on this item, please login or register.


Warning: Unknown: Your script possibly relies on a session side-effect which existed until PHP 4.2.3. Please be advised that the session extension does not consider global variables as a source of data, unless register_globals is enabled. You can disable this functionality and this warning by setting session.bug_compat_42 or session.bug_compat_warn to off, respectively in Unknown on line 0