Guide For UAV Cyber Attack Available Online

Guide For UAV Cyber Attack Available Online

This post is also available in: heעברית (Hebrew)

Unmanned aerial vehicles are being widely used both in the public space and most certainly in the military space. Mostly, the world’s armies use UAVs for surveillance and intelligence purposes – hence the fear of a successful cyber attack against them. Had such a remote attack been commited, allowing a hostile source to get his hands on the vehicle, a great treasure would have been revealed, containing at least new technological perception through which such hostile source can learn about their enemy. In a worse case scenario, the one who commited the UAV cyber attack could simply watch what places the vehicles focused on, so as to learn about the silent movements of their enemy through watching the information collected by it.

For armies operating UAVs for intelligence, this is an unspeakable nightmare. It seems, however, that this nightmare could turn into reality in an instant just by a quick search in Google. It turns out that the internet contains, between mountains of information, a file to explain how anyone can cyber hack into a UAV midflight.ausr_e2

The document explains in great details what are the stages of action necessary in order to take over the aerial vehicle and was published as part of a joint academic research of California University and the Zurich Technological Institute. Naturally the researchers had no intentions other than to enrich the academic discourse, but the information they published aids hostile bodies or individuals to carry out their wicked plans.

On the other hand, even while possibly assissting the enemy unknowingly, these researchers are also causing military research and development teams to develop better defense technology against cyber attacks. So, for example, the Defense Advanced Research Projects Agency (DARPA) is currently working on an encrypting techniques which are supposedly “impenetrable”. The development should be available for operational use by the 2017.

Subscribe to our newsletter.