Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Applications
    • Applications
    • Cybersecurity
    • Mobile

    Why It’s Easy to Hijack Airborne Drones

    Written by

    Wayne Rash
    Published December 8, 2013
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Security and privacy researcher Samy Kamkar told eWEEK exactly how easy it is to take over a small drone while it’s in flight and then turn the device to your own ends.

      In effect, he says, it’s not only possible to steal a drone, it’s easy and cheap, especially when the system was designed without strong security features. He also said that there are things a drone user can do to prevent this from happening.

      There are also some limitations. Kamkar said that his method of hijacking a drone currently only works with devices made by Parrot, which is one of the most commonly used remotely piloted drones. It also requires a software application, called Skyjack, that was developed in part by Kamkar.

      The security of drone communications has become an issue since Amazon.com founder and CEO Jeff Bezos revealed on a Dec. 1 broadcast of the CBS news feature show “60 Minutes” that his company is developing airborne drones capable of delivering packages to customers. This has triggered a public debate on whether an express delivery service based on unmanned drones could be operated safely and reliably, especially in urban areas.

      Kamkar is a long-time security researcher and developer of security systems. He is founder of Unleak, a start up that is beta testing an enterprise data security product. He was also the co-founder of Fonality and Global Domains. His work with drones is part of his ongoing cyber-security research.

      The Parrot AR drone is widely used in news and video applications as well as for use in law enforcement besides being widely used by hobbyists. For its size, it’s a sophisticated device with a wide range of options and it can be purchased from Amazon.com for under $300.

      Kamkar said that his hijacking method will not work if drone operators take security precautions such as encrypting the data link. “SkyJack will not work if the drone is using an encrypted com link,” Kamkar said in an email. “It currently only works with Parrot-based systems, all of which are unencrypted.”

      But what would-be drone delivery companies, such as Amazon and UPS, should be worried about is that the same method of taking over a drone could work on their devices, once the details about their operation are known. Kamkar used those details about Parrot drones to program his own drone to take them over.

      As Kamkar explains on his site, he installs a Raspberry Pi computer, a battery and a wireless transmitter on his own drone. He’s installed Linux on the computer and runs Skyjack software, which is the application that does the actual drone takeover.

      “The software works with a queuing mechanism,” Kamkar explained in his email to eWEEK. “Taking over one drone at a time until all drones it sees are Skyjacked, and then repeats looking for additional drones to control.”

      Kamkar’s drone can operate autonomously, flying around near his Los Angeles home encountering drones it can take over. But Kamkar also said that the software does not need to be installed on a drone to function. In fact, it can be installed on a ground-based computer and simply take over any drone it can detect.

      Security Researcher Demonstrates It’s Easy to Hijack Airborne Drones

      The Skyjack software identifies Parrot drones by detecting their unique MAC (Media Access Control) addresses from their built-in WiFi radios. Once the software has identified the Parrot drone, it commands it to drop its existing WiFi connection. Once it obeys that command, the software connects to the drone’s control system, passing control of the device over to the Skyjack operator who gains full control over the target drone.

      The operator can fly that drone anywhere and use its existing onboard cameras. If the drone were carrying a package, they could command it to land, and drop off the package.

      The single most important vulnerability that Kamkar has found is that these drones are using unencrypted data links. However, the fact that they are so easily identified by their MAC address certainly plays a role. All that’s required is an automated system to take over the onboard control system, pass control to the new operator, and then move on to the next device.

      Of course, the proposed Amazon or UPS drones, if they ever make it past the regulatory authorities, aren’t likely to be running Parrot control systems. But they are each likely to be running control systems that are easily identified by their own control link signals. And therein lies the problem.

      The commercial drones are certainly going to be larger and more substantial in their construction compared to the relatively flimsy construction of devices hobbyists can afford to buy on Amazon. But unless the companies operating those drones make sure they add some significant security to their radio control links, there’s no reason they can’t also be taken over in the same way.

      Such a take-over of a delivery drone could make theft more likely in the course of a delivery. But there are other more troubling possibilities. Someone could, for example, fly such a drone into the path of a landing airliner and even if the drone didn’t actually make it crash, the surprise to the pilot could easily cause a loss of control all by itself.

      Likewise, such a drone, if being used for law enforcement or public safety, could have its capabilities subverted. Not only would the drone not be looking at what it’s supposed to, it could reveal information that the new operator wants to see.

      While Kamkar’s revelations will give drone hobbyists some fun, they point to a serious vulnerability. If these devices are to be used commercially, they need to be highly secure and not easily taken over. Hopefully, the security of the data link will be a significant factor in approving unmanned vehicles for flight in populated areas. Without it, drone operators are simply asking for trouble.

      Wayne Rash
      Wayne Rash
      https://www.eweek.com/author/wayne-rash/
      Wayne Rash is a content writer and editor with a 35-year history covering technology. He’s a frequent speaker on business, technology issues and enterprise computing. He is the author of five books, including his most recent, "Politics on the Nets." Rash is a former Executive Editor of eWEEK and a former analyst in the eWEEK Test Center. He was also an analyst in the InfoWorld Test Center and editor of InternetWeek. He's a retired naval officer, a former principal at American Management Systems and a long-time columnist for Byte Magazine.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×