Modern field guide to security and privacy

Exclusive: Civilian drones need costly fixes to avoid hacking, study indicates

Drones appear to be seriously vulnerable to hackers seeking to commandeer the vehicles by ‘spoofing,’ or faking, GPS satellite navigation signals. An overview of a federal study, obtained by the Monitor, discusses the problem and remedies.

|
Mesa County Sheriff's Unmanned Operations Team/AP
A small Draganflyer X6 drone makes a test flight in Mesa County, Colo. with a Forward Looking Infrared payload, Jan. 8, 2009. The drone, which was on loan to the sheriff's department from the manufacturer, measures about 36 inches from rotor tip to rotor tip, weights just over two pounds. Civilian drones are in demand by police departments, border patrols, power companies, news organizations and others wanting a bird’s-eye view.

Commercial drones expected to fly US skies in coming years, delivering pizza or monitoring power lines, would be dangerously vulnerable to hackers without a variety of potentially costly countermeasures to their GPS navigation systems, results of a federal study indicate.

Privacy and flight-safety concerns have dominated public debate since Congress voted two years ago to let thousands of parcel-laden or observational commercial drones trundle across US skies by 2015.

But an equally serious, if less recognized, threat lies in drone vulnerabilities to hackers seeking to commandeer unmanned aerial vehicles (UAVs) by “spoofing,” or faking, GPS satellite navigation signals using cheap GPS transmitting equipment. Such spoofing, when directed at a drone, could make it crash, drone experts say.

“Hacking commercial drones is a serious concern,” says Dennis Gormley, senior lecturer at Graduate School of Public and International Affairs at the University of Pittsburgh. “There are plenty of people who argue we’re not doing enough, even with respect to securing our more sensitive and costly military drones. So, yes, I’m concerned about the civilian side of things.”

The Federal Aviation Administration's Next Generation Air Transportation System now in development is expected increase its reliance on GPS – the core of the US-operated global navigation satellite system (GNSS). To address the GPS spoofing threat, the FAA in 2012 initiated a federal study of GPS navigation vulnerability. That study – by the GNSS Intentional Interference and Spoofing Study Team – concluded last fall, but findings have not been released publicly. An FAA spokesman declined to comment on the study.

An overview of the study, obtained by the Monitor, lists major vulnerabilities that affect UAVs – as well as newly identified countermeasures to defeat attackers, an expert who has seen the overview says.

“GNSS receivers are susceptible to intentional interference and spoofing,” according to the overview report, which was delivered by an FAA expert at an international conference in New Zealand in April. “Inexpensive, and readily available, GNSS repeaters and GNSS simulation tools can transmit hazardously misleading information ‘spoofing’ GNSS use.”

That much had been suspected since UAV tests at White Sands Missile Range, which allowed University of Texas researchers to demonstrate in 2012 how a drone could be made to dive toward the ground by spoofing.

But the federal research team has apparently advanced the investigation by identifying and investigating no less than eight “intentional interference & spoofing threat scenarios,” including four “interference” (GPS signal jamming) scenarios and four signal-spoofing scenarios, the study overview indicates.

Yet the team also found “numerous technical, operational, and legal mitigations” to limit some of those threats. The report cites six specific technical recommendations to limit GPS hacking, including the use of advanced antennas and digital authentication signatures for satellite signals, according to the overview.

Still, the “ability to recognize deception is problematic” for equipment, pilots, and air traffic controllers, the overview notes. None of the security fixes are likely to come cheap, either – a major issue if the cost of drones is to be kept down to compete with drone-makers in other countries, experts say.

“The strategies they recommend are far from foolproof, but they're sensible: each of them would complicate a successful spoofing attack,” says Todd Humphreys, a professor and satellite navigation expert who led the University of Texas team during the White Sands demonstration and reviewed the study overview and findings for the Monitor. “The question on my mind, and I'm sure on theirs, is how soon some or all these could be implemented. I expect it'll be 5-10 years or more,” says Professor Humphreys, who made these comments via e-mail.

Peter Singer, a strategist at the New America Foundation, a nonpartisan public policy think tank based in Washington, agrees with him.

“Communications of any kind can be jammed or hacked given the right level of skill, motivation, and time,” he says. “So you want to focus not just on improving protection and prevention, but also resilience and response.”

Technical fixes will plug those GPS navigation system vulnerabilities not only for UAVs, but also for other aircraft, say commercial UAV industry officials.

“There are weaknesses to just relying on GPS for navigation, but those weaknesses are not just for unmanned aircraft,” says Ben Gielow, general counsel for the Association for Unmanned Vehicle Systems International, which represents the UAV industry. “It is a concern and it is being addressed, certainly.”

Still, the federal study findings arrive against a backdrop of rising public concern over the prospect of having drones hovering overhead. Last month, the Obama administration’s use of military drones was criticized by a bipartisan panel of experts for creating a “slippery slope” that could lead to perpetual war.

Civilian drones flown with FAA's permission are also in the limelight. Law enforcement agencies, universities, and other registered drone users reported 23 accidents and 236 unsafe incidents since November 2009, according to FAA records, The Washington Post reported last week.

In May, the Post reported, a quad-copter drone with four rotors crashed into the 30th floor of a St. Louis skyscraper. In March, the FAA fined a Brooklyn man $2,200 for hitting two midtown Manhattan skyscrapers with his quad-copter before it nearly crashed into a pedestrian.

Testing on UAV systems to improve safety could delay their arrival in US skies beyond 2015, many say.

Yet once given an FAA stamp of approval, the economy will feel a boost from the commercial drone business, Mr. Gielow says. The military and civilian UAV market is predicted to more than double over the next decade to more than $11 billion in 2023, according to the Teal Group, a Fairfax, Va., consulting firm.

In May, the Pentagon’s Defense Advanced Research Projects Agency (DARPA) unveiled an experimental drone built with secure software aimed at preventing its control and navigation systems from being hacked. Such systems could eventually work their way into commercial drones.

Yet some experts are circumspect about the prospect of preventing drones from being hacked, even with advanced mitigation measures.

“We agree the command-and-control link is one of the easiest to make a fix to by adding encryption,” says Humphreys in a phone interview. “The other weak point is the navigation link. It’s not encrypted and is easy to falsify. But changing signals so they are encrypted will, for civilian drones, take years, a decade – or never. It’s a serious problem.”

You've read  of  free articles. Subscribe to continue.
Real news can be honest, hopeful, credible, constructive.
What is the Monitor difference? Tackling the tough headlines – with humanity. Listening to sources – with respect. Seeing the story that others are missing by reporting what so often gets overlooked: the values that connect us. That’s Monitor reporting – news that changes how you see the world.

Dear Reader,

About a year ago, I happened upon this statement about the Monitor in the Harvard Business Review – under the charming heading of “do things that don’t interest you”:

“Many things that end up” being meaningful, writes social scientist Joseph Grenny, “have come from conference workshops, articles, or online videos that began as a chore and ended with an insight. My work in Kenya, for example, was heavily influenced by a Christian Science Monitor article I had forced myself to read 10 years earlier. Sometimes, we call things ‘boring’ simply because they lie outside the box we are currently in.”

If you were to come up with a punchline to a joke about the Monitor, that would probably be it. We’re seen as being global, fair, insightful, and perhaps a bit too earnest. We’re the bran muffin of journalism.

But you know what? We change lives. And I’m going to argue that we change lives precisely because we force open that too-small box that most human beings think they live in.

The Monitor is a peculiar little publication that’s hard for the world to figure out. We’re run by a church, but we’re not only for church members and we’re not about converting people. We’re known as being fair even as the world becomes as polarized as at any time since the newspaper’s founding in 1908.

We have a mission beyond circulation, we want to bridge divides. We’re about kicking down the door of thought everywhere and saying, “You are bigger and more capable than you realize. And we can prove it.”

If you’re looking for bran muffin journalism, you can subscribe to the Monitor for $15. You’ll get the Monitor Weekly magazine, the Monitor Daily email, and unlimited access to CSMonitor.com.

QR Code to Exclusive: Civilian drones need costly fixes to avoid hacking, study indicates
Read this article in
https://www.csmonitor.com/World/Passcode/2014/0703/Exclusive-Civilian-drones-need-costly-fixes-to-avoid-hacking-study-indicates
QR Code to Subscription page
Start your subscription today
https://www.csmonitor.com/subscribe