sneak 4 days ago

ADS-B is packet data telemetry broadcast unencrypted and unauthenticated by aircraft on 1090MHz.

Anyone can receive it, and many do. FlightRadar and others have networks of people with receivers that forward all received packets to central servers.

The aircraft self-report location, heading, altitude, etc, so anyone can transmit packets making ghost planes.

I am somewhat surprised nobody has stashed an ADS-B spoofer near ATL or AMS that just broadcasts tracks of A380 tail numbers crossing the runways perpendicular at 500 ft AGL or something. They have primary radar, sure, but I imagine there would still be a temporary disruption until people figured out what was going on.

I think this is the first case I’ve seen of ADS-B spoofing in the wild.

EDIT: this was spoofed reports to the data aggregators via the internet, not broadcast on radio waves. I’ve still never seen or heard tell of RF ADS-B spoofing.

  • fc417fc802 4 days ago

    > I’ve still never seen or heard tell of RF ADS-B spoofing.

    Probably because the required expertise, effort, risk, and reward ratios don't work out. You can cause a minor disturbance that isn't particularly visible and in exchange get investigated by the FBI. Seems about as wise as attempting to graffiti the front gate of a military base.

  • pixl97 4 days ago

    Fake signals are not uncommon, but mostly accidental. They are dealt with very quickly when causing traffic control problems

    • sneak 4 days ago

      Sure, but traffic control problems can still be caused (temporarily) by abuse of the frequency/protocol by those intending to cause disruption.

      Can you tell me more about the fake signals? Who sends them? Why? How often?

    • mywittyname 4 days ago

      I'm guessing this doesn't cause traffic control problems due to the no-fly zone over that area?

      • pixl97 4 days ago

        Probably is not causing traffic issues. With that said I'm sure a number of TLA's are looking into it already, so whoever did it has hopefully took a number of infosec steps not to get caught and questioned.

  • infthi 3 days ago

    There was this proof of concept in 2012: https://youtu.be/CXv1j3GbgLk?t=2483

    (IIUC they did not actually transmit data, just fed it directly into an ADS-B receiver, but transmitting would've been trivial at this point)

CGMthrowaway 4 days ago

No real 747 flew this. It was a prank using impossible flight data via ADS-B spoofing. Ground-based “software-defined radios” (SDRs) broadcast fake transponder signals to trick ADS-B Exchange. This works because both the ADS-B & AIS systems use unencrypted, unauthenticated data.

  • joecool1029 4 days ago

    It was sent to ADSBexchange's API, not over RF. No laws were broken.

    • nshireman 4 days ago

      Yep, as evidenced by the "Source:Other" tag on ADSBExchange. Signals actually sent over the air would show ADS-B, TIS-B, etc, as the data source.

      • Scoundreller 4 days ago

        It’s only “other” at the very last point. Go earlier in the track and it shows as “ADS-B”, but every historical real flight in this plane is MLAT (it doesn’t broadcast its precise position but it can be inferred from receivers)

      • jjwiseman 4 days ago

        That's not true. And if you click almost anywhere else on the spoofed track it will show as Source: ADS-B.

  • [removed] 4 days ago
    [deleted]