Student Drone Flies, Submerges

Admit it. You’d get through boring classes in school by daydreaming of cool things you’d like to build. If you were like us, some of them were practical, but some of them were flights of fancy. Did you ever think of an airplane that could dive under the water? We did. So did some students at Aalborg University. The difference is they built theirs. Watch it do its thing in the video below.

As far as we can tell, the drone utilizes variable-pitch props to generate lift in the air and downward thrust in water. In addition to the direction of the thrust, water operations require a lower pitch to minimize drag. We’d be interested in seeing how it is all waterproofed, and we’re unsure how deep the device can go. No word on battery life either. From the video, we aren’t sure how maneuverable it is while submerged, but it does seem to have some control. It wouldn’t be hard to add a lateral thruster to improve underwater operations.

This isn’t the first vehicle of its kind (discounting fictional versions). Researchers at Rutgers created something similar in 2015, and we’ve seen other demonstrations, but this is still very well done, especially for a student project.

We did see a submersible drone built using parts from a flying drone. Cool, but not quite the same.

Continue reading “Student Drone Flies, Submerges”

Power Line Patrols: The Grid’s Eye In The Sky

Those of us who like to monitor air traffic with ADS-B aggregators such as FlightAware and ADS-B Exchange tend to see some interesting flight paths. I’m not talking about the truly ambitious pictures drawn by pilots, or even the more ribald ones, but rather flights that follow paths that seem to make little sense from either a commercial or leisure standpoint.

Most of these mystery flights have long straight stretches interrupted by occasional tight loops, and often cover great distances across rural and urban landscapes alike. A glance at the ADS-B data indicates that these flights are usually pretty close to the ground, and are often completed by helicopters. Occasionally, the registration of the aircraft will even indicate ownership by some “three-letter” federal agency.

Although mystery helicopters flying odd patterns in the sky seems like a good excuse to don a tinfoil hat and head to one’s bunker, chances are pretty good that these aircraft are engaged in a far less nefarious and far more useful endeavour: aerial transmission line patrols. These flights are key to keeping the transmission lines that form the backbone of the grid in tip-top shape, especially at a time of unprecedented growth in load and a shift in the generation profile away from fossil fuels towards renewables.

Continue reading “Power Line Patrols: The Grid’s Eye In The Sky”

A screenshot of the software in action is shown. A sidebar on the left shows an icon of a skull-shaped drone above the text “DAMN VULNERABLE DRONE.” Below this, it lists controls for the simulator, and resources for using the software. In the rest of the screen, a rendered scene is shown. A rendered computer monitor showing “DRONE HACKER” is at the bottom of the scene. Above this is a hovering drone, and behind it is a table labeled “Ground Control Station” with a man sitting at it.

A Vulnerable Simulator For Drone Penetration Testing

The old saying that the best way to learn is by doing holds as true for penetration testing as for anything else, which is why intentionally vulnerable systems like the Damn Vulnerable Web Application are so useful. Until now, however, there hasn’t been a practice system for penetration testing with drones.

The Damn Vulnerable Drone (DVD, a slightly confusing acronym) simulates a drone which flies in a virtual environment under the command of of an Ardupilot flight controller. A companion computer on the drone gives directions to the flight controller and communicates with a simulated ground station over its own WiFi network using the Mavlink protocol. The companion computer, in addition to running WiFi, also streams video to the ground station, sends telemetry information, and manages autonomous navigation, all of which means that the penetration tester has a broad yet realistic attack surface.

The Damn Vulnerable Drone uses Docker for virtualization. The drone’s virtual environment relies on the Gazebo robotics simulation software, which provides a full 3D environment complete with a physics engine, but does make the system requirements fairly hefty. The system can simulate a full flight routine, from motor startup through a full flight, all the way to post-flight data analysis. The video below shows one such flight, without any interference by an attacker. The DVD currently provides 39 different hacking exercises categorized by type, from reconnaissance to firmware attacks. Each exercise has a detailed guide and walk-through available (hidden by default, so as not to spoil the challenge).

This seems to be the first educational tool for drone hacking we’ve seen, but we have seen several vulnerabilities found in drones. Of course, it goes both ways, and we’ve also seen drones used as flying security attack platforms.

Continue reading “A Vulnerable Simulator For Drone Penetration Testing”

Triggering Lightning And Safely Guiding It Using A Drone

Every year lightning strikes cause a lot of damage — with the high-voltage discharges being a major risk to buildings, infrastructure, and the continued existence of squishy bags of mostly salty water. While some ways exist to reduce their impact such as lightning rods, these passive systems can only be deployed in select locations and cannot prevent the build-up of the charge that leads up to the plasma discharge event. But the drone-based system recently tested by Japan’s NTT, the world’s fourth largest telecommunications company, could provide a more proactive solution.

The idea is pretty simple: fly a drone that is protected by a specially designed metal cage close to a thundercloud with a conductive tether leading back to the ground. By providing a very short path to ground, the built-up charge in said cloud will readily discharge into this cage and from there back to the ground.

To test this idea, NTT researchers took commercial drones fitted with such a protective cage and exposed them to artificial lightning. The drones turned out to be fine up to 150 kA which is five times more than natural lightning. Afterwards the full system was tested with a real thunderstorm, during which the drone took a hit and kept flying, although the protective cage partially melted.

Expanding on this experiment, NTT imagines that a system like this could protect cities and sensitive areas, and possibly even use and store the thus captured energy rather than just leading it to ground. While this latter idea would need some seriously effective charging technologies, the idea of proactively discharging thunderclouds is perhaps not so crazy. We would need to see someone run the numbers on the potential effectiveness, of course, but we are all in favor of (safe) lightning experiments like this.

If you’re wondering why channeling lightning away from critical infrastructure is such a big deal, you may want to read up on Apollo 12.

Budget-Minded Synthetic Aperture Radar Takes To The Skies

Unless you work for the government or a large corporation, constrained designs are a fact of life. No matter what you’re building, there’s likely going to be a limit to the time, money, space, or materials you can work with. That’s good news, though, because constrained projects tend to be interesting projects, like this airborne polarimetric synthetic aperture radar.

If none of those terms make much sense to you, don’t worry too much. As [Henrik Forstén] explains, synthetic aperture radar is just a way to make a small radar antenna appear to be much larger, increasing its angular resolution. This is accomplished by moving the antenna across a relatively static target and doing some math to correlate the returned signal with the antenna position. We saw this with his earlier bicycle-mounted SAR.

For this project, [Henrik] shrunk the SAR set down small enough for a low-cost drone to carry. The build log is long and richly detailed and could serve as a design guide for practical radar construction. Component selection was critical, since [Henrik] wanted to use low-cost, easily available parts wherever possible. Still, there are some pretty fancy parts here, with a Zynq 7020 FPGA and a boatload of memory on the digital side of the custom PCB, and a host of specialized parts on the RF side.

The antennas are pretty cool, too; they’re stacked patch antennas made from standard FR4 PCBs, with barn-door feed horns fashioned from copper sheeting and slots positioned 90 to each other to provide switched horizontal and vertical polarization on both the receive and transmit sides. There are also a ton of details about how the radar set is integrated into the flight controller of the drone, as well as an interesting discussion on the autofocusing algorithm used to make up for the less-than-perfect positional accuracy of the system.

The resulting images are remarkably detailed, and almost appear to be visible light images thanks to the obvious shadows cast by large objects like trees and buildings. We’re especially taken by mapping all combinations of transmit and receive polarizations into a single RGB image; the result is ethereal.

Hackaday Links Column Banner

Hackaday Links: February 9, 2025

January 9 ended up being a very expensive day for a Culver City, California man after he pleaded guilty to recklessly operating a drone during the height of the Pacific Palisades wildfire. We covered this story a bit when it happened (second item), which resulted in the drone striking and damaging the leading edge of a Canadian “Super Scooper” plane that was trying to fight the fire. Peter Tripp Akemann, 56, admitted to taking the opportunity to go to the top of a parking garage in Santa Monica and launching his drone to get a better view of the action to the northwest. Unfortunately, the drone got about 2,500 meters away, far beyond visual range and, as it turns out, directly in the path of the planes refilling their tanks by skimming along the waters off Malibu. The agreement between Akemann and federal prosecutors calls for a guilty plea along with full restitution to the government of Quebec, which owns the damaged plane, plus the costs of repair. Akemann needs to write a check for $65,169 plus perform 150 hours of community service related to the relief effort for the fire’s victims. Expensive, yes, but probably better than the year in federal prison such an offense could have earned him.

Continue reading “Hackaday Links: February 9, 2025”

Hackaday Links Column Banner

Hackaday Links: January 26, 2025

Disappointing news this week for those longing for same-hour Amazon delivery as the retail giant tapped the brakes on its Prime Air drone deliveries. The pause is partially blamed on a December incident at the company’s Pendleton, Oregon test facility, where two MK30 delivery drones collided in midair during light rain conditions. A Bloomberg report states that the crash, which resulted in one of the drones catching fire on the ground, was due to a software error related to the weather. As a result, they decided to ground their entire fleet, which provides 60-minute delivery to test markets in Arizona and Texas, until a software update can be issued.

Continue reading “Hackaday Links: January 26, 2025”