{"id":38114,"date":"2020-11-10T19:58:11","date_gmt":"2020-11-10T19:58:11","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/radio-frequency-fingerprinting-of-aircraft-ads-b-transmitters-boffins-reckon-theyve-cracked-it\/"},"modified":"2020-11-10T19:58:11","modified_gmt":"2020-11-10T19:58:11","slug":"radio-frequency-fingerprinting-of-aircraft-ads-b-transmitters-boffins-reckon-theyve-cracked-it","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/radio-frequency-fingerprinting-of-aircraft-ads-b-transmitters-boffins-reckon-theyve-cracked-it\/","title":{"rendered":"Radio Frequency fingerprinting of aircraft ADS-B transmitters? Boffins reckon they&#8217;ve cracked it"},"content":{"rendered":"<p>A group of academics reckon they&#8217;ve found a way to uniquely fingerprint aeroplanes\u2019 Automatic Dependent Surveillance-Broadcast (ADS-B) tracking transmitters \u2013 though an aviation infosec boffin says more research is needed to verify the new technique.<\/p>\n<p>In a paper titled \u201cReal-World ADS-B signal recognition based on Radio Frequency Fingerprinting,\u201d three Chinese researchers describe what they said was a method of identifying unique transmitters fitted to aircraft \u2013 regardless of what identity code the equipment is broadcasting.<\/p>\n<p>\u201cWe propose and design a novel RFF recognition scheme based on Contour Stellar Images and deep learning. We designed an ADS-B original signal capture and labelling method and verified this method by using a 1090MHz baseband signal collected by RTL-SDR, collecting signals from a total of 5 aircraft,\u201d wrote the researchers in their <a target=\"_blank\" href=\"https:\/\/icnp20.cs.ucr.edu\/proceedings\/aimcom2\/Real-World%20ADS-B%20signal%20recognition%20based%20on%20Radio%20Frequency%20Fingerprinting.pdf\" rel=\"noopener noreferrer\">paper<\/a> [PDF].<\/p>\n<p>This could pose a problem for nation states hoping to disguise military and government aircraft as benign civilian traffic. Some countries, however, <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2020\/09\/29\/flight_radar_24_ddos\/\" rel=\"noopener noreferrer\">take a more robust approach<\/a> to preventing open-source surveillance of their operations.<\/p>\n<div class=\"promo_article\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2019\/01\/08\/heathrow_airport.jpg?x=174&amp;y=115&amp;crop=1\" width=\"174\" height=\"115\" alt=\"heathrow_airport\"><\/p>\n<h2 title=\"Faking an emergency collision alarm - just what you don't need over Heathrow\">Meet the new aviation insecurity, same as the old aviation insecurity: Next-gen ACAS X just as vulnerable to spoofing as its predecessor<\/h2>\n<p><a href=\"https:\/\/www.theregister.com\/2020\/10\/06\/acasx_spoofing_vulnerability\/\"><span>READ MORE<\/span><\/a><\/div>\n<p>ADS-B is the tech that powers many popular airline flight tracking websites such as Flight Radar 24 and Flightaware, among others. ADS-B transmitters works by broadcasting the aircraft\u2019s GPS location along with a unique identifier, issued by the registering country\u2019s authorities. Crucially, it is not authenticated; anyone can broadcast an ADS-B signal posing as anyone else.<\/p>\n<p>By broadcasting a different unique identifier one can spoof that aircraft\u2019s identity and pose as another aeroplane, something used by various countries as <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.popularmechanics.com\/military\/aviation\/a33970936\/us-spy-plane-impersonates-malaysian-aircraft\/\">part of military operations<\/a>.<\/p>\n<p>Through applying a convolutional neural network (CNN) to ADS-B data gathered from five aircraft, researchers Haoran Zha, Qiao Tian and Yun Lin, all from China\u2019s Harbin Engineering University, reckoned they were able to successfully differentiate and classify each aircraft\u2019s ADS-B RF emissions. Raw signals were transformed into contour stellar images for training the CNN and eventually live classification of each aircraft\u2019s unique fingerprint.<\/p>\n<p>An RTL-SDR open source radio captured the signals used by the researchers, with the Alexnet and GoogLeNet CNNs used to crunch the data.<\/p>\n<h3 class=\"crosshead\"> <span>Pinch of salt needed here, though<\/span><br \/>\n<\/h3>\n<p>British researcher Matt Smith of <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2020\/03\/04\/aviation_infosec_study_a320_systems_hack\/\" rel=\"noopener noreferrer\">Oxford University&#8217;s aviation cybersecurity department<\/a> wasn\u2019t blown away by the findings, telling <i>The Register<\/i>: \u201cIt&#8217;s certainly an interesting approach and one we haven&#8217;t seen before. However, there are some important questions which would need to be answered before we can properly assess the method.\u201d<\/p>\n<p>Apart from the small number of aircraft in the sample, said Smith, there was no indication that the 500 signals harvested from all five aircraft had been captured while the aeroplane was in flight, or from different locations and ranges.<\/p>\n<p>\u201cHow stable is the fingerprint in different reception environments? Mode S is a notoriously congested channel,\u201d he added, referring to the RF name for the technology ADS-B uses in its signals.<\/p>\n<p>Smith concluded: \u201cThe approach is certainly&#8230; something new, but we need to see more analysis on larger datasets to understand how effective it can be. It would also be important to explore the performance of such a system when faced with realistic Mode S packet rates.\u201d<\/p>\n<p>It may be abortive for now, but if the technique is expanded and verified to be capable of working in near-real time, it could pose an extra headache for nation states and others looking to camouflage their aircraft among others. \u00ae<\/p>\n<p> READ MORE <a href=\"https:\/\/go.theregister.com\/feed\/www.theregister.com\/2020\/11\/10\/adsb_fingerprinting_research\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>More data points needed, says academic, but technique could give governments a spoofin&#8217; bad headache A group of academics reckon they&#8217;ve found a way to uniquely fingerprint aeroplanes\u2019 Automatic Dependent Surveillance-Broadcast (ADS-B) tracking transmitters \u2013 though an aviation infosec boffin says more research is needed to verify the new technique.\u2026  READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":38115,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-38114","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Radio Frequency fingerprinting of aircraft ADS-B transmitters? Boffins reckon they&#039;ve cracked it 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/radio-frequency-fingerprinting-of-aircraft-ads-b-transmitters-boffins-reckon-theyve-cracked-it\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Radio Frequency fingerprinting of aircraft ADS-B transmitters? Boffins reckon they&#039;ve cracked it 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/radio-frequency-fingerprinting-of-aircraft-ads-b-transmitters-boffins-reckon-theyve-cracked-it\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-11-10T19:58:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/11\/radio-frequency-fingerprinting-of-aircraft-ads-b-transmitters-boffins-reckon-theyve-cracked-it.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"174\" \/>\n\t<meta property=\"og:image:height\" content=\"115\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/radio-frequency-fingerprinting-of-aircraft-ads-b-transmitters-boffins-reckon-theyve-cracked-it\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/radio-frequency-fingerprinting-of-aircraft-ads-b-transmitters-boffins-reckon-theyve-cracked-it\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Radio Frequency fingerprinting of aircraft ADS-B transmitters? Boffins reckon they&#8217;ve cracked it\",\"datePublished\":\"2020-11-10T19:58:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/radio-frequency-fingerprinting-of-aircraft-ads-b-transmitters-boffins-reckon-theyve-cracked-it\\\/\"},\"wordCount\":591,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/radio-frequency-fingerprinting-of-aircraft-ads-b-transmitters-boffins-reckon-theyve-cracked-it\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/radio-frequency-fingerprinting-of-aircraft-ads-b-transmitters-boffins-reckon-theyve-cracked-it.jpg\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/radio-frequency-fingerprinting-of-aircraft-ads-b-transmitters-boffins-reckon-theyve-cracked-it\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/radio-frequency-fingerprinting-of-aircraft-ads-b-transmitters-boffins-reckon-theyve-cracked-it\\\/\",\"name\":\"Radio Frequency fingerprinting of aircraft ADS-B transmitters? Boffins reckon they've cracked it 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/radio-frequency-fingerprinting-of-aircraft-ads-b-transmitters-boffins-reckon-theyve-cracked-it\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/radio-frequency-fingerprinting-of-aircraft-ads-b-transmitters-boffins-reckon-theyve-cracked-it\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/radio-frequency-fingerprinting-of-aircraft-ads-b-transmitters-boffins-reckon-theyve-cracked-it.jpg\",\"datePublished\":\"2020-11-10T19:58:11+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/radio-frequency-fingerprinting-of-aircraft-ads-b-transmitters-boffins-reckon-theyve-cracked-it\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/radio-frequency-fingerprinting-of-aircraft-ads-b-transmitters-boffins-reckon-theyve-cracked-it\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/radio-frequency-fingerprinting-of-aircraft-ads-b-transmitters-boffins-reckon-theyve-cracked-it\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/radio-frequency-fingerprinting-of-aircraft-ads-b-transmitters-boffins-reckon-theyve-cracked-it.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/radio-frequency-fingerprinting-of-aircraft-ads-b-transmitters-boffins-reckon-theyve-cracked-it.jpg\",\"width\":174,\"height\":115},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/radio-frequency-fingerprinting-of-aircraft-ads-b-transmitters-boffins-reckon-theyve-cracked-it\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Radio Frequency fingerprinting of aircraft ADS-B transmitters? Boffins reckon they&#8217;ve cracked it\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Radio Frequency fingerprinting of aircraft ADS-B transmitters? Boffins reckon they've cracked it 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/radio-frequency-fingerprinting-of-aircraft-ads-b-transmitters-boffins-reckon-theyve-cracked-it\/","og_locale":"en_US","og_type":"article","og_title":"Radio Frequency fingerprinting of aircraft ADS-B transmitters? Boffins reckon they've cracked it 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/radio-frequency-fingerprinting-of-aircraft-ads-b-transmitters-boffins-reckon-theyve-cracked-it\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-11-10T19:58:11+00:00","og_image":[{"width":174,"height":115,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/11\/radio-frequency-fingerprinting-of-aircraft-ads-b-transmitters-boffins-reckon-theyve-cracked-it.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/radio-frequency-fingerprinting-of-aircraft-ads-b-transmitters-boffins-reckon-theyve-cracked-it\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/radio-frequency-fingerprinting-of-aircraft-ads-b-transmitters-boffins-reckon-theyve-cracked-it\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Radio Frequency fingerprinting of aircraft ADS-B transmitters? Boffins reckon they&#8217;ve cracked it","datePublished":"2020-11-10T19:58:11+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/radio-frequency-fingerprinting-of-aircraft-ads-b-transmitters-boffins-reckon-theyve-cracked-it\/"},"wordCount":591,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/radio-frequency-fingerprinting-of-aircraft-ads-b-transmitters-boffins-reckon-theyve-cracked-it\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/11\/radio-frequency-fingerprinting-of-aircraft-ads-b-transmitters-boffins-reckon-theyve-cracked-it.jpg","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/radio-frequency-fingerprinting-of-aircraft-ads-b-transmitters-boffins-reckon-theyve-cracked-it\/","url":"https:\/\/www.threatshub.org\/blog\/radio-frequency-fingerprinting-of-aircraft-ads-b-transmitters-boffins-reckon-theyve-cracked-it\/","name":"Radio Frequency fingerprinting of aircraft ADS-B transmitters? Boffins reckon they've cracked it 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/radio-frequency-fingerprinting-of-aircraft-ads-b-transmitters-boffins-reckon-theyve-cracked-it\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/radio-frequency-fingerprinting-of-aircraft-ads-b-transmitters-boffins-reckon-theyve-cracked-it\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/11\/radio-frequency-fingerprinting-of-aircraft-ads-b-transmitters-boffins-reckon-theyve-cracked-it.jpg","datePublished":"2020-11-10T19:58:11+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/radio-frequency-fingerprinting-of-aircraft-ads-b-transmitters-boffins-reckon-theyve-cracked-it\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/radio-frequency-fingerprinting-of-aircraft-ads-b-transmitters-boffins-reckon-theyve-cracked-it\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/radio-frequency-fingerprinting-of-aircraft-ads-b-transmitters-boffins-reckon-theyve-cracked-it\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/11\/radio-frequency-fingerprinting-of-aircraft-ads-b-transmitters-boffins-reckon-theyve-cracked-it.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/11\/radio-frequency-fingerprinting-of-aircraft-ads-b-transmitters-boffins-reckon-theyve-cracked-it.jpg","width":174,"height":115},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/radio-frequency-fingerprinting-of-aircraft-ads-b-transmitters-boffins-reckon-theyve-cracked-it\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Radio Frequency fingerprinting of aircraft ADS-B transmitters? Boffins reckon they&#8217;ve cracked it"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/38114","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=38114"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/38114\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/38115"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=38114"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=38114"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=38114"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}