Risk
9/28/2011
12:12 PM
50%
50%

iPhone App Can Fly Unmanned Aircraft

Boeing, MIT test technology to control mini-drones that may eventually be used by the U.S. military.

14 Most Popular Government Mobile Apps
Slideshow: 14 Most Popular Government Mobile Apps
(click image for larger view and for slideshow)
Researchers from Boeing and the Massachusetts Institute of Technology (MIT) have created a prototype application that allows someone to fly a miniature unmanned aircraft from an iPhone.

Eventually, the technology may be applied to remotely control unmanned aerial vehicles (UAVs) such as drones used by the U.S. military in combat and reconnaissance missions.

Boeing Research & Technology and student researchers at MIT's Humans and Automation Lab have successfully tested an iPhone application that uses the device's touch interface to navigate a mini-UAV from across the country as part of a Boeing project called Micro Aerial Vehicle Visualization of Unexplored Environments, or MAV-VUE, according to Boeing.

[ Not only can you use an iPhone to control a UAV, you also can Run Your Data Center From An iPhone ]

An engineer from the aerospace company, George Windsor, successfully flew the UAV above a baseball field on the MIT campus in Cambridge, Mass., via an iPhone in the company's Seattle office. The application is part of Boeing's efforts to team with industry and education partners to develop better and easier ways to control UAVs, among other technological innovations.

Boeing said the benefits of remote control of mini-drones via an iPhone or another smartphone are that the applications can be used to control UAVs for dirty or dangerous tasks, or during long missions that would be tedious for a human at the controls of an aircraft.

Joshua Downs, a human factors specialist with Boeing Research & Technology and the Boeing technical leader of the MAV-VUE project, in a statement described use-case scenarios for the application.

One envisioned a soldier using a mobile app-controlled, lightweight UAV for a better view of a battlefield, and another proposed scenarios in which firefighters or rescue workers can use UAVs to quickly and efficiently get a better view of disaster areas.

The federal government--the military in particular--has been exploring innovative ways to use mobile applications on iPhones and Android-based devices in various combat and reconnaissance scenarios.

One program, Connecting Soldiers to Digital Applications, gives soldiers in the field mobile devices loaded with custom applications that will be helpful in combat, while another called Relevant ISR to the Edge sends real-time intelligence information to soldier handheld devices during a military mission.

Join us for GovCloud 2011, a day-long event where IT professionals in federal, state, and local government will develop a deeper understanding of cloud options. Register now.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-1637
Published: 2015-03-06
Schannel (aka Secure Channel) in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 does not properly restrict TLS state transitions, which makes it easier for r...

CVE-2014-2130
Published: 2015-03-05
Cisco Secure Access Control Server (ACS) provides an unintentional administration web interface based on Apache Tomcat, which allows remote authenticated users to modify application files and configuration files, and consequently execute arbitrary code, by leveraging administrative privileges, aka B...

CVE-2014-9688
Published: 2015-03-05
Unspecified vulnerability in the Ninja Forms plugin before 2.8.10 for WordPress has unknown impact and remote attack vectors related to admin users.

CVE-2015-0598
Published: 2015-03-05
The RADIUS implementation in Cisco IOS and IOS XE allows remote attackers to cause a denial of service (device reload) via crafted IPv6 Attributes in Access-Accept packets, aka Bug IDs CSCur84322 and CSCur27693.

CVE-2015-0607
Published: 2015-03-05
The Authentication Proxy feature in Cisco IOS does not properly handle invalid AAA return codes from RADIUS and TACACS+ servers, which allows remote attackers to bypass authentication in opportunistic circumstances via a connection attempt that triggers an invalid code, as demonstrated by a connecti...

Dark Reading Radio
Archived Dark Reading Radio
How can security professionals better engage with their peers, both in person and online? In this Dark Reading Radio show, we will talk to leaders at some of the security industry’s professional organizations about how security pros can get more involved – with their colleagues in the same industry, with their peers in other industries, and with the IT security community as a whole.