Andersson presented his work at the PacSec security conference in Tokyo earlier this week. It's a timely reminder that drones, like any form of remote electronics, can be hacked with enough time and persistence. DSMx, however, isn't the only signal protocol. Many drone manufacturers, including DJI, use an alternative protocol which may or may not be vulnerable to a similar attack. Regardless, such methods should be of interest to the government and law enforcement -- both to protect their own hardware, and stop the UAVs used by their adversaries. If you're intrigued too, you can check out Anderson's slides from PacSec here.

Drone hijack hardware demonstration at PacSec in Tokyo. pic.twitter.com/NQxA82qJTD — dragosr (@dragosr) October 26, 2016