dfm covers

Cyber-poachers hack GPS collar data to pinpoint tigers

Print PDF
Monday, 23 September 2013 19:07 Written by DFM News

Considering their long history as a favorite target among poachers, it's not surprising that Bengal tigers are now among the planet's most elusive creatures. But while most illegal hunters faced long days of bushwhacking through the dark jungle in hopes of spotting the big cat before it finds them, a dangerous new breed of cyber-savvy poachers may be on the rise -- using conservation tools to help target their illicit prey.

Wildlife officials responsible for monitoring the species in the Satpura-Bori tiger reserve say that their computer systems were recently hacked to collect data from a tiger's GPS collar. The cyber crime, the first of its kind, would allow the poachers real-time data on where the animals were within the reserve, eliminating the dangerous work of tracking them down.

The Times of India reports that location data on at least one collared tiger, identified as Panna-211, may have been compromised. Normally, access to such sensitive information is strictly limited; only three wildlife specialists possess passcodes to view the GPS tracking data.

Since the perpetrator is yet unknown, nor the viability of the hacked information, officials say they will be closely monitoring Panna-211's movement for the next 6 months.

As many iconic endangered species continue to decline due to poaching, conservationists have increasingly begun turning to high-tech tools to aid in their protection. In wrong hands, however, the information could be immensely valuable to criminals with the opposite intention.

News Story sourced from www.treehugger.com

Please make cache directory writable.

Submit an Article

Call for Articles

We are keen to publish new articles from all aspects of digital forensics. Click to contact us with your completed article or article ideas.

Featured Book

Learning iOS Forensics

A practical hands-on guide to acquire and analyse iOS devices with the latest forensic techniques and tools.

Meet the Authors

Andrew Hoog

Andrew Hoog is the Chief Investigative Officer at viaForensics'


Coming up in the Next issue of Digital Forensics Magazine

Coming up in Issue 42 on sale from February 2020:

Forensic Syntactical & Linguistic Investigation

Mark Iwazko presents a case study regarding a Forensic Syntactical & Linguistic investigation: Instructed by the Moscow General Council of one of the actual big four accountants. Read More »

Forensic Readiness: A Proactive Approach to Support Forensic Digital Analysis

An increasing number of criminal actions are inflicting financial and brand damage to organizations around the globe. An impressive number of such cases do not reach the courts, mainly because of the organization’s inefficiency to produce robust digital evidences that are acceptable in the courts of law. Read More »

Subscribe today

Using Error-Patterns for Attribution: An Applied Linguistics Technique

Corpus Linguistics within Second Language Acquisition has developed models of error patterns made by defined groups of second language learners. This knowledge base can be leveraged by a knowledgeable analyst to attribute content to a subset of authors. Read More »

Every Issue
Plus the usual Competition, Book Reviews, 360, IRQ, Legal

Click here to read more about the next issue