Skip to main content

Study: Poachers are trying to hack animal trackers, intercept signals

poachers
Sasint/Pixabay
Poachers are turning to hacking and “cyber poaching” to stay one step ahead of animal conservationists, according to a new study.

The paper, co-published by researchers from several universities in Conservation Biology, claims that poachers are intercepting GPS signals sent from trackers that have been placed on protected animals. The researchers point out that while electronic tagging of endangered or at-risk animals has been beneficial, there are a “number of troubling and unanticipated issues” at the same time.

“Animal tracking can reveal animal locations (sometimes in nearly real-time), and these data can help people locate, disturb, capture, harm, or kill tagged animals,” the paper said.

In one case, dubbed “cyber poaching,” an Indian conservationist’s email account was reportedly targeted to gain sensitive data about a Bengal tiger. The tiger had been equipped with a $5,000 GPS tracker that sent location data to the email address every couple of hours. In this instance the alleged hackers were unsuccessful in scooping up the GPS data from the account after the conservationist was alerted to activity on the account, supposedly from a source over 600 miles away.

The researchers go on to claim that poachers in Yellowstone Park were able to use relatively cheap signal receivers to pick up on GPS signals from tagged wolves.

In another example, tagged white sharks in Australia provided hunters with valuable data on when sharks were congregated in one spot. The data was originally intended to advise beach-goers of when the waters were unsafe for swimming. Instead, this data was allegedly abused by cullers.

“A negative public perception of tagging and tracking could result in protest or cessation of research,” said the researchers.

The authors of the study are calling for more in-depth research into the use of animal tracking and how it can have negative unintended consequences on the wildlife it was designed to protect in the first place.

They suggest developing clearer data-sharing policies from regulators that would control who can access data on animals’ locations. The researchers also raised the alarm over the availability of telemetry devices whose use can be abused. They are calling on regulators “to develop clear and enforceable policies and regulations that limit the ability of the public to use telemetry tools for activities that are inconsistent with the mission of management agencies.”

Manufacturers of these devices need to act as well to ensure the products are more secure and employ encryption, the study authors added.

Editors' Recommendations

Jonathan Keane
Former Digital Trends Contributor
Jonathan is a freelance technology journalist living in Dublin, Ireland. He's previously written for publications and sites…
How to delete your Gmail account (and what you need to know)
The top corner of Gmail on a laptop screen.

Is it time to part ways with your Gmail account? Whether you’re moving onto greener email pastures, or you want to start fresh with a new Gmail address, deleting your old Gmail account is something anyone can do. Of course, we’re not just going to bid you farewell without a guide all our own. If you need to delete your Gmail account, we hope these step-by-step instructions will make the process even easier.

Read more
How to alphabetize data in an Excel spreadsheet
A Microsoft Excel icon in the dock on a Macbook.

Manually organizing data in Microsoft Excel is a real pain. That's why we don't recommend doing it. One simple task, learning how to alphabetize in Excel, is not necessarily as intuitive as we would like. Here's how to get things sorted in a logical, alphabetical order.

Read more
How to build a table of contents in Microsoft Word
Microsoft word document.

Navigating through a Microsoft Word document can be a tedious task for some. Assignments and contracts can lead to many pages that can be hard to keep track of. One solution Microsoft offers for this is a table of contents. In addition to providing an outline and general overview of the content, the feature gives the document a more professional look.

Here’s a guide on how to create a table of contents in Microsoft Word.

Read more