OpenSky Network (@openskynetwork) 's Twitter Profile
OpenSky Network

@openskynetwork

The non-profit aviation research network. Enabling over 500 scientific publications since 2014. ADS-B feeders wanted!

Automatic emergency alerts @OpenSkyAlerts

ID: 2430389784

linkhttp://opensky-network.org calendar_today06-04-2014 12:34:52

1,1K Tweet

3,3K Followers

2,2K Following

Journal of Open Aviation Science (@joaspub) 's Twitter Profile Photo

🥳All papers from the OpenSky Symposium 2023 are published now, after thorough peer reviews: journals.open.tudelft.nl/joas/issue/vie… 💯All papers come with open data and open code. And, all peer reviews are signed and published! ❤️ to all our reviewers. OpenSky Network #OpenScience

Benoit Figuet (@mrfiguette) 's Twitter Profile Photo

auonsson The post-processing analysis of the OpenSky Network data confirms 6 flights spoofed to Lake Tuz between 10:19 and 10:26 UTC, and 20 flights spoofed to Ankara between 12:44 and 13:54 UTC.

Junzi Sun (@junzi) 's Twitter Profile Photo

Join and win our newest data challenge on aircraft take-off mass estimation! hosted by EUROCONTROL PRC: ansperformance.eu/study/data-cha…

Benoit Figuet (@mrfiguette) 's Twitter Profile Photo

1/ GPS spoofing activity in the Black Sea have significantly decreased since August 6, though they haven't completely stopped. spoofing.skai-data-services.com couldn't detect all instances, as often only a single aircraft was affected. x.com/auonsson/statu…

1/ GPS spoofing activity in the Black Sea have significantly decreased since August 6, though they haven't completely stopped. spoofing.skai-data-services.com couldn't detect all instances, as often only a single aircraft was affected.
x.com/auonsson/statu…
Benoit Figuet (@mrfiguette) 's Twitter Profile Photo

1/ Over the past few days, GPS spoofing in the Middle East has been quite dynamic. Using ADS-B data from OpenSky Network, we see that on Aug 23rd at 22:30 UTC, the massive spoofer that was falsifying the GPS position to Beirut has now been reconfigured to target Amman instead.

1/ Over the past few days, GPS spoofing in the Middle East has been quite dynamic. Using ADS-B data from <a href="/OpenSkyNetwork/">OpenSky Network</a>, we see that on Aug 23rd at 22:30 UTC, the massive spoofer that was falsifying the GPS position to Beirut  has now been reconfigured to target Amman instead.
OpenSky Network (@openskynetwork) 's Twitter Profile Photo

We extended the abstract deadline for the 12th OpenSky Symposium to September 13th! We have many outstanding submissions but there is still time to add yours and join us at DLR - English in Hamburg on November 7/8! All information on the Symposium website: symposium.opensky-network.org 📷

We extended the abstract deadline for the 12th OpenSky Symposium to September 13th! We have many outstanding submissions but there is still time to add yours and join us at <a href="/DLR_en/">DLR - English</a> in Hamburg on November 7/8!  All information on the Symposium website: symposium.opensky-network.org

📷
Benoit Figuet (@mrfiguette) 's Twitter Profile Photo

New GPS Spoofing activity detected on spoofing.skai-data-services.com using OpenSky Network. In the last hour we have detected 13 aircraft being spoofed over Poland, Slovakia, Hungary and Romania. The "Spoofed-to Location" is in Ukraine near Lviv. x.com/MrFiguette/sta…

New GPS Spoofing activity detected on spoofing.skai-data-services.com using <a href="/OpenSkyNetwork/">OpenSky Network</a>.
In the last hour we have detected 13 aircraft being spoofed over Poland, Slovakia, Hungary and Romania. The "Spoofed-to Location" is in Ukraine near Lviv.
x.com/MrFiguette/sta…
Benoit Figuet (@mrfiguette) 's Twitter Profile Photo

OpenSky Network Post-processing analysis reveals that between 09:08 and 09:49 UTC, 16 flights were affected by GPS spoofing. The falsified positions observed are significantly different from the usual patterns we’ve seen before:

The Wall Street Journal (@wsj) 's Twitter Profile Photo

Hundreds of daily airline flights around the world are running into GPS spoofing, a hazard that poses new risks for pilots and passengers on.wsj.com/3XOXdhf on.wsj.com/3XOXdhf

Benoit Figuet (@mrfiguette) 's Twitter Profile Photo

1/ Using OpenSky Network data and SkAI Data Services' QUADABRA tool, I reconstructed a TCAS event from flight tracks. At 19:46:58Z, a TA was triggered, followed by a brief RA at 19:47:07Z. Thanks to John Wiseman and Carol Thurlow for their analysis, and Martin for the heads-up!

Benoit Figuet (@mrfiguette) 's Twitter Profile Photo

2/ At RA initiation, the aircraft had 6.08 NM horizontal and 1,675 ft vertical separation. The projected closest point of approach was 1.05 NM horizontal and 993 ft vertical, 14seconds ahead.

2/ At RA initiation, the aircraft had 6.08 NM horizontal and 1,675 ft vertical separation. The projected closest point of approach was 1.05 NM horizontal and 993 ft vertical, 14seconds ahead.
Benoit Figuet (@mrfiguette) 's Twitter Profile Photo

3/ UAL2428 interrupted its descent sharply, going from -2800 ft/min to -500 ft/min in less than 3 seconds, potentially contributing to the reported injuries.

3/ UAL2428 interrupted its descent sharply, going from -2800 ft/min to -500 ft/min in less than 3 seconds, potentially contributing to the reported injuries.
Benoit Figuet (@mrfiguette) 's Twitter Profile Photo

New update at spoofing.skai-data-services.com🛰️! You can now select a specific date to view GPS spoofing and jamming activities for that day! 📅 Still powered by OpenSky Network data. Explore and share your thoughts! #GPS #Spoofing #Jamming #OSINT x.com/MrFiguette/sta…