American Daniel made a hacker drone

Source: Internet
Author: User
Two American computer security experts created their own small self-driving aircraft capable of launching network attacks from the air and monitoring mobile phones. It is called the "wireless air monitoring platform ", it was transformed from an unmanned U.S. military target. Computer security experts Richard palkins and Mike tacay have made special changes to the unmanned target so that it can discover and catch up

Two American computer security experts have created their own capabilities to conduct cyber attacks and monitor mobile phones from the air.

A small self-driving aircraft named "wireless aerial surveillance platform" is transformed from an American military unmanned target.

Computer security experts Richard palkins and Mike tacay made special changes to the unmanned target,

Allows it to discover and track Internet targets and mobile phones. In addition, it can also identify unencrypted network entries,

Then they are used to launch Network Attacks on computer systems.

Attackers can attack networks and mobile phones.

The self-made hacker drone can crack the mobile phone's PIN code, which can be used by hackers to eavesdrop on mobile phone calls or even counterfeit mobile phone signal towers.

"Hackers and drones can perform flight tasks based on the established routes and then return to the base,

We have transformed it to attack wireless networks, Bluetooth and GSM cellular mobile phone communication networks ."

Last weekend, Parkins and tacay attended the DefCon hacker technology seminar in Las Vegas, USA.

Shows the hacker drone. Its body is yellow and its weight is only about 6.35 kg.

The costs of drone manufacturing by hackers are only 6200 US dollars, and pakins and tarsaay claim that

This hacker drone was created to make the computer industry realize that anyone may obtain materials and make such high-tech devices.

Potential lethal effects cannot be underestimated
Drone hackers have a great impact and use. For example, they can find mobile phones in the disaster area and tell rescuers

The location of the employee survivor, or fly over the disaster area to "play" the mobile phone signal tower to resume mobile phone communication in the disaster area.

However, in case it is used by attackers, hackers and drones can easily access through unencrypted wireless networks.

A company's computer network, and this is just the beginning.
"Hackers and drones can penetrate all aspects of your digital life-Bluetooth headsets, mobile phones, and wireless networks

-- Find your weakest link and initiate an attack on it ."

What's more, hackers can use drones to load lightweight items, which can be exploited by some people as terror.

The biochemicals or nuclear weapons of attacks provide potential possibilities.

It is not hard to predict that the US authorities should not allow such hacker drones to fly over densely populated areas.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.