Two American computer security experts created their own small self-driving aircraft capable of launching network attacks from the air and monitoring mobile phones. It is called the "wireless air monitoring platform ", it was transformed from an unmanned U.S. military target. Computer security experts Richard palkins and Mike tacay have made special changes to the unmanned target so that it can discover and catch up
Two American computer security experts have created their own capabilities to conduct cyber attacks and monitor mobile phones from the air.
A small self-driving aircraft named "wireless aerial surveillance platform" is transformed from an American military unmanned target.
Computer security experts Richard palkins and Mike tacay made special changes to the unmanned target,
Allows it to discover and track Internet targets and mobile phones. In addition, it can also identify unencrypted network entries,
Then they are used to launch Network Attacks on computer systems.
Attackers can attack networks and mobile phones.
The self-made hacker drone can crack the mobile phone's PIN code, which can be used by hackers to eavesdrop on mobile phone calls or even counterfeit mobile phone signal towers.
"Hackers and drones can perform flight tasks based on the established routes and then return to the base,
We have transformed it to attack wireless networks, Bluetooth and GSM cellular mobile phone communication networks ."
Last weekend, Parkins and tacay attended the DefCon hacker technology seminar in Las Vegas, USA.
Shows the hacker drone. Its body is yellow and its weight is only about 6.35 kg.
The costs of drone manufacturing by hackers are only 6200 US dollars, and pakins and tarsaay claim that
This hacker drone was created to make the computer industry realize that anyone may obtain materials and make such high-tech devices.
Potential lethal effects cannot be underestimated
Drone hackers have a great impact and use. For example, they can find mobile phones in the disaster area and tell rescuers
The location of the employee survivor, or fly over the disaster area to "play" the mobile phone signal tower to resume mobile phone communication in the disaster area.
However, in case it is used by attackers, hackers and drones can easily access through unencrypted wireless networks.
A company's computer network, and this is just the beginning.
"Hackers and drones can penetrate all aspects of your digital life-Bluetooth headsets, mobile phones, and wireless networks
-- Find your weakest link and initiate an attack on it ."
What's more, hackers can use drones to load lightweight items, which can be exploited by some people as terror.
The biochemicals or nuclear weapons of attacks provide potential possibilities.
It is not hard to predict that the US authorities should not allow such hacker drones to fly over densely populated areas.