SlideShare a Scribd company logo
1 of 2
Download to read offline
WASP: Army Unmanned UAV Plane Turned Into Hacker's
Dream
The age-old theory within warfare is usually that the best place being is the higher ground, from
which usually you can effortlessly see as well as attack your own enemies. Richard Perkins and Mike
Tassey made a decision to utilize that idea to cyber warfare as well.
The outcome was the particular WASP -- short with regard to Wireless Aerial Surveillance Platform.
The Particular a couple of men, whom say they will each have long encounter as personal fpv drone
forum computer security consultants for that U.S. government, took an Army-surplus drone airplane
and turned it directly into an airborne hacking platform which they say can easily infiltrate your Wi-
Fi network, intercept your own cell telephone calls, jam radio signals, even hack web sites
wirelessly. They Will say it expense these any grand total involving $6,200.
They confirmed off the particular WASP at this month's Black Hat pc safety conference throughout
Las Vegas, once a year haven with regard to tech mavens talking -- usually in programming code --
concerning cyber attacks that they want to avoid. 1 method to anticipate what may be coming, many
of which figure, can be to try inventing the things they think the unhealthy guys would.
In other words, mentioned Tassey, "If we thought concerning it, someone else has and they are
generally just certainly not telling you."
The WASP, with regards to six feet long, ended up being depending on a jet the particular military
features routinely employed as being a coaching target. These People exposed the actual plane and
extra the cell phone, tablet pc and a hardly virtually any other items of electronics. These People
wrote computer software in order to read signals coming from ground-based phones and computer
networks.
The FAA demands in which a plane in which size fly a maximum of 400 feet above your ground, as
well as that will or not really it's within sight regarding whoever will be controlling it simply by radio
-- however that provides been fine with Perkins and also Tassey. The Actual WASP would
nevertheless be higher sufficient not really to be noticed by simply individuals inside a company
office creating down below which could be making calls or perhaps sending data, including sensitive
material. Your plane is battery powered and is simply able to remain airborne for an hour, but the
men stated some other versions may well simply fly longer.
At final year's conference, yet another engineer, Chris Paget, had proven how an airborne drone
could be used to intercept cell telephone calls, actually by simply pretending being a flying cell
tower. Its signals could fool phones about the ground straight into relaying calls by means of it. once
it did that, recording private conversations or perhaps data will be just 1 additional step.
Sound any bit more than the top? That's your sort of thing which arises at the annual Black Hat
conferences. There had been furthermore an exhibition by a pc engineer named Jay Radcliffe --
himself the diabetic -- showing that an insulin pump might be managed with a less-than-scrupulous
hacker. Presently there were sessions about how you can defeat antivirus programs, as well as
increase your risk for battery in the stranger's laptop overheat.
"Everybody's pushing the actual technology to do more and more and also more, as well as like all
technology that's pushed such as that, security is surely an afterthought," Radcliffe told the
associated Press.
Of course, a new hovering drone that picks up cell telephone calls could be also employed for good.
Imagine sending 1 for an region hit through an earthquake, where power along with cellular service
happen in order to be knocked out, these people said. The Particular difficulty is the fact that
cellular services providers already have portable towers that don't must property regarding
refueling.
So why attempt all this far-out hacking? Partly, said folks at the conference, to become able to warn
computer specialists they may well be vulnerable throughout ways they we had not imagined. but a
quantity of of which conceded there is also an element regarding sport involved, performing some
thing tough as getting a approach to show it may be done.
"All this involves can be devoted people," stated Tassey. "This will not come with morals or even
ethics."
-- This embed didnt allow it in order to be to be able to copy with regard to story id = 14242824.

More Related Content

Viewers also liked

Uav presentation
Uav presentationUav presentation
Uav presentationMeshut
 
Drone101 - Introduction to Multirotors
Drone101 - Introduction to MultirotorsDrone101 - Introduction to Multirotors
Drone101 - Introduction to MultirotorsJohnson Lam
 
Unmanned aerial vehicles
Unmanned aerial vehiclesUnmanned aerial vehicles
Unmanned aerial vehiclesShahnawaz Alam
 
Get more from your UAV Imagery
Get more from your UAV ImageryGet more from your UAV Imagery
Get more from your UAV Imagerypcigeomatics
 
UAV Presentation
UAV PresentationUAV Presentation
UAV PresentationRuyyan
 
Drone-Unmanned Aerial Vehicle
Drone-Unmanned Aerial VehicleDrone-Unmanned Aerial Vehicle
Drone-Unmanned Aerial Vehicleshivu1234
 
Drones and their Increasing Number of Applications
Drones and their Increasing Number of ApplicationsDrones and their Increasing Number of Applications
Drones and their Increasing Number of ApplicationsJeffrey Funk
 

Viewers also liked (13)

Uav presentation
Uav presentationUav presentation
Uav presentation
 
Drone101 - Introduction to Multirotors
Drone101 - Introduction to MultirotorsDrone101 - Introduction to Multirotors
Drone101 - Introduction to Multirotors
 
Unmanned aerial vehicle
Unmanned aerial vehicleUnmanned aerial vehicle
Unmanned aerial vehicle
 
Drones
DronesDrones
Drones
 
Unmanned aerial vehicles
Unmanned aerial vehiclesUnmanned aerial vehicles
Unmanned aerial vehicles
 
QUAD COPTERS FULL PPT
QUAD COPTERS FULL PPTQUAD COPTERS FULL PPT
QUAD COPTERS FULL PPT
 
Get more from your UAV Imagery
Get more from your UAV ImageryGet more from your UAV Imagery
Get more from your UAV Imagery
 
Drone technology
Drone technologyDrone technology
Drone technology
 
Drones
DronesDrones
Drones
 
UAV Presentation
UAV PresentationUAV Presentation
UAV Presentation
 
Drone Technology
Drone TechnologyDrone Technology
Drone Technology
 
Drone-Unmanned Aerial Vehicle
Drone-Unmanned Aerial VehicleDrone-Unmanned Aerial Vehicle
Drone-Unmanned Aerial Vehicle
 
Drones and their Increasing Number of Applications
Drones and their Increasing Number of ApplicationsDrones and their Increasing Number of Applications
Drones and their Increasing Number of Applications
 

WASP: Army Unmanned UAV Plane Turned Into Hacker's Dream

  • 1. WASP: Army Unmanned UAV Plane Turned Into Hacker's Dream The age-old theory within warfare is usually that the best place being is the higher ground, from which usually you can effortlessly see as well as attack your own enemies. Richard Perkins and Mike Tassey made a decision to utilize that idea to cyber warfare as well. The outcome was the particular WASP -- short with regard to Wireless Aerial Surveillance Platform. The Particular a couple of men, whom say they will each have long encounter as personal fpv drone forum computer security consultants for that U.S. government, took an Army-surplus drone airplane and turned it directly into an airborne hacking platform which they say can easily infiltrate your Wi- Fi network, intercept your own cell telephone calls, jam radio signals, even hack web sites wirelessly. They Will say it expense these any grand total involving $6,200. They confirmed off the particular WASP at this month's Black Hat pc safety conference throughout Las Vegas, once a year haven with regard to tech mavens talking -- usually in programming code -- concerning cyber attacks that they want to avoid. 1 method to anticipate what may be coming, many of which figure, can be to try inventing the things they think the unhealthy guys would. In other words, mentioned Tassey, "If we thought concerning it, someone else has and they are generally just certainly not telling you." The WASP, with regards to six feet long, ended up being depending on a jet the particular military features routinely employed as being a coaching target. These People exposed the actual plane and extra the cell phone, tablet pc and a hardly virtually any other items of electronics. These People wrote computer software in order to read signals coming from ground-based phones and computer networks. The FAA demands in which a plane in which size fly a maximum of 400 feet above your ground, as well as that will or not really it's within sight regarding whoever will be controlling it simply by radio -- however that provides been fine with Perkins and also Tassey. The Actual WASP would nevertheless be higher sufficient not really to be noticed by simply individuals inside a company office creating down below which could be making calls or perhaps sending data, including sensitive material. Your plane is battery powered and is simply able to remain airborne for an hour, but the men stated some other versions may well simply fly longer. At final year's conference, yet another engineer, Chris Paget, had proven how an airborne drone could be used to intercept cell telephone calls, actually by simply pretending being a flying cell tower. Its signals could fool phones about the ground straight into relaying calls by means of it. once it did that, recording private conversations or perhaps data will be just 1 additional step.
  • 2. Sound any bit more than the top? That's your sort of thing which arises at the annual Black Hat conferences. There had been furthermore an exhibition by a pc engineer named Jay Radcliffe -- himself the diabetic -- showing that an insulin pump might be managed with a less-than-scrupulous hacker. Presently there were sessions about how you can defeat antivirus programs, as well as increase your risk for battery in the stranger's laptop overheat. "Everybody's pushing the actual technology to do more and more and also more, as well as like all technology that's pushed such as that, security is surely an afterthought," Radcliffe told the associated Press. Of course, a new hovering drone that picks up cell telephone calls could be also employed for good. Imagine sending 1 for an region hit through an earthquake, where power along with cellular service happen in order to be knocked out, these people said. The Particular difficulty is the fact that cellular services providers already have portable towers that don't must property regarding refueling. So why attempt all this far-out hacking? Partly, said folks at the conference, to become able to warn computer specialists they may well be vulnerable throughout ways they we had not imagined. but a quantity of of which conceded there is also an element regarding sport involved, performing some thing tough as getting a approach to show it may be done. "All this involves can be devoted people," stated Tassey. "This will not come with morals or even ethics." -- This embed didnt allow it in order to be to be able to copy with regard to story id = 14242824.