Quantcast

«

»

Aug 29 2011

Forget UFOs, Watch Out for UAVs

Sometime Last Thursday before this deployment, we had a little game we used to play. Some of my army buddies and I would climb the nearby mountains and spend the day observing Juarez (being Scouts after all). We had great fun watching the TTPs of the warring drug cartels and critiquing their work. One day we noticed a small object flying over the city, swooping low and then orbiting certain areas. Upon a closer look we figured it was some time of modified RC plane or ad hoc UAV.

Then at this year’s Black Hat, researchers Mike Tassey and Richard Perkins unveiled their drone, made from commercially available parts.

This drone plane runs on Arduino and would cost you $6,000. This drone is based on FMQ-117B U.S. Army target drone and equipped it with Wi-Fi and hacking tools — IMSI catcher and antenna to spoof a GSM cell tower and hack calls. What’s more? It can launch a dictionary attack on the network using its database of 340million words.

The device onboard tricks phones to disable encryption, and records call details and content before they’re routed to their intended receiver through VoIP or redirected to anywhere else the hacker wants to send them.

So sooner rather than later, expect the face of cyber and actual crime to experience a similar rapid evolution as the military has in the use of these powerful tools. As they used to say on Rationalwiki.org, “TK can see your house from here,” and soon anybody will be able to do that and more. Tinfoil hats may yet come back in style.

15 comments

1 ping

Skip to comment form

  1. 1
    Marcus Ranum

    I’ve always wondered why “the bad guys”* haven’t tried making explosive-carrying r/c drones like this. If someone produced a $1000 drone that could carry a claymore mine, it could be incredibly disruptive.

    (* quoted because I’m not sure who the bad guys are, but the CIA sure has a lot of drones…)

    1. 1.1
      Assassin Actual

      Well if the bad guys targeted the military, the second it got off the ground it would be tracked. Plus you would need to figure out how to beat the army’s jamming systems and good luck with that. A smart bad guy would launch, line up his glide path, and send it deadstick towards his target. As far as attacks against civilians…sucks to be you?

      1. Assassin Actual

        So as far as cost-risk, old soviet motar rounds are cheaper

        1. Mike de Fleuriot

          Plus mortar rounds can be used by anyone who can open their fist, just drop it down the pipe. And you don’t even need a pipe, IED comes to mind.

          The real problem I think is urban areas, away from war zones which have lots of buildings to launch from. Pennsylvania Avenue, comes to mind.

          1. Assassin Actual

            Thank the gods that most of the people with the required technical level of knowledge are nice enough. But I am sure it is only a manner of time before some human leans to kill with his new toy, we always seem to

  2. 2
    frankb

    You are all terrorists, TERRORISTS I tell you. Who’s side are you on? Oh, all right, carry on then.

  3. 3
    F

    Yup. It’s like warcarting, but with RC aircraft.

  4. 4
    Isabel marant boots

    Hello.This post was really fascinating, particularly because I was searching for thoughts on this matter last Saturday.

  5. 5
    m jak milosc streszczenia

    Hi, i have in mind that i gnome you visited my locale thus i came to “turn in the favor”.I’m attempting to track down things to elevate my placement!I take for granted its ok to press into service a insufficient of your ideas!!

  6. 6
    m jak milosc streszczenia

    Monstrous dead beat ! I impose upon to greenhorn while you reform your website, how can i subscribe allowing for regarding a blog network site? The account helped me a acceptable deal. I had been a little hint on speaking terms familiar with of this your broadcast provided sparkling unblock concept

  7. 7
    m jak milosc streszczenia

    Pretty gracious post. I just stumbled upon your blog and wanted to aver that I’ve properly enjoyed surfing round your blog posts. After all I’ll be subscribing to your rss feed and I trust you write again jolly soon!

  8. 8
    m jak milosc streszczenia

    Great goods from you, man. I’ve conceive of your stuff previous to and you’re well-grounded exceptionally excellent. I deep down like what you have on the agenda c trick acquired here, certainly like what you are stating and the point in which you asseverate it. You go-ahead it enjoyable and you silent circumspection respecting to keep it smart. I shop-talk hang around to read much more from you. This is actually a tremendous site.

  9. 9
    m jak milosc streszczenia

    I was suggested this spider’s web situation by my cousin. I’m not unswerving whether this post is written away him as not anyone else be versed such complete yon my trouble. You are stunning! Thanks!

  10. 10
    m jak milosc streszczenia

    I loved as much as you pleasure receive carried faulty suitable here. The sketch is polite, your authored subject context stylish. nonetheless, you master accede to got an shakiness beyond that you fob off on be delivering the following. unwell unquestionably sink in fare more time was again since to the letter the unvaried virtually mere habitually prearranged happening you bulwark this increase.

  11. 11
    oakley frogskins

    We should not only know the theory but also how to apply it to practice.You really look sharp today.The stars are too far away.How ever you may work hard, the boss will not be fully satisfied.He is respectful to his elders.There is a mark of ink on his shirt.There is a mark of ink on his shirt.No pain,no gain.He led them down the mountain.Can you cover for me on Fridayhelp me tell me how to get there?

  1. 12
    IT security news

    hacking tutorials…

    [...]Forget UFOs, Watch Out for UAVs | Assassin Actual[...]…

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>