AGL 38.00 No Change ▼ 0.00 (0%)
AIRLINK 136.21 Decreased By ▼ -0.24 (-0.18%)
BOP 5.38 Decreased By ▼ -0.06 (-1.1%)
CNERGY 3.72 Decreased By ▼ -0.08 (-2.11%)
DCL 7.41 Decreased By ▼ -0.09 (-1.2%)
DFML 45.40 Decreased By ▼ -0.01 (-0.02%)
DGKC 78.25 Decreased By ▼ -0.27 (-0.34%)
FCCL 28.58 Decreased By ▼ -0.31 (-1.07%)
FFBL 56.10 Decreased By ▼ -0.90 (-1.58%)
FFL 8.93 Decreased By ▼ -0.34 (-3.67%)
HUBC 101.70 Increased By ▲ 4.90 (5.06%)
HUMNL 13.15 Decreased By ▼ -0.25 (-1.87%)
KEL 3.75 Decreased By ▼ -0.02 (-0.53%)
KOSM 7.30 Increased By ▲ 0.02 (0.27%)
MLCF 37.05 Decreased By ▼ -0.75 (-1.98%)
NBP 66.60 Decreased By ▼ -0.90 (-1.33%)
OGDC 164.80 Decreased By ▼ -2.72 (-1.62%)
PAEL 24.80 Decreased By ▼ -0.30 (-1.2%)
PIBTL 6.62 Decreased By ▼ -0.08 (-1.19%)
PPL 128.00 Decreased By ▼ -3.50 (-2.66%)
PRL 23.86 Decreased By ▼ -2.54 (-9.62%)
PTC 14.80 Decreased By ▼ -0.30 (-1.99%)
SEARL 60.87 Decreased By ▼ -1.38 (-2.22%)
TELE 6.90 Decreased By ▼ -0.10 (-1.43%)
TOMCL 35.80 Decreased By ▼ -0.43 (-1.19%)
TPLP 7.65 Decreased By ▼ -0.23 (-2.92%)
TREET 14.05 Increased By ▲ 0.05 (0.36%)
TRG 44.59 Increased By ▲ 0.04 (0.09%)
UNITY 25.84 Decreased By ▼ -0.01 (-0.04%)
WTL 1.20 Decreased By ▼ -0.02 (-1.64%)
BR100 9,089 Decreased By -54.7 (-0.6%)
BR30 27,134 Decreased By -191.8 (-0.7%)
KSE100 85,250 Decreased By -335.3 (-0.39%)
KSE30 26,803 Decreased By -181 (-0.67%)

Computer security specialists showed off a home-made drone aircraft Friday capable of launching airborne cyber attacks, hijacking mobile phone calls, or even delivering a dirty bomb. Rich Perkins and Mike Tassey built the bright yellow Wireless Arial Surveillance Platform in a garage from a used US Army target drone that they customised to find mobile phones and Internet hotspots.
"It will fly a plotted course and return to base," Perkins said while showing the WASP to AFP at a DefCon hackers gathering in Las Vegas. "We loaded it up with the ability to attack Wi-Fi, Bluetooth, and GSM cellular networks." WASP can grab packets of data being sent over the air on wireless networks, or use unsecured hot spots as gateways through which cyber attacks can be launched on computer systems. The drone can grab GMS mobile phone identification numbers that can then be used to bill outgoing calls. It can also let hackers impersonate cell phone towers and eavesdrop on people's calls.
Second-hand drones such as that used for WASP can be bought online for about $150. The rest of the parts were purchased by mail-order for a total tab reaching $6,200, not counting the tremendous number of hours spent working on the project started in 2009.
Perkins said the 14-pound (six-kilogram) drone was built to put the computer security industry on notice that the components are available for such "do-it-yourself" creations, which could be used for good or evil. WASP could find mobile phones in disaster areas, potentially leading rescuers to survivors. It could also fly over a disaster zone to act as a mobile phone tower enabling calls.
The modified drone could also identify key executives by their mobile telephones and then track their movements to look for data-stealing opportunities, such as working on a laptop connected wirelessly to the Internet at a cafe.

Copyright Agence France-Presse, 2011

Comments

Comments are closed.