AIRLINK 193.30 Decreased By ▼ -1.71 (-0.88%)
BOP 9.86 Increased By ▲ 0.09 (0.92%)
CNERGY 7.53 Increased By ▲ 0.17 (2.31%)
FCCL 38.49 Decreased By ▼ -0.28 (-0.72%)
FFL 15.80 Increased By ▲ 0.21 (1.35%)
FLYNG 25.65 Increased By ▲ 0.24 (0.94%)
HUBC 128.89 Increased By ▲ 0.27 (0.21%)
HUMNL 13.79 Decreased By ▼ -0.02 (-0.14%)
KEL 4.63 Increased By ▲ 0.14 (3.12%)
KOSM 6.25 Decreased By ▼ -0.05 (-0.79%)
MLCF 44.45 Decreased By ▼ -0.34 (-0.76%)
OGDC 203.67 Increased By ▲ 0.07 (0.03%)
PACE 6.50 Increased By ▲ 0.08 (1.25%)
PAEL 41.25 Increased By ▲ 0.12 (0.29%)
PIAHCLA 17.63 Increased By ▲ 0.91 (5.44%)
PIBTL 7.65 Decreased By ▼ -0.03 (-0.39%)
POWER 9.14 Increased By ▲ 0.10 (1.11%)
PPL 174.92 Increased By ▲ 1.01 (0.58%)
PRL 39.00 Decreased By ▼ -0.08 (-0.2%)
PTC 24.70 Decreased By ▼ -0.34 (-1.36%)
SEARL 110.25 Increased By ▲ 1.19 (1.09%)
SILK 0.98 Decreased By ▼ -0.01 (-1.01%)
SSGC 38.60 Increased By ▲ 0.46 (1.21%)
SYM 19.66 Increased By ▲ 0.17 (0.87%)
TELE 8.37 Increased By ▲ 0.01 (0.12%)
TPLP 12.25 Increased By ▲ 0.12 (0.99%)
TRG 65.13 Increased By ▲ 0.34 (0.52%)
WAVESAPP 10.62 Increased By ▲ 0.05 (0.47%)
WTL 1.67 Decreased By ▼ -0.02 (-1.18%)
YOUW 3.92 Increased By ▲ 0.05 (1.29%)
BR100 11,888 Decreased By -0.4 (-0%)
BR30 35,383 Increased By 163.8 (0.47%)
KSE100 112,026 Decreased By -3.9 (-0%)
KSE30 35,076 Decreased By -59.8 (-0.17%)

Computer security specialists showed off a home-made drone aircraft Friday capable of launching airborne cyber attacks, hijacking mobile phone calls, or even delivering a dirty bomb. Rich Perkins and Mike Tassey built the bright yellow Wireless Arial Surveillance Platform in a garage from a used US Army target drone that they customised to find mobile phones and Internet hotspots.
"It will fly a plotted course and return to base," Perkins said while showing the WASP to AFP at a DefCon hackers gathering in Las Vegas. "We loaded it up with the ability to attack Wi-Fi, Bluetooth, and GSM cellular networks." WASP can grab packets of data being sent over the air on wireless networks, or use unsecured hot spots as gateways through which cyber attacks can be launched on computer systems. The drone can grab GMS mobile phone identification numbers that can then be used to bill outgoing calls. It can also let hackers impersonate cell phone towers and eavesdrop on people's calls.
Second-hand drones such as that used for WASP can be bought online for about $150. The rest of the parts were purchased by mail-order for a total tab reaching $6,200, not counting the tremendous number of hours spent working on the project started in 2009.
Perkins said the 14-pound (six-kilogram) drone was built to put the computer security industry on notice that the components are available for such "do-it-yourself" creations, which could be used for good or evil. WASP could find mobile phones in disaster areas, potentially leading rescuers to survivors. It could also fly over a disaster zone to act as a mobile phone tower enabling calls.
The modified drone could also identify key executives by their mobile telephones and then track their movements to look for data-stealing opportunities, such as working on a laptop connected wirelessly to the Internet at a cafe.

Copyright Agence France-Presse, 2011

Comments

Comments are closed.