Chinese-made drones that may have been used by U.S. service members in Syria are now banned by the U.S. Army, according to a report.
"Cease all use, uninstall all DJI applications, remove all batteries/storage media from devices, and secure equipment for follow on direction," reads the memo from Lt. Gen. Joseph H. Anderson, the Army's deputy chief of staff for plans and operations. The memo was obtained by the publication Defense One, which said it was also confirmed by two Army officials. According to the publication, the Army document cites "increased awareness of cyber vulnerabilities associated with DJI products."Read more
In 2014, Google and Facebook vied to acquire Titan Aerospace, a maker of high-altitude, solar-powered drones. Google won the bidding, so Facebook purchased its own company, which was building a huge glider called Aquila.
The idea was to beam internet access from the sky to get more people logging on from remote places to access information and probably use both companies’ web services. That soaring vision has come down to Earth with a bump. On Wednesday, a spokeswoman from Google parent Alphabet Inc.’s X research lab said it had shut down Titan.Read more
Over the past few years drones have evolved from toys to powerful tools that can be used by pretty much everybody. Armies use them for scouting and aerial spotting, coast-guards — as coastal patrol.
When it comes to mapping the accident site and locating victims lifeguard sends drones ahead. Unmanned flying vehicles disarm old mines, trace poachers and even spy on the famous Area 51. Quad-, hexa- and other multi-copters nowadays can be purchased for next to nothing. This cost brings up a lot of privacy concerns. Small wonder, as drones could fly everywhere and record almost everything their owner wants them to!Read more
As the rise of hobbyists’ cheap quadcopter drones freaks out the FAA and the Secret Service, it’s easy to forget that the government itself is putting another tier of much-less-cheap UAVs into service for first responders, cops, and the military.
And now a security researcher has shown that at least one model of those government-ready flying machines has serious security vulnerabilities that could allow it to be hacked from more than a mile away, taken over by a rogue operator, or knocked out of the sky with a keystroke. Security researcher will show how flaws in the security of drone’s radio connection allow him to take full control over the quadcopter.Read more
Until a few years ago, only military organizations could afford drones, but advances in sensors, microcontrollers and batteries have led to these aerial vehicles becoming available to consumers.
Anyone can buy a quadcopter and have fun with it, or use it to shoot professional videos. With the increasing popularity of drones, we’re also seeing a rise in the number of incidents involving these gadgets. These incidents have triggered a response from authorities in the USA, with many states enacting laws related to the use of drones. While there has been much focus on the careless use of UAVs, only few have taken into account the risk of cyberattacks.Read more
As concerns rise about a security menace posed by rogue drone flights, US government agencies are working with state and local police forces to develop high-tech systems to protect vulnerable sites.
Although the research aimed at tracking and disabling drones is at an early stage, there has been at least one field test. Last New Year's Eve, New York police used a microwave-based system to try to track a commercially available drone at a packed Times Square and send it back to its operator. Drones have flown perilously close to airliners, interfered with firefighting operations, been used to transport illegal drugs into the United States from Mexico.Read more
Looks like you will have to be extra careful in your workspace now. This drone has been designed to snoop data out of your computers, and it can do so just by hovering around your office.
Looks like the job of a security researcher just got more demanding with the introduction of this drone. It can detect vulnerable network devices while moving here and there and then steal data wirelessly. As most of our networks are Wi-fi based, it must use some Wi-Fi connectivity as well. The aerial surveillance assault drone has a Raspberry Pi system running on Kali Linux that has been specifically designed for penetration testing or pen testing.Read more
In two separate presentations at Def Con in Las Vegas last weekend, security experts demonstrated vulnerabilities in two consumer drones from Parrot. The simplest of the attacks could make Parrot drones, including the company's Bebop model, fall from the sky with a keystroke.
In a live demonstration at Def Con's Internet of Things Village, Ryan Satterfield of the security consulting firm Planet Zuda demonstrated a takedown of a Parrot A.R.Drone by exploiting the drone's built-in Wi-Fi and an open telnet port on the drone's implementation of the BusyBox real-time operating system.Read more
Knocking a drone out of the sky is sometimes possible using an invisible weapon. The vulnerability in some drones comes from a natural property of all objects.
Take a wine glass: if a sound is created that matches the natural resonant frequency of the glass, the resulting effects could cause it to shatter. The same principle applies to components inside drones. Researchers analyzed the effects of resonance on a crucial component of a drone, its gyroscope. A gyroscope keeps a drone balanced, providing information on its tilt, orientation and rotation, allowing for micro-adjustments that keep it aloft. Hobbyist and some commercial drones use inexpensive gyroscopes.Read more
Leaked e-mails from Hacking Team show that the company developed a piece of rugged hardware intended to attack computers and mobile devices via Wi-Fi.
The capability, marketed as part of the company's Remote Control System Galileo, was shown off to defense companies at the International Defense Exposition and Conference in Abu Dhabi, and it drew attention from a major defense contractor. But like all such collaborations, it may have gotten caught up in the companies' legal departments. Co-founder Marco Valleri outlined the roadmap for a number of Hacking Team's platforms, including its "Tactical Network Injector".Read more