Just a proof of concept, for now

Just a Boy and His Cell-Snooping, Password-Cracking, Hacktastic Homemade Spy Drone via Rabbit-Hole

Last year at the Black Hat and Defcon security conferences in Las Vegas, a former Air Force cyber security contractor and a former Air Force engineering systems consultant displayed their 14-pound, six-foot-long unmanned aerial vehicle, WASP (Wireless Aerial Surveillance Platform). Last year it was a work in progress, but next week when they unveil an updated WASP they’ll be showing off a functioning homemade spy drone that can sniff out Wi-Fi networks, autonomously crack passwords, and even eavesdrop on your cell phone calls by posing as a cell tower.

WASP is built from a retired Army target drone, and creators Mike Tassey and Richard Perkins have crammed all kinds of technology aboard, including an HD camera, a small Linux computer packed with a 340-million-word dictionary for brute-forcing passwords as well as other network hacking implements, and eleven different antennae. Oh, and it’s autonomous; it requires human guidance for takeoff and landing, but once airborne WASP can fly a pre-set route, looping around an area looking for poorly defended data.

And on top of that, the duo has taught their WASP a new way to surreptitiously gather intel from the ground: pose as a GSM cell phone tower to trick phones into connecting through WASP rather than their carriers--a trick Tassey and Perkins learned from another security hacker at Defcon last year.

Tassey and Perkins say they built WASP so show just how easy it is, and just how vulnerable you are. “We wanted to bring to light how far the consumer industry has progressed, to the point where public has access to technologies that put companies, and even governments at risk from this new threat vector that they’re not aware of,” Perkins told Forbes.

Consider yourself warned. For details on the WASP design--including pointers on building your own--check out Tassey and Perkins site here.

[Forbes]

17 Comments

its easy to hack pretty much anything nowadays

I see future military applications for this.

why learn from your own mistakes, when you could learn from the mistakes of others?

The first line of defense against HACKING is establishing a close loop network, hardwired, never used wireless. If you use wireless the whole world can climb through the window of you house and do anything they want. Second line of defense, establish a protocol this odd and not mainstream of the world. Yes other countries will always try to hack you, crack into your system, but at least you cut off all the home brew hackers and college kids. The third lines of defense develop a network card that is odd and not what the rest of the world is using too. Fourth lines of defense use operating systems that are different than the rest of the world. The operating system you do use has all its ports CLOSED by default, (ALL OF THEM) and it takes a network administrator to open each one. Unlike many common operating systems that have ALL their ports open and they work backwards, hoping to close all the wholes. Fifth yes have a virus protecting that detects and is aware of all know establish activity, so to be alerted right away to anything suspicious and to investigate further. Sixth create a keyboard encrypted id system with a required personal password. For now, this is all I got, but I am sure more could be added. Our government and any much of our infrastructure (Federal- State-Local Governments, Utilities, Medical, Fire, Hospital, Financial) should be different that the rest of the world. The internet was created to share information. It was not created to allow other people of the world into your own private lives. Protection of people’s privacy in the development of internet is a afterthought and now everyone is running as fast as they can to protect themselves. Everyone’s privacy should had been always considered first and paramount.

Good idea bad(or should i say incorrect) implementation.

The future of "wasp driving" isn't via rc planes its via rc copters.

RC copters and Blimps are very cool and fun!

I hope these guys know that they are violating federal law by illegally receiving and transmitting cellular signals. They could spend a long time in jail for their little bit of fun. That being said, nice hack!

I don't wish to sound belligerent but couldn't devices like this be shot down by vandals or authorities for that matter? Maybe it would be much harder than I imagine but it seems like it could find itself in some unfriendly neighborhoods and not much recourse if it were targeted.

Hacking is a neighbor spying, ease dropping, being illegally nosey. Yes within the first 300 feet over my own house, I feel I am in the legal right to shoot this plane down, if I so desired ( in my opinion). If I shot an airliner that is 5000 feet up in the air is considered wrong. I wish to know, exactly how low an attitude is considered to be my own space, over my own property. I am curious? It seems like a fair legal question. Just in case I like to shoot down any illegal hacking planes.

@BubbaGump

True wireless only exist for cellphones, however now that they are capable of internet access, penetrating the network of a wireless carrier could compromise many users, but even these are ground based networks that are interlinked through landlines (run-on sentence).

In this instance, you're right, a closed-loop network would be more secure. The trouble is the lack of access to the internet. Intranets are closed looped but only offer limited operational function when accessing websites. Needless to say it's just a huge risk to operate on the information super high way (noone's used that one in a while). Just gotta have a robust security program and not be lazy about protective measures to your system.

As for guidelines for personal space intrusion, FAA guidance does not allow aircraft to fly lower than 1000 ft over major metropolitan cities or within 500 ft of congested areas (i.e. vehicles, facilities, or people on the ground). I'm guessing any lower than the latter altitude and you'd be eligible to nail any intruding aircraft with your pump action 12 gauge. At that height the aircraft could have crashed into a terrain obstruction. You wouldn't be able to tell from a radar screen.

Fisher Capital Management Warning

Is this a joke or something? He seemed to have taken the spy drone thing literally. Honestly, Im good with the good ol' SQLi

Bubba, security through obscurity doesn't count for much against an actual attack.

zunigadragon

from Chula Vista, CA

Actually wouldn't the ultimate security be not to have any record of whatever you need private? the best thing if you don't want any of your information hacked, the best thing to do is to either go old school and have it done on paper and pen, or just simply leave no record of whatever you dont want hacked. if there's no files for someone to break into, then there is no hack. or if you must have something say a record, try to have it saved onto an encrypted external hard/flash drive, and only use that H/F drive when you need it, otherwise put it away.
-Your Friend Zunigadragon

put it all on USB lol

Am just thinkin, Zunigadragon, how right you are. civilizations have collapse several times bringing mankind back to the roots of papyrus and stylus. it is evident that at the peak of a civilization comes a decline and subsequently a collapse and fall and hence to protect data from the hungry grips of the past, some sensitive records should be kept in its book form, stuck deep in your pants. let all the war rage, if you are about to die, bury it up in the earth and a thousand years later, it will be found like the Mormons' Book of Mormon.

Personally, I Love This, but then again, I'm not exactly an honest Hacker (I hacked into my school a couple of times). I could see a ton of possibilities for this and am currently working on a copter implementation of this hacking beast. Maybe a roomba vacuum type robot might be good?

-EManU3L-

So they want to hear endless hours of women gossiping on the phone? The device is useless unless they can target specific individuals, highly illegal.

how does it perform in a lightning storm


140 years of Popular Science at your fingertips.



Popular Science+ For iPad

Each issue has been completely reimagined for your iPad. See our amazing new vision for magazines that goes far beyond the printed page



Download Our App

Stay up to date on the latest news of the future of science and technology from your iPhone or Android phone with full articles, images and offline viewing



Follow Us On Twitter

Featuring every article from the magazine and website, plus links from around the Web. Also see our PopSci DIY feed


February 2013: How To Build A Hero

Engineers are racing to build robots that can take the place of rescuers. That story, plus a city that storms can't break and how having fun could lead to breakthrough science.

Also! A leech detective, the solution to America's train-crash problems, the world's fastest baby carriage, and more.



Online Content Director: Suzanne LaBarre | Email
Senior Editor: Paul Adams | Email
Associate Editor: Dan Nosowitz | Email

Contributing Writers:
Clay Dillow | Email
Rebecca Boyle | Email
Colin Lecher | Email
Emily Elert | Email

Intern:
Shaunacy Ferro | Email

circ-top-header.gif
circ-cover.gif
bmxmag-ps