Islamabad—Hacking is on the rise. Hackers have a field day. Their activities are spreading everywhere. Private e-mail accounts are hacked. Passwords of Yahoo and Microsoft are stolen and privacy is abused. A large number of websites are under attack including Internet Explorer 6-9, Window XP, Vista, Server 2003 and 2008. This has made Microsoft to announce that it would fix 22 flaws next Tuesday.
Australia has decided to beef up security in the wake of growing hacking and privacy fears across the country. Hackers are penetrating the ruling elites, celebrities, meg-business and civil society. The latest in hacking is that it is expanding to air. It is very serious challenge to advanced banking and military secrets. Now, digital death rains from above. A pair of security researchers has turned a surplus US army drone planes into an airborne hacking platform that infiltrates Wi-Fi networks, intercepts cellphone calls and even launches denial-of-service (DOS) attacks.
Suddenly, the US intelligence finds itself vulnerable. The hackers have succeeded to penetrate into its Wireless Aerial Surveillance Platform (WASP). They can now hack the IMSI catcher and antenna to impersonate a cellphone base station. They simply flip the switch and nearby cellpgones are tricked into routing outbound calls through the WASP instead of through commercial cell towers.
The WASP cell tower can be tamed by hackers and can even be used to intercept crypted calls, tricking cellphones into disabling encryption and then redirect calls or records them before they are routed to the intended receiver.
Consequently, US multi-billion and highly secretive drone programme is facing a tremendous challenge. Hackers have particularly eyed the drone DOS, which organizes attacks on data providers and sniff out nearby wireless networks.
Thus, the drone technology is a brutal attack on fundamental human rights. The drones are not only invading the privacy and kill innocent people randomly, but can be tricked by hackers to attack some very sensitive installations. For example, the drones can be redirected to attack America itself. Additionally, the adversaries of the United States will use the drones to steal military secrets and advanced technology. The identity of hackers is a mystery. The US intelligence agencies have failed to trace them. The latest unbelievable method used by National Security Agency (NAS) was that it has decided to recruit “ good hackers” to hunt the bad guys. Hackers are also giving a way out to confront and foil the drones by hacking its highly advanced wireless system and render them ineffective.
Australia has decided to beef up security in the wake of growing hacking and privacy fears across the country. Hackers are penetrating the ruling elites, celebrities, meg-business and civil society. The latest in hacking is that it is expanding to air. It is very serious challenge to advanced banking and military secrets. Now, digital death rains from above. A pair of security researchers has turned a surplus US army drone planes into an airborne hacking platform that infiltrates Wi-Fi networks, intercepts cellphone calls and even launches denial-of-service (DOS) attacks.
Suddenly, the US intelligence finds itself vulnerable. The hackers have succeeded to penetrate into its Wireless Aerial Surveillance Platform (WASP). They can now hack the IMSI catcher and antenna to impersonate a cellphone base station. They simply flip the switch and nearby cellpgones are tricked into routing outbound calls through the WASP instead of through commercial cell towers.
The WASP cell tower can be tamed by hackers and can even be used to intercept crypted calls, tricking cellphones into disabling encryption and then redirect calls or records them before they are routed to the intended receiver.
Consequently, US multi-billion and highly secretive drone programme is facing a tremendous challenge. Hackers have particularly eyed the drone DOS, which organizes attacks on data providers and sniff out nearby wireless networks.
Thus, the drone technology is a brutal attack on fundamental human rights. The drones are not only invading the privacy and kill innocent people randomly, but can be tricked by hackers to attack some very sensitive installations. For example, the drones can be redirected to attack America itself. Additionally, the adversaries of the United States will use the drones to steal military secrets and advanced technology. The identity of hackers is a mystery. The US intelligence agencies have failed to trace them. The latest unbelievable method used by National Security Agency (NAS) was that it has decided to recruit “ good hackers” to hunt the bad guys. Hackers are also giving a way out to confront and foil the drones by hacking its highly advanced wireless system and render them ineffective.