With Amazon making headline news about their automatic drone deliveries, a security consultant has released his plans for making a predatory type drone that takes over other drones.
Skyjack “Zombie Drone” software created by Samy Kamkar turns a Parrot AR Quadcopter drone into a flying hacking station that uses a Raspberry Pi and the Aircrack NG tools to find and take over other Parrot drones.
Non-Parrot drones should be safe from his design though, as it searches out for the Parrot’s particular MAC address, and only attacks Wi-Fi signals.
Let’s hope no one puts something like a WaveBubble on one of these Zombie Drone Attackers:
A WaveBubble, though highly illegal to actually build, finds and jams all RF signals in its proximity. This includes GPS, Wi-Fi, Cell Phones, BlueTooth, etc…)
A drone equipped with both technologies (which we don’t support or recommend) could, in effect, try to hack a Wi-Fi based drone and take it over, and if that didn’t work, could possible jam the drones signals and cause it to crash.
Oh the joys of technology…
Sammy has released the plans for his project, see the above YouTube page for links.
The military’s future plan to create a technical cloud that would allow common control of all the branches drones is a great idea! But dear God please tell me the security on this system, (and R&D) will be off the chart to keep Chinese hackers out of the loop.
According to a US Navy release:
The Office of Naval Research (ONR) has developed something similar to a master remote control for military ground, air and undersea unmanned systems that will work across the services, as outlined in a new video released, May 2. (Above)
This Office of the Secretary of Defense (OSD) prescribed data model is a piece of software that enabled development of the Common Control System, which is comprised of many different common control services.
Chinese hackers have run roughshod over allied military designers and contractors. Even QinetiQ North America, a world leading defense and security company that creates secret satellites, drones, and Special Forces software was hacked by Chinese infiltrators.
For three years Chinese hackers pilfered research and development secrets from the company:
“We found traces of the intruders in many of their divisions and across most of their product lines. There was virtually no place we looked where we didn’t find them,” said Christopher Day whose security company was hired by QinetiQ to investigate the break-ins.
Integrating inter-service drone command, control and communication will bring unprecedented capabilities to our drone forces. But security from conception HAS TO BE priority number one.
The future of military micro air vehicle swarms.