Home built Spy Drone hacks WiFi networks, listens to calls

Spy Drone hacks WiFi networks, listens to calls

An unmanned spy drone hacks wi-fi, calls and text messages and it has just made it to the District.

Erin Van der Bellen, WUSA 12:42 p.m. EST December 12, 2014

WASHINGTON (WUSA9) -- It's small. It's bright yellow, and it's capable of cracking Wi-Fi passwords, eavesdropping on your cell phone calls and reading your text messages. It's an unmanned spy drone and it just landed in Washington, D.C.

Long-time friends and former Air Force buddies, Mike Tassey and Rich Perkins, describe their state-of-the-art cyber drone as hard to take down, hard to see and virtually hard to detect.

They built it in a garage, using off the shelf electronics to prove a drone can be used to launch cyber-attacks.

It needs a human for take-off and landing but once airborne, it can fly any pre-programmed route posing as a cell phone tower and tricking wireless cell phones.

While it's flying those points, the spy drone has a number of antennas for picking up your cell phone conversation, for picking up blue tooth, and for picking up and monitoring Wi Fi signals.

Tassey and Perkins tested the drone in isolated conditions to avoid breaking laws or recording conversations other than their own.

"We passed telephone calls, hacked into networks, cracked the encryption on Wi-Fi access points all of that sort of evilness is possible," said Tassey.

And now their spy drone has landed in Washington so everyone can see it.

"I think it's fantastic to have an artifact like this in the Spy Museum," said Vincent Houghton, International Spy Museum Curator.

"It's the first of its kind, it's a piece of modern espionage equipment," said Houghton. "This is something governments should be doing and perhaps only government should be doing.

"If two guys from the Midwest can build this for six-thousand dollars in a garage, what can Iran do? What can nation states do?" said Rich Perkins.

The drone has a 50 mile range and while its creators chose a cyber-attack test, they say this technology can be used things like anti-IED missions and search and rescue operations.


Popular posts from this blog

Report: World’s 1st remote brain surgery via 5G network performed in China

Visualizing The Power Of The World's Supercomputers

BMW traps alleged thief by remotely locking him in car