Drones - Countering Criminal Usage

Tri, Quad, Hexa and Octocopters. Multi-rotor micro copters are so numerous and advanced, that they are in use by criminal elements for various purposes. Their utility will expand along with criminal creativity. Imagine our government’s “official” uses:

Gathering information from hacking into private WiFi networks Spoofing cell towers to snoop on cell phone conversations and text exchanges Spying on private on-goings Listening in via microphone Assaulting with lights, tazers, guns and flash-bang grenades Starting fires Illuminating dark areas Infiltrating buildings,

Continue reading Drones – Countering Criminal Usage

From JohnGaltFLA - Drones and More

JohnGaltFLA, a site I discovered about 15 minutes ago, has an article called Obama’s SS is Here Now. The author says he doesn’t go down the rat hole of “black helicopters”, and stays away from discussions that tend to flow toward the ridiculous. But, he then goes on to talk about certain events, with supporting evidence, that have a certain magnetism.

Near the end, he gets into discussions about large and micro drones. The “ShadowHawk” killbot caught my attention, since

Continue reading From JohnGaltFLA – Drones and More

The Drone Wars - Data Thieves

In others articles we’ve published, we shared with you the existence of data-stealing technology mounted on drones. The most common of all communications methods used at fixed locations is a WiFi network. With specialized equipment, Data Thieving Drones can hack into your communications stream and see all that you see. Add to that, Persistent Perch capability, and a network spook can nab your bits and bytes for a very long length of time.

Defending against these things is a wide

Continue reading The Drone Wars – Data Thieves

Seems Data-Thieves cracked WPA-2

The most secure of personal wireless security password protocols has been hacked. WPA-2, the best choice for general home wireless network security, seems to have been cut to pieces. In this article by phys.org, we read:

Now, a new study published in the International Journal of Information and Computer Security, reveals that one of the previously strongest wireless security systems, Wi-Fi protected access 2 (WPA2) can also be easily broken into on wireless local area networks (WLANs). The researchers have

Continue reading Seems Data-Thieves cracked WPA-2

Data-Thieving Drones

And you thought only the NSA was snooping at your window. Forget, for the moment, the

Picture from heliguy.com

drone /UAV aspect of this story. Consider that the technology for hacking your Wi-Fi network exists in great abundance, and data-thieves everywhere would love to get a peek at your network data streams. Imagine a world where the guy a few booths over inside your favorite coffee hangout is a thief. His pal behind you, too. It isn’t enough that

Continue reading Data-Thieving Drones

A Reply to a YouTube Series of Vids

A reply to a series of videos from a YouTube user by the name of StankMouthCharlie.

Stank Mouth posted a quartet of videos with the title “Why Most Doomsday Preppers Will Die.” They can be found here:

http://www.youtube.com/watch?v=R1bch3BVgl4 http://www.youtube.com/watch?v=HVodljGX5wg http://www.youtube.com/watch?v=BLSmP-WGv-U http://www.youtube.com/watch?v=sEhWw6YbQgQ

In Charlie’s series, he covers a number of issues relating to the foolishness of prepper stockpiling, training, bugging in or out, marksmanship, manliness, shelters and retreats – all in the face of predatory “gangs” or “posses” with skills and

Continue reading A Reply to a YouTube Series of Vids

Quad Copter Project

A colleague at work builds multi-rotor copters. His latest creations utilize 4 rotors, carry cameras, and dive into the ocean. Well, that last bit about the ocean was an impromptu trick his tri-copter attempted. The up-side-down video from under water, of him approaching and retrieving the thing from a tidal pool, was hilarious.

I used to build R/C ships. Taking a plan drawing and converting it into production schematics was something I liked to do. With the interesting things builders

Continue reading Quad Copter Project

Ironman and the Swarming Suits

Ironman 3 was entertaining on a few points. Who would have expected Ben Kingsley?

SPOILER ALERT

Toward the end, there is a scene (spoiler alert……) where we see multiple Ironman suits flying without a human encased within. They are under Jarvis’ control at the behest of Stark. They undergo dramatic offensive attack maneuvers to defeat multiple enemies. Jarvis does a great job of commanding the effort, under the management of Stark himself.

Back in 1983, Roy Scheider starred in a

Continue reading Ironman and the Swarming Suits

The Latest on the Micro-Drone Stage

The logical direction of the development of miniature UAVs is:

Smaller packages Heavier payloads per pound Greater surveillance capabilities Reduced cost Simpler Operation Automated mission profiles and possible networked “swarms”

Here are some articles along those lines.

From Britain, a tome on terrorist usage of armed miniatures.

Regulating miniature drones.

Who gets to fly drones?

Waves of drones on the way, and what it might mean.

The Private Drones Industry is like Apple in 1984 – True!

 

 

Continue reading The Latest on the Micro-Drone Stage

Defending Against Drones

Got a wild hair tonight, and decided I’d do a quick and filthy search on drone defense techniques. A lot of links came up, and here are a few of them for your review. Some have nothing to do with conducting counter measures work against infiltrators and criminals, but they include interesting thoughts nonetheless.

So, in no particular order of interest or importance….

Stealth Hoodies – Personal Thermal Masking. http://ahprojects.com/projects/stealth-wear Interrupting Information collection. http://www.drone-defense.com/ Spy vs. Spy? http://www.fluther.com/156018/is-there-a-defense-against-drone-attacks/ The AP

Continue reading Defending Against Drones

Monthly Archives