HVCC UAV DRONE TECHNOLOGY GROUP
DRONE DATA SECURITY
HVCC UAV DRONE TECHNOLOGY GROUP specializes in DRONE DATA SECURITY which we consider the silent kill in the world. The ability of bad actor to attack our grid by the use of DRONES is unchecked. The ability of the bad actor to be miles away and fly a drone next the a power plant building where the computers are that control any part a grid or a sub station and change or shut down vital operations for even a short time can be a catastrophic event. What happen during that shut down ? What if they shut the Grid down totally. Just imagine that. No one will know when it could happen or why it did or when it will happen again, and they wont know a drone did it. Scary!
Now imagine a drone that can fly next to you office and steal you data before it enters your secure communication network and or attached its self to the wall of your building for hours stealing all you classified data and then take off again. Can't happen? It can and does in this new world of drones.
Drone can now hack into your cell phones and steal all your data, pictures, passwords, banking data and personal emails in 30 seconds. That is a real scary thought think of were those pictures might end up on the dark web. Bad actors don't care about the laws.
HVCC UAV DRONE TECHNOLOGT GROUP utilizes many counter measures to defend against these attacks. HVCC UAV DRONE TECHNOLOGY GROUP is a major supplier of DEDRONE and their DRONETRACKER system. We are also the exclusive solution provider of DRONE DEFENSE SERIES which incorporates many solutions into one package. DRONE DATA SECURITY is a critical part of our protection services under our DRONE DEFENSE SERIES with the protection of Prime Ministers, High Profile People, Dignitaries, Athletes and high income groups. HVCC UAV DRONE TECHNOLOHY GROUP is responsible for all air space security for SAUTEURS WATERFRONT DESTINATION PROJECT in on GRENADA, the largest and most technological project in the Caribbean and the only project of its kind in the world.
READ MORE ABOUT DRONE DEFENSE SERIES UNDER THE TAB DRONE DEFENSE SERIES.
Data-stealing Snoopy drone unveiled at Black Hat
By Kim Gittleson BBC reporter, Black Hat, Singapore
Glenn Wilkinson uses a quadcopter drone with the Snoopy software built inside to gather smartphone data
Security firm SensePost has unveiled its Snoopy drone, which can steal data from unsuspecting smartphone users, at the Black Hat security conference in Singapore.
The drone uses the company's software, which is installed on a computer attached to a drone.
That code can be used to hack smartphones and steal personal data - all without a user's knowledge.
It does this by exploiting handsets looking for a wireless signal.
Glenn Wilkinson, who developed Snoopy, says that when the software is attached to a drone flying around an area, it can gather everything from a user's home address to his or her bank information.
"Every device we carry emits unique signatures - even pacemakers come with wi-fi today," Mr Wilkinson tells the BBC.
"And - holy smokes, what a bad idea."
'The machines that betrayed their masters'
Many smartphone users leave the wireless option constantly turned on on their smartphone. That means the phones are constantly looking for a network to join - including previously used networks.
"A lot of [past] network names are unique and it's possible to easily geo-locate them," says Mr Wilkinson, who explains Snoopy uses a combination of the name of a network a user is looking for as well as the MAC address that uniquely identifies a device to track a smartphone in real-time.
[Man holding smartphone with map coming out of it] Snoopy can identify the exact location and user information of a specific smartphone
Beyond that, Snoopy demonstrates how someone could also impersonate one of those past networks in a so-called karma attack, in which a rogue operator impersonates a past network that a user then joins, thinking it is safe.
I've gathered smartphone device data from every security conference that I've been at for the last year and a halfGlenn Wilkinson, Sensepoint
Once the user has joined the disguised network, the rogue operator can then steal any information that the user enters while on that network - including e-mail passwords, Facebook account information, and even banking details.
This is why Mr Wilkinson says that smartphones and other devices that use wireless technology - such as Oyster cards using RFID (radio frequency identification) or bank cards with chips - can betray their users.
'Am I on candid camera?'
Mr Wilkinson - who began developing the Snoopy software three years ago as a side-project - gave the BBC a preview of the technology ahead of its release.
Pulling out a laptop from his bag, Mr Wilkinson opened the Snoopy programme - and immediately pulled up the smartphone information of hundreds of Black Hat conference attendees.
With just a few keystrokes, he showed that an attendee sitting in the back right corner of the keynote speech probably lived in a specific neighbourhood in Singapore. The software even provided a streetview photo of the smartphone user's presumed address.
[DJI phantom] Image caption SensePost has used the Snoopy software attached to cheap commercial drones like DJI's Phantom
"I've gathered smartphone device data from every security conference that I've been at for the last year and a half - so I can see who was at each event and whether or not they've attended multiple events," says Mr Wilkinson.
He then shows this data to conference attendees - who often ask, when presented with a photograph of their home or office, if they're on candid camera.
Mr Wilkinson is quick to acknowledge that the Snoopy software is not new technology - but rather, just a different way of gathering together a series of known security risks.
"There's nothing new about this - what's new is that Snoopy brings a lot of the technology together in a unique way," he explains.
Find out more
§ Drones are controlled either autonomously by on-board computers, or by remote control
§ They are used in situations where manned flight is considered too dangerous or difficult
§ Also increasingly used for policing and fire-fighting, security work, and for filming
Drones: What are they and how do they work?
Watch BBC News' camera drone in action
For instance, the Snoopy software has been ground-based until now, operating primarily on computers, smartphones with Linux installed on them, and on open-source small computers like the Raspberry Pi and BeagleBone Black.
But when attached to a drone, it can quickly cover large areas.
"You can also fly out of audio-visual range - so you can't see or hear it, meaning you can bypass physical security - men with guns, that sort of thing," he says.
It's not hard to imagine a scenario in which an authoritarian regime could fly the drone over an anti-government protest and collect the smartphone data of every protester and use the data to figure out the identities of everyone in attendance.
Mr Wilkinson says that this is why he has become fascinated with our "digital terrestrial footprint" - and the way our devices can betray us.
He says he wants to "talk about this to bring awareness" of the security risks posed by such simple technologies to users.
His advice? Turn off the wireless network on your phone until you absolutely need to use it.