On being mobbed

The account of an ongoing bid to harass a legal tenant out of her Seattle neighborhood


The next platform for hacking is the sky

At this year’s DefCon, a technology conference for hackers, roboticist David Jordan presented his company’s Aerial Assault drone, a drone equipped with an arsenal of software tools for detecting and recording weaknesses and locations of within-range wireless networks.  An August 11 post to the Popular Science website on the Las Vegas conference is titled “DRONE AT DEFCON HACKS FROM THE SKY.” (http://www.popsci.com/drone-defcon-hacks-sky)

With the sky as network perimeter, a field of wireless networks become a battleground of targets. The drone can detect, hover over and hack a wireless network or relay the GPS coordinates back to its operator to slate a later attack. Kelsey Atherton, the writer of the Popular Science article, reminds us, “At their core, drones are little more than computers that fly.” The Aerial Assault drone is available to consumers for $2,500. Information from WikiLeaks, according to the same article, revealed that defense contractor Boeing was investigating the feasibility of a hacking drone for military applications earlier this year. With the integration of drones into the U.S. arsenal, where do we draw the line between hobby drones and weaponry?

Earlier models of hacking drones provided unprotected wireless networks that harvested data from users who unknowingly joined the service. (https://www.rt.com/usa/312072-aerial-assault-hacking-drone/) Such drones could hover and harvest data from corporate users on lunch breaks in public squares and other exterior environments.

Alongside developments such as these, 2015 brought the introduction of drones like the Skyjack, built to hack and control other drones in the sky or within radio range from Linux machines on the ground.

With flying hacker drones available to hackers and hobbyists, there must be a means for individuals hacked in this manner to begin to investigate intrusions and theft of data.

In my own experience, telling the police you suspect a cyber-crime has occurred meets with inaction and a reply that there is no probable cause. Yet, so far as I understand it, without a police referral there is no possibility of involving the FBI, the organization actually tasked with cyber-crime.

For an individual who is being hacked or monitored (without forensic “artifacts” that allow an intrusion to be traced) to have a chance of even discouraging surveillance by a hacker drone, it must be possible to trace ownership of a drone. If drones do not have flight plans for each time they lift off, in addition to having a transponder they should be restricted to operation in a limited airspace. The plan or area of flight should be publicly documented with information that identifies both owner and flying machine. The information should be readily accessible to the public and conveyed in a manner that is reasonably understood by the lay person.

 



Leave a Reply

the lay of the land

Air conditioners are the entry point to the grid, and a postcard from Seattle’s South Cedar Park

Mobbing is extremism (part 2)

Lighting and mobbers’ living-off-the-land exploits

Mobbing by WiFi range extender

The mobbers’ “World Wireless System” and hate culture in Albany, California (part 1)

The mobbers’ “World Wireless System” and hate culture in Albany, California (part 2)

The mobbers’ “World Wireless System” and hate culture in Albany, California (part 3)

Infrastructure crimes: Mobbing with interference; extraction by heat (part 3)

Mobbing, infrasound and leaky feeders (part 2)

Mobbing, infrasound and leaky feeders (part 1)

Smart meters, carrier current transmission and the mobbers’ radio (part 1)

Stop mobbing crimes with data: Airtool for wireless capture

Stop mobbing crimes with data: Visualize nearby networks with NetSpot

Is this a radio? Look what the mobbers made!

Pictures from a mobbing (part 2)

Pictures from a mobbing (part 1)

Gang-stalking: Invest in real estate! No money down! (part 2)

Recommended reading on the “On being mobbed” blog

THE MOST RECENT 50 ENTRIES

Discover more from On being mobbed

Subscribe now to keep reading and get access to the full archive.

Continue reading