[Rushtalk] The New Overhead Privacy Thief

John A. Quayle blueoval57 at verizon.net
Sat May 3 19:05:10 MDT 2014


         The BEST way to protect yourself from this violation of your 
constitutional rights is to shoot one down.......


-jaq




At 09:37 PM 4/30/2014, you wrote:


>
><http://i-hls.com/2014/03/new-overhead-privacy-thief/>The New 
>Overhead Privacy Thief
>
>
>
>http://i-hls.com/2014/03/new-overhead-privacy-thief/?utm_source=Israel+Homeland+Security+%28iHLS%29&utm_campaign=885deb8545-Newsletter_English_IL_26_3_2014&utm_medium=email&utm_term=0_8ee2e16ed1-885deb8545-87451153
>
>Posted by <http://i-hls.com/author/newsdesk/>newsdesk
>Illustration photo (123rf)
>
>
>Illustration photo (123rf)
>
>The next threat to your privacy could be hovering overhead while you 
>walk down the street. Hackers have developed a 
><http://i-hls.com/he/2014/01/ausr-2014-expo-autonomous-unmanned-systems-robotics/>drone 
>that can steal the contents of your smartphone and access your 
>password. The technology equipped on the 
><http://i-hls.com/he/2014/01/ausr-2014-expo-autonomous-unmanned-systems-robotics/>drone, 
>known as Snoopy, looks for mobile devices with Wi-Fi settings turned on.
>
>Snoopy takes advantage of a feature built into all smartphones and 
>tablets: When mobile devices try to connect to the Internet, they 
>look for networks theyve accessed in the past.
>
>Thats when Snoopy can swoop into action: the 
><http://i-hls.com/he/2014/01/ausr-2014-expo-autonomous-unmanned-systems-robotics/>drone 
>can send back a signal pretending to be networks youve connected to 
>in the past. Devices two feet apart could both make connections with 
>the quadcopter, each thinking it is a different, trusted Wi-Fi 
>network. When the phones connect to the 
><http://i-hls.com/he/2014/01/ausr-2014-expo-autonomous-unmanned-systems-robotics/>drone, 
>Snoopy will intercept everything they send and receive.
>
>According to 
>s<http://i-hls.com/2014/01/ausr-2014-expo-autonomous-unmanned-systems-robotics/>UAS 
>that includes the sites you visit, credit card information entered 
>or saved on different sites, location data, usernames and passwords. 
>Each phone has a unique identification number, or MAC address, which 
>the 
><http://i-hls.com/he/2014/01/ausr-2014-expo-autonomous-unmanned-systems-robotics/>drone 
>uses to tie the traffic to the device.
>
>The names of the networks the phones visit can also be telling. CNN 
>Money recently took Snoopy out for a spin and were able to show what 
>they believed to be the homes of several people who had walked 
>underneath the 
><http://i-hls.com/he/2014/01/ausr-2014-expo-autonomous-unmanned-systems-robotics/>drone. 
>In less than an hour of flying, he obtained network names and GPS 
>coordinates for about 150 mobile devices.
>
>They were also able to obtain usernames and passwords for Amazon, 
>PayPal and Yahoo accounts created for the purposes of the reporting 
>so that they could verify the claims without actually stealing from people.
>
>Collecting metadata, or the device IDs and network names, is 
>probably not illegal, according to the Electronic Frontier 
>Foundation. Intercepting usernames, passwords and credit card 
>information with the intent of using them would likely violate 
>wiretapping and identity theft laws.
>
>Installing the technology on drones creates a powerful threat 
>because drones are mobile and often out of sight for pedestrians, 
>enabling them to follow people undetected.
>
>While most of the applications of this hack are creepy, it could 
>also be used for law enforcement and public safety. During a riot, a 
><http://i-hls.com/he/2014/01/ausr-2014-expo-autonomous-unmanned-systems-robotics/>drone 
>could fly overhead and identify looters, for example.
>
>Users can protect themselves by shutting off Wi-Fi connections and 
>forcing their devices to ask before they join networks.
>
>
>
>
>_______________________________________________
>Rushtalk mailing list
>Rushtalk at csdco.com
>http://kalos.csdco.com/mailman/listinfo/rushtalk
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://kalos.csdco.com/pipermail/rushtalk/attachments/20140503/43f3d48c/attachment.html 


More information about the Rushtalk mailing list