Commando Bugs

20121103172208-Picture10-2_copy.jpg?1351988601

A security source in the Gaza Strip told the Palestinians website Al Majed that “the purpose of these tiny aircraft is to trace missing IDF soldiers and track Hamas militants.” The source further disclosed that these so called “electronic dragonflies” are also capable of opening fire against target and even blow themselves up over them.

According to this source, these tiny electronic airborne devices carry embedded images of missing soldiers for the purpose of search and identification. The source added these “electronic dragonflies” are in fact US-made espionage devices featuring GPS. They emit signals, which satellites then pick up. The tiny crafts, which are capable of penetrating buildings through tiny holes, “look like flies from afar, or even a small bird.” It is believed they are controlled remotely.

The source added that Hamas believes these “electronic dragonflies” are also designed to trace explosives and unveil their production sites. Irrespective of this report, i-HLS has already exposed in the past that Israel Aerospace Industries (IAI) is developing a tiny unmanned aircraft featuring insect-like wings, complete with the akin flap mechanism, rendering them capable of flying like butterflies or insects. IAI is not the sole developer to be inspired by nature at large or even insects in particular, but of importance is the designated use of real live insects for intelligence and reconnaissance.
The US is already working on real live insects carrying imbedded tiny electronic systems. Defense Advanced Research Projects Agency (DARPA) is said to be developing a project harnessing bugs for military missions.

Ultimately, DARPA intends to have live insects implanted with electronics and mechanics rendering them controllable remotely and directed from afar, for the purpose of espionage of explosive detection missions. A radio signal will activate the implant, guiding the insect to a specified venue or location.

For the actual purpose of locating explosives, the bug will be fitted with a microscopic sensor, whereas ’espionage bugs’ will feature tiny cameras or microphones. “Electronics and optics have reach such an ultra-advanced stage, that we can manufacture devices of practically any size,” says one expert.
US scientists intend to implant these microscopic devices inside bugs’ cocoons, during the pupal stage. Post metamorphosis, the bug develops normally to full size with the implant already imbedded. DARPA’s teams are focusing their efforts on butterflies, moths and dragonflies. There is still a dispute between experts whether these insects can be guided and directed to perform military missions, but experiments are ongoing.

There have been past experiments to install various sensors on certain birds. Experts say the American effort is interesting.” After all, DARPA is an official US government agency, and they must believe it’s possible to achieve development of a remote controlled insect,” one expert told i-HLS.

There is no doubt that in some places worldwide, there are current efforts to develop unmanned aerial vehicles (UAVs) capable of making their way into buildings and capture video, images and sound. Intelligence gathering is always moving forwards thanks to cutting-edge miniaturization. The question remains though, where does this leave our privacy, where do uninvolved civilians fit in. The problem persists, and it will worsen. It seems progress does not come without a price.

i-hls

 

« Middle East: Cyberwar Heats Up
How Credible is the Anonymous Threat to Israel? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

DMH Stallard

DMH Stallard

DMH Stallard is a mid-market law firm. Areas of expertise include cyber security and cyber crime.

SOTI

SOTI

SOTI is an industry leader in Enterprise Mobility Management (EMM).

Karamba Security

Karamba Security

Karamba provide an IoT Security solution for ECUs in automobiles which ensures that all cars are protected (not just autonomous cars).

totemo

totemo

Totemo offers solutions for the secure exchange of business information.

IBLISS Digital Security

IBLISS Digital Security

How cyber-resilient is your business now? We help companies to continuously answer this never-ending C-level question.

Center for Applied Cybersecurity Research (CACR) - University of Indiana

Center for Applied Cybersecurity Research (CACR) - University of Indiana

CACR serves Indiana and the nation by tackling cyber risk in research and other unusual environments through agile, holistic, principle-based cybersecurity.

X4 Technology

X4 Technology

X4 Technology is a leader in finding the very best technology talent for some of the world’s most innovative start-ups and globally recognised brands.

Empiric

Empiric

Empiric is a multi-award winning technology and transformation recruitment agency specialising in data, digital, cloud and security.

Halcyon Knights

Halcyon Knights

Halcyon Knights is a specialist executive search and IT recruitment agency in the APAC region. Areas of specialisation include cybersecurity.

Titans24

Titans24

Titans24 is a Software-as-a-Service security platform for web applications. It prevents attacks on business websites that are protected under 11 cyber-security layers.

Jandnet Recruitment

Jandnet Recruitment

Jandnet Recruitment is a small specialist company working in the IT sector. We recruit across all IT disciplines including cyber security and digital identity.

GoTo

GoTo

At GoTo we help people and businesses to connect and collaborate simply and securely – from anywhere. We’re the trusted partner for companies of all sizes.

Cyphershield

Cyphershield

Cypershield is a Security and Smart Contract audit company providing professional smart contract auditing services for varied Crypto projects.

Cloudaeris

Cloudaeris

Cloudaeris is a trusted Microsoft Partner, and we've got what it takes to make your business more efficient and agile.

Academia the Technology Group

Academia the Technology Group

Academia specialise in the supply of software, IT hardware, training and service solutions to the public sectors, business and pro media markets.

CrashPlan

CrashPlan

CrashPlan provides peace of mind through secure, scalable, and straightforward endpoint data backup.