Commando Bugs

20121103172208-Picture10-2_copy.jpg?1351988601

A security source in the Gaza Strip told the Palestinians website Al Majed that “the purpose of these tiny aircraft is to trace missing IDF soldiers and track Hamas militants.” The source further disclosed that these so called “electronic dragonflies” are also capable of opening fire against target and even blow themselves up over them.

According to this source, these tiny electronic airborne devices carry embedded images of missing soldiers for the purpose of search and identification. The source added these “electronic dragonflies” are in fact US-made espionage devices featuring GPS. They emit signals, which satellites then pick up. The tiny crafts, which are capable of penetrating buildings through tiny holes, “look like flies from afar, or even a small bird.” It is believed they are controlled remotely.

The source added that Hamas believes these “electronic dragonflies” are also designed to trace explosives and unveil their production sites. Irrespective of this report, i-HLS has already exposed in the past that Israel Aerospace Industries (IAI) is developing a tiny unmanned aircraft featuring insect-like wings, complete with the akin flap mechanism, rendering them capable of flying like butterflies or insects. IAI is not the sole developer to be inspired by nature at large or even insects in particular, but of importance is the designated use of real live insects for intelligence and reconnaissance.
The US is already working on real live insects carrying imbedded tiny electronic systems. Defense Advanced Research Projects Agency (DARPA) is said to be developing a project harnessing bugs for military missions.

Ultimately, DARPA intends to have live insects implanted with electronics and mechanics rendering them controllable remotely and directed from afar, for the purpose of espionage of explosive detection missions. A radio signal will activate the implant, guiding the insect to a specified venue or location.

For the actual purpose of locating explosives, the bug will be fitted with a microscopic sensor, whereas ’espionage bugs’ will feature tiny cameras or microphones. “Electronics and optics have reach such an ultra-advanced stage, that we can manufacture devices of practically any size,” says one expert.
US scientists intend to implant these microscopic devices inside bugs’ cocoons, during the pupal stage. Post metamorphosis, the bug develops normally to full size with the implant already imbedded. DARPA’s teams are focusing their efforts on butterflies, moths and dragonflies. There is still a dispute between experts whether these insects can be guided and directed to perform military missions, but experiments are ongoing.

There have been past experiments to install various sensors on certain birds. Experts say the American effort is interesting.” After all, DARPA is an official US government agency, and they must believe it’s possible to achieve development of a remote controlled insect,” one expert told i-HLS.

There is no doubt that in some places worldwide, there are current efforts to develop unmanned aerial vehicles (UAVs) capable of making their way into buildings and capture video, images and sound. Intelligence gathering is always moving forwards thanks to cutting-edge miniaturization. The question remains though, where does this leave our privacy, where do uninvolved civilians fit in. The problem persists, and it will worsen. It seems progress does not come without a price.

i-hls

 

« Middle East: Cyberwar Heats Up
How Credible is the Anonymous Threat to Israel? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

AlgoSec

AlgoSec

The AlgoSec platform enables the world’s most complex organizations to gain visibility, reduce risk and process changes at zero-touch across the hybrid network.

GovCERT.HK

GovCERT.HK

GovCERT.HK is the Government Computer Emergency Response Team for Hong Kong.

TrustInSoft

TrustInSoft

TrustInSoft develops solutions that validate mission-critical software and eliminate attack vectors.

Pathway Forensics

Pathway Forensics

Pathway Forensics is a leading provider of computer forensics, e-discovery services and digital investigations.

SoftLock

SoftLock

Softlock is a regional leader in Information Security providing solutions, consulting, integration and testing services to protect information assets, identities and supporting infrastructure.

Cyber Forensic & Investigation (CFI)

Cyber Forensic & Investigation (CFI)

Cyber Forensic & Investigation (CFI) is recognized as Thailand’s leader in cyber investigations and digital forensics.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

u-blox

u-blox

u-blox deliver leading wireless technology to reliably and securely locate and connect people and devices.

Alias Robotics

Alias Robotics

Alias Robotics is a robot cyber security company. We deliver cyber security solutions for robots and robot components.

OriginalMy

OriginalMy

OriginalMy is a cybersecurity startup, focussed on digital governance and information authentication. Its mission is to prove authenticity using state-of-the-art cryptography and blockchain technology

Darkbeam

Darkbeam

Darkbeam provides a unified solution to protect against security, brand and compliance risks across your digital infrastructure.

Cyberi

Cyberi

Cyberi provide specialist technical consultancy and cyber advisory services, from penetration testing and assurance to incident management and response, and technical security research.

Trace3

Trace3

Trace3 is a pioneer in business transformation solutions, empowering organizations to keep pace with the rapid changes in IT innovations and maximize organizational health.

Josef Ressel Centre for Intelligent & Secure Industrial Automation

Josef Ressel Centre for Intelligent & Secure Industrial Automation

The Josef Ressel Centre for Intelligent and Secure Industrial Automation investigates the fundamentals of digital assistants for industrial machines that enable intelligent and secure operation.

Vernetzen

Vernetzen

Vernetzen is an industrial network and cybersecurity innovator focused on delivering practical solutions to connect and secure industry across the globe.

Reality Defender

Reality Defender

Reality Defender stops deepfakes before they become a problem. Our proprietary deepfake and generative content fingerprinting technology detects video, audio, and image deepfakes.