Commando Bugs

20121103172208-Picture10-2_copy.jpg?1351988601

A security source in the Gaza Strip told the Palestinians website Al Majed that “the purpose of these tiny aircraft is to trace missing IDF soldiers and track Hamas militants.” The source further disclosed that these so called “electronic dragonflies” are also capable of opening fire against target and even blow themselves up over them.

According to this source, these tiny electronic airborne devices carry embedded images of missing soldiers for the purpose of search and identification. The source added these “electronic dragonflies” are in fact US-made espionage devices featuring GPS. They emit signals, which satellites then pick up. The tiny crafts, which are capable of penetrating buildings through tiny holes, “look like flies from afar, or even a small bird.” It is believed they are controlled remotely.

The source added that Hamas believes these “electronic dragonflies” are also designed to trace explosives and unveil their production sites. Irrespective of this report, i-HLS has already exposed in the past that Israel Aerospace Industries (IAI) is developing a tiny unmanned aircraft featuring insect-like wings, complete with the akin flap mechanism, rendering them capable of flying like butterflies or insects. IAI is not the sole developer to be inspired by nature at large or even insects in particular, but of importance is the designated use of real live insects for intelligence and reconnaissance.
The US is already working on real live insects carrying imbedded tiny electronic systems. Defense Advanced Research Projects Agency (DARPA) is said to be developing a project harnessing bugs for military missions.

Ultimately, DARPA intends to have live insects implanted with electronics and mechanics rendering them controllable remotely and directed from afar, for the purpose of espionage of explosive detection missions. A radio signal will activate the implant, guiding the insect to a specified venue or location.

For the actual purpose of locating explosives, the bug will be fitted with a microscopic sensor, whereas ’espionage bugs’ will feature tiny cameras or microphones. “Electronics and optics have reach such an ultra-advanced stage, that we can manufacture devices of practically any size,” says one expert.
US scientists intend to implant these microscopic devices inside bugs’ cocoons, during the pupal stage. Post metamorphosis, the bug develops normally to full size with the implant already imbedded. DARPA’s teams are focusing their efforts on butterflies, moths and dragonflies. There is still a dispute between experts whether these insects can be guided and directed to perform military missions, but experiments are ongoing.

There have been past experiments to install various sensors on certain birds. Experts say the American effort is interesting.” After all, DARPA is an official US government agency, and they must believe it’s possible to achieve development of a remote controlled insect,” one expert told i-HLS.

There is no doubt that in some places worldwide, there are current efforts to develop unmanned aerial vehicles (UAVs) capable of making their way into buildings and capture video, images and sound. Intelligence gathering is always moving forwards thanks to cutting-edge miniaturization. The question remains though, where does this leave our privacy, where do uninvolved civilians fit in. The problem persists, and it will worsen. It seems progress does not come without a price.

i-hls

 

« Middle East: Cyberwar Heats Up
How Credible is the Anonymous Threat to Israel? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Senetas

Senetas

Senetas is a leading developer and manufacturer of certified high-assurance encryption solutions, dedicated to protecting network transmitted data without compromising performance.

Forensic Control

Forensic Control

Forensic Control specialise in providing simple & straightforward Cyber Security to organisations, helping them assess, prevent and respond to cyber threats.

Clearwater Security & Compliance

Clearwater Security & Compliance

Clearwater Compliance specialize in Privacy, Security, Compliance and Risk Management Solutions for Health Care, Law Firms and other businesses.

High Sec Labs (HSL)

High Sec Labs (HSL)

High Sec Labs develops high-quality, cyber-defense solutions in the field of network and peripheral isolation.

CryptoCurrency Certification Consortium (C4)

CryptoCurrency Certification Consortium (C4)

The CryptoCurrency Certification Consortium is a non-profit organization that provides certifications to professionals who perform cryptocurrency-related services.

CM Blockchain Security Center

CM Blockchain Security Center

We are dedicated to building a healthier blockchain ecosystem, providing solutions to security technology, and helping those who practice in the area of blockchain to get insight into industry trends.

CorkBIC International Security Accelerator

CorkBIC International Security Accelerator

CorkBIC International Security Accelerator invests in early stage disruptive companies in the security industry including, Cybersecurity, Internet of Things (IOT), Blockchain and AI.

CyberCube

CyberCube

CyberCube provide world-leading cyber risk analytics for the cyber insurance market.

Immuta

Immuta

Immuta empowers data engineering and operations teams to automate data governance, security, access control & privacy protection.

Porto Research, Technology & Innovation Center (PORTIC)

Porto Research, Technology & Innovation Center (PORTIC)

PORTIC brings together several research centers and groups from P.PORTO in a single space, forming a superstructure dedicated to research, technology transfer, innovation and entrepreneurship.

QGroup

QGroup

QGroup has been re-designing the consultancy industry since 2012. We're a rapidly expanding group of consulting companies that deliver bespoke IT services including cybersecurity.

RealTyme

RealTyme

RealTyme is a secure communication and collaboration platform with privacy and human experience at its core.

Axiata Digital Labs

Axiata Digital Labs

Axiata Digital Labs is the technology hub of Axiata Group Berhad Malaysia which is one of the leading groups in telecommunication in Asia.

Defimoon

Defimoon

DeFimoon is the International Blockchain Development & Security Agency. We provide professional services and solutions at the highest quality on world-leading chains.

DeltaSpike

DeltaSpike

DeltaSpike empowers individuals and organizations worldwide through its comprehensive cybersecurity solutions.

Permiso Security

Permiso Security

Permiso combines industry leading Identity Security Posture Management with Identity Threat Detection and Response, leaving no place to hide for identity threats lurking in your environment.