Skip to main content

IBM has created the coffee drone, what could be dangerous in wrong hands

https://metsantarinoita.blogspot.com/

Kimmo Huosionmaa

Coffee drones are created to make life easier, but this kind of drones can be extremely dangerous because they can also be used in eavesdrop operations. In that case, the nano helicopter would hang the microphone under it. Or somebody can put the small eavesdrop machine called "bug" in that drone if that would fly from the unsecured area. Those drones can also be used in the many kinds of intelligence operations, and one of the most interesting methods is, that drone would carry the "honey-pot" or rogue WLAN-devices to near the targeted office. Those rogue stations would replace the normal WLAN support stations, and those stations would be pulled out from the wall plug.


Those drones could carry those devices unseen on the cover of the night, and then the operator must only connect those devices to the electric circuit simply putting the plug to socket, and because those operators must not carry anything, the security guards could let them go to the roofs. The problem with those WLAN-devices is that they must replace the original devices. In the most valuable method would be that the real WLAN-stations would be renamed, taken out from the electric circuit or destroyed, and the data would be routed to the faked WLAN support stations.


The normal mobile telephone can be used in that kind of action, and there is needed the programs, what would duplicate the data. The other route would allow the user to use normal Internet-services, but the other route would send to the operator's computer. And when the eavesdrop mission is over must the real WLAN stations reconnect and the honeypot routers, what is used  "man in the middle" attack would just fly away with those drones.


In the worst scenarios, those drones can equip with a dynamite,  grenade or FAE (Fuel Air Explosives) bomb. Those weapons can be extremely lethal. Also, the microwave weapons can be connected to that thing. Those weapons cause very powerful EMP-pulse, what can cause very bad injuries. The idea of those weapons is that the battery would be pushed by explosives, and then it would give extremely powerful microwave burst in the compassion with their size, what mission is to damage the electronics, and terminate computer centers or alarming systems.

https://eu.usatoday.com/story/money/2018/08/22/ibm-has-invented-coffee-drones-and-they-predict-when-you-need-cup/1051161002/

Comments

Popular posts from this blog

The AI-based PCs will replace current PCs quite soon. A Lenovo director says.

    The AI-based PCs will replace current PCs quite soon. A Lenovo director says.   Lenovo plans to replace current PCs by using new AI-based systems. The AI-based PC is the tool that makes computing more powerful, more effective, and safer than ever before. The Kernel-based AI that guards computers and identifies the users are tools that are required at this time of modern computing. The problem with this type of advantage is that if those AI-based system's servers are in China, makes the PC an ultimate control tool. Another thing is that the host who controls servers can use data collected from the users to create military AI applications. Computer games help to create AI that can respond to all types of actions. And AI also can create things like hypersonic lifting bodies and command systems for military tools. Also, AI can create new types of dual-use systems that control drone swarms in marketing situations for making dragon images in the skies. But the same systems can contro

Quantum computers and ultra-fast photonic microchips can danger even the most secure communication.

"Quantum computers could pose a major security risk to current communication systems in 12-15 years with their exponentially greater speed and code-breaking ability. (ScitechDaily, Today’s Most-Secure Communications Threatened by Future Quantum Computers) Quantum computers can break entire binary cryptography. And that makes all communication unsecured. That is one of the greatest threats in quantum computing. And this brings the arms race to the quantum age. The quantum computer can create codes that any binary computer can break. But the quantum computer can also break old-fashioned codes. And that makes it an ultimate weapon and sabotage tool.   Quantum computers can change the measurements of the ammunition in factories by changing the system calibration. Or it can delete databases from the opponent's computer systems. This thing can delete all SIM cards from mobile telephones. In peacetime, the hackers that operate using quantum systems can steal the names of the counter-

The new 3D printers are coin-size systems.

"The tiny device could enable a user to rapidly create customized, low-cost objects on the go, like a fastener to repair a wobbly bicycle wheel or a component for a critical medical operation. Credit: Sampson Wilcox, RLE" (Scitech, Tiny Titan: MIT’s Revolutionary Coin-Sized 3D Printer Fits in Your Pocket) Researchers created a 3D printer that is coin-size. That kind of printer can create things like microchips. But it's possible. Those tiny 3D printers can also work in extremely large-size projects. In simplest models, the 3D printers are positioned on tracks. The 3D printer itself is the tool, that can be part of the modular production systems.  There are visions of high-temperature metal printers installed on the gantry cranes. That makes those crane printers that can make even ship-size things. The crane that the printer controls can move back and forth and the printer can move horizontally. This kind of thing can turn the crane into a high-temperature 3D printer, that