Author states that, “Last year professor at the university of Texas demonstrated that it was possible to remotely hack into and takeover a Homeland Security drone in midflight (Lev Grossman, 2013).” By taking that into account what the author is in the Texas University was trying to illustrate that drone is a machine with an IP address and it can be hacked and after breaking its encryption codes anyone can make a copy of it. It’s very risky if terrorists got drone they will use it against America and that’s a problem and then how America will save their civilians. For example, Iran’s military claimed that they already hacked a surveillance drone of CIA and their military has already made a new copy of it however United States has already claimed that they lost one of their drones. Drones may have become a most popular piece of technology to go after for hackers these
Author states that, “Last year professor at the university of Texas demonstrated that it was possible to remotely hack into and takeover a Homeland Security drone in midflight (Lev Grossman, 2013).” By taking that into account what the author is in the Texas University was trying to illustrate that drone is a machine with an IP address and it can be hacked and after breaking its encryption codes anyone can make a copy of it. It’s very risky if terrorists got drone they will use it against America and that’s a problem and then how America will save their civilians. For example, Iran’s military claimed that they already hacked a surveillance drone of CIA and their military has already made a new copy of it however United States has already claimed that they lost one of their drones. Drones may have become a most popular piece of technology to go after for hackers these