<img src="https://secure.seem3pick.com/198073.png" style="display:none;">

IT Security: Endangered Species and Hackers, An Unlikely Pairing

Posted by Ola Owojori on Thu, Apr 03, 2014

WWF

What’s the first thing that pops into your head when you hear the word “hacker”? Is it fraud, or identity thief, Anonymous, or The Girl With the Dragon Tattoo?  Well any of the answers above are probably correct; perhaps except for the last one. Now what’s the thing that pops into your head when you hear “endangered species”? Is it elephants, rhinos, tigers, poachers, or the black market? Once again all of the above are correct!

Now, based on the answers above for hackers
and endangered species, it can be inferred that there is no relationship between the two. Endangered species and hackers are two completely different things in two separate worlds. Unfortunately, that assumption is wrong -- in today’s world of advance technology there is a connection between the two, more specifically hackers and poachers have created an asymmetric warfare.

WWF II

 

The illegal practice of poaching protected endangered species has taken a turn for the worst. Poachers have enlisted the help of hackers to improve the practice and increase profits tenfold. The hardest part of poaching animals is finding their exact (or best estimated) location. In order to find this information, the hackers break into the animals’ GPS collars and relay the information to the poachers. This new type of poaching has been dubbed “cyberpoaching”.

The GPS collars are instruments used by conservationists for studies and tracking purposes but they’ve turned into tools for poachers. Ironically enough, due to the high cost of the GPS collars (they cost as much as $5,000) the conservationists only use the collars on the most endangered species, which just happens to be the animals poachers want the most. The most valuable and rarest species are elephants, tigers, rhinos, and snow leopards. The information retained from the GPS collars enable the poachers to the do a faster and cleaner job.

 WWF III

 

Poachers Think Twice!

South African National ParksThe Howard G. Buffett Foundation donated $23.7 at the beginning of March 2014 to the South
Africa National Parks to combat rhino poaching.  This month they will be investing in deploying
a combination of technology and patrolling to end the poaching.  And in December of 2012 Google awarded the WWF a $5 million Global Impact Award to create an umbrella of technology to protect the wildlifeThe measures being taken by conservation organizations to combat cyberpoaching, specifically at the World Wildlife Fund (WWFis the testing of drones and Falcon UAVs. The UAVs are equipped with cameras and sensors and are used during the day and night.  The UAVs allow a ranger to see the poachers hiding in trees, because they allow you to see the body heat.  With the drones, the rangers can avoid running into poachers or lions at night.

 

World Wild Life Federation

They are also using an RF Mesh radio transmissions that sends information from the UAVs, the
RFID tags and sensors at watering holes to a central location.  These transmission can journey up to 7 miles and more.  A key feature of RF mesh is that each device is capable of communication with nearby peers and then sending information via those peers to an access
point.  A better explanation of this is that every mesh node acts as a router, and the advantage is that not every device has to have a direct path to a peer.  This saves on costs and power in the communications chips in each device and uses less power in their signals.  These radio transmitters can last for months or even years without battery replacement.  The RF network is also integrated with an encrypted radio and digital communication system for the rangers.  The Wildlife Crime Technology Project has elected to battle the cyberpoachers by using this encrypted data streaming system which is extremely hard to access;  

http://www.fastcoexist.com/3026125/rfid-tagged-rhinos-and-smart-watering-holes-the-google-funded-tech-fighting-poaching

http://mashable.com/2014/03/05/cyberpoaching/

 

Picture Sources:

http://animalsinendangered.blogspot.com/2010/12/list-of-endangered-animals-in-india.html

http://images2.fanpop.com/images/photos/2600000/White-Tigers-wild-animals-2688151-1024-768.jpg

http://3rdbillion.net/2013/10/endangered-animals/

http://tolweb.org/Mammalia

http://babies-dangerous-wild-animals.blogspot.com/p/animal-news.html

 

Tags: Disaster Recovery, Data Security

Subscribe to our BLOG

Recent Posts