Once built for the Military Drones are now available for commerce and hobbyists and. . .
Drones certainly have their usefulness today in agriculture; rescue missions, the power industry, photography, hobby flying and nearly every other sector of business and recreation, and are openly available for everyone. Drones can be purchased with various levels of sophistication from multiple sources.
The threat to everyone can include:
- Possible Lethal Ordnance
- Surveillance on Corporation’s Facilities & Headquarters
- Access through Internet and Network Endpoints
- Stadiums & Open Air Festivals
- Home & Personal Privacy
- Travel Routes & Timelines
- Dirty bomb delivery to strategic targets
Drones have become increasingly more sophisticated marvels of technology and flight and, as with all advancing technologies, today’s drones have their dark side. Cyber security risks are increased by the lack of security measures built into the units. Drones, all functioning in a very similar manner are, in a nutshell, flying sensors that are communicating via the Internet, capturing and transmitting data while being controlled and accessed remotely. Thus they have a sensor, an Internet connection and a means to capture and transmit data usually to a cloud. Hence illustrating a connection to the IoT (Internet of Things Platform – the support software that connects edge hardware, access points, and data networks to other parts of the value chain) and a means of infiltrating IoT implementations.
The sensor component is easily adjustable and variable. They could be configured to be cameras, microphones, sniffers and thermal imaging. Their role can be easily converted.
Drone troubles for security
- Drone cameras can capture video of confidential facilities without consent.
- Aggressors can access to unsecured video transmissions. Hackers can steal data…
- A drone can be a combat weapon – an armed hobby drone can be a real danger to all.
- Drones can be hacked and remotely taken over.
- Drone protocols are vulnerable and hackable.
- Drones can be used to attack Wi-Fi, Bluetooth and other wireless connections.
State and Federal FAA regulations for drones vary but most say that drones should follow the “line of sight rule,” which mandates that drone operators keep the unmanned aircraft within eye sight at all times. An overview of the rules can be found here at: http://www.businessinsider.com/drones-law-faa-regulations-2017-7
But of course bad guys always follow the rules, as we all know!