https://www.iotworldtoday.com/wp-content/themes/ioti_child/assets/images/logo/footer-logo.png
  • Home
  • News
    • Back
    • IoT World 2020 News
  • Strategy
  • Special Reports
  • Galleries
  • Business Resources
    • Back
    • Webinars
    • White Papers
    • Industry Perspectives
    • Featured Vendors
  • Other Content
    • Back
    • IoT World 2020 News
    • Q&As
    • Case Studies
    • Features
    • How-to
    • Opinion
    • Video / Podcasts
  • More
    • Back
    • About Us
    • Contact
    • Advertise
    • Strategic Partners
  • IOT World Events
    • Back
    • Internet of Things World: San Jose
    • IoT World 2020 News
Iot World Today
  • NEWSLETTER
  • Home
  • News
    • Back
    • IoT World 2020 News
  • Strategy
  • Special Reports
  • Galleries
  • Business Resources
    • Back
    • Webinars
    • White Papers
    • Industry Perspectives
    • Featured Vendors
  • Other Content
    • Back
    • IoT World 2020 News
    • Q&As
    • Case Studies
    • Features
    • How-to
    • Opinion
    • Video / Podcasts
  • More
    • Back
    • About Us
    • Contact
    • Advertise
    • Strategic Partners
  • IOT World Events
    • Back
    • Internet of Things World: San Jose
    • IoT World 2020 News
  • newsletter
  • IIoT
  • Cities
  • Energy
  • Homes/Buildings
  • Transportation/Logistics
  • Connected Health Care
  • Retail
  • AI
  • Architecture
  • Engineering/Development
  • Security
ioti.com

Security


NoodleTail

Drone with chainsaw

8 Drone-Related Security Dangers

How can drones cause havoc? Let me count the ways.
  • Written by Brian Buntz
  • 9th March 2017

“With drones, whatever security you thought you had is gone,” declares Kunal Jain from the drone security company Dedrone (San Francisco). While most people don’t yet equate drones with security risks, they pose an array of threats, and reports of drone-related accidents and near-misses are on the rise. With some one million drones entering the airspace globally each month, the prospect of securing drones is becoming more daunting. “Think of nearly any worst case scenario, and you can probably do it with a drone,” Jain says.

Related: Join us on Thursday, March 23 at 12 p.m. PST. for a Twitter chat dedicated to drones at #IoTBizChat.

Here are eight drone-related risks:

1. Airspace Threats

Imagine the level of damage a swarm of drones could cause if they were sucked into a jet engine. While most airports ban drones from flying near them, such rules may potentially be hard to enforce. “The scary thing is that all of the airport approaches for aircraft are published with great accuracy,” says Joerg Lamprecht, cofounder and CEO of Dedrone. Because planes’ autopilot modes fly according to a precisely predefined flight, it wouldn’t be overly difficult for a drone operator to position a drone right in the middle of this flight path—whether near an airport or anywhere else along an airplane’s flight path. “Now, you don’t have to even be in the airport to cause a problem,” Jain adds.

2. Vehicles for Weapons

Think of any light- to medium-weight weapon, and it can probably be attached to a drone. There are already videos of drones with chainsaws, machine guns, and flamethrowers attached.

But a prankster or terrorist could cause havoc with even the simplest of weapons. Imagine the reaction if a drone hovered above a popular sporting event, sprinkling an unknown white powder over the crowd. “A stunt like this would cause pandemonium, even if the powder in question was merely powdered sugar. You would have to have everybody quarantined because you don’t know what that substance was,” says JB McDowell, a sales engineer at Dedrone. “And stadium owners around the nation would freak out and postpone games and increase security.”

Terrorists are beginning to employ drones for both reconnaissance and combat operations. And such unmanned aerial vehicles could be used to deploy dangerous chemical weaponry, drop bombs, or even carry out nuclear attacks. Former U.S. President Obama described a possible scenario in which terrorists spread radioactive material over a densely-populated area. South Korean President Park Geun-hye agreed in a meeting last April that the risk was real: “We must actively respond to the threat of drones being used to spread radioactive materials or infiltrate nuclear facilities.”

But terrorists wouldn’t need access to nuclear materials to cause havoc. They could, for instance, decide to poison the water system by flying a drone over a water facility and drop poison inside.

3. Low-Tech Corporate Espionage

In a famous scene in the HBO series Silicon Valley, a circle of men—purportedly venture capitalists—sit around a boardroom table. Three members of the startup Pied Piper take turns explaining how their technology works, jotting algorithms and formulas on a whiteboard while the men sitting around the table furiously jot down notes and later snap smartphone pictures. The engineers are impressed with how engaged the audience is. Erlich Bachman, who leads the startup’s incubator, is less impressed: “Of course they are interested. They want to steal it. This is a classic brain rape.”

Drones, however, may be the ultimate tool for corporate espionage. For one thing, rival companies can use drones to carry out this same basic scenario from Silicon Valley. After all, it’s common for whiteboards to display financial information, notes on the company’s strategy, technological diagrams, and so forth. All a drone operator has to do is to find one of these whiteboards facing a window and snap some pictures—it doesn’t matter if it is on the first floor or the thirtieth.

Note: The topic of IoT security is a key item on the agenda at Internet of Things World in Santa Clara this May. Check out the agenda for the world’s biggest IoT event.

Drone operators have also used this basic approach to spy on everything from prototype car models, the filming of Game of Thrones, and Apple’s new “spaceship” campus before it officially opens. There has also been an uptick in reports of drones flying over company facilities that are potential M&A targets, says JB McDowell, a sales engineer at Dedrone.

4. High-Tech Corporate Espionage

Having a drone hover outside of a board room and snap pictures may be daring, but it isn’t very sophisticated. Some of the most damaging drone-related hijacks involve computer hacking. There are, for instance, reports of drones loaded with a Raspberry Pi that can land atop a data center and steal sensitive information. “The drone will die but comes equipped with a separate power source for its components so that it will continue to sniff and transmit data over time,” says Kunal Jain, enterprise sales manager at Dedrone. “One of our partners has found a drone like that on top of a building. The drone was rusted and dead, but the components were still working.”

5. Smuggling

Many prisons across the United States are working to stop drones from smuggling everything from drugs, pornography, and smartphones to prisoners. Last year, a fight erupted at an Ohio prison after a drone dropped heroin into the exercise yard. Drug cartels have also used drones to ferry their wares across the Mexican–U.S. border.

6. Collisions

There have been a handful of reports of serious injuries from lightweight drones colliding into people. But collisions between 50-pound commercial drones could prove fatal, based on a recent article from Bloomberg that summarized the results of drone research involving crash-test dummies. “If you’re operating a large, multi-rotor aircraft in really close? proximity to people and treating it as if it’s a toy, then I think it’s asking for some pretty severe outcomes,” explained Mark Blanks, director of the government-approved drone test center at Virginia Tech.

7. The Difficulty of Enforcing the Rules

Authorities are attempting to crack down on drones flying in sensitive areas such as near airports or crowded sporting events. At the Super Bowl this year, for instance, FAA set up a 34.5-mile “no-drone zone” around the stadium. But the problem is that such no-fly zones are difficult to enforce. Radar has a hard time picking up drones, making it easy for some random guy in his backyard or in the back of a truck to fly a drone into a sensitive airspace undetected. “What happens if a kid goes out and flies a drone near an airport? Do you prosecute the child, the parents? What would you do?” asks Jain.

8. Drone-Based Hacking

Drones also open up an array of new avenues for hackers. Not only can drones be hacked in flight, causing them to crash, the craft also can be used for stealing sensitive information from the public. It wouldn’t be hard for a drone to hover 150 feet above a park, broadcast a WiFi signal overhead, and then grab sensitive information from anyone using the network, for instance. In 2014, the security firm SensePost showed the feasibility of such attacks with its so-called Snoopy Drone.

Image credits: Thinkstock

Tags: Article Security Technologies

Related


  • 3d rendering of human brain on technology background
    AI Ups the Ante for IoT Cybersecurity
    Security providers in IT and OT have implemented AI, ML and other advanced technologies to make systems smarter than malicious attackers.
  • IoT security
    Protecting Your Network Against Ripple20 Vulnerabilities
    Early this year, Ripple20 wrought havoc on numerous IoT devices, given vulnerable third-party code. Here are ways to prevent your organization from the fallout.
  • IoT security
    IoT Security Trends, 2021: COVID-19 Casts Long Shadow
    While some IoT security trends in 2021 will continue trends from 2019 and 2020, COVID-19 has brought some new threats to the fore.
  • IoT security
    IoT Device Security: Risk Assessment, Hygiene Are Key
    As devices and data proliferate at the edge of the network, IT pros have encountered new challenges in securing enterprise IT systems.

2 comments

  1. Avatar AM Hopper 23rd December 2018 @ 9:52 pm
    Reply

    What about the ability to weaponize drone with killing mechanisms attached to drones?

  2. Avatar nope 11th February 2020 @ 9:24 pm
    Reply

    Why don’t people arm no fly zones with EMP devices?

Leave a comment Cancel reply

-or-

Log in with your IoT World Today account

Alternatively, post a comment by completing the form below:

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Related Content

  • COVID-19 Driving Data Integration Projects in IoT
  • Intro to LynxSecure
  • Can Privacy-Preserving Machine Learning Overcome Data-Sharing Worries?
  • Cybersecurity Crisis Management During the Coronavirus Pandemic

News

View all

Private LTE Market Projected to Grow to $13 Billion

12th January 2021

IoT World Announces 2021 IoT World Advisory Board

9th December 2020

White Papers

View all

The eSIM Cookbook – Towards the Next Generation of Connected Devices

22nd February 2021

eSIM Delivers Greater Freedom for OEMs – by Beecham Research and Truphone

22nd February 2021

Special Reports

View all

Cybersecurity Protection Increasingly Depends on Machine Learning

28th October 2020

Webinars

View all

Weber’s Journey: How a Top Grill Maker Serves Up Connected Cooking

25th February 2021

From Insights to Action: Best Practices for Implementing Connected Device Security

15th December 2020

Galleries

View all

Top IoT Trends to Watch in 2020

26th January 2020

Five of the Most Promising Digital Health Technologies

14th January 2020

Industry Perspectives

View all

IoT Spending Holds Firm — Tempered by Dose of ‘IoT Pragmatism’

1st December 2020

The Great IoT Connectivity Lockdown

11th May 2020

Events

View all

IoT at the Edge

17th March 2021

Embedded IoT World 2021

28th April 2021 - 29th April 2021

IoT World 2021

2nd November 2021 - 4th November 2021

Twitter

IoTWorldToday, IoTWorldSeries

IoT Remote Monitoring Helps Enterprises Traverse COVID-19 and Beyond dlvr.it/RtZ3K5 https://t.co/owJXYf1gkO

26th February 2021
IoTWorldToday, IoTWorldSeries

Securing the Industrial Internet of Things dlvr.it/RtYfYk https://t.co/khUn79dvQD

26th February 2021
IoTWorldToday, IoTWorldSeries

📢 Announcing #EIOTWORLD sponsor, @BluetoothSIG — the global standard for simple, secure wireless connections. ➕ Le… twitter.com/i/web/status/1…

26th February 2021
IoTWorldToday, IoTWorldSeries

How IoT Devices Can Enhance the Connected Customer Experience dlvr.it/RtPcvS

24th February 2021
IoTWorldToday, IoTWorldSeries

🤝 Meet #EIOTWORLD speaker Ingo Feldner, Project Lead for Virtual #Hardware Platforms at @RobertBoschGmbH 📅 Join hi… twitter.com/i/web/status/1…

24th February 2021
IoTWorldToday, IoTWorldSeries

Developing IoT Applications with Rust: Using a Rust Development Environment dlvr.it/RtNqrk https://t.co/wOmnoz2UVT

24th February 2021
IoTWorldToday, IoTWorldSeries

Chip-Enabled Edge AI Drives Next-Gen IoT dlvr.it/RtKcMQ https://t.co/dLjBzE6Qei

23rd February 2021
IoTWorldToday, IoTWorldSeries

The eSIM Cookbook – Towards the Next Generation of Connected Devices dlvr.it/RtG5bB https://t.co/5kXa8Pnv4T

22nd February 2021

Newsletter

Sign up for IoT World Today newsletters: vertical industry coverage on Tuesdays and horizontal tech coverage on Thursdays.

Special Reports

Our Special Reports take an in-depth look at key topics within the IoT space. Download our latest reports.

Business Resources

Find the latest white papers and other resources from selected vendors.

Media Kit and Advertising

Want to reach our audience? Access our media kit.

DISCOVER MORE FROM INFORMA TECH

  • IoT World Series
  • Channel Futures
  • RISC-V
  • Dark Reading
  • ITPro Today
  • Web Hosting Talk

WORKING WITH US

  • Contact
  • About Us
  • Advertise
  • Login/Register

FOLLOW IoT World Today ON SOCIAL

  • Privacy
  • CCPA: “Do Not Sell My Data”
  • Cookies Policy
  • Terms
Copyright © 2021 Informa PLC. Informa PLC is registered in England and Wales with company number 8860726 whose registered and Head office is 5 Howick Place, London, SW1P 1WG.
This website uses cookies, including third party ones, to allow for analysis of how people use our website in order to improve your experience and our services. By continuing to use our website, you agree to the use of such cookies. Click here for more information on our Cookie Policy and Privacy Policy.
X