https://www.iotworldtoday.com/wp-content/themes/ioti_child/assets/images/logo/IoTWorldToday-mobile-logo.png
  • Home
  • News
    • Back
    • Roundups
  • Strategy
  • Special Reports
  • Business Resources
    • Back
    • Webinars
    • White Papers
    • Industry Perspectives
    • Featured Vendors
  • Other Content
    • Back
    • Q&As
    • Case Studies
    • Features
    • How-to
    • Opinion
    • Podcasts
    • Strategic Partners
    • Latest videos
  • More
    • Back
    • About Us
    • Contact
    • Advertise
    • Editorial Submissions
  • Events
Iot World Today
  • NEWSLETTER
  • Home
  • News
    • Back
    • Roundups
  • Strategy
  • Special Reports
  • Business Resources
    • Back
    • Webinars
    • White Papers
    • Industry Perspectives
    • Featured Vendors
  • Other Content
    • Back
    • Q&As
    • Case Studies
    • Features
    • How-to
    • Opinion
    • Podcasts
    • Strategic Partners
    • Latest videos
  • More
    • Back
    • About Us
    • Contact
    • Advertise
    • Editorial Submissions
  • Events
  • newsletter
  • IIoT
  • Cities
  • Energy
  • Homes/Buildings
  • Transportation/Logistics
  • Connected Health Care
  • Retail
  • AI
  • Metaverse
  • Development
  • Security
ioti.com

Security


NoodleTail

Drone with chainsaw

8 Drone-Related Security Dangers

How can drones cause havoc? Let me count the ways.
  • Written by Brian Buntz
  • 9th March 2017

“With drones, whatever security you thought you had is gone,” declares Kunal Jain from the drone security company Dedrone (San Francisco). While most people don’t yet equate drones with security risks, they pose an array of threats, and reports of drone-related accidents and near-misses are on the rise. With some one million drones entering the airspace globally each month, the prospect of securing drones is becoming more daunting. “Think of nearly any worst case scenario, and you can probably do it with a drone,” Jain says.

Related: Join us on Thursday, March 23 at 12 p.m. PST. for a Twitter chat dedicated to drones at #IoTBizChat.

Here are eight drone-related risks:

1. Airspace Threats

Imagine the level of damage a swarm of drones could cause if they were sucked into a jet engine. While most airports ban drones from flying near them, such rules may potentially be hard to enforce. “The scary thing is that all of the airport approaches for aircraft are published with great accuracy,” says Joerg Lamprecht, cofounder and CEO of Dedrone. Because planes’ autopilot modes fly according to a precisely predefined flight, it wouldn’t be overly difficult for a drone operator to position a drone right in the middle of this flight path—whether near an airport or anywhere else along an airplane’s flight path. “Now, you don’t have to even be in the airport to cause a problem,” Jain adds.

2. Vehicles for Weapons

Think of any light- to medium-weight weapon, and it can probably be attached to a drone. There are already videos of drones with chainsaws, machine guns, and flamethrowers attached.

But a prankster or terrorist could cause havoc with even the simplest of weapons. Imagine the reaction if a drone hovered above a popular sporting event, sprinkling an unknown white powder over the crowd. “A stunt like this would cause pandemonium, even if the powder in question was merely powdered sugar. You would have to have everybody quarantined because you don’t know what that substance was,” says JB McDowell, a sales engineer at Dedrone. “And stadium owners around the nation would freak out and postpone games and increase security.”

Terrorists are beginning to employ drones for both reconnaissance and combat operations. And such unmanned aerial vehicles could be used to deploy dangerous chemical weaponry, drop bombs, or even carry out nuclear attacks. Former U.S. President Obama described a possible scenario in which terrorists spread radioactive material over a densely-populated area. South Korean President Park Geun-hye agreed in a meeting last April that the risk was real: “We must actively respond to the threat of drones being used to spread radioactive materials or infiltrate nuclear facilities.”

But terrorists wouldn’t need access to nuclear materials to cause havoc. They could, for instance, decide to poison the water system by flying a drone over a water facility and drop poison inside.

3. Low-Tech Corporate Espionage

In a famous scene in the HBO series Silicon Valley, a circle of men—purportedly venture capitalists—sit around a boardroom table. Three members of the startup Pied Piper take turns explaining how their technology works, jotting algorithms and formulas on a whiteboard while the men sitting around the table furiously jot down notes and later snap smartphone pictures. The engineers are impressed with how engaged the audience is. Erlich Bachman, who leads the startup’s incubator, is less impressed: “Of course they are interested. They want to steal it. This is a classic brain rape.”

Drones, however, may be the ultimate tool for corporate espionage. For one thing, rival companies can use drones to carry out this same basic scenario from Silicon Valley. After all, it’s common for whiteboards to display financial information, notes on the company’s strategy, technological diagrams, and so forth. All a drone operator has to do is to find one of these whiteboards facing a window and snap some pictures—it doesn’t matter if it is on the first floor or the thirtieth.

Note: The topic of IoT security is a key item on the agenda at Internet of Things World in Santa Clara this May. Check out the agenda for the world’s biggest IoT event.

Drone operators have also used this basic approach to spy on everything from prototype car models, the filming of Game of Thrones, and Apple’s new “spaceship” campus before it officially opens. There has also been an uptick in reports of drones flying over company facilities that are potential M&A targets, says JB McDowell, a sales engineer at Dedrone.

4. High-Tech Corporate Espionage

Having a drone hover outside of a board room and snap pictures may be daring, but it isn’t very sophisticated. Some of the most damaging drone-related hijacks involve computer hacking. There are, for instance, reports of drones loaded with a Raspberry Pi that can land atop a data center and steal sensitive information. “The drone will die but comes equipped with a separate power source for its components so that it will continue to sniff and transmit data over time,” says Kunal Jain, enterprise sales manager at Dedrone. “One of our partners has found a drone like that on top of a building. The drone was rusted and dead, but the components were still working.”

5. Smuggling

Many prisons across the United States are working to stop drones from smuggling everything from drugs, pornography, and smartphones to prisoners. Last year, a fight erupted at an Ohio prison after a drone dropped heroin into the exercise yard. Drug cartels have also used drones to ferry their wares across the Mexican–U.S. border.

6. Collisions

There have been a handful of reports of serious injuries from lightweight drones colliding into people. But collisions between 50-pound commercial drones could prove fatal, based on a recent article from Bloomberg that summarized the results of drone research involving crash-test dummies. “If you’re operating a large, multi-rotor aircraft in really close? proximity to people and treating it as if it’s a toy, then I think it’s asking for some pretty severe outcomes,” explained Mark Blanks, director of the government-approved drone test center at Virginia Tech.

7. The Difficulty of Enforcing the Rules

Authorities are attempting to crack down on drones flying in sensitive areas such as near airports or crowded sporting events. At the Super Bowl this year, for instance, FAA set up a 34.5-mile “no-drone zone” around the stadium. But the problem is that such no-fly zones are difficult to enforce. Radar has a hard time picking up drones, making it easy for some random guy in his backyard or in the back of a truck to fly a drone into a sensitive airspace undetected. “What happens if a kid goes out and flies a drone near an airport? Do you prosecute the child, the parents? What would you do?” asks Jain.

8. Drone-Based Hacking

Drones also open up an array of new avenues for hackers. Not only can drones be hacked in flight, causing them to crash, the craft also can be used for stealing sensitive information from the public. It wouldn’t be hard for a drone to hover 150 feet above a park, broadcast a WiFi signal overhead, and then grab sensitive information from anyone using the network, for instance. In 2014, the security firm SensePost showed the feasibility of such attacks with its so-called Snoopy Drone.

Image credits: Thinkstock

Tags: Article Security Technologies

Related Content


  • Caltech campus
    Robots Could Gain Sense of Touch, With New Artificial Skin
    New design can help businesses determine the presence of hazardous materials, offer greater safety for workers
  • Clearview AI Fined $9.4M Over Facial Data Scraping
    The company was ordered to delete any data it held on U.K. citizens.
  • Microsoft Ramping up Cybersecurity Service Offerings
    Three new managed services will boost the company’s presence in the security space
  • IoT Product Roundup
    IoT Product Roundup: PTC, Nokia, Arm and More
    All the latest Internet of Things products

2 comments

  1. Avatar AM Hopper 23rd December 2018 @ 9:52 pm
    Reply

    What about the ability to weaponize drone with killing mechanisms attached to drones?

  2. Avatar nope 11th February 2020 @ 9:24 pm
    Reply

    Why don’t people arm no fly zones with EMP devices?

Leave a Reply to AM Hopper Cancel reply

-or-

Log in with your IoT World Today account

Alternatively, post a comment by completing the form below:

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Latest News

  • Microsoft Extends Secured-Core Program to IoT Devices
  • Spot the Robot Dog Helps Police Ahead of Boston’s Fourth of July Celebration
  • Unmanned Robotic Combat Vehicle Being Tested
  • Image shows a Close up of lens on black background
    Carnegie Mellon Researchers Invent System to Find Hidden Cameras

Roundups

View all

IoT Product Roundup: Canonical, InfluxData, Wiliot and More

23rd June 2022

IoT Product Roundup: Cisco, Telit, Draganfly and More

9th June 2022

IoT Deals, Partnerships Roundup: Google, Arm, Senet and More

26th May 2022

White Papers

View all

The Role of Manufacturing Technology in Continuous Improvement Ebook

6th April 2022

IIoT Platform Trends for Manufacturing in 2022

6th April 2022

Latest Videos

View all
Image shows Unilever's Alberto Prado at AI Summit 2022 in London

AI Summit 2022: Unilever’s Alberto Prado

Prado talks about how Unilever is using AI to accelerate the speed of new discoveries and gives them access to more breakthrough innovation

Image Shows John Lewis' Barry Panai at AI Summit London 2022

AI Summit 2022: John Lewis’ Barry Panayi on AI in Retail

Panayi talks about data and AI in retail and how individuals and the technology can work together

E-books

View all

How Remote Access Helps Enterprises Improve IT Service and Employee Satisfaction

12th January 2022

An Integrated Approach to IoT Security

6th November 2020

Webinars

View all

Rethinking the Database in the IoT Era

18th May 2022

Jumpstarting Industrial IoT solutions with an edge data management platform

12th May 2022

AI led Digital Transformation of Manufacturing: Time is NOW

9th December 2021

Special Reports

View all

Omdia’s Smart Home Market Dynamics Report

7th January 2022

Cybersecurity Protection Increasingly Depends on Machine Learning

28th October 2020

IoT Security Best Practices for Industry and Enterprise

20th October 2020

Twitter

IoTWorldToday, IoTWorldSeries

🤔 Looking for 3 Strategies to Avoid IoT Key Theft? We’ve got you covered! As tech companies continue to develop an… twitter.com/i/web/status/1…

5th July 2022
IoTWorldToday, IoTWorldSeries

AI Summit 2022: Unilever’s Alberto Prado dlvr.it/STMpRN https://t.co/1dyLREr8N6

5th July 2022
IoTWorldToday, IoTWorldSeries

Seoul Robotics Expands 3D Perception Platform across South America dlvr.it/STMhSV https://t.co/a10l3Eb2Kn

5th July 2022
IoTWorldToday, IoTWorldSeries

Microsoft Extends Secured-Core Program to IoT Devices dlvr.it/STMg4k https://t.co/laBPF5VjC4

5th July 2022
IoTWorldToday, IoTWorldSeries

Spot the Robot Dog Helps Police Ahead of Boston’s Fourth of July Celebration dlvr.it/STKWjb https://t.co/LdRg7a2xqU

4th July 2022
IoTWorldToday, IoTWorldSeries

Another 59,000 @Teslas being recalled over a software glitch affecting the vehicle’s Emergency Call safety system… twitter.com/i/web/status/1…

4th July 2022
IoTWorldToday, IoTWorldSeries

Join us in the premier #tech destination of #Austin this November 2-3 for our next #IoT event. Connect and collabo… twitter.com/i/web/status/1…

4th July 2022
IoTWorldToday, IoTWorldSeries

SoftBank, May Mobility Team on Autonomous Driving dlvr.it/STJrW0 https://t.co/mOYoBsgs14

4th July 2022

Newsletter

Sign up for IoT World Today newsletters: vertical industry coverage on Tuesdays and horizontal tech coverage on Thursdays.

Special Reports

Our Special Reports take an in-depth look at key topics within the IoT space. Download our latest reports.

Business Resources

Find the latest white papers and other resources from selected vendors.

Media Kit and Advertising

Want to reach our audience? Access our media kit.

DISCOVER MORE FROM INFORMA TECH

  • IoT World Series
  • Channel Futures
  • RISC-V
  • Dark Reading
  • ITPro Today
  • Web Hosting Talk

WORKING WITH US

  • Contact
  • About Us
  • Advertise
  • Login/Register

FOLLOW IoT World Today ON SOCIAL

  • Privacy
  • CCPA: “Do Not Sell My Data”
  • Cookies Policy
  • Terms
Copyright © 2022 Informa PLC. Informa PLC is registered in England and Wales with company number 8860726 whose registered and Head office is 5 Howick Place, London, SW1P 1WG.
This website uses cookies, including third party ones, to allow for analysis of how people use our website in order to improve your experience and our services. By continuing to use our website, you agree to the use of such cookies. Click here for more information on our Cookie Policy and Privacy Policy.
X