Drones and cybersecurity?

1 October 2019 Surveillance

With estimates that between 30 000 and 50 000 drones are currently being operated in South Africa, security experts advise that unmanned aerial vehicles have punched a gaping hole in existing physical and IT security strategies.

Interpol warns that the potential use of drones in a terrorist incident or attack against critical infrastructure and soft targets is a growing concern for law enforcement, as the availability of drone technology becomes more widespread globally.

Furthermore, as drones become less expensive and their potential applications continue to expand, it is expected that countries across the globe will see a rise and evolution of this threat.

A report by Goldman Sachs estimated that the total drone market could reach $100 billion by 2020, playing a significant role in every sector of the economy, from agriculture to entertainment and everything in between. However, the report also cautions that for security professionals, the scope of the threat is huge and evolving.

Every enterprise and every individual protected by a traditional fence now requires an aerial equivalent, according to Pieter Scholtz, DSM expert at T-Systems South Africa. “Drones are bypassing all the traditional security measures that have been in place for years and are breaking all the rules regarding physical access and countermeasures.”

Scholtz notes that what compounds the threat is that drones are relatively inexpensive, easy to operate and can carry heavy payloads that can perform surveillance, capture data, or disrupt networks.

“One of the main things that organisations need to do is to expand their cybersecurity policies to include the threat posed by drones. The nature of drones means that they present a very cheap and easy way to do industry espionage, or network hacking. These threats should be taken seriously,” Scholtz says.

He cites an incident in which a German company found a drone parked on the roof of its data centre, where it tried to hack into the centre’s command and control network. “Hacker drones can eavesdrop electronically on conversations, can perform network attacks, or can create a fake wireless access point that can trick an organisation’s employees to connect to it, instead of the corporate LAN,” Scholtz says.

A host of other threats are posed by surveillance drones, which can be used for corporate espionage, invasion of privacy and intelligence gathering for a physical attack, as well as by smuggler drones, which can be used to deliver contraband to restricted areas, such as prisons. Weaponised drones can bring about a variety of physical threats, either by carrying a payload of weapons, or by being used as a weapon itself.

Sam Twala, business and technical director at NTSU Aviation Solutions, says that regulations alone will do little to discourage criminals exploiting drone technology for nefarious purposes. Instead, he says that organisations need to rely on drone detection technology to protect themselves.

“Terrorists or people with malicious intent do not read regulations and comply prior to carrying out their plans. Hence, it is important that organisations develop defence models that will help to protect them against drones,” he says, adding that, unfortunately, there is no one-size-fits-all solution.

“The variance in threats delivered by drones means many different types of facilities are vulnerable. You will need a solution that can fit to each environment.”

However, because the threat posed by drones is evolving at the speed of cybersecurity, it is security specialists that are facing a challenge to keep up, says Jaacie Visagie, special project manager at UAV & Drone Solutions.

“At the moment, it’s a cat and mouse game. We are discovering new things every day, because this is a relatively new industry,” he concludes.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Human-centric control rooms
Iritron Integrated Solutions Surveillance Residential Estate (Industry)
Iritron and Oculus show that when it comes to control rooms, people, not just technology, are at the centre of the most significant performance differentiators today, not just how efficiently the technology works.

Read more...
Smarter security for safer estate living
neaMetrics Suprema Integrated Solutions Surveillance Access Control & Identity Management Residential Estate (Industry)
The expansion of residential estates has led to many communities being constructed with security as an afterthought. Unfortunately, fencing, cameras, and a guard at the gate only create a false sense of safety, which vanishes after the first incident.

Read more...
Secure, long-distance thermal from Keenfinity
Products & Solutions Surveillance Residential Estate (Industry)
The DINION thermal 8100i camera is a bullet thermal camera built for mission-critical applications, prioritising long-distance monitoring and reliable perimeter intrusion detection with built-in Intelligent Video Analytics (IVA) Pro Perimeter video analytics.

Read more...
IVA AI Pro Visual Gun Detection
Products & Solutions Surveillance Security Services & Risk Management Residential Estate (Industry)
Bosch has announced the launch of the IVA AI Pro Visual Gun Detection analytics based on deep learning. It is designed for automatic detection and classification of people and brandished firearms.

Read more...
IP-based horn loudspeakers
Products & Solutions Surveillance Security Services & Risk Management Residential Estate (Industry)
Bosch has announced the launch of its new IP-based horn loudspeakers and amplifier module: the high-output LHN-UC15L-SIP horn (for long-throw applications), the compact LHN-UC15W-SIP horn (for wide-angle coverage) and the AMN-P15-SIP amplifier module.

Read more...
Identity, Security & Access Alliance focuses on intelligence and integration
SMART Security Solutions Ideco Biometrics BoomGate Systems Bosch Building Technologies Technews Publishing Integrated Solutions Surveillance Access Control & Identity Management
The Identity, Security & Access Alliance (ISAA) hosted several launch events in Johannesburg in August, showcasing the participating companies’ technical solutions with a primary focus on the solutions made possible by integrating high-quality systems to deliver comprehensive solutions.

Read more...
Make BIG and COMPLEX small and manageable
neaMetrics Suprema AI & Data Analytics Surveillance Integrated Solutions
Traditional CCTV and access systems often operate separately, creating gaps in visibility and efficiency. TRASSIR and Suprema have partnered to develop an integrated platform that improves security, operations, and situational awareness.

Read more...
Get the AI fundamentals right
Leaderware Editor's Choice Surveillance AI & Data Analytics
Much of the marketing for CCTV AI detection implies the client can just drop the AI into their existing systems and operations, and they will be detecting all criminals and be far more efficient when doing it.

Read more...
SMART Surveillance Conference in Johannesburg
Arteco Global Africa Technews Publishing SMART Security Solutions Axis Communications SA neaMetrics Editor's Choice Surveillance Security Services & Risk Management Logistics (Industry) AI & Data Analytics
SMART Security Solutions hosted its annual SMART Surveillance Conference in Johannesburg in July, welcoming several guests, sponsors, and speakers for an informative and enjoyable day examining the evolution of the surveillance market.

Read more...
LiDAR protects railways from new and existing dangers
Surveillance
3D LiDAR (Light Detection and Ranging) sensors are being installed to monitor rail traffic and ensure safety of passengers as well as individuals walking near the tracks, or trying to perform dangerous stunts for social media.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.