Drones and cybersecurity?

1 October 2019 Surveillance

With estimates that between 30 000 and 50 000 drones are currently being operated in South Africa, security experts advise that unmanned aerial vehicles have punched a gaping hole in existing physical and IT security strategies.

Interpol warns that the potential use of drones in a terrorist incident or attack against critical infrastructure and soft targets is a growing concern for law enforcement, as the availability of drone technology becomes more widespread globally.

Furthermore, as drones become less expensive and their potential applications continue to expand, it is expected that countries across the globe will see a rise and evolution of this threat.

A report by Goldman Sachs estimated that the total drone market could reach $100 billion by 2020, playing a significant role in every sector of the economy, from agriculture to entertainment and everything in between. However, the report also cautions that for security professionals, the scope of the threat is huge and evolving.

Every enterprise and every individual protected by a traditional fence now requires an aerial equivalent, according to Pieter Scholtz, DSM expert at T-Systems South Africa. “Drones are bypassing all the traditional security measures that have been in place for years and are breaking all the rules regarding physical access and countermeasures.”

Scholtz notes that what compounds the threat is that drones are relatively inexpensive, easy to operate and can carry heavy payloads that can perform surveillance, capture data, or disrupt networks.

“One of the main things that organisations need to do is to expand their cybersecurity policies to include the threat posed by drones. The nature of drones means that they present a very cheap and easy way to do industry espionage, or network hacking. These threats should be taken seriously,” Scholtz says.

He cites an incident in which a German company found a drone parked on the roof of its data centre, where it tried to hack into the centre’s command and control network. “Hacker drones can eavesdrop electronically on conversations, can perform network attacks, or can create a fake wireless access point that can trick an organisation’s employees to connect to it, instead of the corporate LAN,” Scholtz says.

A host of other threats are posed by surveillance drones, which can be used for corporate espionage, invasion of privacy and intelligence gathering for a physical attack, as well as by smuggler drones, which can be used to deliver contraband to restricted areas, such as prisons. Weaponised drones can bring about a variety of physical threats, either by carrying a payload of weapons, or by being used as a weapon itself.

Sam Twala, business and technical director at NTSU Aviation Solutions, says that regulations alone will do little to discourage criminals exploiting drone technology for nefarious purposes. Instead, he says that organisations need to rely on drone detection technology to protect themselves.

“Terrorists or people with malicious intent do not read regulations and comply prior to carrying out their plans. Hence, it is important that organisations develop defence models that will help to protect them against drones,” he says, adding that, unfortunately, there is no one-size-fits-all solution.

“The variance in threats delivered by drones means many different types of facilities are vulnerable. You will need a solution that can fit to each environment.”

However, because the threat posed by drones is evolving at the speed of cybersecurity, it is security specialists that are facing a challenge to keep up, says Jaacie Visagie, special project manager at UAV & Drone Solutions.

“At the moment, it’s a cat and mouse game. We are discovering new things every day, because this is a relatively new industry,” he concludes.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Unlock the future of security operations in Bloemfontein
DeepAlert News & Events Surveillance
Security professionals and business leaders are invited to revolutionise their offsite monitoring operations at the DeepAlert Product Road Show, taking place on 16 – 17 September 2025, at the Schoemanspark Golf Club, Bloemfontein.

Read more...
Your Wi-Fi router is about to start watching you
News & Events Surveillance Security Services & Risk Management
Advanced algorithms are able to analyse your Wi-Fi signals and create a representation of your movements, turning your home's Wi-Fi into a motion detection and personal identification system.

Read more...
Secure, modernise and optimise CCTV
Surveillance Products & Solutions
Industrial and commercial organisations are navigating complex digital transformation processes. With SecuVue, companies can bridge the gap between operational technology and information technology for safer, smarter operations.

Read more...
Eagle Eye Precision Person & Vehicle Detection
Surveillance Products & Solutions AI & Data Analytics
Eagle Eye’s new Precision Person & Vehicle Detection feature detects people and vehicles at long distances with high accuracy and is especially designed for customers who actively monitor for intruders

Read more...
Hikvision launches AcuSeek NVR
Surveillance Products & Solutions AI & Data Analytics
By integrating natural language interaction, Hikvision’s AcuSeek NVR enables precise video and image retrieval within seconds, marking a transformative milestone for the security industry's advance into intelligent and efficient applications.

Read more...
2025 video surveillance market set for improved fortunes
News & Events Surveillance
Novaira Insights has unveiled its latest report, World Market for Video Surveillance Hardware and Software – 2025 Edition, forecasting a healthy growth rate of 8,1% until 2029, excluding China.

Read more...
Dallmeier and Hexagon form a technology partnership
Surveillance
Dallmeier and Hexagon have agreed to form a technology partnership, which will see the two companies combine their expertise to develop integrated security solutions for various application areas, particularly critical infrastructures.

Read more...
Safer spaces through smart surveillance
NEC XON Surveillance
Advances in facial recognition technology are transforming surveillance from a mere recording tool into an intelligent, integrated system that enhances real-time safety, moving beyond the traditional expansion of CCTV efforts.

Read more...
Next generation of AI-powered video telematics
IoT & Automation Surveillance Transport (Industry)
Webfleet, Bridgestone’s fleet management solution in South Africa, has launched Webfleet Video 2.0, an AI-powered solution designed to enhance fleet safety, security, compliance with local regulations and operational efficiency through real-time video insights.

Read more...
Key design considerations for a control room
Leaderware Editor's Choice Surveillance Training & Education
If you are designing or upgrading a control room, or even reviewing or auditing an existing control room, there are a number of design factors that one would need to consider.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.