Drones and cybersecurity?

1 October 2019 Surveillance

With estimates that between 30 000 and 50 000 drones are currently being operated in South Africa, security experts advise that unmanned aerial vehicles have punched a gaping hole in existing physical and IT security strategies.

Interpol warns that the potential use of drones in a terrorist incident or attack against critical infrastructure and soft targets is a growing concern for law enforcement, as the availability of drone technology becomes more widespread globally.

Furthermore, as drones become less expensive and their potential applications continue to expand, it is expected that countries across the globe will see a rise and evolution of this threat.

A report by Goldman Sachs estimated that the total drone market could reach $100 billion by 2020, playing a significant role in every sector of the economy, from agriculture to entertainment and everything in between. However, the report also cautions that for security professionals, the scope of the threat is huge and evolving.

Every enterprise and every individual protected by a traditional fence now requires an aerial equivalent, according to Pieter Scholtz, DSM expert at T-Systems South Africa. “Drones are bypassing all the traditional security measures that have been in place for years and are breaking all the rules regarding physical access and countermeasures.”

Scholtz notes that what compounds the threat is that drones are relatively inexpensive, easy to operate and can carry heavy payloads that can perform surveillance, capture data, or disrupt networks.

“One of the main things that organisations need to do is to expand their cybersecurity policies to include the threat posed by drones. The nature of drones means that they present a very cheap and easy way to do industry espionage, or network hacking. These threats should be taken seriously,” Scholtz says.

He cites an incident in which a German company found a drone parked on the roof of its data centre, where it tried to hack into the centre’s command and control network. “Hacker drones can eavesdrop electronically on conversations, can perform network attacks, or can create a fake wireless access point that can trick an organisation’s employees to connect to it, instead of the corporate LAN,” Scholtz says.

A host of other threats are posed by surveillance drones, which can be used for corporate espionage, invasion of privacy and intelligence gathering for a physical attack, as well as by smuggler drones, which can be used to deliver contraband to restricted areas, such as prisons. Weaponised drones can bring about a variety of physical threats, either by carrying a payload of weapons, or by being used as a weapon itself.

Sam Twala, business and technical director at NTSU Aviation Solutions, says that regulations alone will do little to discourage criminals exploiting drone technology for nefarious purposes. Instead, he says that organisations need to rely on drone detection technology to protect themselves.

“Terrorists or people with malicious intent do not read regulations and comply prior to carrying out their plans. Hence, it is important that organisations develop defence models that will help to protect them against drones,” he says, adding that, unfortunately, there is no one-size-fits-all solution.

“The variance in threats delivered by drones means many different types of facilities are vulnerable. You will need a solution that can fit to each environment.”

However, because the threat posed by drones is evolving at the speed of cybersecurity, it is security specialists that are facing a challenge to keep up, says Jaacie Visagie, special project manager at UAV & Drone Solutions.

“At the moment, it’s a cat and mouse game. We are discovering new things every day, because this is a relatively new industry,” he concludes.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Data privacy best practices for physical security teams
Genetec Surveillance Integrated Solutions IoT & Automation
Physical security systems produce large amounts of information from video footage, access control records, and licence plate data. Recommendations assist organisations in safeguarding sensitive data, while ensuring effective security operations.

Read more...
The AI goldrush has a credibility problem
Surveillance AI & Data Analytics
The single most important question a surveillance buyer can ask is deceptively simple: “Was this system programmed or was it trained?” That question alone will reveal more about what you are evaluating than any feature list or marketing video.

Read more...
Surveillance & AI roundtable
DeepAlert Lytehouse Refraime SMART Security Solutions Technews Publishing Editor's Choice Surveillance Integrated Solutions AI & Data Analytics
SMART Security Solutions held an online roundtable with a few surveillance experts to explore the intersection of surveillance and AI, gaining insights into the market and how control rooms are evolving.

Read more...
Duxbury SA Milesight distributor
Duxbury Networking News & Events Surveillance
Duxbury Networking has been appointed the exclusive distributor of Milesight surveillance solutions in South Africa, expanding its surveillance portfolio with a platform designed to deliver AI-driven analytics, rapid deployment, and open integration for modern security environments.

Read more...
Transforming video surveillance into strategic intelligence
Secutel Technologies Products & Solutions Surveillance
In a world where risk moves faster, and operations are more interconnected than ever, you need more than footage — you need insight.

Read more...
Coordinated efforts lead to successful crime response
News & Events Surveillance Integrated Solutions
A synchronised operation involving Vumacam’s control room operators, the Johannesburg Metropolitan Police Department (JMPD), and 24/7 Drone Force, resulted in the successful identification and apprehension of a suspect linked to a reported theft case.

Read more...
From surveillance to insight across Africa
neaMetrics TRASSIR - neaMetrics Distribution Access Control & Identity Management Surveillance Products & Solutions
TRASSIR is a global developer of intelligent video management and analytics solutions, delivering AI-driven platforms that enable organisations to monitor, analyse, and respond to events across complex physical environments.

Read more...
Edge AI-powered night vision
Surveillance Products & Solutions
By eliminating the need for supplemental lighting, the VIVOTEK Chroma24 low-light full-colour AI camera series provides quiet, unobtrusive protection, while also reducing power consumption and minimising impact on people, ecosystems, and the environment.

Read more...
CAA-compliant ground drone outsourcing
Surveillance IoT & Automation
South African mines, estates, utility companies, independent power producers, ports, municipalities and others can now own and operate a CAA-compliant drone dock ground station in just six to eight weeks.

Read more...
AI-powered classification across large areas
Axis Communications SA Surveillance Products & Solutions AI & Data Analytics
Axis Communications announced the upcoming launch of two innovative radars. Each device delivers a 180° or 270° horizontal field of detection, with accurate AI-powered classification across large areas, 24/7, in all weather and lighting conditions.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.