Viw Magazine

Men's Weekly

.

  • Written by Mohiuddin Ahmed, Lecturer of Computing & Security, Edith Cowan University
Are military drones a security threat to their own operators? Gorodenkoff/Shutterstock

Unmanned aerial vehicles, more commonly called drones, are now a fundamental part of defence force capability, from intelligence gathering to unmanned engagement in military operations. But what happens if our own technology is turned against us?

Between 2015 and 2022, the global commercial drone market is expected to grow from A$5.95 billion to A$7.47 billion.

Drones are now being used in a host of applications, including agriculture, media, parcel delivery, and defence.

However, as with all IT technology, manufacturers and users may leave the digital doors unlocked. This potentially leaves opportunities for cyber-criminals and perhaps even cyber-warfare.


Read more: Police drones: can we trust the eyes in the skies?


Imagine a defence operation in which a drone is sent out to spy on enemy territory. The enemy identifies the drone but instead of disabling it, compromises the sensors (vision, sonar, and so on) to inject false data. Acting upon such data could then result in inappropriate tactics and, in a worst case scenario, may even lead to avoidable casualties.

UK cybersecurity consultant James Dale warned earlier this year that “equipment is now available to hack drones so they can bypass technology controls”.

Drones are relatively cheap technologies for military use – certainly cheaper than the use of satellites for surveillance. Off-the-shelf drones can be used to gather intelligence, without any significant development effort.

Meanwhile, governments have cracked down on illegal civilian drone use, and imposed no-fly zones around secure infrastructure such as airports. Drone manufacturers have been forced to provide “geofencing” software to avoid situations such as the recent drone strike in a Saudi oil field. However, cyber criminals are smart enough to bypass such controls and openly provide services to help consumers get past government and military-enforced no-fly zones.

It doesn’t cost much to skirt around the no-fly rules. Author provided

Russian software company Coptersafe sells such modifications for a few hundred dollars. Anyone can buy a drone from a retail store, purchase the modifications, and then send their drone into no-fly zones such as military bases and airports. Ironically, Russia’s military base in Syria came under attack from drones last year.

Australia on the frontline

Australia is at the frontier of the military drone revolution, equipping itself with a fleet of hundreds of new drones. Lieutenant Colonel Keirin Joyce, discussing the program in a recent defence podcast, declared Australia will soon be “the most unmanned [air vehicle] army in the world per capita”.

It will be essential to safeguard every single component of this sophisticated unmanned aerial fleet from cyber attack.

When drones were developed, cyber security was not a priority. Let’s explore a few potential threats to drone technology:

  • drone navigation is based on the Global Positioning System (GPS). It’s possible an attacker can break the encryption of this communication channel. Fake signals can be fed to the targeted drone and the drone effectively gets lost. This type of attack can be launched without being in close physical proximity

  • with knowledge of the flight controller systems, hackers can gain access using “brute force” attacks. Then, the captured video footage can be manipulated to mislead the operator and influence ground operations

  • a drone fitted with sensors could be manipulated by injecting rogue signals. For example, the gyroscopes on a drone can be misled using an external source of audio energy. Cyber criminals may take advantage of this design characteristic to create false sensor readings

  • drones’ onboard control systems are effectively small computers. Drone control systems (onboard and ground-based controllers) are also vulnerable to malicious software or Maldrone (malware for drones). The founder and CTO of CloudSEK, Rahul Sasi discovered a backdoor in the Parrot AR.Drone. Using malicious software, an attacker can establish remote communication and can take control of the drone. Attackers can also inject false data to mislead the operators. This type of malware can be installed silently without any visible sign to the operators. The consequences are significant if the drones are used for military operations.


Read more: Eye in the Sky and the moral dilemmas of modern warfare


As with traditional cyber-crime, it’s likely 2019 will see a sharp rise in drone-related incidents. However, these security breaches should not discourage the use of drones for personal, industrial or military applications. Drones are great tools in the era of smart cities, for instance.

But we should not forget the potential for cyber crime – and nowhere are the stakes higher than in military drone use. Clearly, the use of drones needs to be carefully regulated. And the first step is for the government and the Australian Defence Force to be fully aware of the risks.

The authors do not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and have disclosed no relevant affiliations beyond their academic appointment.

Authors: Mohiuddin Ahmed, Lecturer of Computing & Security, Edith Cowan University

Read more http://theconversation.com/aerial-threat-why-drone-hacking-could-be-bad-news-for-the-military-124588

Maximising Space with Innovative Storage Solutions for Urban Cyclists

Urban cyclists often face the challenge of limited storage space in their homes. Efficient storage solutions are crucial for maintaining a c...

How to Choose the Best Coffee Beans for Your Home

Coffee is more than just a morning ritual, it’s comfort, energy, and joy in a cup. Whether you enjoy a bold espresso or a smooth latte, th...

Running with Wide Feet? A Guide to 4E Running Shoes and Injury Prevention

Running stands out as a beloved fitness pursuit in Australia. From the scenic coastal routes of Sydney to the lush parklands of Adelaide and...

Intellectual Property Mistakes Businesses Make

Protecting intellectual property (IP) is essential for any business, yet many companies overlook key steps that safeguard their ideas and ...

Security Fencing: Strength, Style, and Safety for Every Property

When it comes to protecting your property, nothing provides peace of mind quite like high-quality security fencing. Whether you’re safeg...

FRP Storage Tanks: Strong, Reliable, and Built to Last for Modern Industries

💧 Discover why FRP storage tanks are the smart choice for industries! From strength and corrosion resistance to easy maintenance and long...

How to Build a Simple Summer Wardrobe That Works Anywhere

Image source: Dekota SwimI swear — I packed for three days in Byron and ended up wearing the same outfit on repeat. A linen shirt, my Broo...

SMSF Loan Experts: Unlocking Property Investment Through Self-Managed Super Funds

SMSF has become an increasingly popular strategy for Australians looking to grow their retirement savings while maintaining greater contro...

Sliding Screen Door: A Practical Addition to Modern Homes

Modern homes are designed to bring comfort, functionality, and a connection with the outdoors. A sliding screen door perfectly embodies al...

A Step-by-Step Guide to the Melbourne Conveyancing Process

Buying or selling property can feel overwhelming without understanding how the legal side works. That’s where conveyancing in Melbourne ...

Sydney’s Best Moving Services: How to Pick the Right One for You

Moving to a new home or office is one of the most significant tasks that require time, planning, and the right professionals to make the pro...

7 Benefits of Hiring Professional Moving Companies for Your Next Relocation

Relocating to a new home or office is a major life event that can be both exciting and stressful. While some people attempt to handle the mo...

Shopify Web Developer: Crafting High-Performance Online Stores for Business Success

In today’s competitive eCommerce landscape, businesses need more than a standard website to attract and retain customers. They need an o...

Essential Sailing Knots and When to Use Them

Learning to tie essential sailing knots is one of the most valuable skills any sailor can master. Whether you’re an experienced skipper ...

Common Myths About Automatic Gates—Busted

Automatic gates have become a staple of modern home and business security, offering both convenience and peace of mind. Yet despite their ...

Affordable and High-Quality Plantation Shutters for Every Home

Plantation shutters are a classic window treatment known for their wide horizontal slats that can be adjusted to control light, privacy, and...

Comprehensive Guide on Water Quality in Central Coast: Ensuring Safe and Healthy Water Supply

Unlock secrets to safe & healthy water with our comprehensive guide on water quality in the Central Coast! Protect your health now! Wat...

Smart Cleaning Product Choices for Australian Businesses: A Guide for Office Managers

Smart cleaning choices help keep Australian offices healthy. This means selecting safe, effective, and budget-friendly supplies. First, matc...

Designing Reusable CTA Components for Multi-Channel Experiences

Another key piece to digital marketing are calls-to-action. They transform engagement into measurable outcomes clicks, sign-ups, purchases...

Delivering Responsive UX Through Dynamic Content Rendering

User expectations have shifted overnight. Audiences no longer accept static, templated experiences. Instead, they want digital engagement ...

hacklink hack forum hacklink film izle hacklink meritkingmadridbetmadridbetTaraftariumselcuksportskingroyalkingroyalkingroyalmatbetholiganbetholiganbetcasibom1xbet girişselçuksportspadişahbet hacklink hack forum hacklink film izle hacklink meritkingmadridbetmadridbetTaraftariumselcuksportskingroyalkingroyalkingroyalmatbetholiganbetholiganbetcasibom1xbet girişselçuksportspadişahbet