Viw Magazine

Men's Weekly

.

  • Written by Mohiuddin Ahmed, Lecturer of Computing & Security, Edith Cowan University
Are military drones a security threat to their own operators? Gorodenkoff/Shutterstock

Unmanned aerial vehicles, more commonly called drones, are now a fundamental part of defence force capability, from intelligence gathering to unmanned engagement in military operations. But what happens if our own technology is turned against us?

Between 2015 and 2022, the global commercial drone market is expected to grow from A$5.95 billion to A$7.47 billion.

Drones are now being used in a host of applications, including agriculture, media, parcel delivery, and defence.

However, as with all IT technology, manufacturers and users may leave the digital doors unlocked. This potentially leaves opportunities for cyber-criminals and perhaps even cyber-warfare.


Read more: Police drones: can we trust the eyes in the skies?


Imagine a defence operation in which a drone is sent out to spy on enemy territory. The enemy identifies the drone but instead of disabling it, compromises the sensors (vision, sonar, and so on) to inject false data. Acting upon such data could then result in inappropriate tactics and, in a worst case scenario, may even lead to avoidable casualties.

UK cybersecurity consultant James Dale warned earlier this year that “equipment is now available to hack drones so they can bypass technology controls”.

Drones are relatively cheap technologies for military use – certainly cheaper than the use of satellites for surveillance. Off-the-shelf drones can be used to gather intelligence, without any significant development effort.

Meanwhile, governments have cracked down on illegal civilian drone use, and imposed no-fly zones around secure infrastructure such as airports. Drone manufacturers have been forced to provide “geofencing” software to avoid situations such as the recent drone strike in a Saudi oil field. However, cyber criminals are smart enough to bypass such controls and openly provide services to help consumers get past government and military-enforced no-fly zones.

It doesn’t cost much to skirt around the no-fly rules. Author provided

Russian software company Coptersafe sells such modifications for a few hundred dollars. Anyone can buy a drone from a retail store, purchase the modifications, and then send their drone into no-fly zones such as military bases and airports. Ironically, Russia’s military base in Syria came under attack from drones last year.

Australia on the frontline

Australia is at the frontier of the military drone revolution, equipping itself with a fleet of hundreds of new drones. Lieutenant Colonel Keirin Joyce, discussing the program in a recent defence podcast, declared Australia will soon be “the most unmanned [air vehicle] army in the world per capita”.

It will be essential to safeguard every single component of this sophisticated unmanned aerial fleet from cyber attack.

When drones were developed, cyber security was not a priority. Let’s explore a few potential threats to drone technology:

  • drone navigation is based on the Global Positioning System (GPS). It’s possible an attacker can break the encryption of this communication channel. Fake signals can be fed to the targeted drone and the drone effectively gets lost. This type of attack can be launched without being in close physical proximity

  • with knowledge of the flight controller systems, hackers can gain access using “brute force” attacks. Then, the captured video footage can be manipulated to mislead the operator and influence ground operations

  • a drone fitted with sensors could be manipulated by injecting rogue signals. For example, the gyroscopes on a drone can be misled using an external source of audio energy. Cyber criminals may take advantage of this design characteristic to create false sensor readings

  • drones’ onboard control systems are effectively small computers. Drone control systems (onboard and ground-based controllers) are also vulnerable to malicious software or Maldrone (malware for drones). The founder and CTO of CloudSEK, Rahul Sasi discovered a backdoor in the Parrot AR.Drone. Using malicious software, an attacker can establish remote communication and can take control of the drone. Attackers can also inject false data to mislead the operators. This type of malware can be installed silently without any visible sign to the operators. The consequences are significant if the drones are used for military operations.


Read more: Eye in the Sky and the moral dilemmas of modern warfare


As with traditional cyber-crime, it’s likely 2019 will see a sharp rise in drone-related incidents. However, these security breaches should not discourage the use of drones for personal, industrial or military applications. Drones are great tools in the era of smart cities, for instance.

But we should not forget the potential for cyber crime – and nowhere are the stakes higher than in military drone use. Clearly, the use of drones needs to be carefully regulated. And the first step is for the government and the Australian Defence Force to be fully aware of the risks.

The authors do not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and have disclosed no relevant affiliations beyond their academic appointment.

Authors: Mohiuddin Ahmed, Lecturer of Computing & Security, Edith Cowan University

Read more http://theconversation.com/aerial-threat-why-drone-hacking-could-be-bad-news-for-the-military-124588

No Credit Check Loans in Australia: What They Signal About Access to Credit

No credit check loans sit at the intersection of financial inclusion and risk management in Australia’s lending market. Often discussed ...

Domestic vs Commercial Builders in NSW: Licensing Differences Explained

When planning a construction project in New South Wales, choosing the right builder is crucial to ensure quality, compliance, and a smooth p...

Hybrid vs. Standard Caravans: Which is Better for a Family of Four?

Families exploring caravans for sale often compare hybrid and standard models to find the best balance of comfort, practicality and off ro...

First Time Shopping at a Caravan Clearance Sale? Here’s What to Know

If you’re in the market for a caravan, you should have a good idea of what you’re looking for by now. If a caravan clearance sale is loo...

Why the Alps Should Be on Every Traveler’s Bucket List

The Alps: one of the most remarkable mountain ranges in the world. A place where nature, culture, activity, and tranquility meet like a ha...

Exploring Local Markets and Artisan Shops in the Alps

Your ultimate guide to exploring the markets and artisan shops in the Alps of all of the regions' excursions is one of the most authentic ...

The Importance Of Professional Fiberglass Boat Repair For Strength, Safety And Long-Term Performance

Boats made from fiberglass are known for their durability, lightweight structure and smooth performance. However, even the strongest vesse...

Why Choosing the Right Cosmetic Clinic Bundoora Matters for Confidence and Care

Personal appearance can influence confidence, comfort, and overall wellbeing. Many people seek treatments to enhance features, refresh the...

Best Home Care Package Meal Providers: A Comprehensive Guide for Australian Seniors

As we age, maintaining proper nutrition becomes increasingly important, yet preparing healthy meals can become challenging for many older Au...

The Benefits Of Residential Solar Power Systems For Long-Term Energy Savings And Sustainability

Many homeowners are turning to residential solar power systems as a practical way to reduce rising electricity costs, improve energy inde...

Paint Protection Film Brisbane: The Ultimate Guide to Protecting Your Vehicle

Brisbane's harsh subtropical climate, with its intense UV rays, summer storms, and coastal conditions, can wreak havoc on your vehicle's pai...

The Complete Guide to Name Tags: Types, Benefits, and Best Practices

Whether you're organising a corporate conference, managing a retail team, or hosting a networking event, name tags play a crucial role in fa...

How Family Court Lawyers Can Guide You Through High-Conflict Parenting Disputes

High-conflict parenting disputes can be draining, unpredictable and emotionally overwhelming, especially when communication has broken dow...

Why Professional Evaporative Cooling Repair Is Important for Reliable Performance and Summer Comfort

Evaporative cooling is widely used in many homes. However, like any cooling system, it can experience wear, blockages, or mechanical fault...

How 3pl Companies Support Business Growth Through Efficient Warehousing And Fulfilment Solutions

As customer expectations continue to rise, businesses rely heavily on streamlined logistics to deliver products quickly and accurately. Ma...

Restoring Rental Spaces To Perfection Before Moving Out

A stressful part when leaving a rented home is ensuring the space is spotless and ready for inspection. A professional's help becomes invalu...

Why More Aussies Are Choosing Pontoon Boats To Launch a Waterside Lifestyle

Soaking up the long, sunny days of summer is a classic Australian pastime, and there’s no better way to do it than aboard a boat. But wh...

Building Bespoke Spaces: Why a Custom-Driven Approach Truly Matters

When it comes to creating a home that’s a perfect fit for your lifestyle, a Fiteni Homes-style approach offers unmatched flexibility and...

Refining Facial Contours with Modern Surgical Techniques on the Gold Coast

When we think of rejuvenation and restoring youthful contours, a targeted solution such as a face lift can be transformational. For those ...

Term Deposits Australia: A Complete Guide to Fixed-Rate Savings

For Australians seeking a safe, predictable way to grow their savings, term deposits australia options provide an attractive solution. Off...