Drones & Future...
The theme and objective of writing this article is to educate people who're basically non-technical and have zero Information Security background.
Technology is evolving and we should be aware of it.
Let's dive into the topic. Drones have become part of our lives as we rely on technology a lot.
We along with many other individuals use them in host of applications, including agriculture, media, parcel delivery, etc.
However, with technology we have now-a-days, can leave potential weak holes for the bad guys to do harm if potentially door remains unlocked by the user. It can also lead to cyber crime. ~ My thought!
Who Invented Drone? It's Uses and Affects
US Military invented drones for its purpose. Drones also attracted other countries Military.Several other individuals like you and me also use Drones for various tasks including photography, agriculture, gathering live footage around the scene, criminal who is hard to catch, search and rescue operations, life events, live broadcasting etc.
However, on a radar, drones appear equivalent to the size of a bird.
Military has to bear its downside cause let's suppose Military Intelligence sends a drone for intercepting and gathering Intel.
On the other hand, due to its smaller size of a bird appearing on radar, it slips away.
Just think how crucial it can be at a point where its vulnerable.
Also, drones are rapid they main good link with the controller due to frequency hopping technique.
Now this makes it impossible to get detected for the communicator and the sender.
Potential Threats From Drones?
Major threat from these drones is that anyone with a criminal mindset can turn against it by simply hacking it.There are certain equipment available in the black market, they can easily bypass technology and security controls.
In other words, rogue drones can pose security risks.
With the rise of technology, people with criminal mindsets can easily get their hands-on cyber-exploit kits from cyber black market without having any experience of hacking or programming and can use these kits to provide harm.
Funding can be done including government personnel and hacks on demand.
Conclusion
What should we do? Our personal computers were developed in 1910.Experts of that era explained certain things which could happen and they eventually happened and are still happening.
Ultimately, we're still managing those things.
Current possible laws, policies and ethics are no match for the technology used in drone.
However, the current privacy and cyber laws needs updating.
Many of the laws we have don’t apply to the individuals doing current activities so the best practice is to take stock of the surveillance laws that may exist in territories and happen to see if they are able to provide an appropriate level of regulation.
And as for military purpose, I guess some sort of unconditional security to overcome with rogue drones.
Comments
Post a Comment