{"id":39242,"date":"2021-04-13T04:48:28","date_gmt":"2021-04-13T08:48:28","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?post_type=emagazine&#038;p=39242"},"modified":"2023-07-13T04:10:11","modified_gmt":"2023-07-13T08:10:11","slug":"protecting-business-drones","status":"publish","type":"emagazine","link":"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/protecting-business-drones\/39242\/","title":{"rendered":"On the fly: How businesses can protect against drone attack"},"content":{"rendered":"<p>While widely rated \u2018zero stars\u2019 by humans, 2020 was a great year for drones. US market research firm Research and Markets estimate the <a href=\"https:\/\/www.businesswire.com\/news\/home\/20200721005593\/en\/Drone-Market-to-Grow-from-22.5-Billion-in-2020-to-Over-42.8-Billion-by-2025-at-a-CAGR-of-13.8---ResearchAndMarkets.com\" target=\"_blank\" rel=\"noopener nofollow\">drone market is worth 22.5 billion US dollars<\/a> and predicts it will double in the next five years. Much-awaited <a href=\"https:\/\/www.forbes.com\/sites\/danwoods\/2017\/01\/25\/10-killer-use-cases-what-drones-as-a-service-can-do-for-your-business\/?sh=33df994f196c\" target=\"_blank\" rel=\"noopener nofollow\">regulation in countries like China, India and the US in recent years has added clarity on how businesses can use drones<\/a>. The threat of COVID-19 saw public health organizations burst onto the scene, using <a href=\"https:\/\/www.weforum.org\/agenda\/2020\/05\/medical-delivery-drones-coronavirus-africa-us\/\" target=\"_blank\" rel=\"noopener nofollow\">drones to deliver medical supplies<\/a>, <a href=\"https:\/\/www.geospatialworld.net\/blogs\/how-drones-are-being-used-to-combat-covid-19\/\" target=\"_blank\" rel=\"noopener nofollow\">spray disinfectant and conduct remote temperature-checking<\/a>. A Swiss robotics firms has even been <a href=\"https:\/\/www.tomorrowunlocked.com\/teaching-a-drone-do-art\" target=\"_blank\" rel=\"noopener nofollow\">training drones to make high storey street art<\/a>.<\/p>\n<blockquote><p>The drone\u2019s rapidly rising star also raises concerns for physical and cyber business security.<\/p>\n<\/blockquote>\n<p>What are the risks companies face, and what can they do about them?<\/p>\n<h2>New developments in drone technology<\/h2>\n<p>Drones have been growing in sophistication in recent years, changing the picture of drone-based threats. So what\u2019s been happening out there?<\/p>\n<p>Drones can now use <a href=\"https:\/\/medium.com\/vsinghbisen\/how-ai-based-drone-works-artificial-intelligence-drone-use-cases-7f3d44b8abe3\" target=\"_blank\" rel=\"noopener nofollow\">\u2018computer vision:\u2019 Machine learning that lets them scan and recognize an object<\/a> and follow or identify other places where it occurs. There are now <a href=\"https:\/\/www.eurekalert.org\/pub_releases\/2019-06\/tiot-dtu062819.php\" target=\"_blank\" rel=\"noopener nofollow\">drone add-ons that can transmit real-time high-definition images and video<\/a>. Drones can also do more thanks to fast and reliable 5G spreading around the globe, <a href=\"https:\/\/www.rcrwireless.com\/20200922\/carriers\/four-5g-drone-demonstrations-and-trials\" target=\"_blank\" rel=\"noopener nofollow\">increasing how long and far a drone can travel without returning to base and allowing for automatically adapting journeys in response to <\/a><a href=\"https:\/\/www.rcrwireless.com\/20200922\/carriers\/four-5g-drone-demonstrations-and-trials\" target=\"_blank\" rel=\"noopener nofollow\">real-time information<\/a>.<\/p>\n\t\t\t<div class=\"c-promo-product\">\n\t\t\t\t\t\t\t<a href=\"https:\/\/antidrone.kaspersky.com\/en\/\" class=\"c-promo-product__figure\">\n\t\t\t\t\t<img decoding=\"async\" width=\"423\" height=\"455\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2021\/04\/16120850\/k_Antidrone-2.png\" class=\"attachment-card-default size-card-default\" alt=\"\" data-src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2021\/04\/16120850\/k_Antidrone-2.png\" data-srcset=\"\" srcset=\"\">\t\t\t\t<\/a>\n\t\t\t\t\t\t<article class=\"c-card c-card--link c-card--medium@sm c-card--aside-hor@lg\">\n\t\t\t\t<div class=\"c-card__body  \">\n\t\t\t\t\t<header class=\"c-card__header\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"c-card__headline\">Detect, classify and neutralize drones<\/p>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"c-card__title \"><span>Antidrone System<\/span><\/h3>\n\t\t\t\t\t\t\t\t\t\t\t<\/header>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"c-card__desc \">\n\t\t\t\t\t\t\t<p>Kaspersky\u2019s stand-alone solution that stops drones<\/p>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"c-card__aside\">\n\t\t\t\t\t<a href=\"https:\/\/antidrone.kaspersky.com\/en\/\" class=\"c-button c-card__link\" target=\"_blank\" rel=\"noopener nofollow\">See solution<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/article>\n\t\t<\/div>\n\t\n<h2>Which businesses and activities are most at risk from drones?<\/h2>\n<p>There are four main ways drones can threaten businesses and other organizations. There\u2019s <em>collision<\/em>: Where drones collide with objects or other aircraft, causing damage and endangering lives. Criminals can use drones that carry weapons to <em>attack <\/em>people or property directly. <em>Espionage<\/em> includes illegally collecting private information, for example, by using the drone\u2019s sensors, photography or video. Finally, there\u2019s <em>smuggling<\/em>: criminally transporting goods.<\/p>\n<p>The most well-known drone security incidents involved potential or actual collisions. Drone sightings near runways led to the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Gatwick_Airport_drone_incident\" target=\"_blank\" rel=\"noopener nofollow\">disruption of around 1,000 flights at Gatwick Airport in London in 2018<\/a>. Although the airport\u2019s swift action in this instance prevented damage, there have been <a href=\"https:\/\/en.wikipedia.org\/wiki\/List_of_UAV-related_incidents#Verified_aircraft_collisions\" target=\"_blank\" rel=\"noopener nofollow\">numerous collisions and near misses between drones and aircraft<\/a> in the past. <a href=\"https:\/\/www.euronews.com\/2020\/03\/02\/flights-grounded-at-frankfurt-airport-after-drone-activity\" target=\"_blank\" rel=\"noopener nofollow\">Frankfurt Airport shut down several times in 2020 after drone sightings<\/a>.<\/p>\n<p>Press photographers have used drones to breach personal privacy. The Los Angeles County Superior Court ruled against a press agency that <a href=\"https:\/\/www.bbc.com\/news\/uk-54472714\" target=\"_blank\" rel=\"noopener nofollow\">used a drone to photograph the Duke and Duchess of Sussex\u2019s baby<\/a> within the confines of their home.<\/p>\n<p>Law enforcers know criminals are using drones to move contraband. Drug smugglers are \u2018getting high\u2019 \u2013 in 2020, <a href=\"https:\/\/theindependent.sg\/four-suspects-that-flew-drugs-via-drone-between-kranji-and-jb-nabbed\/\" target=\"_blank\" rel=\"noopener nofollow\">Singaporean police intercepted a drone being used to traffic class A controlled drugs between Singapore and Malaysia<\/a>, leading to several arrests.<\/p>\n<p>Non-profit policy researchers RAND Corporation identifies one more kind of drone attack: When cybercriminals compromise and disable or take over organizations\u2019 drones. In 2020 they looked at the <a href=\"https:\/\/www.rand.org\/pubs\/research_reports\/RR2972.html\" target=\"_blank\" rel=\"noopener nofollow\">cyber threat drones pose to US industry and homeland security<\/a>. They noted many potential threats from drone compromise, including creating \u201cvisual blind spots in detection of smuggling or other nefarious activities at borders and ports,\u201d reduced \u201ccapability to identify, reach or supply individuals in peril or medical distress in disaster zones\u201d and the threat of \u201ccyber-physical attack to damage the critical infrastructure.\u201d They urged the Department of Homeland Security to \u201cprioritize the most critical vulnerabilities and find ways to close attack vectors and protect attack surfaces.\u201d<\/p>\n<h2>How to protect your business from attack by drone<\/h2>\n<p>While drones are famously agile and can go where humans cannot, they\u2019re far from unstoppable. <a href=\"https:\/\/www.tomorrowunlocked.com\/flying-drones-near-airports\" target=\"_blank\" rel=\"noopener nofollow\">\u2018Ethical hacker\u2019 teams have found several effective ways to disable nefarious drones<\/a>, like confusing them with ultrasound or jamming them with radio waves.<\/p>\n<blockquote><p>Many businesses and organizations are adopting antidrone systems, especially airports, industrial premises and public event organizers. <\/p>\n<\/blockquote>\n<p>Market research firm Forrester recommends businesses consider using these in its 2020 report <a href=\"https:\/\/www.forrester.com\/report\/Navigate+The+Digital+Ecosystem+Of+Commercial+Drones\/-\/E-RES146136\" target=\"_blank\" rel=\"noopener nofollow\">Navigate the digital ecosystem of commercial drones<\/a>: \u201cPut security and governance on your drone adoption agenda. Drones introduce new risks, such as hacking, business disruptions and privacy violations. Chief Information Officers (CIOs) must work with security pros to identify potential security issues and track regulatory changes closely.\u201d It recommends considering antidrone solutions to reduce the threat of unauthorized drones.<\/p>\n<h2>How do antidrone systems work?<\/h2>\n<p>Antidrone systems combine hardware and software, detecting drones in flight by scanning with radar, <a href=\"https:\/\/en.wikipedia.org\/wiki\/Lidar\" target=\"_blank\" rel=\"noopener nofollow\">lidar<\/a> and radio. After analyzing the drone using audio, video and thermal information, they jam it by interrupting its controlling signal. Detection and analysis happens in seconds.<\/p>\n<p>Antidrone systems can be customized for any scale of territory. The <a href=\"https:\/\/antidrone.kaspersky.com\/en\/solution\/hardware\/\" target=\"_blank\" rel=\"noopener nofollow\">shape and size of the area the business needs to control decides determines what technology to use<\/a>, for example, panoramic cameras work for small-scale sites (up to 300 meters or 980 feet) and in areas where building heights vary. Radar-based detection is best for large sites outside built-up areas. Antidrone system suppliers give examples of how they\u2019ve set up systems for the needs of an <a href=\"https:\/\/antidrone.kaspersky.com\/en\/industries\/airports\/\" target=\"_blank\" rel=\"noopener nofollow\">airport<\/a>, <a href=\"https:\/\/antidrone.kaspersky.com\/en\/industries\/industrial\/\" target=\"_blank\" rel=\"noopener nofollow\">industrial estate<\/a> and <a href=\"https:\/\/antidrone.kaspersky.com\/en\/industries\/events\/\" target=\"_blank\" rel=\"noopener nofollow\">public events<\/a>.<\/p>\n<p>If your organization uses drones, take these <a href=\"https:\/\/www.kaspersky.com\/resource-center\/threats\/can-drones-be-hacked\" target=\"_blank\" rel=\"noopener nofollow\">six security actions to prevent drone compromise<\/a>. These include regularly updating the drone\u2019s firmware and making sure your base station app has a strong password.<\/p>\n<p>We should expect to see criminals using ever-more-sophisticated drones to cause chaos and compromise in the coming years. The good news is, businesses and public bodies can do things to protect their property, people and assets. Drones are changing the way we do business. Properly secured, in future we\u2019ll see even more exciting drone innovation take to the sky.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As we become more adept at using drones for good, harmful drone activity continues. Thankfully, these nimble hovering gadgets are far from unstoppable.<\/p>\n","protected":false},"author":2631,"featured_media":39243,"template":"","coauthors":[4045],"class_list":{"0":"post-39242","1":"emagazine","2":"type-emagazine","3":"status-publish","4":"has-post-thumbnail","6":"emagazine-category-emerging-tech","7":"emagazine-category-safer-business","8":"emagazine-tag-drones"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/protecting-business-drones\/39242\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/secure-futures-magazine\/protecting-business-drones\/24540\/"}],"acf":[],"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/emagazine\/39242","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/emagazine"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/emagazine"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2631"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/39243"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=39242"}],"wp:term":[{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/coauthors?post=39242"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}