SlideShare a Scribd company logo
1 of 14
Download to read offline
01/12/2015
1
Copyright © 2015 DRONEMATRIX
Ronny Kenens
ronny.k@dronematrix.
eu
CYBERSECURITY & DRONES
November 4, 2015
Copyright © 2015 DRONEMATRIX
Topics
• Drones … what’s in the name ?
• Different type of Drones
• Where are Drones used today ?
• Challenges in the Drone world
• What about Cybersecurity
• Closing statements
01/12/2015
2
Copyright © 2015 DRONEMATRIX
Copyright © 2015 DRONEMATRIX
”Drones mischaracterize what these things are,
they not dumb, not unmanned, they remotely piloted
aircrafts.”
General Norton Schwartz
Chief of Staff of the U.S. Air Force
Augustus 10, 2012
01/12/2015
3
Copyright © 2015 DRONEMATRIX
What’s in the name ?
• Drone
• Unmanned Aerial Vehicle UAV
• Uninhabited Aerial Vehicle UAV
• Unmanned Aerial System UAS
• Remotely Piloted Vehicle RPV
• Remotely Piloted Aircraft RPA
• Remotely Piloted Aircraft System RPAS
• Remotely Operated Air Vehicles ROAV
• Micro Aerial Vehicle MAV
• Drone / UAV
Copyright © 2015 DRONEMATRIX
Different type of UAVs
Scope UAVs related to mass
01/12/2015
4
Copyright © 2015 DRONEMATRIX
Public Perception = Overall confusion
Not true
Not true
Not true
Not true
Not true
Not true
Not true
Not true
Drone are bad
Drones are only used in the army
Drones are always unmanned
Drones are dangerous
Drones are uncontrolled projectiles
Drones are not safe
Drones are useless for citizens
Drones are useless for business
Bottom-line:
• Use DRONES the way they have to be USED
• Technology maturity opens a lot of opportunities
• Drone market is in take-off mode and growing steadily
Copyright © 2015 DRONEMATRIX
‘Computers do things more precisely and
faster than humans … ‘
… but we need humans to
deal with uncertainty. “
"People are running around,
relying on intuition, and
accidents happen.
I want to make that go more
smoothly.“
Prof. Mary (Missy) Cummings
- 1e female US Navy F18 fighter jet pilot, landing on aircraft carriers (1988-1999)
- Professor Aeronautics & Astronautics at MIT Univ. USA
01/12/2015
5
Copyright © 2015 DRONEMATRIX
Drone Playing fields
SoftwareGround controlAircraft Avionics Payloads
Copyright © 2015 DRONEMATRIX
DRONE Flight Safety IS KEY !
• Sense & Avoid
– On-board Collision Avoidance / CAS
– Collaborative Collision Avoidance / ITS
• Dual Operator Control
• Propeller protection
• Drone Parachute
01/12/2015
6
Copyright © 2015 DRONEMATRIX
Aerial Photography Pipe/Power line Surveillance
Real-estate Mapping Border Surveillance
Transport Crowd Control
Suspect Tracking Mail/Fright Transport
Traffic Monitoring Agricultural Applications
Disaster Response/Relief Movie Productions
Damage Assessment Sporting Event Coverage
Infrastructure Monitoring Mining detection
Fertilizer Management Fishery Control
Overview where Drones are used today ?
Copyright © 2015 DRONEMATRIX
Drones - Industrial
Oil and gas off-shore inspections
• Scandinavia, Middle East, Asia, US, ….
01/12/2015
7
Copyright © 2015 DRONEMATRIX
“Insect mapping” and extermination (multi-spectral and thermal imaging)
Drones – Agriculture
“Weed Mapping” in maize Fields (via color–infrared composition imaging)
Copyright © 2015 DRONEMATRIX
Drones – Medical
Ambulance Drone Delivers Defibrillator
Alec Mormot
graduate industrial design
TU Delft University
01/12/2015
8
Copyright © 2015 DRONEMATRIX
Drones – Logistics
Delivery
Inspection & control
Copyright © 2015 DRONEMATRIX
Drones – Security
• Human controlled drone
• Tethered drone
• Autonomous drones in docking station
01/12/2015
9
Copyright © 2015 DRONEMATRIX
Challenges in the Drone world
• Public Acceptance / Safety
• Standards/Certifications
– Drone certification
– Pilot Training
– Flight planning platform
• Technology:
– Battery life time
– Sense & avoid
• Legal
– Integration in existing aviation
– Data privacy
• Liability and Insurance
– Koen De Vos / European Commission: European Electronic ID
– Matthijs van Miltenburg / EP - D66 : European Chipregistration
• Cyber security
– Hijacking
• Spoofing
• Jamming
Copyright © 2015 DRONEMATRIX
Hijacking: Jamming & Spoofing
• Influence:
• pilot control signals
• GPS signals
Noise
False
signals
01/12/2015
10
Copyright © 2015 DRONEMATRIX
Protect drone against Hackers
• System-Aware Secure Sentinel to protect Military drones
• When the system detects “illogical drone behaviors” actions are initiated:
• automated recovery process activated
• alert to operators
Copyright © 2015 DRONEMATRIX
Drone Interceptor
• 2014: 12 French nuclear plants were buzzed by drones
• 2014: drone crashed on the White House
• 2015: drone carrying radioactive sand landed on roof of Japanese prime minister’s office
in Tokyo
• 2015: drones spotted hovering near the Eiffel tower
• 2015: drone tried to fly (full of drugs + screwdriver + mobile phone) into a British prison
01/12/2015
11
Copyright © 2015 DRONEMATRIX
Anti-UAV Defence System (AUDS)
• AUDS can detect, track, classify potentially malicious UAVs (up to 8km)
• Combination of 3 systems:
– electronic-scanning radar target detection
– electro-optic tracking and classification
– directional RF disrupt/inhibit capabilities
EO Tracker &
RF Disruptor
Air Security Radar
Copyright © 2015 DRONEMATRIX
Anti-UAV beam gun
• Small, portable, accurate, rapid-to-use UAV counter-weapon
• Uses radio beam to jam the drone control systems and stop it
• Weapon is a “non-kinetic solution” (=without firing a bullet)
01/12/2015
12
Copyright © 2015 DRONEMATRIX
Drone Geofencing
• NO-FLY ZONES
• Drone manufacturers install safeguards in
the drone’ software to keep the drone
away from:
• airports Civ./Mil.
• airliners
• emergency response crews
• Large bridges
• ….
Integrated Airspace
Copyright © 2015 DRONEMATRIX
Privacy / Data Privacy
• Make image / store image
• Legal framework for specific activities:
– Ex. Security companies
01/12/2015
13
Copyright © 2015 DRONEMATRIX
Closing Statements
• Drones are here to stay !
• Countries with more relaxed UAV laws will leverage the drone economy
• Need for a European legal framework
• Fastest growing sectors:
– agricultural, security & surveillance, transport & logistics
• Technology can accelerate drone acceptance and market development
– Battery - Increase flight autonomy
– Sense & avoid
• Safety, security and solid contingency plans are a must.
– Sense & avoid
– Unique ELECTRONIC ID for each drone
• Effective DRONE CYBERSECURITY requires a real system-engineering approach,
not just IT
Copyright © 2015 DRONEMATRIX
But as Peter Drucker said :
“The best way to predict the future is to create it.”
Copyright© 2015 - A N S E C U R - RiskMatrixResultantsGroup
Ronny Kenens
ronny.k@dronematrix.eu
01/12/2015
14
Copyright © 2015 DRONEMATRIX
European Drone Convention 2016
Drones for Security Services
• Organised by:
– EUKA : Europea UAV Drones Knowladge Area
– CoESS : Conferation of European Security Services
• Date : June 2016
• Place: Brussels or Strasbourg

More Related Content

Similar to Cybersecurity and drones 2015

The world of Unmanned Systems is Evolving. DRONES TAKE OFF !
The world of Unmanned Systems is Evolving. DRONES TAKE OFF !The world of Unmanned Systems is Evolving. DRONES TAKE OFF !
The world of Unmanned Systems is Evolving. DRONES TAKE OFF !
RonnyKenens
 
Cyber as WMD- April 2015- GFSU
Cyber as WMD- April 2015- GFSUCyber as WMD- April 2015- GFSU
Cyber as WMD- April 2015- GFSU
Mohit Rampal
 
Gettozero stealth industrial
Gettozero stealth industrialGettozero stealth industrial
Gettozero stealth industrial
Sherid444
 

Similar to Cybersecurity and drones 2015 (20)

The world of Unmanned Systems is Evolving. DRONES TAKE OFF !
The world of Unmanned Systems is Evolving. DRONES TAKE OFF !The world of Unmanned Systems is Evolving. DRONES TAKE OFF !
The world of Unmanned Systems is Evolving. DRONES TAKE OFF !
 
I'm being followed by drones
I'm being followed by dronesI'm being followed by drones
I'm being followed by drones
 
CrowdCasts Monthly: When Pandas Attack
CrowdCasts Monthly: When Pandas AttackCrowdCasts Monthly: When Pandas Attack
CrowdCasts Monthly: When Pandas Attack
 
Drone Aviation Radar System
Drone Aviation Radar SystemDrone Aviation Radar System
Drone Aviation Radar System
 
Csa dar-air-pitch-deck-102316
Csa dar-air-pitch-deck-102316Csa dar-air-pitch-deck-102316
Csa dar-air-pitch-deck-102316
 
Cyber as WMD- April 2015- GFSU
Cyber as WMD- April 2015- GFSUCyber as WMD- April 2015- GFSU
Cyber as WMD- April 2015- GFSU
 
Drones
DronesDrones
Drones
 
DRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERS
DRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERSDRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERS
DRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERS
 
Advantages of Handheld Drone Jammers
Advantages of Handheld Drone JammersAdvantages of Handheld Drone Jammers
Advantages of Handheld Drone Jammers
 
modern security risks for big data and mobile applications
modern security risks for big data and mobile applicationsmodern security risks for big data and mobile applications
modern security risks for big data and mobile applications
 
Highlighting the Need for Drone Countermeasures in Sensitive Establishments
Highlighting the Need for Drone Countermeasures in Sensitive EstablishmentsHighlighting the Need for Drone Countermeasures in Sensitive Establishments
Highlighting the Need for Drone Countermeasures in Sensitive Establishments
 
Protecting the Public: Role of Anti-Drone Systems in Big Events
Protecting the Public: Role of Anti-Drone Systems in Big EventsProtecting the Public: Role of Anti-Drone Systems in Big Events
Protecting the Public: Role of Anti-Drone Systems in Big Events
 
Understanding IoT Security: How to Quantify Security Risk of IoT Technologies
Understanding IoT Security: How to Quantify Security Risk of IoT TechnologiesUnderstanding IoT Security: How to Quantify Security Risk of IoT Technologies
Understanding IoT Security: How to Quantify Security Risk of IoT Technologies
 
Aviation Security Challenges: Practical Solutions
Aviation Security Challenges: Practical SolutionsAviation Security Challenges: Practical Solutions
Aviation Security Challenges: Practical Solutions
 
Aviation security challenges: practical solutions
Aviation security challenges: practical solutionsAviation security challenges: practical solutions
Aviation security challenges: practical solutions
 
Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...
Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...
Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...
 
How do drone detection systems add an extra layer of security?
How do drone detection systems add an extra layer of security?How do drone detection systems add an extra layer of security?
How do drone detection systems add an extra layer of security?
 
Operationalizing Threat Intelligence to Battle Persistent Actors
Operationalizing Threat Intelligence to Battle Persistent ActorsOperationalizing Threat Intelligence to Battle Persistent Actors
Operationalizing Threat Intelligence to Battle Persistent Actors
 
Gettozero stealth industrial
Gettozero stealth industrialGettozero stealth industrial
Gettozero stealth industrial
 
Threat Intelligence + SIEM: A Force to be Reckoned With
Threat Intelligence +  SIEM: A Force to be Reckoned WithThreat Intelligence +  SIEM: A Force to be Reckoned With
Threat Intelligence + SIEM: A Force to be Reckoned With
 

Recently uploaded

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Recently uploaded (20)

presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 

Cybersecurity and drones 2015

  • 1. 01/12/2015 1 Copyright © 2015 DRONEMATRIX Ronny Kenens ronny.k@dronematrix. eu CYBERSECURITY & DRONES November 4, 2015 Copyright © 2015 DRONEMATRIX Topics • Drones … what’s in the name ? • Different type of Drones • Where are Drones used today ? • Challenges in the Drone world • What about Cybersecurity • Closing statements
  • 2. 01/12/2015 2 Copyright © 2015 DRONEMATRIX Copyright © 2015 DRONEMATRIX ”Drones mischaracterize what these things are, they not dumb, not unmanned, they remotely piloted aircrafts.” General Norton Schwartz Chief of Staff of the U.S. Air Force Augustus 10, 2012
  • 3. 01/12/2015 3 Copyright © 2015 DRONEMATRIX What’s in the name ? • Drone • Unmanned Aerial Vehicle UAV • Uninhabited Aerial Vehicle UAV • Unmanned Aerial System UAS • Remotely Piloted Vehicle RPV • Remotely Piloted Aircraft RPA • Remotely Piloted Aircraft System RPAS • Remotely Operated Air Vehicles ROAV • Micro Aerial Vehicle MAV • Drone / UAV Copyright © 2015 DRONEMATRIX Different type of UAVs Scope UAVs related to mass
  • 4. 01/12/2015 4 Copyright © 2015 DRONEMATRIX Public Perception = Overall confusion Not true Not true Not true Not true Not true Not true Not true Not true Drone are bad Drones are only used in the army Drones are always unmanned Drones are dangerous Drones are uncontrolled projectiles Drones are not safe Drones are useless for citizens Drones are useless for business Bottom-line: • Use DRONES the way they have to be USED • Technology maturity opens a lot of opportunities • Drone market is in take-off mode and growing steadily Copyright © 2015 DRONEMATRIX ‘Computers do things more precisely and faster than humans … ‘ … but we need humans to deal with uncertainty. “ "People are running around, relying on intuition, and accidents happen. I want to make that go more smoothly.“ Prof. Mary (Missy) Cummings - 1e female US Navy F18 fighter jet pilot, landing on aircraft carriers (1988-1999) - Professor Aeronautics & Astronautics at MIT Univ. USA
  • 5. 01/12/2015 5 Copyright © 2015 DRONEMATRIX Drone Playing fields SoftwareGround controlAircraft Avionics Payloads Copyright © 2015 DRONEMATRIX DRONE Flight Safety IS KEY ! • Sense & Avoid – On-board Collision Avoidance / CAS – Collaborative Collision Avoidance / ITS • Dual Operator Control • Propeller protection • Drone Parachute
  • 6. 01/12/2015 6 Copyright © 2015 DRONEMATRIX Aerial Photography Pipe/Power line Surveillance Real-estate Mapping Border Surveillance Transport Crowd Control Suspect Tracking Mail/Fright Transport Traffic Monitoring Agricultural Applications Disaster Response/Relief Movie Productions Damage Assessment Sporting Event Coverage Infrastructure Monitoring Mining detection Fertilizer Management Fishery Control Overview where Drones are used today ? Copyright © 2015 DRONEMATRIX Drones - Industrial Oil and gas off-shore inspections • Scandinavia, Middle East, Asia, US, ….
  • 7. 01/12/2015 7 Copyright © 2015 DRONEMATRIX “Insect mapping” and extermination (multi-spectral and thermal imaging) Drones – Agriculture “Weed Mapping” in maize Fields (via color–infrared composition imaging) Copyright © 2015 DRONEMATRIX Drones – Medical Ambulance Drone Delivers Defibrillator Alec Mormot graduate industrial design TU Delft University
  • 8. 01/12/2015 8 Copyright © 2015 DRONEMATRIX Drones – Logistics Delivery Inspection & control Copyright © 2015 DRONEMATRIX Drones – Security • Human controlled drone • Tethered drone • Autonomous drones in docking station
  • 9. 01/12/2015 9 Copyright © 2015 DRONEMATRIX Challenges in the Drone world • Public Acceptance / Safety • Standards/Certifications – Drone certification – Pilot Training – Flight planning platform • Technology: – Battery life time – Sense & avoid • Legal – Integration in existing aviation – Data privacy • Liability and Insurance – Koen De Vos / European Commission: European Electronic ID – Matthijs van Miltenburg / EP - D66 : European Chipregistration • Cyber security – Hijacking • Spoofing • Jamming Copyright © 2015 DRONEMATRIX Hijacking: Jamming & Spoofing • Influence: • pilot control signals • GPS signals Noise False signals
  • 10. 01/12/2015 10 Copyright © 2015 DRONEMATRIX Protect drone against Hackers • System-Aware Secure Sentinel to protect Military drones • When the system detects “illogical drone behaviors” actions are initiated: • automated recovery process activated • alert to operators Copyright © 2015 DRONEMATRIX Drone Interceptor • 2014: 12 French nuclear plants were buzzed by drones • 2014: drone crashed on the White House • 2015: drone carrying radioactive sand landed on roof of Japanese prime minister’s office in Tokyo • 2015: drones spotted hovering near the Eiffel tower • 2015: drone tried to fly (full of drugs + screwdriver + mobile phone) into a British prison
  • 11. 01/12/2015 11 Copyright © 2015 DRONEMATRIX Anti-UAV Defence System (AUDS) • AUDS can detect, track, classify potentially malicious UAVs (up to 8km) • Combination of 3 systems: – electronic-scanning radar target detection – electro-optic tracking and classification – directional RF disrupt/inhibit capabilities EO Tracker & RF Disruptor Air Security Radar Copyright © 2015 DRONEMATRIX Anti-UAV beam gun • Small, portable, accurate, rapid-to-use UAV counter-weapon • Uses radio beam to jam the drone control systems and stop it • Weapon is a “non-kinetic solution” (=without firing a bullet)
  • 12. 01/12/2015 12 Copyright © 2015 DRONEMATRIX Drone Geofencing • NO-FLY ZONES • Drone manufacturers install safeguards in the drone’ software to keep the drone away from: • airports Civ./Mil. • airliners • emergency response crews • Large bridges • …. Integrated Airspace Copyright © 2015 DRONEMATRIX Privacy / Data Privacy • Make image / store image • Legal framework for specific activities: – Ex. Security companies
  • 13. 01/12/2015 13 Copyright © 2015 DRONEMATRIX Closing Statements • Drones are here to stay ! • Countries with more relaxed UAV laws will leverage the drone economy • Need for a European legal framework • Fastest growing sectors: – agricultural, security & surveillance, transport & logistics • Technology can accelerate drone acceptance and market development – Battery - Increase flight autonomy – Sense & avoid • Safety, security and solid contingency plans are a must. – Sense & avoid – Unique ELECTRONIC ID for each drone • Effective DRONE CYBERSECURITY requires a real system-engineering approach, not just IT Copyright © 2015 DRONEMATRIX But as Peter Drucker said : “The best way to predict the future is to create it.” Copyright© 2015 - A N S E C U R - RiskMatrixResultantsGroup Ronny Kenens ronny.k@dronematrix.eu
  • 14. 01/12/2015 14 Copyright © 2015 DRONEMATRIX European Drone Convention 2016 Drones for Security Services • Organised by: – EUKA : Europea UAV Drones Knowladge Area – CoESS : Conferation of European Security Services • Date : June 2016 • Place: Brussels or Strasbourg