SlideShare a Scribd company logo
01/12/2015
1
Copyright © 2015 DRONEMATRIX
Ronny Kenens
ronny.k@dronematrix.
eu
CYBERSECURITY & DRONES
November 4, 2015
Copyright © 2015 DRONEMATRIX
Topics
• Drones … what’s in the name ?
• Different type of Drones
• Where are Drones used today ?
• Challenges in the Drone world
• What about Cybersecurity
• Closing statements
01/12/2015
2
Copyright © 2015 DRONEMATRIX
Copyright © 2015 DRONEMATRIX
”Drones mischaracterize what these things are,
they not dumb, not unmanned, they remotely piloted
aircrafts.”
General Norton Schwartz
Chief of Staff of the U.S. Air Force
Augustus 10, 2012
01/12/2015
3
Copyright © 2015 DRONEMATRIX
What’s in the name ?
• Drone
• Unmanned Aerial Vehicle UAV
• Uninhabited Aerial Vehicle UAV
• Unmanned Aerial System UAS
• Remotely Piloted Vehicle RPV
• Remotely Piloted Aircraft RPA
• Remotely Piloted Aircraft System RPAS
• Remotely Operated Air Vehicles ROAV
• Micro Aerial Vehicle MAV
• Drone / UAV
Copyright © 2015 DRONEMATRIX
Different type of UAVs
Scope UAVs related to mass
01/12/2015
4
Copyright © 2015 DRONEMATRIX
Public Perception = Overall confusion
Not true
Not true
Not true
Not true
Not true
Not true
Not true
Not true
Drone are bad
Drones are only used in the army
Drones are always unmanned
Drones are dangerous
Drones are uncontrolled projectiles
Drones are not safe
Drones are useless for citizens
Drones are useless for business
Bottom-line:
• Use DRONES the way they have to be USED
• Technology maturity opens a lot of opportunities
• Drone market is in take-off mode and growing steadily
Copyright © 2015 DRONEMATRIX
‘Computers do things more precisely and
faster than humans … ‘
… but we need humans to
deal with uncertainty. “
"People are running around,
relying on intuition, and
accidents happen.
I want to make that go more
smoothly.“
Prof. Mary (Missy) Cummings
- 1e female US Navy F18 fighter jet pilot, landing on aircraft carriers (1988-1999)
- Professor Aeronautics & Astronautics at MIT Univ. USA
01/12/2015
5
Copyright © 2015 DRONEMATRIX
Drone Playing fields
SoftwareGround controlAircraft Avionics Payloads
Copyright © 2015 DRONEMATRIX
DRONE Flight Safety IS KEY !
• Sense & Avoid
– On-board Collision Avoidance / CAS
– Collaborative Collision Avoidance / ITS
• Dual Operator Control
• Propeller protection
• Drone Parachute
01/12/2015
6
Copyright © 2015 DRONEMATRIX
Aerial Photography Pipe/Power line Surveillance
Real-estate Mapping Border Surveillance
Transport Crowd Control
Suspect Tracking Mail/Fright Transport
Traffic Monitoring Agricultural Applications
Disaster Response/Relief Movie Productions
Damage Assessment Sporting Event Coverage
Infrastructure Monitoring Mining detection
Fertilizer Management Fishery Control
Overview where Drones are used today ?
Copyright © 2015 DRONEMATRIX
Drones - Industrial
Oil and gas off-shore inspections
• Scandinavia, Middle East, Asia, US, ….
01/12/2015
7
Copyright © 2015 DRONEMATRIX
“Insect mapping” and extermination (multi-spectral and thermal imaging)
Drones – Agriculture
“Weed Mapping” in maize Fields (via color–infrared composition imaging)
Copyright © 2015 DRONEMATRIX
Drones – Medical
Ambulance Drone Delivers Defibrillator
Alec Mormot
graduate industrial design
TU Delft University
01/12/2015
8
Copyright © 2015 DRONEMATRIX
Drones – Logistics
Delivery
Inspection & control
Copyright © 2015 DRONEMATRIX
Drones – Security
• Human controlled drone
• Tethered drone
• Autonomous drones in docking station
01/12/2015
9
Copyright © 2015 DRONEMATRIX
Challenges in the Drone world
• Public Acceptance / Safety
• Standards/Certifications
– Drone certification
– Pilot Training
– Flight planning platform
• Technology:
– Battery life time
– Sense & avoid
• Legal
– Integration in existing aviation
– Data privacy
• Liability and Insurance
– Koen De Vos / European Commission: European Electronic ID
– Matthijs van Miltenburg / EP - D66 : European Chipregistration
• Cyber security
– Hijacking
• Spoofing
• Jamming
Copyright © 2015 DRONEMATRIX
Hijacking: Jamming & Spoofing
• Influence:
• pilot control signals
• GPS signals
Noise
False
signals
01/12/2015
10
Copyright © 2015 DRONEMATRIX
Protect drone against Hackers
• System-Aware Secure Sentinel to protect Military drones
• When the system detects “illogical drone behaviors” actions are initiated:
• automated recovery process activated
• alert to operators
Copyright © 2015 DRONEMATRIX
Drone Interceptor
• 2014: 12 French nuclear plants were buzzed by drones
• 2014: drone crashed on the White House
• 2015: drone carrying radioactive sand landed on roof of Japanese prime minister’s office
in Tokyo
• 2015: drones spotted hovering near the Eiffel tower
• 2015: drone tried to fly (full of drugs + screwdriver + mobile phone) into a British prison
01/12/2015
11
Copyright © 2015 DRONEMATRIX
Anti-UAV Defence System (AUDS)
• AUDS can detect, track, classify potentially malicious UAVs (up to 8km)
• Combination of 3 systems:
– electronic-scanning radar target detection
– electro-optic tracking and classification
– directional RF disrupt/inhibit capabilities
EO Tracker &
RF Disruptor
Air Security Radar
Copyright © 2015 DRONEMATRIX
Anti-UAV beam gun
• Small, portable, accurate, rapid-to-use UAV counter-weapon
• Uses radio beam to jam the drone control systems and stop it
• Weapon is a “non-kinetic solution” (=without firing a bullet)
01/12/2015
12
Copyright © 2015 DRONEMATRIX
Drone Geofencing
• NO-FLY ZONES
• Drone manufacturers install safeguards in
the drone’ software to keep the drone
away from:
• airports Civ./Mil.
• airliners
• emergency response crews
• Large bridges
• ….
Integrated Airspace
Copyright © 2015 DRONEMATRIX
Privacy / Data Privacy
• Make image / store image
• Legal framework for specific activities:
– Ex. Security companies
01/12/2015
13
Copyright © 2015 DRONEMATRIX
Closing Statements
• Drones are here to stay !
• Countries with more relaxed UAV laws will leverage the drone economy
• Need for a European legal framework
• Fastest growing sectors:
– agricultural, security & surveillance, transport & logistics
• Technology can accelerate drone acceptance and market development
– Battery - Increase flight autonomy
– Sense & avoid
• Safety, security and solid contingency plans are a must.
– Sense & avoid
– Unique ELECTRONIC ID for each drone
• Effective DRONE CYBERSECURITY requires a real system-engineering approach,
not just IT
Copyright © 2015 DRONEMATRIX
But as Peter Drucker said :
“The best way to predict the future is to create it.”
Copyright© 2015 - A N S E C U R - RiskMatrixResultantsGroup
Ronny Kenens
ronny.k@dronematrix.eu
01/12/2015
14
Copyright © 2015 DRONEMATRIX
European Drone Convention 2016
Drones for Security Services
• Organised by:
– EUKA : Europea UAV Drones Knowladge Area
– CoESS : Conferation of European Security Services
• Date : June 2016
• Place: Brussels or Strasbourg

More Related Content

Similar to Cybersecurity and drones 2015

The world of Unmanned Systems is Evolving. DRONES TAKE OFF !
The world of Unmanned Systems is Evolving. DRONES TAKE OFF !The world of Unmanned Systems is Evolving. DRONES TAKE OFF !
The world of Unmanned Systems is Evolving. DRONES TAKE OFF !RonnyKenens
 
I'm being followed by drones
I'm being followed by dronesI'm being followed by drones
I'm being followed by drones
DataWorks Summit/Hadoop Summit
 
CrowdCasts Monthly: When Pandas Attack
CrowdCasts Monthly: When Pandas AttackCrowdCasts Monthly: When Pandas Attack
CrowdCasts Monthly: When Pandas Attack
CrowdStrike
 
Drone Aviation Radar System
Drone Aviation Radar SystemDrone Aviation Radar System
Drone Aviation Radar System
ClearSpace Aeronautics
 
Csa dar-air-pitch-deck-102316
Csa dar-air-pitch-deck-102316Csa dar-air-pitch-deck-102316
Csa dar-air-pitch-deck-102316
ClearSpace Aeronautics
 
Cyber as WMD- April 2015- GFSU
Cyber as WMD- April 2015- GFSUCyber as WMD- April 2015- GFSU
Cyber as WMD- April 2015- GFSUMohit Rampal
 
Drones
DronesDrones
DRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERS
DRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERSDRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERS
DRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERS
Reputelligence
 
Advantages of Handheld Drone Jammers
Advantages of Handheld Drone JammersAdvantages of Handheld Drone Jammers
Advantages of Handheld Drone Jammers
NovoQuad
 
modern security risks for big data and mobile applications
modern security risks for big data and mobile applicationsmodern security risks for big data and mobile applications
modern security risks for big data and mobile applications
Trivadis
 
Highlighting the Need for Drone Countermeasures in Sensitive Establishments
Highlighting the Need for Drone Countermeasures in Sensitive EstablishmentsHighlighting the Need for Drone Countermeasures in Sensitive Establishments
Highlighting the Need for Drone Countermeasures in Sensitive Establishments
NovoQuad
 
Protecting the Public: Role of Anti-Drone Systems in Big Events
Protecting the Public: Role of Anti-Drone Systems in Big EventsProtecting the Public: Role of Anti-Drone Systems in Big Events
Protecting the Public: Role of Anti-Drone Systems in Big Events
NovoQuad
 
Understanding IoT Security: How to Quantify Security Risk of IoT Technologies
Understanding IoT Security: How to Quantify Security Risk of IoT TechnologiesUnderstanding IoT Security: How to Quantify Security Risk of IoT Technologies
Understanding IoT Security: How to Quantify Security Risk of IoT Technologies
Denim Group
 
Aviation security challenges: practical solutions
Aviation security challenges: practical solutionsAviation security challenges: practical solutions
Aviation security challenges: practical solutions
Tristan Wiggill
 
Aviation Security Challenges: Practical Solutions
Aviation Security Challenges: Practical SolutionsAviation Security Challenges: Practical Solutions
Aviation Security Challenges: Practical Solutions
Professional Aviation Services
 
Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...
Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...
Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...
Cyren, Inc
 
How do drone detection systems add an extra layer of security?
How do drone detection systems add an extra layer of security?How do drone detection systems add an extra layer of security?
How do drone detection systems add an extra layer of security?
NovoQuad
 
Operationalizing Threat Intelligence to Battle Persistent Actors
Operationalizing Threat Intelligence to Battle Persistent ActorsOperationalizing Threat Intelligence to Battle Persistent Actors
Operationalizing Threat Intelligence to Battle Persistent Actors
ThreatConnect
 
Gettozero stealth industrial
Gettozero stealth industrialGettozero stealth industrial
Gettozero stealth industrialSherid444
 
Threat Intelligence + SIEM: A Force to be Reckoned With
Threat Intelligence +  SIEM: A Force to be Reckoned WithThreat Intelligence +  SIEM: A Force to be Reckoned With
Threat Intelligence + SIEM: A Force to be Reckoned With
SolarWinds
 

Similar to Cybersecurity and drones 2015 (20)

The world of Unmanned Systems is Evolving. DRONES TAKE OFF !
The world of Unmanned Systems is Evolving. DRONES TAKE OFF !The world of Unmanned Systems is Evolving. DRONES TAKE OFF !
The world of Unmanned Systems is Evolving. DRONES TAKE OFF !
 
I'm being followed by drones
I'm being followed by dronesI'm being followed by drones
I'm being followed by drones
 
CrowdCasts Monthly: When Pandas Attack
CrowdCasts Monthly: When Pandas AttackCrowdCasts Monthly: When Pandas Attack
CrowdCasts Monthly: When Pandas Attack
 
Drone Aviation Radar System
Drone Aviation Radar SystemDrone Aviation Radar System
Drone Aviation Radar System
 
Csa dar-air-pitch-deck-102316
Csa dar-air-pitch-deck-102316Csa dar-air-pitch-deck-102316
Csa dar-air-pitch-deck-102316
 
Cyber as WMD- April 2015- GFSU
Cyber as WMD- April 2015- GFSUCyber as WMD- April 2015- GFSU
Cyber as WMD- April 2015- GFSU
 
Drones
DronesDrones
Drones
 
DRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERS
DRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERSDRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERS
DRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERS
 
Advantages of Handheld Drone Jammers
Advantages of Handheld Drone JammersAdvantages of Handheld Drone Jammers
Advantages of Handheld Drone Jammers
 
modern security risks for big data and mobile applications
modern security risks for big data and mobile applicationsmodern security risks for big data and mobile applications
modern security risks for big data and mobile applications
 
Highlighting the Need for Drone Countermeasures in Sensitive Establishments
Highlighting the Need for Drone Countermeasures in Sensitive EstablishmentsHighlighting the Need for Drone Countermeasures in Sensitive Establishments
Highlighting the Need for Drone Countermeasures in Sensitive Establishments
 
Protecting the Public: Role of Anti-Drone Systems in Big Events
Protecting the Public: Role of Anti-Drone Systems in Big EventsProtecting the Public: Role of Anti-Drone Systems in Big Events
Protecting the Public: Role of Anti-Drone Systems in Big Events
 
Understanding IoT Security: How to Quantify Security Risk of IoT Technologies
Understanding IoT Security: How to Quantify Security Risk of IoT TechnologiesUnderstanding IoT Security: How to Quantify Security Risk of IoT Technologies
Understanding IoT Security: How to Quantify Security Risk of IoT Technologies
 
Aviation security challenges: practical solutions
Aviation security challenges: practical solutionsAviation security challenges: practical solutions
Aviation security challenges: practical solutions
 
Aviation Security Challenges: Practical Solutions
Aviation Security Challenges: Practical SolutionsAviation Security Challenges: Practical Solutions
Aviation Security Challenges: Practical Solutions
 
Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...
Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...
Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...
 
How do drone detection systems add an extra layer of security?
How do drone detection systems add an extra layer of security?How do drone detection systems add an extra layer of security?
How do drone detection systems add an extra layer of security?
 
Operationalizing Threat Intelligence to Battle Persistent Actors
Operationalizing Threat Intelligence to Battle Persistent ActorsOperationalizing Threat Intelligence to Battle Persistent Actors
Operationalizing Threat Intelligence to Battle Persistent Actors
 
Gettozero stealth industrial
Gettozero stealth industrialGettozero stealth industrial
Gettozero stealth industrial
 
Threat Intelligence + SIEM: A Force to be Reckoned With
Threat Intelligence +  SIEM: A Force to be Reckoned WithThreat Intelligence +  SIEM: A Force to be Reckoned With
Threat Intelligence + SIEM: A Force to be Reckoned With
 

Recently uploaded

UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 

Recently uploaded (20)

UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 

Cybersecurity and drones 2015

  • 1. 01/12/2015 1 Copyright © 2015 DRONEMATRIX Ronny Kenens ronny.k@dronematrix. eu CYBERSECURITY & DRONES November 4, 2015 Copyright © 2015 DRONEMATRIX Topics • Drones … what’s in the name ? • Different type of Drones • Where are Drones used today ? • Challenges in the Drone world • What about Cybersecurity • Closing statements
  • 2. 01/12/2015 2 Copyright © 2015 DRONEMATRIX Copyright © 2015 DRONEMATRIX ”Drones mischaracterize what these things are, they not dumb, not unmanned, they remotely piloted aircrafts.” General Norton Schwartz Chief of Staff of the U.S. Air Force Augustus 10, 2012
  • 3. 01/12/2015 3 Copyright © 2015 DRONEMATRIX What’s in the name ? • Drone • Unmanned Aerial Vehicle UAV • Uninhabited Aerial Vehicle UAV • Unmanned Aerial System UAS • Remotely Piloted Vehicle RPV • Remotely Piloted Aircraft RPA • Remotely Piloted Aircraft System RPAS • Remotely Operated Air Vehicles ROAV • Micro Aerial Vehicle MAV • Drone / UAV Copyright © 2015 DRONEMATRIX Different type of UAVs Scope UAVs related to mass
  • 4. 01/12/2015 4 Copyright © 2015 DRONEMATRIX Public Perception = Overall confusion Not true Not true Not true Not true Not true Not true Not true Not true Drone are bad Drones are only used in the army Drones are always unmanned Drones are dangerous Drones are uncontrolled projectiles Drones are not safe Drones are useless for citizens Drones are useless for business Bottom-line: • Use DRONES the way they have to be USED • Technology maturity opens a lot of opportunities • Drone market is in take-off mode and growing steadily Copyright © 2015 DRONEMATRIX ‘Computers do things more precisely and faster than humans … ‘ … but we need humans to deal with uncertainty. “ "People are running around, relying on intuition, and accidents happen. I want to make that go more smoothly.“ Prof. Mary (Missy) Cummings - 1e female US Navy F18 fighter jet pilot, landing on aircraft carriers (1988-1999) - Professor Aeronautics & Astronautics at MIT Univ. USA
  • 5. 01/12/2015 5 Copyright © 2015 DRONEMATRIX Drone Playing fields SoftwareGround controlAircraft Avionics Payloads Copyright © 2015 DRONEMATRIX DRONE Flight Safety IS KEY ! • Sense & Avoid – On-board Collision Avoidance / CAS – Collaborative Collision Avoidance / ITS • Dual Operator Control • Propeller protection • Drone Parachute
  • 6. 01/12/2015 6 Copyright © 2015 DRONEMATRIX Aerial Photography Pipe/Power line Surveillance Real-estate Mapping Border Surveillance Transport Crowd Control Suspect Tracking Mail/Fright Transport Traffic Monitoring Agricultural Applications Disaster Response/Relief Movie Productions Damage Assessment Sporting Event Coverage Infrastructure Monitoring Mining detection Fertilizer Management Fishery Control Overview where Drones are used today ? Copyright © 2015 DRONEMATRIX Drones - Industrial Oil and gas off-shore inspections • Scandinavia, Middle East, Asia, US, ….
  • 7. 01/12/2015 7 Copyright © 2015 DRONEMATRIX “Insect mapping” and extermination (multi-spectral and thermal imaging) Drones – Agriculture “Weed Mapping” in maize Fields (via color–infrared composition imaging) Copyright © 2015 DRONEMATRIX Drones – Medical Ambulance Drone Delivers Defibrillator Alec Mormot graduate industrial design TU Delft University
  • 8. 01/12/2015 8 Copyright © 2015 DRONEMATRIX Drones – Logistics Delivery Inspection & control Copyright © 2015 DRONEMATRIX Drones – Security • Human controlled drone • Tethered drone • Autonomous drones in docking station
  • 9. 01/12/2015 9 Copyright © 2015 DRONEMATRIX Challenges in the Drone world • Public Acceptance / Safety • Standards/Certifications – Drone certification – Pilot Training – Flight planning platform • Technology: – Battery life time – Sense & avoid • Legal – Integration in existing aviation – Data privacy • Liability and Insurance – Koen De Vos / European Commission: European Electronic ID – Matthijs van Miltenburg / EP - D66 : European Chipregistration • Cyber security – Hijacking • Spoofing • Jamming Copyright © 2015 DRONEMATRIX Hijacking: Jamming & Spoofing • Influence: • pilot control signals • GPS signals Noise False signals
  • 10. 01/12/2015 10 Copyright © 2015 DRONEMATRIX Protect drone against Hackers • System-Aware Secure Sentinel to protect Military drones • When the system detects “illogical drone behaviors” actions are initiated: • automated recovery process activated • alert to operators Copyright © 2015 DRONEMATRIX Drone Interceptor • 2014: 12 French nuclear plants were buzzed by drones • 2014: drone crashed on the White House • 2015: drone carrying radioactive sand landed on roof of Japanese prime minister’s office in Tokyo • 2015: drones spotted hovering near the Eiffel tower • 2015: drone tried to fly (full of drugs + screwdriver + mobile phone) into a British prison
  • 11. 01/12/2015 11 Copyright © 2015 DRONEMATRIX Anti-UAV Defence System (AUDS) • AUDS can detect, track, classify potentially malicious UAVs (up to 8km) • Combination of 3 systems: – electronic-scanning radar target detection – electro-optic tracking and classification – directional RF disrupt/inhibit capabilities EO Tracker & RF Disruptor Air Security Radar Copyright © 2015 DRONEMATRIX Anti-UAV beam gun • Small, portable, accurate, rapid-to-use UAV counter-weapon • Uses radio beam to jam the drone control systems and stop it • Weapon is a “non-kinetic solution” (=without firing a bullet)
  • 12. 01/12/2015 12 Copyright © 2015 DRONEMATRIX Drone Geofencing • NO-FLY ZONES • Drone manufacturers install safeguards in the drone’ software to keep the drone away from: • airports Civ./Mil. • airliners • emergency response crews • Large bridges • …. Integrated Airspace Copyright © 2015 DRONEMATRIX Privacy / Data Privacy • Make image / store image • Legal framework for specific activities: – Ex. Security companies
  • 13. 01/12/2015 13 Copyright © 2015 DRONEMATRIX Closing Statements • Drones are here to stay ! • Countries with more relaxed UAV laws will leverage the drone economy • Need for a European legal framework • Fastest growing sectors: – agricultural, security & surveillance, transport & logistics • Technology can accelerate drone acceptance and market development – Battery - Increase flight autonomy – Sense & avoid • Safety, security and solid contingency plans are a must. – Sense & avoid – Unique ELECTRONIC ID for each drone • Effective DRONE CYBERSECURITY requires a real system-engineering approach, not just IT Copyright © 2015 DRONEMATRIX But as Peter Drucker said : “The best way to predict the future is to create it.” Copyright© 2015 - A N S E C U R - RiskMatrixResultantsGroup Ronny Kenens ronny.k@dronematrix.eu
  • 14. 01/12/2015 14 Copyright © 2015 DRONEMATRIX European Drone Convention 2016 Drones for Security Services • Organised by: – EUKA : Europea UAV Drones Knowladge Area – CoESS : Conferation of European Security Services • Date : June 2016 • Place: Brussels or Strasbourg