Drones: The Looming Threat

Unmanned aircraft, otherwise known as drones, are becoming common. Many are familiar with America’s use of armed drones in Pakistan, Yemen and elsewhere but drones are also increasingly being used by other parts of government, by companies and individuals. 

Drones can be far cheaper to operate than anything that requires an on-board pilot, and they are handy for making maps and taking pictures and videos. The FBI uses a small fleet of drones for law-enforcement surveillance. Customs and Border Patrol uses them to monitor the American border with Mexico. Commercial drones are now regularly used for real-estate photography and to monitor oil and gas pipelines, among many other applications.

The proliferation of drones, which include both small fixed-wing aircraft and small rotorcraft with multiple propellers, raises some vexing public-policy questions. 

At issue is also the way some drones can loiter overhead for long stretches, engaging in what is called “persistent surveillance”. As drones—and other airborne surveillance platforms, such as circling manned aircraft and lighter-than-air craft—become cheaper and more effective, persistent aerial surveillance could become the norm, and no privacy or transparency measures currently exist in the law. 

The current state of the law, both legislation and court decisions, is poorly suited to deal with persistent surveillance. This is because privacy law is tailored to questions of whether one is in public, an open field, or in a space where one has a “reasonable expectation of privacy”. The Supreme Court has, at times, expanded such spaces, for instance finding in 1967 that the FBI cannot eavesdrop on conversations in telephone booths without a warrant. But in this era of “big data”, the line between public and private can no longer be delimited by physical boundaries.

Complicating matters, there is no clear line between episodic surveillance, a snapshot, and persistent surveillance even though the effects are profoundly different. It’s the difference between a snapshot and an overhead video that shows the comings and goings of everybody in a city over the course of a week. In such a video, a so-called “pattern-of-life” emerges. Any still frame from the video might be a defensible incursion on privacy, yet the whole video is something more than the sum of these parts.

Discussions about privacy often involve the question of why it is something worth protecting. People tend to invoke Louis Brandeis and Samuel Warren’s definition of privacy in 1890 as the “right to be let alone”. So persistent surveillance, whether through monitoring internet browsing habits or from a drone overhead, undermines the formation of liberal individuals in the way that an over-reliance on GPS undermines the formation of a sense of direction. 

It is worth noting that not all persistent drones are a threat to privacy, NASA’s Global Hawk Earth science missions, for instance, are exactly what they claim to be: new tools for studying hurricanes and other natural phenomena. But it is essential that these questions about drones and privacy are being asked now. 

Economist:

 

« Connected Cars: Risks for Automated Vehicles.
You Can Tell Which Emails are Being Tracked. »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Evidian

Evidian

Evidian, a Bull Group company, is the European leader and one of the major worldwide vendors of identity and access management software.

Schneider Electric

Schneider Electric

Schneider Electric develops connected technologies and solutions to manage energy and process in ways that are safe, reliable and sustainable.

Neoteric Networks

Neoteric Networks

We deliver a no nonsense procedure to implementing technology. The technology selection process ensures that all customers enjoy an engineered methodology implementing technology.

IoT M2M Council (IMC)

IoT M2M Council (IMC)

The IMC is the largest and fastest-growing trade organisation in the IoT/M2M sector.

Cybersec Infohub

Cybersec Infohub

Cybersec Infohub is a Hong Kong government programme to enhance the exchange of cyber security information with industry and enterprises to jointly defend against cyber attacks.

Google for Startups

Google for Startups

Google for Startups is Google’s initiative to help startups thrive across every corner of the world.

Cyble

Cyble

Cyble Vision enables faster detection of cyber threats and focuses on identifying and analysing the motivations, methods, capabilities and tools of adversaries.

Certo Software

Certo Software

Certo are trusted experts in mobile security. At Certo, mobile security is not an afterthought, it’s what we do.

Web3fied

Web3fied

Web3fied is a seed stage company building the future of decentralized digital identity and credentials management.

Verisign

Verisign

Verisign is a Global Leader in Domain Names & Internet Security, providing protection for websites and enterprises around the world.

HCS

HCS

HCS is an IT Company and Telecoms provider with an experienced team who are dedicated to ensuring our clients business systems are protected.

Exacom

Exacom

Exacom is a leading provider of multimedia logging/recording solutions across public safety, government, DoD, energy, utilities, transportation, and security applications.

Exiger

Exiger

Exiger is revolutionizing the way corporations, government agencies and banks navigate risk and compliance in their third-parties, supply chains and customers.

Semgrep

Semgrep

Semgrep is a fast, open-source, static analysis tool for profoundly improving software security and reliability.

appNovi

appNovi

appNovi inventories everything to map the attack surface, identify missing security agents, and prioritize vulnerabilities based on exposure.

Platview Technologies

Platview Technologies

Platview Technologies is an innovative and agile cybersecurity company with the goal of safe-guarding businesses with our world-class, industry-leading services and technology solutions.