Jump to content
Main menu
Main menu
move to sidebar
hide
Navigation
Main page
Recent changes
Random page
Help about MediaWiki
Special pages
Niidae Wiki
Search
Search
Appearance
Create account
Log in
Personal tools
Create account
Log in
Pages for logged out editors
learn more
Contributions
Talk
Editing
Unmanned aerial vehicle
(section)
Page
Discussion
English
Read
Edit
View history
Tools
Tools
move to sidebar
hide
Actions
Read
Edit
View history
General
What links here
Related changes
Page information
Appearance
move to sidebar
hide
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
==== Security vulnerabilities ==== By 2017, drones were being used to drop contraband into prisons.<ref>{{Cite web|url=https://www.npr.org/2017/11/15/564272346/prisons-work-to-keep-out-drug-smuggling-drones|title=Prisons Work To Keep Out Drug-Smuggling Drones|website=NPR.org|access-date=19 January 2018|archive-date=19 January 2018|archive-url=https://web.archive.org/web/20180119175506/https://www.npr.org/2017/11/15/564272346/prisons-work-to-keep-out-drug-smuggling-drones|url-status=live}}</ref> The interest in UAVs cybersecurity has been raised greatly after the Predator UAV video stream hijacking incident in 2009,<ref>{{Cite news|url=http://edition.cnn.com/2009/US/12/17/drone.video.hacked/|title=Iraqi insurgents hacked Predator drone feeds, U.S. official indicates|website=CNN.com|author1=Mike Mount|author2=Elaine Quijano|access-date=6 December 2016|archive-date=5 March 2017|archive-url=https://web.archive.org/web/20170305082148/http://edition.cnn.com/2009/US/12/17/drone.video.hacked/|url-status=live}}</ref> where Islamic militants used cheap, off-the-shelf equipment to stream video feeds from a UAV. Another risk is the possibility of hijacking or jamming a UAV in flight. Several security researchers have made public some vulnerabilities in commercial UAVs, in some cases even providing full source code or tools to reproduce their attacks.<ref>{{Cite web|url=https://medium.com/@swalters/how-can-drones-be-hacked-the-updated-list-of-vulnerable-drones-attack-tools-dd2e006d6809|title=How Can Drones Be Hacked? The updated list of vulnerable drones & attack tools|last=Walters|first=Sander|date=29 October 2016|website=Medium|access-date=6 December 2016|archive-date=23 July 2018|archive-url=https://web.archive.org/web/20180723003615/https://medium.com/@swalters/how-can-drones-be-hacked-the-updated-list-of-vulnerable-drones-attack-tools-dd2e006d6809|url-status=live}}</ref> At a workshop on UAVs and privacy in October 2016, researchers from the [[Federal Trade Commission]] showed they were able to hack into three different consumer [[quadcopter]]s and noted that UAV manufacturers can make their UAVs more secure by the basic security measures of encrypting the Wi-Fi signal and adding password protection.<ref>{{cite news|last1=Glaser|first1=April|title=The U.S. government showed just how easy it is to hack drones made by Parrot, DBPower and Cheerson|url=http://www.recode.net/2017/1/4/14062654/drones-hacking-security-ftc-parrot-dbpower-cheerson|work=Recode|access-date=6 January 2017|date=4 January 2017|archive-date=5 January 2017|archive-url=https://web.archive.org/web/20170105190345/http://www.recode.net/2017/1/4/14062654/drones-hacking-security-ftc-parrot-dbpower-cheerson|url-status=live}}</ref>
Summary:
Please note that all contributions to Niidae Wiki may be edited, altered, or removed by other contributors. If you do not want your writing to be edited mercilessly, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource (see
Encyclopedia:Copyrights
for details).
Do not submit copyrighted work without permission!
Cancel
Editing help
(opens in new window)
Search
Search
Editing
Unmanned aerial vehicle
(section)
Add topic