Drones: The Looming Threat

Unmanned aircraft, otherwise known as drones, are becoming common. Many are familiar with America’s use of armed drones in Pakistan, Yemen and elsewhere but drones are also increasingly being used by other parts of government, by companies and individuals. 

Drones can be far cheaper to operate than anything that requires an on-board pilot, and they are handy for making maps and taking pictures and videos. The FBI uses a small fleet of drones for law-enforcement surveillance. Customs and Border Patrol uses them to monitor the American border with Mexico. Commercial drones are now regularly used for real-estate photography and to monitor oil and gas pipelines, among many other applications.

The proliferation of drones, which include both small fixed-wing aircraft and small rotorcraft with multiple propellers, raises some vexing public-policy questions. 

At issue is also the way some drones can loiter overhead for long stretches, engaging in what is called “persistent surveillance”. As drones—and other airborne surveillance platforms, such as circling manned aircraft and lighter-than-air craft—become cheaper and more effective, persistent aerial surveillance could become the norm, and no privacy or transparency measures currently exist in the law. 

The current state of the law, both legislation and court decisions, is poorly suited to deal with persistent surveillance. This is because privacy law is tailored to questions of whether one is in public, an open field, or in a space where one has a “reasonable expectation of privacy”. The Supreme Court has, at times, expanded such spaces, for instance finding in 1967 that the FBI cannot eavesdrop on conversations in telephone booths without a warrant. But in this era of “big data”, the line between public and private can no longer be delimited by physical boundaries.

Complicating matters, there is no clear line between episodic surveillance, a snapshot, and persistent surveillance even though the effects are profoundly different. It’s the difference between a snapshot and an overhead video that shows the comings and goings of everybody in a city over the course of a week. In such a video, a so-called “pattern-of-life” emerges. Any still frame from the video might be a defensible incursion on privacy, yet the whole video is something more than the sum of these parts.

Discussions about privacy often involve the question of why it is something worth protecting. People tend to invoke Louis Brandeis and Samuel Warren’s definition of privacy in 1890 as the “right to be let alone”. So persistent surveillance, whether through monitoring internet browsing habits or from a drone overhead, undermines the formation of liberal individuals in the way that an over-reliance on GPS undermines the formation of a sense of direction. 

It is worth noting that not all persistent drones are a threat to privacy, NASA’s Global Hawk Earth science missions, for instance, are exactly what they claim to be: new tools for studying hurricanes and other natural phenomena. But it is essential that these questions about drones and privacy are being asked now. 

Economist:

 

« Connected Cars: Risks for Automated Vehicles.
You Can Tell Which Emails are Being Tracked. »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Caliber Security Partners

Caliber Security Partners

Caliber Security Partners is a full-service information security company, with a wide range of security services for clients with varying levels of security maturity.

Schneider Electric

Schneider Electric

Schneider Electric develops connected technologies and solutions to manage energy and process in ways that are safe, reliable and sustainable.

Kudelski Security

Kudelski Security

Kudelski Security is an international cybersecurity company providing innovative, independent and tailored security solutions for large enterprise and public sector clients.

CRU Data Security Group (CDSG)

CRU Data Security Group (CDSG)

CRU is a pioneer in devices for data mobility, data security, encryption, and digital investigation.

Data Resolve Technologies

Data Resolve Technologies

Data Resolve offer a mechanism through which customers can detect and tackle various kinds of sensitive activities pertaining to data loss and data theft.

Office of the Government Chief Information Officer (OGCIO) - Hong Kong

Office of the Government Chief Information Officer (OGCIO) - Hong Kong

OGCIO supports the development of community-wide information technology infrastructure and setting of technical and professional standards to strengthen Hong Kong’s position as a world digital city.

Innovasec

Innovasec

Innovasec provide information security consulting and training services.

Aergo

Aergo

Aergo offers an easier and more proven way to adopt blockchain and transform your business while building on your existing IT and cloud assets.

Solidified

Solidified

Solidified is the largest audit platform for smart contracts. Our community has the highest concentration of top Blockchain security specialists and best-in-class code auditors.

Nominet

Nominet

Nominet's cyber division offers network detection and response services to governments and enterprises worldwide.

Future Planet Capital

Future Planet Capital

Future Planet is the impact-led, global venture capital firm built to invest in high growth potential companies from the world's top research centres.

Security Risk Management (SRM)

Security Risk Management (SRM)

SRM provide a comprehensive security risk management service encompassing people, processes, technology, governance, compliance and risk management.

Searchlight Cyber

Searchlight Cyber

Searchlight Cyber is a leading darknet intelligence company. Working with law enforcement, industry, and end users to help protect society against the threats of the darknet.

Nagios

Nagios

Nagios is a powerful tool that provides you with instant awareness of your organization’s mission-critical IT infrastructure.

Concourse Labs

Concourse Labs

Concourse Labs Security Guardrails continuously verify cloud infrastructure and workloads. Continuously assess clouds for security, resiliency, and regulatory compliance.

Banyax

Banyax

Banyax provides 24×7 real-time Cyber Defense Center Services using the latest technology tools to provide state-of-the-art defense.