Drones: The Looming Threat

Unmanned aircraft, otherwise known as drones, are becoming common. Many are familiar with America’s use of armed drones in Pakistan, Yemen and elsewhere but drones are also increasingly being used by other parts of government, by companies and individuals. 

Drones can be far cheaper to operate than anything that requires an on-board pilot, and they are handy for making maps and taking pictures and videos. The FBI uses a small fleet of drones for law-enforcement surveillance. Customs and Border Patrol uses them to monitor the American border with Mexico. Commercial drones are now regularly used for real-estate photography and to monitor oil and gas pipelines, among many other applications.

The proliferation of drones, which include both small fixed-wing aircraft and small rotorcraft with multiple propellers, raises some vexing public-policy questions. 

At issue is also the way some drones can loiter overhead for long stretches, engaging in what is called “persistent surveillance”. As drones—and other airborne surveillance platforms, such as circling manned aircraft and lighter-than-air craft—become cheaper and more effective, persistent aerial surveillance could become the norm, and no privacy or transparency measures currently exist in the law. 

The current state of the law, both legislation and court decisions, is poorly suited to deal with persistent surveillance. This is because privacy law is tailored to questions of whether one is in public, an open field, or in a space where one has a “reasonable expectation of privacy”. The Supreme Court has, at times, expanded such spaces, for instance finding in 1967 that the FBI cannot eavesdrop on conversations in telephone booths without a warrant. But in this era of “big data”, the line between public and private can no longer be delimited by physical boundaries.

Complicating matters, there is no clear line between episodic surveillance, a snapshot, and persistent surveillance even though the effects are profoundly different. It’s the difference between a snapshot and an overhead video that shows the comings and goings of everybody in a city over the course of a week. In such a video, a so-called “pattern-of-life” emerges. Any still frame from the video might be a defensible incursion on privacy, yet the whole video is something more than the sum of these parts.

Discussions about privacy often involve the question of why it is something worth protecting. People tend to invoke Louis Brandeis and Samuel Warren’s definition of privacy in 1890 as the “right to be let alone”. So persistent surveillance, whether through monitoring internet browsing habits or from a drone overhead, undermines the formation of liberal individuals in the way that an over-reliance on GPS undermines the formation of a sense of direction. 

It is worth noting that not all persistent drones are a threat to privacy, NASA’s Global Hawk Earth science missions, for instance, are exactly what they claim to be: new tools for studying hurricanes and other natural phenomena. But it is essential that these questions about drones and privacy are being asked now. 

Economist:

 

« Connected Cars: Risks for Automated Vehicles.
You Can Tell Which Emails are Being Tracked. »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

National Cyber League (NCL)

National Cyber League (NCL)

The NCL provides a virtual training ground for participants to develop, practice, and validate their cybersecurity knowledge and skills.

National Intelligence Service (NIS) - South Korea

National Intelligence Service (NIS) - South Korea

The NIS oversees policy on cyber security in South Korea by formulating and coordinating the execution of such policy and devising necessary schemes and guidelines.

Saviynt

Saviynt

Saviynt is a leading provider of Cloud Security and Identity Governance solutions.

Silicon:SAFE

Silicon:SAFE

Silicon:SAFE develops impenetrable hardware solutions that prevent bulk data theft during a cyber-attack.

ZeroNorth

ZeroNorth

ZeroNorth provides a new approach to improve software and infrastructure security, simplify continuous compliance reporting and to create more cost-effective risk management programs.

SkillCube

SkillCube

SkillCube is one of the pioneers in India focusing on Cyber Security Skill Development Solutions.

CYDES

CYDES

CYDES is the first event in Malaysia to showcase advanced solutions and technologies to address cyber defence and cyber security challenges for the public and private sectors.

Secure Ideas

Secure Ideas

Secure Ideas is focused on penetration testing and application security including web applications, web services and mobile applications.

Sontiq

Sontiq

Sontiq is committed to providing best-in-class, highly scalable, award-winning identity security solutions to consumers, businesses and government agencies.

Vala Secure

Vala Secure

Vala Secure is a cybersecurity and compliance consultancy that always stays ahead of regulations, future threats and ever-changing security environments.

Josef Ressel Centre for Intelligent & Secure Industrial Automation

Josef Ressel Centre for Intelligent & Secure Industrial Automation

The Josef Ressel Centre for Intelligent and Secure Industrial Automation investigates the fundamentals of digital assistants for industrial machines that enable intelligent and secure operation.

Zeron

Zeron

Zeron build bridges between security teams and top management. Our platform unifies your cyber risk posture seamlessly, encompassing threat insights and quantifiable risk scenarios.

Index Engines

Index Engines

Index Engines is the world’s leading AI-powered analytics engine to detect data corruption due to ransomware.

Zanutix Consulting

Zanutix Consulting

Zanutix specialize in a wide range of services including Network Design and Implementation, Data Management, Cloud Solutions, Software Development and Cybersecurity.

NinjaOne

NinjaOne

The NinjaOne Platform was built to help IT and MSP teams efficiently manage, patch, and support all endpoints.

Academia the Technology Group

Academia the Technology Group

Academia specialise in the supply of software, IT hardware, training and service solutions to the public sectors, business and pro media markets.