Drones: The Looming Threat

Unmanned aircraft, otherwise known as drones, are becoming common. Many are familiar with America’s use of armed drones in Pakistan, Yemen and elsewhere but drones are also increasingly being used by other parts of government, by companies and individuals. 

Drones can be far cheaper to operate than anything that requires an on-board pilot, and they are handy for making maps and taking pictures and videos. The FBI uses a small fleet of drones for law-enforcement surveillance. Customs and Border Patrol uses them to monitor the American border with Mexico. Commercial drones are now regularly used for real-estate photography and to monitor oil and gas pipelines, among many other applications.

The proliferation of drones, which include both small fixed-wing aircraft and small rotorcraft with multiple propellers, raises some vexing public-policy questions. 

At issue is also the way some drones can loiter overhead for long stretches, engaging in what is called “persistent surveillance”. As drones—and other airborne surveillance platforms, such as circling manned aircraft and lighter-than-air craft—become cheaper and more effective, persistent aerial surveillance could become the norm, and no privacy or transparency measures currently exist in the law. 

The current state of the law, both legislation and court decisions, is poorly suited to deal with persistent surveillance. This is because privacy law is tailored to questions of whether one is in public, an open field, or in a space where one has a “reasonable expectation of privacy”. The Supreme Court has, at times, expanded such spaces, for instance finding in 1967 that the FBI cannot eavesdrop on conversations in telephone booths without a warrant. But in this era of “big data”, the line between public and private can no longer be delimited by physical boundaries.

Complicating matters, there is no clear line between episodic surveillance, a snapshot, and persistent surveillance even though the effects are profoundly different. It’s the difference between a snapshot and an overhead video that shows the comings and goings of everybody in a city over the course of a week. In such a video, a so-called “pattern-of-life” emerges. Any still frame from the video might be a defensible incursion on privacy, yet the whole video is something more than the sum of these parts.

Discussions about privacy often involve the question of why it is something worth protecting. People tend to invoke Louis Brandeis and Samuel Warren’s definition of privacy in 1890 as the “right to be let alone”. So persistent surveillance, whether through monitoring internet browsing habits or from a drone overhead, undermines the formation of liberal individuals in the way that an over-reliance on GPS undermines the formation of a sense of direction. 

It is worth noting that not all persistent drones are a threat to privacy, NASA’s Global Hawk Earth science missions, for instance, are exactly what they claim to be: new tools for studying hurricanes and other natural phenomena. But it is essential that these questions about drones and privacy are being asked now. 

Economist:

 

« Connected Cars: Risks for Automated Vehicles.
You Can Tell Which Emails are Being Tracked. »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

National Cyber Security Centre (NCSC) - United Kingdom

National Cyber Security Centre (NCSC) - United Kingdom

The NCSC acts as a bridge between industry and government, providing a unified source of advice, guidance and support on cyber security, including the management of cyber security incidents.

Resilience First

Resilience First

Resilience First is a not-for-profit organisation, led and funded by business to strengthen collective business resilience in all areas, including cyber security.

InPhySec

InPhySec

InPhySec is a leading New Zealand information, physical and cyber security company.

Emirates International Accreditation Center (EIAC)

Emirates International Accreditation Center (EIAC)

EIACI is the national accreditation body for the United Arab Emirates. The directory of members provides details of organisations offering certification services for ISO 27001.

AnChain.AI

AnChain.AI

AnChain.AI's analytics platform proactively protects crypto assets by providing proprietary artificial intelligence, knowledge graphs, and threat intelligence on blockchain transactions.

Paladin Capital Group

Paladin Capital Group

Paladin is a leading global investor that supports and grows the world’s most innovative cyber companies.

Blue Hexagon

Blue Hexagon

Blue Hexagon is a deep learning innovator focused on protecting organizations from cyberthreats.

TopSOC Information Security

TopSOC Information Security

TopSOC Information Security provide a wide range of security consultation, implementation and training services.

Cyware

Cyware

Cyware is the only company building Virtual Cyber Fusion Centers enabling end-to-end threat intelligence automation, sharing, and unprecedented threat response for organizations globally.

Ekco

Ekco

Ekco is one of Europe’s leading managed cloud providers. With a network of infrastructure and security specialists across Europe, we’ve perfected our approach to supporting digital transformation.

Training.com.au

Training.com.au

Training.com.au is a comparison website through which those looking to learn about different aspects of cyber security can compare learning courses from training providers from across Australia.

Spirit Technology Solutions

Spirit Technology Solutions

Spirit Technology Solutions is a modern workplace services provider committed to delivering solutions that embody our core principles of security, sustainability, and scalability.

SecureAck

SecureAck

From our A-Op SaaS automation platform to Managed Automation-as-a-Service (MAaaS), SecureAck offer powerful security automation the way that best suits your organisation's needs.

Merlin Ventures

Merlin Ventures

Merlin Ventures is a strategic investor focused on driving growth and value for cybersecurity software companies with market-leading potential.

Sinergi Digital

Sinergi Digital

Sinergi Digital is a business unit of the Metrodata Group with a focus on providing ICT solution to help accelerating digital transformation.

Blue Mantis

Blue Mantis

Blue Mantis is a security-first, IT solutions and services provider with a 30+ year history of successfully helping clients achieve business modernization.