At the end of 2018, Gatwick airport in the United Kingdom had an incident that marked this issue even more as relevant, as several teams sought to fly over the airport jeopardizing its safety but also highlighted the “ease” of Hack such a team.
Although they had no bombs or any type of special attachment, the possibilities that security experts saw at the airport were several.
“The problem that is put on the table, when you manage to manipulate the software of any of these computers, is that as soon as the cyber criminals manage to have an entry route they can expose these hacks on pages that are easily accessible, they should not even look in the dark web or the deep web”said the Kaspersky specialist.
And it is that in addition to affecting the users of this type of equipment, the regulation and consequences that could come at the regulation level may not have sufficient legal specifications in case of a crime.
“Starting to exclude part of the sky is something that has been done since airplanes exist, however in the case of drones, these are elements that professionally serve to capture images for research, artistic or even journalistic shots, so delimiting them is more complicated than in the case of airspace” he explained to Telegraph, James Dale, an expert on cyber security PA Consulting.
Either by air or almost at ground level, the hacking that can be suffered by drones even falls to teams that are intended to safeguard the integrity of government offices or cities and very strict regulation would even leave out these agency work tools of security.
“The drones have low acoustic and thermal traces so that on a radar, they resemble birds, and air traffic control radars are designed to ignore birds, this makes them effective elements to detect criminal activities but also to make them,” said Dale.
At the other end of the spectrum, the German company Rheinmetall Defense developed anti-drone lasers that can be mounted on a truck or armored vehicle.
But these types of solutions pose problems when wanting to use them in very populated areas and even at airports.
Therefore, the best solution to this type of risk is to do modeling exercises, deter drone operators who are not authorized to enter into a rule and “maintain cyber security systems even on the equipment they least think of,” concluded Assolini.