{"id":13438,"date":"2016-03-22T06:34:41","date_gmt":"2016-03-22T11:34:41","guid":{"rendered":"http:\/\/hcstx.org\/?p=13438"},"modified":"2016-03-22T06:34:41","modified_gmt":"2016-03-22T11:34:41","slug":"modern-crime-the-next-great-hacker-threat-could-be-drones","status":"publish","type":"post","link":"https:\/\/thetacticalhermit.com\/index.php\/2016\/03\/22\/modern-crime-the-next-great-hacker-threat-could-be-drones\/","title":{"rendered":"Modern Crime: The Next Great Hacker Threat Could be Drones"},"content":{"rendered":"<div class=\"jetpack-video-wrapper\"><iframe loading=\"lazy\" title=\"Drones &amp; Privacy (&#039;Truth and Power&#039;: Episode 10 Clip)\" width=\"640\" height=\"360\" src=\"https:\/\/www.youtube.com\/embed\/sLS_RE6N_Cw?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" allowfullscreen><\/iframe><\/div>\n<p>Ryan Satterfield was testing out his new Parrot drone in his backyard in Camarillo, California, when suddenly he wondered: <a href=\"http:\/\/www.ozy.com\/fast-forward\/hacker-proofing-helpers\/38081\" target=\"_blank\" rel=\"noopener\">Could it get hacked<\/a>? Since Satterfield, founder of information security company Planet Zuda, uncovers hacking vulnerabilities for a living, it didn\u2019t take long for him to discover a way to take over the aircraft remotely. He opened up his laptop, connected to the drone using an open network that wasn\u2019t password-protected, used tech for accessing remote computers, then typed the ominous command \u201ckill 1.\u201d Sure enough, the drone promptly fell out of the sky and crashed to the ground. (Satterfield reached out to Parrot before sharing this vulnerability with the public, though Parrot didn\u2019t respond to OZY\u2019s request for comment.)<\/p>\n<p>As technology <a href=\"http:\/\/www.ozy.com\/fast-forward\/lost-send-in-the-drones-and-robots\/60593\" target=\"_blank\" rel=\"noopener\">propels drones forward<\/a> to more widespread adoption, the threat of hackers intercepting them looms. Indeed, it\u2019s high time for the integration of unmanned aircraft systems across the U.S.: Since the Federal Aviation Administration\u2019s requirement for registering drones for recreational use kicked off at the end of 2015, more than 250,000 drone owners have signed on. In the commercial sector, more than 1,000 drone permits have been approved by the FAA, and the total domestic economic impact is forecasted to reach $82.1 billion before 2025, according to the Association for Unmanned Vehicle Systems International.<\/p>\n<p>Already, drones are being used for a wide range of functions today, from providing surveillance for the military and law enforcement to taking aerial snapshots, delivering medical supplies to people in remote areas, finding missing persons or even counting the number of endangered species in a given location. But in an era when hackers are targeting everything from retail stores to insurance company databases and even automobiles, it\u2019s no surprise that the worlds of drones and breaches could soon collide, sparking costly, and dangerous, consequences. \u201cWhat happens with any new technology is that we deploy them, and don\u2019t lock them down properly until things go wrong,\u201d says Ryan Calo, an assistant professor of law at the University of Washington. \u201cWhat we\u2019re seeing with drones is no different.\u201d<\/p>\n<blockquote><p><em><strong>There\u2019s the risk of drones being used to help frame crimes, since it\u2019s now possible for cybercriminals to hack into drones and upload fictitious videos.<\/strong><\/em><\/p><\/blockquote>\n<p>Read the Remainder at <strong><a href=\"http:\/\/www.ozy.com\/fast-forward\/the-next-great-threat-from-hackers-drones\/67660?utm_source=dd&amp;utm_medium=email&amp;utm_campaign=03212016&amp;variable=39fe65539224826abd35ed3f9ee054f5\">OZY<\/a><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ryan Satterfield was testing out his new Parrot drone in his backyard in Camarillo, California, when suddenly he wondered: Could it get hacked? Since Satterfield, founder of information security company Planet Zuda, uncovers hacking vulnerabilities for a living, it didn\u2019t take long for him to discover a way to take over the aircraft remotely. He&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_newsletter_tier_id":0,"jetpack_publicize_message":"","jetpack_is_tweetstorm":false,"jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false}}},"categories":[5406,74,1317,3986,65,3712],"tags":[10476,1558,10477,4296,1839],"jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/posts\/13438"}],"collection":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/comments?post=13438"}],"version-history":[{"count":0,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/posts\/13438\/revisions"}],"wp:attachment":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/media?parent=13438"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/categories?post=13438"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/tags?post=13438"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}