17
1 Hacker Drones: A New Cyber Security Threat Jackson Markey Dedrone

Hacker Drones: A New Cyber Security Threat · 3 1 Physical & IT Security Strategies Have a Gaping Hole •Every enterprise and every individual protected by a traditional fence now

  • Upload
    lengoc

  • View
    214

  • Download
    0

Embed Size (px)

Citation preview

1

Hacker Drones:

A New Cyber Security Threat

Jackson Markey

Dedrone

2

Agenda

• Same Threat – New Avenue

• The Difficulty in Drone Detection

• 1. Threat Variance

• Focus: Cyber Security

• 2. Lack of Standardization

• 3. Every site in vulnerable

• Addressing the Threat

• Dedrone

3

1

Physical & IT Security Strategies Have a Gaping Hole

• Every enterprise and every individual protected by a traditional fence now

requires an aerial equivalent.

4

2017 & Beyond: Explosive Drone Industry Growth

• Millions of drones already in the air

• Growing at over 30% year-over-year

• FAA forecasts 7 million drones by 2020

0

500,000

1,000,000

1,500,000

2,000,000

2,500,000

3,000,000

3,500,000

4,000,000

2013 2014 2015 2016 2017

Drone Units Sold

5

Hacker Drone

CYBER

Surveillance Drone

PHYSICAL / CYBER

Terrorist Drone

PHYSICAL

Smugglers Drone

PHYSICAL / CYBER

Challenge 1: Threat Variance

6

Threat: Hacking Drone

Payload• Sniffing device

• Spoofing device

• Raspberry Pi

Threat• Hacking, data extraction

Examples• Data center snooping

• WiFi spoofing

• Internet-of-Things hacking

7

8

Drone Incidents

9

Working on a secured floor in a 30-story office tower used to put your confidential

documents out of reach of Wi-Fi hackers. Not any more. Closing the physical gap with

a drone dramatically simplifies an attack or scan of vulnerable devices.

Next Generation of Hacking

1 0

Challenge 2: No Design StandardsRC

2.4 GHz

WiFi, RC

2.4 GHz

RC

5.8 GHz

Lightbridge 1,

RC 2.4 GHzLightbridge 2 Ocusync

2012

2013

2014

2015

2016

2017

Phantom 1

Phantom 2Phantom 2

Vision

Inspire 1

Phantom 3

Phantom 3

Adv/Pro Phantom 4

Pro

Mavic Pro

Spark

1 1

Challenge 3: Every Site is Vulnerable to Drone Attacks

Prisons Stadiums

Datacenters

Events

Private ResidencesCorporations

1 2

Addressing the Threat

1 3

High-Growth Company Background

• Founded in 2014, with HQ in San Francisco and offices in Washington, D.C. and in Kassel, Germany

• Founders with extensive experience building technology companies

• Backed by $28M in funding from top-tier investors such as Menlo Ventures, FelicisVentures, and John Chambers

Leaders in Airspace Security

• Sensor agnostic, software centric platform

• Solution deployed at datacenters, stadiums, correctional facilities, and companies of all sizes. (200+)

About Dedrone

1 4

Extensible Platform for Drone Detection & Mitigation

Pattern Recognition

1 5

Demo

1 6

Active Mitigation

Additional Security Layers

Passive Mitigation

Foundational System

Threat Analysis

Lower Airspace Security Strategy

Minimum investment to

evaluate threat in specific

environment

Detect, Classify, real-time location of

drone and base station

Based off situational awareness implement

SOPs, take automated steps to protect assets

Create redundancy in detection and drone

localization, detect non-conventional drones

Fully understand threat to select the appropriate

active mitigation technology

Thank you!Jackson Markey