How to Analyze the Cyber Threat from Drones

Background, Analysis Frameworks, and Analysis Tools

Katharina Ley Best, Jon Schmid, Shane Tierney, Jalal Awan, Nahom M. Beyene, Maynard A. Holliday, Raza Khan, Karen Lee

ResearchPublished Mar 5, 2020

This work explores approaches for understanding, inventorying, and modeling cybersecurity implications of the rapid growth in unmanned aerial systems (UAS), focusing specifically on current vulnerabilities and future trends. The authors propose conceptual approaches meant to enable the enumeration and categorization of UAS-related cyber threats and explore some of the potential benefits and challenges of modeling the commercial UAS threat. These approaches are applied to real-world threat scenarios to test their validity and illustrate the types of attacks that are currently feasible. Industry trends and the implications of these trends for cybersecurity are presented. Finally, the authors consider the UAS-related cybersecurity threat from the perspective of the Department of Homeland Security (DHS). Specifically, the authors describe the vulnerability of particular DHS components to the threats described in this report and suggest possible means of threat mitigation.

Key Findings

The cybersecurity threat landscape introduced by a wider range of UAS use is not well understood

  • A combination of "blue" and "red" team approaches to enumerating, understanding, and categorizing cyber threats related to UAS as targets and UAS as weapons can help stakeholders better understand the space.
  • Emerging trends such as autonomous flight, UAS traffic management, swarming, AI, and blockchain will continue to add complexity to this space.

Compromised drones can have real impacts on security for the Department of Homeland Security

  • If faced with compromised drones, Customs and Border Protection might lose intelligence, surveillance, and reconnaissance (ISR) capabilities, creating visual blind spots in detection of smuggling or other nefarious activities at borders and ports.
  • Compromised Federal Emergency Management Agency (FEMA) drones might reduce the agency's capability to identify, reach, or supply individuals in peril or medical distress in disaster zones.
  • Compromised Cybersecurity and Infrastructure Security Agency (CISA) drones would degrade the ability of CISA to conduct critical infrastructure inspections in some cases, and could be used in a cyberphysical attack to damage the critical infrastructure it was meant to survey.
  • Compromised Immigrations and Customs Enforcement drones will reduce overall capability, require fallback to less-familiar concepts of operation, and increase risk for the agents in the field.

Recommendations

  • DHS must continue to work with senior policymakers, cybersecurity experts, and other government and law enforcement agencies to move towards a coherent UAS cyber strategy.
  • DHS should also prioritize the most critical vulnerabilities and find ways to close attack vectors and protect attack surfaces.
  • DHS will need to monitor UAS adoption and anticipate the implications of widespread UAS diffusion.

Order a Print Copy

Format
Paperback
Page count
96 pages
List Price
$26.00
Buy link
Add to Cart

Topics

Document Details

  • Availability: Available
  • Year: 2020
  • Print Format: Paperback
  • Paperback Pages: 96
  • Paperback Price: $26.00
  • Paperback ISBN/EAN: 978-1-9774-0287-5
  • DOI: https://doi.org/10.7249/RR2972
  • Document Number: RR-2972-RC

Citation

RAND Style Manual
Best, Katharina Ley, Jon Schmid, Shane Tierney, Jalal Awan, Nahom M. Beyene, Maynard A. Holliday, Raza Khan, and Karen Lee, How to Analyze the Cyber Threat from Drones: Background, Analysis Frameworks, and Analysis Tools, Homeland Security Operational Analysis Center operated by the RAND Corporation, RR-2972-RC, 2020. As of September 23, 2024: https://www.rand.org/pubs/research_reports/RR2972.html
Chicago Manual of Style
Best, Katharina Ley, Jon Schmid, Shane Tierney, Jalal Awan, Nahom M. Beyene, Maynard A. Holliday, Raza Khan, and Karen Lee, How to Analyze the Cyber Threat from Drones: Background, Analysis Frameworks, and Analysis Tools. Homeland Security Operational Analysis Center operated by the RAND Corporation, 2020. https://www.rand.org/pubs/research_reports/RR2972.html. Also available in print form.
BibTeX RIS

This research was conducted using internal funding generated from operations of the Homeland Security Research Division (HSRD) and within the HSRD Acquisition and Development Program.

This publication is part of the RAND research report series. Research reports present research findings and objective analysis that address the challenges facing the public and private sectors. All RAND research reports undergo rigorous peer review to ensure high standards for research quality and objectivity.

This document and trademark(s) contained herein are protected by law. This representation of RAND intellectual property is provided for noncommercial use only. Unauthorized posting of this publication online is prohibited; linking directly to this product page is encouraged. Permission is required from RAND to reproduce, or reuse in another form, any of its research documents for commercial purposes. For information on reprint and reuse permissions, please visit www.rand.org/pubs/permissions.

RAND is a nonprofit institution that helps improve policy and decisionmaking through research and analysis. RAND's publications do not necessarily reflect the opinions of its research clients and sponsors.