Humanities Homework Help
MHE 509 TUI What Might Be Some Ways to Detect Prevent Unlawful Drone Usage Discussion
Discussion Requirements
A substantive comment should be approximately 300 words or more for the response (A total of 1 response).
Read the initial comments posted by your classmates and reflect upon them.
Before writing your comments:
- Review the Discussion grading rubric to see what is expected for an excellent discussion, in order to earn full credit.
- Review some resources to help you synthesize, such as the following:
Sullivan, J. (2011). Strategies for Synthesis Writing. Retrieved from http://www.findingdulcinea.com/features/edu/Strategies-for-Synthesis-Writing.html
NOTE: You are required to cite sources and include a reference list for the second post if it is simply your opinion. However, if your opinion is based on facts (as it should be), it is good practice to strengthen your position by citing sources.
Be sure to meet all of the criteria in the rubric, as noted in the instructions above.
Third post for each module discussion:
Read the initial and secondary comments posted by your classmates and reflect upon them.
Directly respond to at least one classmate in a way that extends meaningful discussions, adds new information, and/or offers alternative perspectives.
MY POST
Classmates and Professor,
Drones and Vulnerability Analysis
The use of drones has constantly risen over the past years due to their resilience. Drones can be used for different purposes: capturing images, surveillance, real-time video, transport of goods, and live stream. However, drones have come under a lot of scrutinies as they are not being used exclusively for the right reasons. Still, some individuals leverage this technology for hideous objectives. Drones are easy to manage and can be compromised to accomplish various attacks on unsuspecting individuals.
On the other hand, drones have many security susceptibilities that make them susceptible to hackers and hijackers. Therefore, drones’ vulnerability assessment needs to expound more on identifying and quantifying hazards that can affect the drawn systems, whether natural or derived from human interference. This is because the frequency and probability of UAV attacks are high and can have devastating and fatal effects.
For the vulnerability assessment study of drones to achieve its desired results, they should introduce new objectives. The first object should be to review the incidents to and from drones and the existing measures to counter these attacks. Another fundamental goal is to investigate the emerging risks presented by drones in cyber-attacks and efforts to reduce these attacks. The assessment should also focus on analyzing the exploitation of drone vulnerabilities on smart devices such as phones and tablets. Another objective should be to review the use of Unmanned Aerial vehicles (UAV) in different domains such as civilian, military, terrorism, and other additional purposes (Dolan & Thompson II, 2013). Another objective should be to assess the existing and emerging challenges that arise due to the concerns of safety, security and privacy while using drones or UAVs.
Despite the vulnerabilities, security, and privacy concerns presented by drones, we cannot deny the many benefits the technology has brought to society. The use of the technology is rising, and it is estimated that over ten thousand drones will be used commercially in the next five years (Yaacoub et al., 2020). The objectives presented above are geared towards developing a comprehensive plan to guide drone technology’s safety by identifying effective mitigating drones’ vulnerability and security measures. The goals will allow key stakeholders to adopt and develop new techniques and technologies to enhance drone attacks’ detection and protection. Besides, reviewing the current solutions and countermeasures used in the technology’s mitigation efforts will help identify the existing gaps in UIV technology. This information is crucial if we are to find lasting solutions to reducing drone vulnerability.
Pedro
References
Dolan, A., & Thompson II, R. (2013). Integration of Drones into Domestic Airspace: Selected Legal Issues. Fas.org. Retrieved 15 April 2021, from https://fas.org/sgp/crs/natsec/R42940.pdf
Yaacoub, J., Noura, H., Salman, O., & Chehab, A. (2020). Security analysis of drones systems: Attacks, limitations, and recommendations. Internet of Things, 11, 100218. https://doi.org/10.1016/j.iot.2020.100218
RESPONSE 1 (DO NOT ANSWER)
As a follow-up to your posting do you feel that there should be some type of controls / licensing required before drones are used?
THE ANSWER I RESPONDED:
Professor,
Yes, there is the need to have controls of how the drones are being utilized in different locations and purposes. The drones have been used for criminal activities such as thefts, where they study the geographical location of the area before carrying out the crime. Drones have also affected the privacy of people, making them feel insecure. It reveals how people live and their daily activities, which makes some feel unsecured. High usage of drones might also act as obstacles that can affect the signals of the airplanes, and without much control, more accidents of the airlines might be accepted. So it is important to have controls on where, how, and when to use the drones. The users are supposed to be restricted on the height to avoid confusion in the space(Clarke, 2014).
By licensing the use of the drones, the users will be restricted, and it will be easy to identify the drone that was used in a certain activity. The users will not be allowed to take information from restricted areas without approval from the government. This will help in promoting respect and dignity of the people as privacy will be enhanced. The use of drones will be minimized as people will be afraid to be caught using the drones illegally, leading to higher fines or imprisonment.
There should be clear policies on who is supposed to acquire a drone and how events the drones should be used. Huge fines need to be imposed on all those that will violate the policies since this will help in preventing the privacy of the people. The licensing will also help the security agents in keeping records of all the drones in a certain area and the people who have been given the responsibility of using them. If this is not considered, many people will acquire drones since the technology is improving, leading to more crimes (911-Security, 2020). The terrorists will also use them to invade the government institutions leading to mass destruction.
Pedro
Reference
911-Security. (2020). Drone Surveillance: How criminals are using drones to commit crimes. Retrieved from No Drone Zone Federal Aviation Administration: https://www.911security.com/blog/drone-surveillanc…
Clarke, R. (2014). The Regulation of Civilian Drones Impacts on Behavioural Privacy. Computer Law & Security Review, 30(3), 286-305. https://doi.org/10.1016/j.clsr.2014.03.005
NEW QUESTION: (PLEASE RESPOND):
What might be some ways to detect / prevent unlawful drone usage?
_____________________________________________________________________________________________________
Module 2 – Background
THE MILITARY PARTNERSHIPS
Required Reading
Dolan, A. M. and Thompson, R. M. (2013). Integration of drones into domestic airspace: Selected legal issues. Congressional Research Service. Retrieved from https://fas.org/sgp/crs/natsec/R42940.pdf
Read pp. 3-11.
FEMA IS-75: Military Resources in Emergency Management (2011). FEMA. Retrieved from https://training.fema.gov/emiweb/is/is75/student%2…
Read “Integration of Military Resources in Accordance with NIMS and NRF” pp. SM III-8 to SM III-21
The Posse Comitatus Act—fact sheet (2019, September 23), Section 1385 of Title 18, United States Code (USC). U.S. Northern Command. Retrieved from https://www.northcom.mil/Newsroom/Fact-Sheets/Arti…
2018 National Preparedness Report (2018). FEMA.gov. https://www.fema.gov/media-library-data/1541781185…/
Required Websites
American Red Cross: Terrorism Preparedness: http://www.redcross.org/get-help/prepare-for-emerg…
NORAD and U.S. Northern Command Posture Statement:
http://www.northcom.mil/Portals/28/Documents/2014%…
United States Northern Command. http://www.northcom.mil/