Physical security attacks can come in many forms.
Physical security attacks can come in many forms. One relatively new attack method comes through the use of drones. Swarms of drones have been seen flying over our military bases, such as over Langley Air Force Base (Joint Base Langley-Eustis) in Virginia.
Respond to the following:
Describe the physical security breach, focusing primarily on IT systems, including what might have happened and the scope of what could have been breached.
Explain what actions could have been taken immediately to minimize or mitigate the effects of this breach.
Discuss long-term best practices that should be put in place to mitigate this type of event in the future.
After reading a few of your classmate’s postings, reply to those from which you learned something new or to which you have something constructive to add. For example:
Discuss what you learned.
Ask probing questions or seek clarification.
Explain why you agree or disagree with your classmate’s main points, assertions, assumptions, or conclusions.
Suggest research strategies or specific resources on the topic.
Sample Answer
The increasing accessibility and sophistication of drone technology pose a significant and evolving threat to physical security, particularly for sensitive installations like military bases. The reported swarms of drones over facilities like Langley Air Force Base highlight a disturbing new vector for potential physical and cyber security breaches.
Description of the Physical Security Breach (Focus on IT Systems)
A swarm of drones flying over a military base represents a multi-faceted physical security breach with severe implications for IT systems, even without direct physical contact.
What Might Have Happened:
- Reconnaissance and Mapping: The most immediate and likely threat is advanced reconnaissance. Drones equipped with high-resolution cameras, thermal imaging, and even LiDAR can extensively map the base’s layout, building structures, entry/exit points, security perimeters, and critical infrastructure. This mapping can reveal blind spots in existing physical security, optimal infiltration routes, and even identify specific equipment or sensitive areas (e.g., server farms, communications hubs) by analyzing heat signatures or distinctive electromagnetic emissions.