On June 17-19, the president of the Polish Chamber of Unmanned Systems – Robert Fintak – participated in the conference hosted in Tbilisi: “Joint flights – Poland – Georgia Technology bridges”.
Read moreLast week, the Board of the Chamber held another working meeting at the Ministry of Agriculture and Rural Development regarding spraying drones and their approval for use.
Read moreNext week, on May 27 at 11:00, the coneference “20 years of Poland in the European Union” will be held at the Poznań Congress Center. Polish Investment Agency on the European market.”
Read moreOn May 15, 2024, the Polish Chamber of Unmanned Systems joined the newly established Polish-Emirate Business Council. Participation in this elite group of the largest companies from the UAE and Poland opens unique opportunities for our members.
Read moreThe 2nd Anti-Terrorist Congress was held on April 9-10, 2024 at Cardinal Stefan Wyszynski University in Warsaw. This year we all met in an international formula, with the active participation of NATO experts, international security institutions and representatives of government as well as the local authorities.
The congress participants included several hundred representatives of scientific and expert centres, security institutions, the security and technical security sector, as well as public utilities and critical infrastructure.
A representative of the Chamber gave a presentation on the topic “The use of unmanned systems in potential terrorist attacks on critical infrastructure.
The Chamber also served as a Content Partner of the Anti-Terrorism Congress
Please, contact us for more details.
The Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) in the United States have published “Cybersecurity Guidance: Chinese-made drones for infrastructure needs.” The goal of the release is to raise awareness of the risks associated with Chinese drones and provide critical infrastructure and local and territorial partners (SLTT) with recommended cyber security measures to reduce risks to networks and sensitive information.
The People’s Republic of China (PRC) has introduced legislation that allows the government to expand the legal basis for accessing data held by companies in China. The use of Chinese drones in critical infrastructure operations potentially threatens the security of information that may be transferred to PRC institutions. This guidance outlines the potential vulnerabilities of networks and sensitive information when these drones are operated without proper cybersecurity protocols, as well as the possible consequences.
Threats associated with Chinese drones
Chinese drones produced for critical infrastructure pose a serious threat to the national security, economic and public health of the United States. Critical infrastructure sections such as the energy, chemical and communications industries are increasingly relying on drones for various missions to reduce operational costs and improve personnel safety. However, the use of Chinese drones carries serious risks.
The government of the People’s Republic of China has introduced legislation that allows it to access and control data stored by companies in China. This increases the risk of unauthorized access to systems and data, posing a serious threat to critical infrastructure. Therefore, it is important for organizations to use secure and U.S.-manufactured drones that minimize the negative impact on cyber security.
Cybersecurity recommendations
Critical infrastructure organizations should use drones designed with security in mind and manufactured by U.S. companies. The Cyber Security Guidelines offer cyber security recommendations that organizations should consider as part of their drone program, policies and procedures. Here are some recommendations to consider:
Secure communications
Ensure secure communications – Ensure that communications between the drone and the control system are secure and cannot be intercepted by third parties. Use wireless communication protocols that are encrypted and secure.
Up-to-date software
Maintain up-to-date software – Update drone software regularly to ensure the latest security patches and fixes. Outdated software can be vulnerable to cyberattacks.
Drone access
Secure drone access – Limit access to drones to authorized users only. Use multi-level authentication and strong passwords to prevent unauthorized use of drones.
Monitoring
Monitor and detect threats – Use monitoring tools and threat detection systems to identify potential cyberattacks and suspicious activity against drones.
Competency
Staff training – Conduct regular training for staff on cyber security and drone awareness. Staff knowledge is key to ensuring safe drone use.
Summary
The dangers of Chinese drones in the critical infrastructure sector are real and serious. Organizations should act with caution and consider cybersecurity recommendations to reduce the risk of unauthorized access to networks and sensitive information. The use of drones designed with security in mind and manufactured by U.S. companies is critical to protecting national security, economic security and public health. Concerted efforts to ensure the security and resilience of critical infrastructure are very important.
Want to know more? visit CISA’s Unmanned Aircraft Systems (UAS) website.
Information
Oświadczenie o wysokości składek
Prawa autorskie: Polska Izba Systemów Bezzałogowych
Webmaster: wilkniebieski.pl
Members and Partners
Info
UAV Chamber Poland
KRS 0000687201
NIP 5223096212