Global Security and Intelligence Studies Volume 2, Issue 1, Fall 2016 | Page 82
Global Security and Intelligence Studies
practical study will fill in gray areas very quicklyā€¯ (Maddox and Stuckenberg 2015). DHS
and other governmental agencies should collaborate with universities to promote and
endorse such research. Students are ideal candidates to conduct such experiments. They
can go through the unfamiliar process of targeting by conducting reconnaissance by
visiting the site or through open source intelligence collection. They can then research
and purchase a drone through the same unclassified mediums a lone wolf would use,
learn how to fly and program the drone and attempt an attack with mock explosives in
a controlled setting under approved conditions. Such experimentation can transform
theoretical studies into practical application, aiding refinement of defense mechanisms
and exploring the possible terrorist applications of consumer drones.
Conclusions and Recommendations for Additional Research
For less than $1,600, anyone can acquire a ready to fly, GPS-enabled and cameraequipped
consumer drone that can carry a small amount of weight. This offers
terrorists new capabilities in executing attacks, particularly the ability to bypass
traditional security measures and gain unprecedented access to a vulnerable target.
Lone wolves in the United States break the mold of global terrorism, motivated by antigovernmental
ideologies more than religious or other principles. Innovators among
these lone wolves may use consumer drones to target a number of long-term static,
temporary static or mobile targets in the coming years.
Consumer drones currently on the market offer a diversity of capabilities, of
which payload, maximum range and maximum speed are most important. None of
these can carry more than 1.0 kg of a substance, significantly limiting the destructive
capacity of an explosive-laden drone; even so, a precision attack can render devastating
effects against a vulnerable target. It is very likely that lone wolves will continue to use
firearms and bombs in attacks rather than explosive-laden consumer drones due to a
much higher probability of inflicting more casualties and causing more damage.
A variety of sophisticated defense mechanisms exist which can detect small
drones at low altitudes, but there are few mechanisms capable of interdicting a drone
in flight toward a target. Collaboration between government agencies and drone
manufacturers may improve security conditions by implementing no-fly zones over
sensitive sites through firmware, potentially delaying or deterring many attacks. Such
defenses can help secure long-term static targets, but temporary static targets and
mobile targets remain vulnerable, generally reliant on the human eye for detection with
no reliable interdiction mechanisms.
Legislation limiting payload capacity of consumer drones can curtail future
challenges associated with this type of terrorist attack. Additionally, legislation
requiring geofencing firmware in drones offers a viable defense mechanism that drone
manufacturers can quickly implement. Much of this new field remains unexplored,
especially terrorist applications of drones, as most research is theoretical, without
practical experiments or trials. Academia can hedge the risks of nefarious innovators
by exploring the bounds of consumer drones before lone wolves, enhancing defense
efforts by exposing vulnerabilities.
76