Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Drones for Next-Gen Oil & Gas Facility Protecti...

Stone Fort Group
June 21, 2017
130

Drones for Next-Gen Oil & Gas Facility Protection - UAV Technology Sniffing for Leaks, Surveying Operations and Protecting the Environment - Bobby Long, VP of Sales, Dedrone

Stone Fort Group

June 21, 2017
Tweet

More Decks by Stone Fort Group

Transcript

  1. 2 Agenda • The Evolution of Drones • Why Protecting

    Your Lower Airspace is so Challenging • The Steps to Mitigation
  2. 4 2002 – 2014: From CIA to Consumers 2002: CIA

    Drones Expensive, complex, powerful 2014: Basic consumer drones Inexpensive, simple, rudimentary
  3. 5 2014 – 2017: Dramatic Growth in Drone Capabilities Advanced

    consumer drones Inexpensive, powerful, easy to operate Extensive business applications Survey, delivery, imaging, disaster relief, etc.
  4. 6 2017 & Beyond: Explosive Drone Industry Growth • Millions

    of drones already in the air • Growing at over 30% year-over-year • Estimated $11B market by 2020 0 500,000 1,000,000 1,500,000 2,000,000 2,500,000 3,000,000 3,500,000 4,000,000 2013 2014 2015 2016 2017 Drone Units Sold
  5. 1 0 1 Sabotage of critical parts of the infrastructure,

    such as ventilation/cooling Terrorist Drone
  6. 1 2 1 Your SOC monitors the infrastructure and exteriors,

    but the airspace is wide open Hacker Drone
  7. 1 8 1) New manufacturers and types of drones entering

    the market every day and no standards around transmission protocols, form factor, capabilities, etc. 2) A variety of different environments need to be protected…plants, corporate buildings, R&D facilities, datacenters, executives 3) Many different threats need to be protected against: Physical threats, Surveillance/Privacy threats, and Cyber threats Drone security closely resembles cyber security, therefore the key to success is SOFTWARE Framework for a solution – 3 challenges that must be addressed
  8. 2 0 Step 1: Threat/Vulnerability Assessment • Goal: Data collection

    • How often, what type, repeat offenders? • Mitigation Preparation • Threat Profile • Components: RF/WiFi Sensor • Foundational sensor • Highly accurate • Drone profile (Type, MAC Address, time in airspace, signal strength/proximity) • Outcome: • Complete airspace visibility
  9. 2 1 DRONE ALERT DRONE: Phantom 4 SSID: PHANTOM3_0af963 MAC:

    60:60:1f:0a:f9:63 RSSI: -78 dBm RETURNING: 2x
  10. 2 2 Step 2: Situational Awareness and Process • Goal:

    Defensive processes, situational awareness • Internal security/Police cooperation • Find/prosecute pilot, shut off WiFi, close curtains • Components: Video, Directional RF, Radar • Flight path of drone • Outcome: • Defend your asset
  11. 2 3 Step 3: Adapt To Dissolve The Threat •

    Hacking/ Corporate Espionage: • Disable Wifi • Disable Bluetooth • Deploy Security Resources to commandeer a landed drone • Surveillance/ Corporate Espionage: • Change/Update Security Protocols • Move/cover high valued goods • Alert Authorities • Flood Lights • Fog Bombs & Trigger Curtains • Ultimate Mitigation : • Legal Prosecution (finding pilot) • Via forensic Evidence
  12. 2 6 About Dedrone High-Growth Technology Company • Founded in

    2014, with HQ in San Francisco, CA and facilities in Kassel, Germany • CEO and co-founders with extensive experience building technology companies • Backed by $28M in funding from top-tier investors such as Menlo Ventures, Felicis Ventures, and John Chambers Leaders in Aerial Intrusion Prevention • First-to-market detecting the most advanced WiFi and non-WiFi drones, including DJI Mavic and Phantom 4 • Solution deployed at datacenters, stadiums, correctional facilities, and companies of all sizes