{"id":1026,"date":"2016-07-21T22:55:14","date_gmt":"2016-07-21T20:55:14","guid":{"rendered":"https:\/\/blog.mi.hdm-stuttgart.de\/?p=1026"},"modified":"2023-06-07T15:01:07","modified_gmt":"2023-06-07T13:01:07","slug":"security-aspects-in-the-context-of-drones","status":"publish","type":"post","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2016\/07\/21\/security-aspects-in-the-context-of-drones\/","title":{"rendered":"Security aspects in the context of drones"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Image you are sitting on your balcony after a stressful working day. Your legs on a chair, an ice cold beer in your hand and the afternoon sun on your face. Suddenly the light darkens and a soft buzz is filling the air, constantly getting louder and more annoying. &nbsp;A cold breeze causes goosebumps on your arms. What\u2019s happening here? A drone enters your view, delivering a new TV device to your neighbour. You sink back in your chair and release the air you had hold unconsciously in your lungs.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Drones are flying robots, also called unmanned aircrafts, available in every size for actions that are dangerous or repetitive for humans. Today they still need to be controlled and closely monitored by one or two pilots via remote control. But in the future, artificial intelligence, included as their \u201cbrains\u201d, could allow them to work autonomously to support us in our daily routines, science or warfare. They have many advantages, but we also found alarming facts and stories about how their use is harmful to our society and mankind. Have a look to understand what we\u2019re talking about&#8230;<\/span><\/p>\n<p><!--more--><\/p>\n<p><b>\u201cWe\u2019re entering the drone age\u201d <a href=\"http:\/\/www.businessinsider.com\/drones-drones-drones-2014-7?IR=T\">[Chris Anderson]<\/a><\/b><\/p>\n<p><span style=\"font-weight: 400;\">Automation is progressing in all parts of the industry and manpower continues to be supported or replaced by machines. When people hear the word \u201cdrone\u201d, they mostly think either of war drones or of quadrocopters used for leisure and filming. As the following passage shows, drones have countless other fields of application in the civil sector and the industry &#8211; some of them might surprise you. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Drones are nowadays an indispensable part of the agricultural industry. Equipped with infrared cameras and sensors, they can be used to optimize the utilization of fertilizer and pesticide by monitoring the fields for pests and lack of nutrients and water. This so called precision farming will certainly soon be common practice in the agribusiness. Other industrial sectors are also relying more and more on drones for tasks which would take too long for humans to complete. One of them is the inspection and survey of industrial facilities, especially power stations, using high resolution cameras. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Amazon, DHL and the german post office are testing drones for the delivery of packages and goods. Currently the government is blocking this development, the regulations to fly drones for commercial use are very strict. But the day will come, when drones are a common sight in the &nbsp;skies above our cities. This will have a huge impact on the transportation business, and on the employment market in general. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">First drones for medical transport are developed in Israel. Compared to helicopters, they can fly under worse weather conditions and need a smaller space to land. Those ambulance drones can rescue people in difficult terrain. The military shows great interest in this concept for medical evacuations, because there is no need of a pilot which could be endangered.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The states in Germany are buying drones for the police as well as the fire department. They are used for search and rescue operations &#8211; and for surveillance of larger crowds of people. The later causes some controversy and discussion about the right to privacy &#8211; as shown in the following paragraph, this is one of the key questions which need to be addressed when talking about drones. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Drones are also employed in various research projects &#8211; some of the size of cent coins are used detect the reasons for the colony collapse of bees. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">In addition more and more people are buying drones for filming and photographing, either for journalism or for private use: Smaller ones can be purchased for an achievable price, which ranges from 50-2000\u20ac. <\/span><\/p>\n<p><strong>Problems<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">But as mentioned before, even smaller drones are a problem for security. First of all, if a drone malfunctions and crashes into a crowd of people, this can lead to serious injuries or even death. Secondly they are a threat to the right of privacy. Equipped with high resolution cameras, web capabilities and sensors, they can be used to monitor nearly everything and everyone, whether the person agrees or not. This also leads to industrial espionage, another threat for businesses and organisations, which can cost a lot of money or damage the reputation of a company. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Furthermore, drones owned by journalists or curious bystanders are known for interfering with rescue missions of police and fire department, preventing helicopters from landing or taking photos of accident victims . <\/span><\/p>\n<p><span style=\"font-weight: 400;\">There have also been reports of nearly collisions with commercial airplanes and the smuggling of goods in and out of prisons. <\/span><\/p>\n<p><strong>Solutions\/ Defense<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">Most of these problems are addressed by the so called \u201cno-fly zones\u201d, which are determined by the cities and states. It is forbidden to fly drones near prisons, power plants, airports, crowds of people and scenes of accidents. But how can these regulations be enforced? How can the drones be restricted and, if necessary, be forced to land or be destroyed? What if the neighbor is enjoying flying his drone over your garden?<\/span><\/p>\n<p><span style=\"font-weight: 400;\">There are several approaches how to handle this issue. One of them is quite simple: get yourself a hunting eagle and train it to attack drones. This low-tech solution to a high-tech problem is utilized by police forces in the Netherlands and proves to be quite effective. Another possibility is to use other, bigger drones to catch drones with nets, as used by the Tokyo police department. For industrial facilities and power plants, there are special devices which can disturb the signal between the drone and its pilot, which forces the drone to land or to return to its starting point. Another possibility is the use of powerful lasers, which can burn a hole into the drone or completely destroy it. Such Star Wars-like lasers are currently developed by Boeing and will be available for the military in the next year &#8211; a frightening thought, even if it\u2019s meant for defense. But presumably it\u2019s better than drones carrying explosives into a nuclear power plant. <\/span><\/p>\n<p><b>Threats from above: Flying computers<\/b><\/p>\n<p><span style=\"font-weight: 400;\">We have seen numerous opportunities and problems that drones can bring &#8211; but let\u2019s remind ourselves of a fact: drones are flying computers. And computers can be hacked. This means, that not only their use can cause danger, even the drone itself can be targeted &#8211; no matter the size. There are countless competitions for drone hacking and there even have been reports of successful hacks of military drones. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Let\u2019s start with civil drones. They are mostly designed to be user-friendly and comfortable to operate. Some of them have wi-fi enabled to stream videos or FTP and telnet servers with open ports. Others even have Node.js installed, which can execute server-sided JavaScript. No wonder that they have vulnerabilities which can be exploited. There are enough tutorials on the web how to do this &#8211; one option is the so called <a href=\"https:\/\/samy.pl\/skyjack\/\">\u201cSkyJack\u201d<\/a><\/span><span style=\"font-weight: 400;\"> hack by Samy Kamkar, which searches for victim drones autonomously, separates them from their pilots and then controls them &#8211; the open source code can be downloaded on github. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Certainly military drones are more secure than civil ones as they use encrypted communication channels. But even they can be vulnerable to GPS spoofing and other threats &#8211; and the attackers are highly skilled and motivated. As reported in the documents leaked by Snowden, the british and american secret agencies have already successfully hacked Israeli drones and monitored their video feeds. The used tools are also open source.<\/span><\/p>\n<p><strong>Conclusion<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">As you can imagine, the consequences of kidnapped drones &#8211; whether civil or military &#8211; can be severe. Tutorials and learning material on hacking, even professional hackers for hire can be found on the net. Drones therefore need to be much more secure to be part of our daily lives. But who will be responsible for standards and guidelines for secure drones? Who will lead the race between drone developing companies, security experts and attackers? Will we soon leave our houses wearing helmets, in fear of drones crashing on our heads? These will be some of the main challenges to be tackled in the future. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">We have discussed some of the possible impacts of drones on our everyday lives &#8211; but how about the usage of drones in national security?<\/span><\/p>\n<p><b>Secure the state <\/b><\/p>\n<p><span style=\"font-weight: 400;\">States in general and Germany in particular can be considered as complex systems, consisting of multiple components which interact with and influence each other. These elements can be of various types, for example institutions like governments, educational and health care systems, critical infrastructures, sensitive information of all kind.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In case of an attack from outside, one or multiple system elements can be damaged. Therefore it is necessary to protect and ensure security in the so called system \u201cGermany\u201d. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">The question that arises is how safety can be assured? How is the foreign and security policy trying to ensure security? Which dangers and risks (and wars) are threatening the system \u201cGermany\u201d?<\/span><\/p>\n<p><strong>Foreign and Security Policy<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">A storm is brewing over Germany. The cloud of dangers and security threats in our time and the future is extending. Key words like climate and environmental disasters, plagues and epidemics, decayed states, migration developments, supply of the population as well as the supply of the industry with ressources, criminal (cyber) networks, threats and attacks of critical infrastructures and the international terrorism are included.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">All these dangers hover over Germany, threatening to discharge every moment in a harmful and devastating thunderstorm, filled with destructiveness and thirst of power. The foreign and security policy has to take actions. It\u2019s a serious situation. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Let\u2019s take a look at what promises the German foreign and security policy makes to defuse this circumstances.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Germany\u2019s foreign and security policy is built on four pillars. Besides the integration in Europe, the support of human rights and the participation in globalization, Germany encourages peace in a united Europe. Subsequently politics work in the fields of war prevention and disarmament, support and follow the EU, NATO, UN and G7. In crisis Germany wants to act preemptively against violent actions. Weapons should not be spreaded and arms should be controlled.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Will this behaviour prevent the thundercloud from releasing its harmful content? Shouldn\u2019t we take stronger actions?<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As mentioned above Germany wants to support every peaceful conflict resolution. In the same breath the Federal Ministry of Defence (Bundesministerum f\u00fcr Verteidigung, BMVg) says: \u201cZwar kann Sicherheit nicht vorrangig milit\u00e4risch gew\u00e4hrleistet werden, allerdings sind [&#8230;] Stabilit\u00e4t und Sicherheit notfalls auch mit milit\u00e4rischen Mitteln durchzusetzen.\u201d which translates to \u201cSecurity can not primarily be assured with military power, however if needed stability and security are ensured with military actions as well\u201d.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The so called modern weapons are drones. But are the able to ensure securityy in the system \u201cGermany\u201d? Are there any other countries which are already using drones for military purposes? How and what can Germany learn from them?<\/span><\/p>\n<p><strong>Drones for the military<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">Drones in military contexts are used for exploration and surveillance. Beyond these use cases there are armed drones for eliminating enemies ressources. Currently Germany possesses only a few surveillance drones.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In future scenarios they want to lease armed drones from Israel. The problem is: those drones can not be used for defence, their solemn purpose is offensive warfare &#8211; a fact which contradicts the so called goals of Germany\u2019s foreign policy. But compared to this the US have plenty of surveillance and armed drones like Predator or Reaper drones.<\/span><\/p>\n<p><strong>Operation of military drones<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">Drones are operated remotely via a satellite link between the plane\/drone and the pilot. US drone pilots are usually stationed somewhere in the US while \u2018their\u2019 drones are flying hundreds of kilometers over the ocean in Pakistan.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Three persons are needed to manage a successful drone attack. One person flies and navigates the plane, one person observes and operates cameras and sensors which are installed in the drone and the third person stays in contact with commanders and ground forces directly involved in the battle.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In addition there are two US military bases in Germany, one in Ramstein (Pfalz) and one in Stuttgart-M\u00f6hringen\/ Plieningen. They serve the US in their drone wars in Pakistan and Africa.<\/span><\/p>\n<p><strong>\u201cWar on terror\u201d<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">Since 2004 the US fly hidden drone attacks in Pakistan. Since then they had 291 operations with US UAVs. Approximately 2500 had to die. Goals of these attacks are terror organisations like members of al-Qaeda, Taliban or IS. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Currently the decision of killing a person is under human orders. The following points need to be fulfilled: <\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">An informed high-ranking commander needs to confirm that the target person has terroristic intentions.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">In addition the target person must be threatening or planning an attack against the USA and a detention\/ an arrest is currently not possible.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">The attack should be necessary, accurately performed and appropriate as well as humane. It would be interesting to know what\u2019s humane in killing someone&#8230;<\/span><\/p>\n<p>Killing with drones is considered to be a clean war, only a few surgical attacks and a manageable amount of dead. Questionable! Well of course we can underline that no US soldiers are directly &nbsp;involved and harmed. But surgical? Many civilians are killed! And using the word \u201cclean\u201d in the context of war? What is considered to be \u2018clean\u2019 when killing someone? There are no fair trials or any human rights are included in this murdering. And maybe, a quiet voice whispers in my head, maybe it lowers the obstacle when firing remotely instead of looking somebody directly in the eye before killing him or her.<\/p>\n<p><strong>Let the machines act: Skynet and other AIs in drones<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">Currently drones only act on human orders. But in a near future it might be possible that learning algorithms take over this task. There is for example \u201cSkynet\u201d, an algorithm developed by US scientists. It\u2019s a piece of software that determines whether a person has terroristic intentions or not, taking decision trees and more than 90 different criteria as input. In case \u201cSkynet\u201d finds a potential courier for terror organisations, drones will kill that person.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Which mysterious theory is behind \u201cSkynet\u201d? Scientist assume that terrorists (or couriers and other groups working for terroristic organisations) have outstanding different behaviour in using phones than other citizens. Therefore the US started a comprehensive surveillance of 55 million users of the mobile communication network in Pakistan, including tracking in social networks, phoning (location, time, telephone partners, when and for how long switching phones on and off etc.), travelling behaviour, daily routines and so on. Remarkably different behaviours are tracked by Skynet. To train the algorithm, known terroristic user profiles are inserted in Skynet as a so called ground truth. Skynet now compares known terroristic profiles with newly tracked data.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In 0,008 to 0,18 % of all cases Skynet produces wrong results, so called false positives. This means innocent people are declared as terrorists. Having a number of 55 million people living in Pakistan this results in 4400 to 99.000 people mistakenly marked as terrorists and in a future scenario then killed by drones. Acceptable? War damage? Well just imagine this would be your beloved ones&#8230;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">So the question isn\u2019t just about how such learning algorithms and artificial intelligence can be improved, it\u2019s more fundamental: Do we want software to decide over life and death? Who controls such algorithms? Secret services and governments? Are they trustworthy at all? Who is trustworthy when dealing with such a power? Or might it even be possible to \u201cinsert\u201d moral and ethical values in AIs? How, for example, can they recognize whether someone just hoisted the white flag and gives up?<\/span><\/p>\n<p><b>Forecast<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Let\u2019s be honest: Drones can be a huge advantage to our society. On the other hand there are multiple concerns when dealing with this technology. They are small flying computers. And computers are vulnerable to hacks. So how can drones become more secure? Moreover there is the issue with special non-fly areas and air traffic when there are more and more flying vehicles. <\/span><\/p>\n<p><strong>Wars and security issues of the future<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">Wars won\u2019t stop when there are no peaceful agreements and power and greed reign the earth. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Prospectively there won\u2019t be wars between nations but rather we\u2019ll have asymmetric wars of individual groups such as guerilla warriors, secret services, terror organisations and hacker associations. This will constantly lead to more than 740.000 war dead.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">By the use of remotely operated or autonomously acting war robots and drones and the global connection over the internet wars will accelerate &#8211; they now can be conducted over the internet.<\/span><\/p>\n<p><strong>Cyberwar<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">Hacking infrastructures and industrial facilities may harm whole nations and states over a longer period of time. This is called cyber war. Attackers may even not getting up from their chair. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Where does war in the web start? By sending a malicious email? How are we gonna solve this problem? How will we live with total supervision and the permanent threat of cyberwar? What are we going to do against the surgical killing of people where it is easy to eliminate contrary thoughts? How can we ensure global security? It feels like we returned to our questions in the beginning. They are still here waiting to be answered, but hopefully your awareness for all the concerns has risen. <\/span><\/p>\n<p><strong>More open questions<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">To be honest &#8211; an ordinary mortal like you and me &#8211; we only want to live our lives in peace and harmony. And maybe some comfort, supported by drones. But how can this be possible in such a world, in a world where so many people are so greedy and gasp for more and more power, forcing others to believe in their mindset.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Terminating this blog entry with an often quoted philosophical statement of Kant: \u201cBe brave enough to use your mind!\u201d. And we add: use the technical progress including drones reasonable and responsible to make this world a safer place.<\/span><\/p>\n<p><em>Posted by Ina de Marco and&nbsp;Lisa M\u00f6cking.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Image you are sitting on your balcony after a stressful working day. Your legs on a chair, an ice cold beer in your hand and the afternoon sun on your face. Suddenly the light darkens and a soft buzz is filling the air, constantly getting louder and more annoying. &nbsp;A cold breeze causes goosebumps on [&hellip;]<\/p>\n","protected":false},"author":57,"featured_media":1028,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[26,651],"tags":[55,27,56],"ppma_author":[702],"class_list":["post-1026","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-secure-systems","category-system-designs","tag-drones","tag-security","tag-war-on-terror"],"aioseo_notices":[],"jetpack_featured_media_url":"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2016\/07\/Drones.png","jetpack-related-posts":[{"id":3803,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2018\/09\/12\/autonomous-war-what-dangers-are-associated-with-warfare-without-human-intervention\/","url_meta":{"origin":1026,"position":0},"title":"Autonomous War &#8211; Which dangers are associated with warfare without human intervention?","author":"Alexander Sch\u00fcbl","date":"12. September 2018","format":false,"excerpt":"The term autonomous war has been a controversial topic for years. But what exactly does the term actually mean? Autonomous war means the use of autonomous lethal weapons (short: LAWs) and machines or vehicles, which are primarily used by the military for modern warfare. Autonomous weapon systems can decide independently\u2026","rel":"","context":"In &quot;Secure Systems&quot;","block_context":{"text":"Secure Systems","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/system-designs\/secure-systems\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/08\/samsung.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/08\/samsung.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/08\/samsung.png?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":10415,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2020\/08\/19\/ai-cyberattacks-deepfakes\/","url_meta":{"origin":1026,"position":1},"title":"The Dark Side of AI &#8211; Part 1: Cyberattacks and Deepfakes","author":"Micha Christ","date":"19. August 2020","format":false,"excerpt":"Introduction Who hasn't seen a cinema production in which an AI-based robot threatens individual people or the entire human race? It is in the stars when or if such a technology can really be developed. With this series of blog entries we want to point out that AI does not\u2026","rel":"","context":"In &quot;Allgemein&quot;","block_context":{"text":"Allgemein","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/allgemein\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2020\/08\/screen-shot-2018-08-03-at-10-34-32-1.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2020\/08\/screen-shot-2018-08-03-at-10-34-32-1.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2020\/08\/screen-shot-2018-08-03-at-10-34-32-1.jpg?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":13157,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2021\/03\/17\/monitoring-with-the-elastic-stack\/","url_meta":{"origin":1026,"position":2},"title":"Monitoring with the Elastic Stack","author":"Joel Beiter","date":"17. March 2021","format":false,"excerpt":"Netflix, stackoverflow and Linkedin are just a few of the companies activly using the Elastic Stack. Use cases include performance and security monitoring or log analytics. [1] The Elastic Stack consists of different products with the most popular ones being Elasticsearch, Kibana, Logstash and Beats. This article will introduce the\u2026","rel":"","context":"In &quot;Allgemein&quot;","block_context":{"text":"Allgemein","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/allgemein\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2021\/03\/shards.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2021\/03\/shards.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2021\/03\/shards.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2021\/03\/shards.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":3217,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2017\/09\/14\/embedded-security-using-an-esp32\/","url_meta":{"origin":1026,"position":3},"title":"Embedded Security using an ESP32","author":"benjaminmorgner","date":"14. September 2017","format":false,"excerpt":"Ever wondered why your brand-new Philips Hue suddenly starts blinking SOS? Or why there is an ominous Broadcast on your Samsung TV while watching your daily Desperate Housewives? And didn't you wear an Apple Watch a few minutes ago, and why did you buy 2 TVs in that time? Security\u2026","rel":"","context":"In &quot;Secure Systems&quot;","block_context":{"text":"Secure Systems","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/system-designs\/secure-systems\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":26378,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2024\/07\/25\/secure-code-fast-delivery-the-power-of-devsecops\/","url_meta":{"origin":1026,"position":4},"title":"Secure Code, Fast Delivery: The Power of DevSecOps","author":"Furkan Erdogan","date":"25. July 2024","format":false,"excerpt":"In today\u2019s fast-paced digital world, security breaches are more than just a risk; they\u2019re almost a guarantee if you don\u2019t stay ahead. Imagine being able to develop software at lightning speed without compromising on security. Sounds like a dream, right? Welcome to the world of DevSecOps! If you\u2019re curious about\u2026","rel":"","context":"In &quot;Allgemein&quot;","block_context":{"text":"Allgemein","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/allgemein\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2024\/07\/grafik.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2024\/07\/grafik.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2024\/07\/grafik.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2024\/07\/grafik.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2024\/07\/grafik.png?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2024\/07\/grafik.png?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":3232,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2017\/10\/06\/usable-security-users-are-not-your-enemy\/","url_meta":{"origin":1026,"position":5},"title":"Usable Security &#8211; Users are not your enemy","author":"mw195","date":"6. October 2017","format":false,"excerpt":"Introduction Often overlooked, usability turned out to be one of the most important aspects of security. Usable systems enable users to accomplish their goals with increased productivity, less errors and security incidents. And It stills seems to be the exception rather than the rule. When it comes to software, many\u2026","rel":"","context":"In &quot;Secure Systems&quot;","block_context":{"text":"Secure Systems","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/system-designs\/secure-systems\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/10\/windows-uac.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]}],"jetpack_sharing_enabled":false,"authors":[{"term_id":702,"user_id":57,"is_guest":0,"slug":"lm073","display_name":"Lisa M\u00f6cking","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/7ef786e2ec11bb11a739680000fe4aae69cdf3f43e40e2e8e107f3391f575365?s=96&d=mm&r=g","0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/posts\/1026","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/users\/57"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/comments?post=1026"}],"version-history":[{"count":5,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/posts\/1026\/revisions"}],"predecessor-version":[{"id":24684,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/posts\/1026\/revisions\/24684"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/media\/1028"}],"wp:attachment":[{"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/media?parent=1026"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/categories?post=1026"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/tags?post=1026"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/ppma_author?post=1026"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}