Adobe’s Flash Player will be switched off by default at the end of this year, meaning Chrome users will need to actively turn it on for all but a handful of top websites.
The slow and steady slide to a world without Flash continues, with Google revealing plans to phase out support for Adobe’s Flash Player in its Chrome Web browser for all but a handful of websites. And the company expects the changes to roll out by the fourth quarter of 2016.
While it says Flash might have “historically” been a good way to present rich media online, Google is now much more partial to HTML5, thanks to faster load times and lower power use.
As a result, Flash will still come bundled with Chrome, but “its presence will not be advertised by default.” Where the Flash Player is the only option for viewing content on a site, users will need to actively switch it on for individual sites. Enterprise Chrome users will also have the option of switching Flash off altogether.
Google will maintain support in the short-term for the top 10 domains using the player, including YouTube, Facebook, Yahoo, Twitch and Amazon. But this “whitelist” is set to be periodically reviewed, with sites removed if they no longer warrant an exception, and the exemption list will expire after a year.
A spokesperson for Adobe said it was working with Google in its goal of “an industry-wide transition to Open Web standards,” including the adoption of HTML5.
Given that Flash continues to be used in areas such as education, web gaming and premium video, the responsible thing for Adobe to do is to continue to support Flash with updates and fixes, as we help the industry transition,” Adobe said in an emailed statement. “Looking ahead, we encourage content creators to build with new web standards.”
Many other tech firms, including Apple, Microsoft and Mozilla, have taken steps to stop Flash running. In 2015, Facebook’s security chief Alex Stamos called for it to be killed off once and for all. However, it still lives on because many sites still make heavy use of it and many games employ it in ways that are hard to replicate with other web technologies.
Security hole. Shortly before Google announced its plans, security firm Fire-eye revealed the latest reported vulnerability in Flash was being actively exploited by cyberthieves. The malicious campaign began only days after the bug was first discovered.
In a blogpost, a Fire-eye researcher said attack code was being included in Flash files embedded in Microsoft Office documents. Adobe has published patches that stop Flash being used as an attack route via this flaw.
Writing on the Sophos security blog, Paul Ducklin said this was the third time in three months that Adobe had needed to produce patches for vulnerabilities that, if exploited, would let attackers compromise a victim’s computer.
Many security firms now recommend that people uninstall Flash player to avoid falling victim to malicious attachments or booby-trapped webpages. A lot of web firms have now stopped using Flash in a bid to thwart attackers.
Interesting thought…. FREE Wi-Fi from Facebook? There are over a BILLION people with Facebook accounts and Facebook wants to interact with all of them.
Would you check in on Facebook in exchange for free Wi-Fi at a hotel, restaurant, retailer or your Doctor’s office? That’s the pitch Facebook has cooked up to hook its social network into companies big and small.
Here’s potentially the next big security / privacy intrusion. Facebook wants businesses to provide FREE Wi-Fi to their customers as long as the customer checks in using their Facebook credentials.
When customers check in to use a business Wi-Fi, their friends can discover the business by seeing the check in on their news feed. After checking in, people will be asked if they also want to like the business page so you can continue to connect with them on Facebook
For Facebook, the Wi-Fi-with-check-in initiative is part of a broader plan to attack the local market by encouraging merchants to set up and maintain Pages on the social network. Participating merchants will get additional distribution with each check-in, receiving exposure that could help bring in more customers or inspire more “likes.” They’ll also benefit from aggregate, anonymous demographic data such as age, gender, and interests on customers who sign-in to Facebook Wi-Fi, and can then use that data for targeting purposes in whatever Facebook advertising campaigns they run.
In essence, Facebook, which is not profiting directly from any revenue share through the partnership, hopes to attract more merchants that go on to buy ads. The idea is also to become a formidable player in local search, an area where everyone from Google and Yahoo to Yelp and Foursquare are competing for attention and advertising dollars.
This would appear to be a good thing for business owners but what does the consumer get out of it? Not much beyond the Wi-Fi access except perhaps that it’s a real time report of where a person is at any moment in time.
A friend of ours recently “checked in via Facebook” to use the FREE Wi-Fi at a car dealer and didn’t realize how that information would be used. All of a sudden, he got a text message from another friend asking – “hey… are you looking for a new car?”
Let’s take this a bit further – how about your doctor or dentist office offering the same Facebook Wi-Fi access. (remember Facebook is trying to get EVERY business signed up for this) Now everyone you know on Facebook and their “friends” will know exactly where you are for the next hour or so. Does that thought scare you just a little? It’s like checking into a restaurant while traveling in another state – announcing to the Facebook world that you’re not home – so maybe it’s a good time to come by your house and rattle a door or window.
Whatever the reasoning behind Facebook Wi-Fi, there’s no question that millions of people will find the prospect of free Wi-Fi too good to pass up, which raises a number of privacy issues. What does it mean when you link your Facebook account to your browsing history, especially when merchant and social network would seemingly benefit from knowing more about you?
Social media is getting more intrusive each and every day. It’s up to you and me to protect our privacy and physical location when were out and about on our daily rounds. If a local business offers you FREE Wi-Fi just for logging in with your Facebook account – think twice about it. If you really need Wi-Fi access while you’re sitting in a waiting room somewhere, ask them for their guest access code
RING Video doorbell. An internet-connected doorbell isn’t a new idea. The Doorbot of a few years ago was clunky and ugly, but the concept was good: someone rings your doorbell, your smartphone beeps and buzzes, and with a tap, you can initiate a videochat with the visitor. It doesn’t matter if you’re in the kitchen, at the office, or on vacation in the mountains. You can talk to them and see them. They can hear you, but they can’t see you. If it’s a delivery, you can give the guy permission to leave a package and instructions on where to stash it.
The Ring Video Doorbell offers a more refined and comprehensive approach. It adds motion sensing, so it can alert you via your phone when somebody walks through your yard or onto your porch. It also records video and audio of each event (a ringing of the bell or a motion detection) and stores it in the cloud for later review.
The Ring unit costs $199, and you can easily install it yourself. Below the 180 degree camera eye is a circular button surrounded by an LED ring. At the bottom is a speaker allowing you to chat with your friendly FedEx or UPS driver. The companion app is a free downlaod, as is the user account that lets you access the Ring’s features. The cloud storage runs $3 per month or $30 per year.
The Ring Video Doorbell doesn’t offer a live video feed or the ability to constantly record footage, but Ring does say it will allow remote camera access at some point in the future, so you can take a peek out your doorbell even when nothing triggers the camera.
Knock, Knock, Who’s There?
All the tools necessary for installation are included—even caulk and a miniature level. Before you mount the Ring, you charge it using USB (you’ll probably have to take it down and recharge it once per year) and connect it to your Wi-Fi network, which happens through the smartphone app. (Ring is set to release their next generation doorbell that would in place of your current wired bell.)
When someone presses the button on Ring, your smartphone begins to, well, ring. The same goes for the unit itself—it rings to let the person at your door know something is happening. Opening the notification brings up a live video feed, where you can Reject or Accept the invitation to interact.
Bodies in Motion
Using motion sensors built into the camera, Ring can alert you when someone is at your door before they even press the doorbell. This is especially useful when the UPS or FedEx driver leaves a package and refuses to ring your doorbell. Also, before the button is even pressed, Ring detects motion at your door and begins recording video. This makes it possible to view what happened at your door before the bell was pressed. This video recording feature can provide you with the peace of mind in knowing any activity at your door is being recorded – well worth the minimal monthly fee. Not to mention, you can download any of the videos to your mobile device for easy sharing with family members, or in the hopefully unlikely case where it’s necessary, the authorities.
Video of how the Ring Video Doorbell works: https://www.youtube.com/watch?v=f9TRo7JDxFg
Check out their product line: https://ring.com/products
The U.S. Department of Homeland Security has issued a warning to remove Apple’s QuickTime for Windows. The alert came in response to Trend Micro’s report of two security flaws in the software, which will never be patched because Apple has ended support for QuickTime for Windows.
Computers running QuickTime are open to increased risk of malicious attack or data loss, US-CERT warned, and remote attackers could take control of a victim’s computer system. US-CERT is part of DHS’ National Cybersecurity and Communications Integration Center.
“We alerted DHS because we felt the situation was broad enough that people having unpatched vulnerabilities on their system needed to be made aware,” said Christopher Budd, global threat communication manager at Trend Micro. The only mitigation available is to uninstall QuickTime for Windows,” US-CERT’s alert said.
Instructions from Apple can be found here: https://support.apple.com/en-us/HT205771Apple has not discontinued security updates for QuickTime on Apple computer systems – just Windows based systems. It is not clear why Apple made the decision to end Windows support.
Zero Day Warning
Trend Micro’s Zero Day Initiative learned about the vulnerabilities from researcher Steven Seeley of Source Incite, who is named in the warning. ZDI then issued advisories detailing the critical vulnerabilities:
• The Apple QuickTime moov Atom Heap Corruption Remote Code Execution vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of QuickTime. The problem first came to ZDI’s attention late last year. The number of users at risk is unknown at this time.
• The QuickTime Atom Processing Heap Corruption Remote Code Execution Vulnerability allows an attacker to write data outside of an allocated heap buffer by providing an invalid index.
Software makers regularly retire applications, so it’s not unusual that QuickTime would be vulnerable. However, it was odd that Apple did not issue a public statement about ending its support for QuickTime for Windows and that the software was still available for download.
Increasing Software Vulnerability
QuickTime joins a growing list of software that is not supported any longer. That list includes Microsoft Windows XP and Oracle Java 6, which means users of those operating systems increasingly will be vulnerable to attack.
DHS didn’t have any comment to add to its alert, said spokesperson Scott McConnell, who referred questions to Apple. Apple did not respond to requests to comment for this story.
The warnings come amid recent reports about computer system vulnerabilities, including one issued just a few days ago about a vulnerability in Adobe’s Flash Player that could leave computers open to ransomware, which can lock up entire systems until an attacker is paid to release control.
When you’re on Facebook, do you ever get the feeling that you’re being watched? An ad pops up that’s right up your alley, or three new articles show up in your feed that are similar to something you’ve just recently clicked on.
Sometimes it seems like Facebook knows you personally, and that’s because it does. It has algorithms that track what you like, watch and click on. Facebook uses this information to target ads to users on behalf of its paid advertisers.
Facebook itself isn’t the only culprit. Tons of companies use Facebook’s platform as a way to track you. In fact, right now there a probably dozens of companies that are watching your posts, storing your profile information and more, without you even realizing it.
How did this happen in the first place? When Facebook first started out, people rushed to join because of the many perks that it offered. One of those perks, and probably the most appealing, was the fact that Facebook was entirely ad-free. You could use the service to connect with family and friends without being bothered by someone trying to sell you something.
Well, like they say, “All good things must come to an end.” Eventually, Facebook began selling ads like everyone else. And that’s when everything changed.
People realized that Facebook provided a treasure trove of information for advertisers. By clicking “like” users were telling companies exactly what they wanted — more of this, less of that. This led to the big data tracking we now see.
Three sneaky ways companies are tracking you: Most people understand that Facebook is tracking their preferences whenever they use the app. But, few realize they’re being tracked in other ways too. And, that’s what these third-party companies are banking on. If you don’t know you’re being tracked, then you won’t ask them to stop.
Here’s three things to watch out for.
1: Facebook apps: This is when you receive a request to play a Facebook game your friends are obsessed with, and you decide to sign up. If you’ve ever done this before, then you’ve allowed that app developer to track you. These third-party apps integrate with your Facebook profile and can ask Facebook for permission to pull various personal data, from your work history to timeline posts. And although you can edit what information they can access, very few people do.
2: Facebook logins: This is when you visit a site and it says “Log in with Facebook,” and you do, then you’re letting that company track you.
3: Friends’ apps monitoring you: Even if you didn’t download an app, your Facebook settings may allow apps your friends have installed to also see YOU. It’s pretty scary.
You might be wondering why this even matters, and how it really impacts you personally. The easiest way to answer those questions is to point out all of those big data breaches you hear about almost daily. Hackers rarely waste time on individuals these days. They’ve got much bigger fish to fry. Large retailers, for example – or the databases where these third-party companies store the information they’ve gathered. That’s why everyone should take these steps to protect their private information.
Some Options To Help Stop The Tracking Madness:
Review and edit installed apps: To see what apps you’ve installed over the years, open Facebook in your browser, click the down arrow in the upper right corner and select “Settings.” Then click on the “Apps” header in the left column.
To see what information an app is accessing, click the pencil icon next to any of the apps to see and edit the settings. The first setting lets you set who can see that you use the app. It defaults to “Only Me,” so it isn’t a big deal. Below it, however, is another story.
In the case of Skype, for example, it pulls your public profile information along with your list of friends, email address, birthday and hometown.
Remember that this information is being stored on a third-party server. Not every app developer is going to have Microsoft-level security, and hackers are good at turning tiny pieces of stolen information into big gains.
If you want to keep using the app, you can deselect certain items, such as your email address. Be aware that won’t remove the information from the app developer’s servers, however. If you change your email address in the future, however, the developer won’t get the new one.
Remove apps you don’t use: If you don’t want to use the app anymore, you can click the “Remove app” link at the bottom of the page. Just remember that this won’t automatically remove your information from the app developer’s servers. For that you’ll need to contact the app developer directly. Facebook has a link for more information on this under the “Remove info collected by the app” section in the app’s settings.
Turn off apps completely: If you’ve deleted all the apps, and you’re not keen on accidentally installing more in the future, you can turn off the app platform completely. Just note you won’t be able to install apps or log in to third-party sites using Facebook until you turn this back on.
To turn off the app platform, go back to the App Settings page. Under “Apps, Websites and Plugins,” click the “Edit” button. At first, this just looks like a way to disable app notifications and invites from other people, which is a big help on its own. However, you’ll want to click the “Disable Platform” link in the bottom left corner.
Facebook gives you their standard warning about what disabling the platform does. If you’re OK with it, click the “Disable Platform” button. Unfortunately, this won’t remove information that app developers might have collected about you already.
Stop logging into sites using Facebook: In the future, when you’re adding an app or logging into a website try to avoid logging in with your Facebook account. But, if you must use Facebook to log in, then look for the “Log in Anonymously” or “Guest” option so it won’t share your information.
Stop friends’ apps from seeing your info: Apps can still get your information through your friends. As your friends install apps, those apps can request permission to get info about you.
To put a stop to this, go back to the App Settings page. Then under “Apps Others Use” click the “Edit” button. You’ll see everything that your friends’ apps can see about you. Go through and uncheck every option listed on the page, and then click “Save.” Now companies can’t track new information about you.
It’s up to each of us to monitor and maintain what information we want shared with others. I’m sure you’ll be very surprised when you log in and check your Facebook app settings.
People who don’t want to pay for Netflix services can buy stolen log-in credentials on the black market for rock-bottom prices, Symantec reports.
The online security company said it found advertisements and software aimed at cheapskate streamers, though it didn’t mention the names of the shady sites and forums.
Netflix Logins For Sale. The ads, which show Netflix logins for sale for as little as a quarter each, proudly display guarantees of “freshly cracked” accounts. They also ask their “customers” not to spoil the fun by changing passwords or messing with payments, either of which would alert the paying user to the fact that their account has been breached.
It is, of course, illegal — these are stolen accounts, gathered through nefarious means like malware and phishing. But since Netflix takes a laissez-faire approach to sharing accounts, paying users could easily be watching shows at the same time as someone who bought their login for a quarter on the Dark Web.
Netflix CEO Reed Hastings has said in the past that he doesn’t consider password sharing a big problem, and as long as the user base keeps growing (the service just passed 65 million subscribers globally), this common practice is likely to stay that way
Sharing your Netflix log-in? Turns out you might not be the only one who lets a friend or family member log into your Netflix account. In fact, if you don’t, you’re in the minority, according to a poll of over 5,000 Netflix users conducted by Global Web Index.
Only 35 percent of users claimed to be the sole user of the account — 30 percent shared it with one other person, 16 percent with two people, and 19 percent shared it with three or more.
Netflix has plans that permit multiple streams to multiple screens at once, which means they’re fine with accounts being shared to a certain degree. Two spouses and a kid watching a movie shouldn’t require three accounts, of course — but spreading the login among four or five friends might be something the company would like to stop.
Could your account be on one of these lists? It’s hard to say, but one easy way to check is to look at your recently watched shows. If you see a lot you don’t recognize and don’t seem like your style (or that of anyone you share with), you might want to change your password. That simple action will immediately stop your account from being used by others without your permission.
The “Internet of Things” security is badly broken and getting worse. The Shodan search engine is only the latest reminder of why we need to fix IoT security.
Shodan, a search engine for the Internet of Things (IoT), recently launched a new section that lets users easily browse vulnerable webcams.
The feed includes images of marijuana plantations, back rooms of banks, infants and children in their homes, kitchens, living rooms, garages, ski slopes, swimming pools, colleges and schools, laboratories, and cash register cameras in retail stores. The cameras are vulnerable because they use the Real Time Streaming Protocol (RTSP, port 554) to share video but have no password authentication in place. Shodan crawls the Internet at random looking for IP addresses with open ports. If an open port lacks authentication and streams a video feed, the new script takes a snap and moves on.
While the privacy implications here are obvious, Shodan’s new image feed also highlights the dismal state of IoT security, and raises questions about what we are going to do to fix the problem.
Of course insecure webcams are not exactly a new thing. The last several years have seen report after report hammer home the point. In 2013, the FTC sanctioned webcam manufacturer TRENDnet for exposing “the private lives of hundreds of consumers to public viewing on the Internet.” Today it’s estimated that there are now millions of such insecure webcams connected and easily discoverable with Shodan. That number will only continue to grow.
So why are things getting worse and not better? Webcam manufacturers are in a race to gain market share. Consumers do not perceive value in security and privacy and have not shown a willingness to pay for such things. As a result, webcam manufacturers slash costs to maximize their profit, often on narrow margins. Many webcams now sell for as little as $20.
The problem: Consumers are saying we’re not supposed to know anything about this cybersecurity stuff and the manufacturers don’t want to lift a finger to help users because it costs them money.
If consumers were making an informed decision and that informed decision affected no one but themselves, perhaps we could let the matter rest. But neither of those conditions are true. Most consumers fail to appreciate the consequences of purchasing insecure IoT devices. Worse, such a quantity of insecure devices makes the Internet less secure for everyone. What botnet will use vulnerable webcams to launch DDoS attacks? What malware will use insecure webcams to infect smart homes? You may remember in November the story about a 2008-era malware – Conficker.B affects police body cams in 2015, it threatens not just the reliability of recorded police activity but also serves as a transmission vector to attack other devices.
The bigger picture here is not just personal privacy, but the security of IoT devices. As we expand that connectivity, when we get into systems that affect public safety and human life—medical devices, the automotive space, critical infrastructure—the consequences of failure are higher than something as shocking as a Shodan webcam peering into the baby’s crib.
FTC to the Rescue? When it comes to strong-arming manufacturers, government entities like the US Federal Trade Commission (FTC) may be able to help. Maneesha Mithal, associate director of the FTC’s division of privacy and identity protection, was quick to mention several examples where the organization went after at-fault companies. In recent years according to Mithal, the FTC has prosecuted more than 50 cases against companies that did not reasonably secure their networks, products, or services.
The FTC takes action against companies engaged in deceptive or unfair business practices, she explained. That includes IoT manufacturers who fail to take reasonable measures to secure their devices.
In addition to the enforcement action against TRENDnet, the FTC also issued security best practices for IoT manufacturers back in January 2015, urging them to build in security at the design phase rather than bolting it on as an afterthought. These practices could be a “defense-in-depth” strategy to mitigate risks, pushing security patches to connected devices for the duration of the product life cycle, and so on.
As consumers of IoT products it’s our responsibility to learn about the individual security and password settings for the devices we use and secure them to the best of our ability. Just don’t rely on the manufacturer to protect you – they probably won’t.
Data Privacy Day – January 28, 2016
Data Privacy Day (DPD) is an effort to empower people to protect their privacy, control their digital footprint and escalate the protection of privacy and data as everyone’s priority. Held annually on January 28th, Data Privacy Day aims to increase awareness of privacy and data protection issues among consumers, organizations, and government officials. DPD helps industry, academia, and advocates to highlight consumer privacy efforts.
Data Privacy Day began in the United States and Canada in January 2008 as an extension of the Data Protection Day celebration in Europe. Data Protection Day commemorates the January 28, 1981, signing of Convention 108, the first legally binding international treaty dealing with privacy and data protection. Data Privacy Day is now a celebration for everyone, observed annually on Jan. 28.
Data Privacy Day is led by the National Cyber Security Alliance, a non-profit, public private partnership focused on cyber security education for all online citizens. StaySafeOnline.org has many resources to help you, your family and your business stay safe online.
Free Security Check-Ups Check your computer for known viruses, spyware, and discover if your computer is vulnerable to cyber attacks.
Check Your Privacy Settings One-stop shop for easy instructions to update your privacy settings wherever and however you go online.
Parent Resources Information regarding cyberbullying, child identity theft, Facebook for parents, social networking, etc.
Educator Resources Prepared educational materials for the classroom, K – 12th grades.
Business Resources Informational resources for businesses regarding bring your own device, information security, document destruction, compliance, data breach, and risk management. https://www.staysafeonline.org/data-privacy-day/business-resources
Privacy and Domestic Violence Resources for domestic violence survivors and victims to help safeguard the privacy of their personal information.
I received an email yesterday from John McAfee. Yup – he’s the guy that founded McAfee Antivirus, he’s the libertarian party candidate in the 2016 presidential election and he’s also promoting his new security technology device called Everykey!
Everykey is a brand new product designed to replace your passwords and keys. When Everykey is close to your phone, laptop, tablet, house door, car door, or another access-controlled device, it unlocks that device. When you walk away, that device locks back down. Everykey can also log you into your website accounts. If you lose your Everykey, you can remotely freeze it, so no one else can use it.
Using the EveryKey App, you pair your key to your devices, manage key settings such as the active range and even freeze your key if it is lost or stolen. The EveryKey app also pushes the latest over-the-air software updates to your key so you stay up to date with features and updated security standards.
There are currently 2 different device options.
A Wrist Band: This wearable accessory turns EveryKey into a sleek and stylish fashion statement. Just pop your key into the pocket on the back of the band and wear it wherever you go.
Key ring: One day, Everykey will replace all of your keys on that big bulky keychain. Until that day, you can use the Everykey Rey Ring Accessory as a convenient way to carry your keys.
Current pricing which includes 1 Key Ring Accessory and 1 charging cable for each EveryKey device purchased.
1 EveryKey – $128
2 Pack: $230
4 Pack: $435
10 Pack: $1,024
Expect the first EveryKey devices to ship in March of 2016
For additional information: https://everykey.com/
Get regular updates and additional information about Everykey here: https://www.indiegogo.com/projects/everykey-your-only-key#/updates
Hobby drones. Unmanned Aerial Vehicles. Remote-controlled Copters.
Call them what you will, in many cases they’re becoming a nuisance. A minority of irresponsible users have been flying them too close to airplanes and helicopters, wandering into restricted military airspace, spying on neighbors; disrupting sporting events and even injuring people. It was only a matter of time before some trigger-happy vigilante shot one of the privacy invaders out of the sky.
Regulators and law enforcers are struggling to cope with the growth in their popularity, increasing the likelihood that heavy-handed legislation could stifle innovation in a sector that has great commercial potential for businesses large and small.
The Government Steps In: Drones in the US, and the people who fly them, must be registered in a government database beginning on December 21st. Any drones purchased from that date onwards must be logged before the first outdoor flight, the Federal Aviation Administration (FAA) has said.
Existing drone owners will have until February 19th, 2016 to register their drones, but a $5 fee will be waived to encourage registration within the first 30 days.
FAA spokesman Les Dorr said that it would seek to educate, rather than punish, those found to have not registered their drones. But he added: “For people who simply refuse to register, we do have enforcement tools available.” Those punishments could be civil penalties of up to $27,500, but in severe cases, criminal prosecutions could result in a $250,000 fine and a maximum of three years in prison.
The new rule affects drones weighing in at half a pound to 55lb. Users older than 13 must register themselves, but parents can register on behalf of younger children. Each drone will be given a unique identification number to be displayed on the device.
On Monday, December 14th, the FAA promised the process would be streamlined and user-friendly. “Make no mistake: unmanned aircraft enthusiasts are aviators and with that title comes a great deal of responsibility,” US transportation secretary Anthony Foxx said in a statement. “Registration gives us an opportunity to work with these users to operate their unmanned aircraft safely.
What will registering drones accomplish? Regulators had been under pressure to clamp down on what many people, particularly those in the emergency services, consider to be a growing menace – hobbyist drone users flying in unwanted places. Firefighters in California have reported that drones have disrupted efforts to contain wildfires.
Unfortunately, drone rules and registration will not prevent bad drone use. Many pundits are drawing comparisons to people who drive cars without a driver’s license or insurance: “You really can’t legislate against stupidity.” But other bodies, including the Association for Unmanned Vehicle Systems
www.AUVSI.org – The Association for Unmanned Vehicle Systems International, have backed the idea and taken an active role in consultations. The new regulations fall short of allowing emergency service personnel to forcibly disable drones by using electronic jamming equipment. Let’s see how long that lasts?