- Anti-poaching technologies like drones, tracking tags and CCTV are vulnerable to cyber-attacks, a new study shows.
- Stellenbosch University master's graduate Christelle Steyn says her passion for wildlife, and IT led her to conduct the research.
- She recommends regular software updates, firewalls and intruder detection systems among the options to guard against threats.
- For climate change news and analysis, go to News24 Climate Future.
Anti-poaching technologies like tracking tags, CCTV and thermal cameras, and drones are vulnerable to cyber-attacks, new research shows.
Stellenbosch University master's graduate Christelle Steyn, who is also a certified field guide with the Field Guides Association of Southern Africa, conducted the research. She shared with News24 that growing up, she visited national parks and enjoyed wildlife, but this is just a hobby. When it came to pursuing studies, she chose another interest of hers: IT.
"When I came to the point of considering a Masters degree, I wanted to combine IT with wildlife," Steyn said. She recalled approaching her supervisor about her idea to research anti-poaching systems and their security, which he believed would work as a Masters research.
Steyn's study involved simulating a hypothetical network of anti-poaching technologies that are used or could be applied in the conservation of rhinos, elephants, pangolins and lions.
She had to rely on a hypothetical scenario as existing or real-world anti-poaching operations do not want to disclose data on the status and capabilities of their systems, as this would put them at risk.
Steyn used the simulation to test various cyberattacks against anti-poaching technologies in order to identify potential risks and vulnerabilities. She could also determine the severity of different threats. She also found ways to mitigate or overcome these attacks by configuring the responses of these technologies.
READ | South Africa withdraws species protection, elephant management laws
"Since many of the technologies used in anti-poaching operations are connected to either another device, a database, a network, or the internet to transmit data, they are all vulnerable to attack.
"The systems used to store the collected data are ultimately at most risk, especially if they can be accessed by cybersecurity compromises of the network or connected devices," she said.
Steyn found that common attacks on anti-poaching networks involve intercepting communications networks and retrieving data or disrupting a network to block monitoring or delay responses.
Not all networks have adequate security applied. And some of them that do, are vulnerable to more sophisticated attacks. Steyn noted that syndicates are able to fund the skills, training and equipment a poaching recruit requires to be able to access or attack anti-poaching systems and the relevant communications networks.
Her study recommends the use of comprehensive anti-virus products, regular software updates, as well as firewalls and intruder detections. These are an added layer of protection from just having a username and password as a security measure. Regular security audits need to be conducted by an expert. She also recommends a "security-aware" culture among employees to be able to spot and limit these attacks.
Steyn expects that the findings from the study can be used for anti-poaching efforts by government agencies like SANParks, nonprofits and even private entities.