{"id":6563,"date":"2025-04-11T10:21:19","date_gmt":"2025-04-11T10:21:19","guid":{"rendered":"https:\/\/ziew.online\/?p=6563"},"modified":"2025-04-11T10:21:20","modified_gmt":"2025-04-11T10:21:20","slug":"drony-i-cyberprzestepstwa","status":"publish","type":"post","link":"https:\/\/ziew.online\/index.php\/2025\/04\/11\/drony-i-cyberprzestepstwa\/","title":{"rendered":"Drony i cyberprzest\u0119pstwa"},"content":{"rendered":"\n<p class=\"wp-block-paragraph\"><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Drony i cyberprzest\u0119pstwa<\/h2>\n\n\n\n<p class=\"has-drop-cap wp-block-paragraph\">Wiem co sobie teraz pomy\u015blicie. Co ten ch\u0142op wypisuje? Jak drony i cyberprzest\u0119pstwa? Co taki ma\u0142y, lataj\u0105cy chochlik z kamer\u0105 mo\u017ce namiesza\u0107 w naszych komputerach? Przecie\u017c to jakie\u015b brednie, prawda? Prawda???<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Ot\u00f3\u017c nie. W sumie pewnie bym nie opisa\u0142 tego przypadku, gdybym sam nie przeczyta\u0142 artyku\u0142u na <strong><a href=\"https:\/\/www.computerworld.com\/article\/3958458\/drones-are-the-future-of-cybercrime.html\">computerworld.com<\/a><\/strong> . Wprawdzie my\u015bla\u0142em, \u017ce znam przynajmniej wi\u0119kszo\u015b\u0107 metod jakich u\u017cywaj\u0105 hakerzy, ale \u017ceby dronem? \u0141o Panie&#8230; Pomys\u0142owo\u015b\u0107 cyberprzest\u0119pc\u00f3w nie zna, najwyra\u017aniej, granic. Ale przejd\u017amy do rzeczy&#8230;<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"450\" src=\"https:\/\/ziew.online\/wp-content\/uploads\/2025\/04\/pexels-emrahayvali-2073611.jpg\" alt=\"Drony i cyberprzestepstwa 2\" class=\"wp-image-6584\" style=\"width:750px;height:auto\" srcset=\"https:\/\/ziew.online\/wp-content\/uploads\/2025\/04\/pexels-emrahayvali-2073611.jpg 600w, https:\/\/ziew.online\/wp-content\/uploads\/2025\/04\/pexels-emrahayvali-2073611-300x225.jpg 300w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><figcaption class=\"wp-element-caption\">Photo by Emrah AYVALI: https:\/\/www.pexels.com\/photo\/drone-flying-2073611\/<\/figcaption><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Wojna, drony i &#8230;<\/h2>\n\n\n\n<p class=\"has-drop-cap wp-block-paragraph\">No w\u0142a\u015bnie. Wojna, drony i zak\u0142\u00f3cenia mo\u017cliwo\u015bci przeciwnika. W jaki spos\u00f3b wykorzystywane s\u0105 drony w wojnie na Ukrainie, o kt\u00f3rych zapewne nie wiedzieli\u015bcie? C\u00f3\u017c, ju\u017c \u015bpiesz\u0119 z odpowiedzi\u0105.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Wyobra\u017acie sobie, \u017ce pr\u00f3cz standardowych misji obserwacyjnych i typowo uderzeniowych, mo\u017cna je r\u00f3wnie\u017c wykorzysta\u0107 do:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>rozsy\u0142ania z\u0142o\u015bliwego kodu typu &#8222;malware&#8221;, a tym samym zak\u0142\u00f3caniu rosyjskich system\u00f3w i wsparciu w obronie przed cyberzagro\u017ceniami;<\/li>\n\n\n\n<li>zdalnego &#8222;palenia&#8221; port\u00f3w USB;<\/li>\n\n\n\n<li>blokowania zmiany oprogramowania;<\/li>\n\n\n\n<li>wykradania danych systemu kontroli, celem lokalizowania wrogich operator\u00f3w;<\/li>\n\n\n\n<li>przesy\u0142aniu innego z\u0142o\u015bliwego oprogramowania, celem wykorzystania w p\u00f3\u017aniejszym terminie.<\/li>\n<\/ul>\n\n\n\n<p class=\"wp-block-paragraph\">Oczywi\u015bcie wszystkie wymienione przypadki s\u0105 realizowane poprzez wcze\u015bniejsze przej\u0119cie w ca\u0142o\u015bci dron\u00f3w przeciwnika. Technika opiera si\u0119 bowiem na zmianie oprogramowania w taki spos\u00f3b, by ponownie u\u017cywaj\u0105cy go nieprzyjaciel nie by\u0142 \u015bwiadomy modyfikacji. Czy tego typu akcje maj\u0105 miejsce tylko na wojnie? Niestety, nie do ko\u0144ca&#8230;<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img decoding=\"async\" src=\"https:\/\/ziew.online\/wp-content\/uploads\/2024\/08\/240711-M-PI941-1029.jpg\" alt=\"\u0141\u0105czno\u015b\u0107 3\" class=\"wp-image-5925\" style=\"width:750px;height:auto\"\/><figcaption class=\"wp-element-caption\">U.S. Marine Corps Cpl. Brian Vile, an intelligence specialist with Marine Rotational Force \u2013 Darwin 24.3, operates a Skydio drone as part of a counter-unmanned aircraft systems field test at Mount Bundey Training Area, NT, Australia, July 11, 2024. The Marines and Australian Soldiers with the Robotics and Autonomous Implementation and Coordination Office, Australian Army Headquarters, used C-UAS to enhance MRF-D 24.3 Marine Air-Ground Task Force capabilities to defend against aerial attacks. Vile is a native of Pennsylvania. (U.S. Marine Corps photo by Cpl. Migel A. Reynosa)<\/figcaption><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Cyberatak &#8222;na drona&#8221;<\/h2>\n\n\n\n<p class=\"has-drop-cap wp-block-paragraph\">Jak si\u0119 bowiem okazuje, realne zagro\u017cenia w postaci dron\u00f3w wykradaj\u0105cych has\u0142a, mog\u0105 spotka\u0107 nas na co dzie\u0144. Warto tu przytoczy\u0107 ciekawy przypadek, jaki spotka\u0142 pewnego specjalist\u0119 od spraw bezpiecze\u0144stwa w firmie.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Wyobra\u017acie sobie sytuacj\u0119, w kt\u00f3rej to administratorzy wykrywaj\u0105 dziwne po\u0142\u0105czenia z sieci firmy. Analizuj\u0105c g\u0142\u0119biej problem, dochodz\u0105 do wniosku, \u017ce ten sam adres MAC by\u0142 jednocze\u015bnie u\u017cywany zdalnie przez pracownika pracuj\u0105cego z domu. <\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Poprzez wykorzystanie testera Wi-Fi &#8222;Fluke AirCheck&#8221;, uda\u0142o si\u0119 wy\u015bledzi\u0107 nieuczciwy sygna\u0142. Trop wi\u00f3d\u0142 na dach budynku, gdzie znaleziono dwa zmodyfikowane drony: DJI Phantom i DJI Matrice 600. Dron &#8222;Phantom&#8221; by\u0142 wyposa\u017cony w urz\u0105dzenie Wi-Fi &#8222;Pineapple&#8221; (narz\u0119dzie zwykle u\u017cywane do test\u00f3w penetracyjnych, ale tutaj nadu\u017cywane do podszywania si\u0119 pod legaln\u0105 sie\u0107 firmy). Umo\u017cliwi\u0142o to atakuj\u0105cym przechwycenie danych logowania, gdy pracownicy nie\u015bwiadomie \u0142\u0105czyli si\u0119 z fa\u0142szyw\u0105 sieci\u0105. Dron &#8222;Matrice&#8221; przenosi\u0142 bardziej rozbudowany \u0142adunek, w tym Raspberry Pi, mini laptopa GPD, modem 4G, dodatkowe urz\u0105dzenia Wi-Fi i baterie.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Na szcz\u0119\u015bcie firma zatrudnia\u0142a prawdziwych specjalist\u00f3w od cyberbezpiecze\u0144stwa, kt\u00f3rzy szybko uporali si\u0119 z niechcianymi go\u015b\u0107mi. Dzi\u0119ki ich reakcji uda\u0142o si\u0119 zapobiec w\u0142amaniu, kt\u00f3re mog\u0142o mie\u0107 tragiczne skutki.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Realne zagro\u017cenie &#8222;w cywilu&#8221;<\/h2>\n\n\n\n<p class=\"has-drop-cap wp-block-paragraph\">Jak sami dobrze wiecie, wy\u017cej wymieniony przypadek mo\u017ce by\u0107 r\u00f3\u017cnie modyfikowany. Dobrym przyk\u0142adem, mo\u017ce tu by\u0107 tworzenie tzw. &#8222;dron\u00f3w zombie&#8221;. W grudniu 2013 r. badacz ds. bezpiecze\u0144stwa Samy Kamkar zaprezentowa\u0142 projekt o nazwie &#8222;SkyJack&#8221;.  Pozwala\u0142 on na hakowanie dron\u00f3w, dzi\u0119ki kt\u00f3remu mog\u0142y one autonomicznie przejmowa\u0107 kontrol\u0119 nad innymi dronami w trakcie lotu. U\u017cywaj\u0105c Parrot AR.Drone 2.0, Raspberry Pi i niestandardowego oprogramowania, Kamkar pokaza\u0142, jak mo\u017cna tego dokona\u0107. Jego system wykorzysta\u0142 niezaszyfrowane po\u0142\u0105czenia Wi-Fi, dzi\u0119ki czemu roz\u0142\u0105czy\u0142 ich prawowitych operator\u00f3w i stworzy\u0142 \u201earmi\u0119 dron\u00f3w zombie\u201d, kt\u00f3re dzia\u0142a\u0142y pod jego kontrol\u0105.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Ech, ta ludzka pomys\u0142owo\u015b\u0107&#8230; Ale, ale&#8230; Wracaj\u0105c do tematu. Co jeszcze mo\u017cna robi\u0107 przy pomocy dron\u00f3w? Mo\u017cna je np. wykorzysta\u0107 do:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Pods\u0142uchiwania i podszywania si\u0119 pod sie\u0107;<\/li>\n\n\n\n<li>Sprawowania nadzoru wizualnego nad interesuj\u0105cym celem (niekoniecznie legalnie);<\/li>\n\n\n\n<li>Przechwytywania danych (Wi-Fi, Bluetooth, RFID);<\/li>\n\n\n\n<li>Uderze\u0144 typu DoS (Denial of Service);<\/li>\n\n\n\n<li>Dostarczania z\u0142o\u015bliwych urz\u0105dze\u0144 (mog\u0105cych prowadzi\u0107 w\u0142amania do system\u00f3w);<\/li>\n\n\n\n<li>Dostarczania z\u0142o\u015bliwego oprogramowania;<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"CBS 2 Exclusive: Criminals Use Drones To Target Victims In High-Tech Heists\" width=\"1290\" height=\"726\" src=\"https:\/\/www.youtube.com\/embed\/Bpd4xnUfwoA?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Podsumowanie<\/h2>\n\n\n\n<p class=\"has-drop-cap wp-block-paragraph\">Niesamowite jak przest\u0119pcy potrafi\u0105 dostosowywa\u0107 si\u0119 do bie\u017c\u0105cych czas\u00f3w i mo\u017cliwo\u015bci. Najwyra\u017aniej pomys\u0142owo\u015b\u0107 nie ma granic. Wszystkie te przypadki, jak i ten, kt\u00f3ry opisa\u0142em cho\u0107by <strong><a href=\"https:\/\/ziew.online\/index.php\/2024\/02\/05\/przyszlosc-ai\/\">TU<\/a><\/strong>, wprawiaj\u0105 w lekkie os\u0142upienie. <\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Nasze zabezpieczenia dzia\u0142aj\u0105ce wczoraj, mog\u0105 si\u0119 okaza\u0107 ju\u017c przestarza\u0142e dzi\u015b, a co dopiero jutro. Ci\u0105g\u0142y monitoring i nu\u017c\u0105ce wdra\u017canie poprawek potrafi\u0105 wyko\u0144czy\u0107 nawet najbardziej wytrwa\u0142ych. Co zatem robi\u0107 by si\u0119 nie da\u0107? Sprawdza\u0107, czyta\u0107 i uczy\u0107 si\u0119! By\u0107 na bie\u017c\u0105co i czuwa\u0107 &#8211; czego sobie i Wam serdecznie \u017cycz\u0119, a p\u00f3ki co&#8230;<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Do nast\u0119pnego! <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Drony i cyberprzest\u0119pstwa? Oszem, da si\u0119! Czyli o tym jak przest\u0119pcy wykorzystuj\u0105 te urz\u0105dzenia do wykonywania &#8222;brudnej&#8221; roboty.<\/p>\n","protected":false},"author":1,"featured_media":6583,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"iawp_total_views":23,"footnotes":""},"categories":[60,61],"tags":[29,62,91,102],"class_list":["post-6563","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-bezpieczenstwo","category-cyber","tag-bezpieczenstwo","tag-cyberbezpieczenstwo","tag-drony","tag-inteligentne-urzadzenia"],"blocksy_meta":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Drony i cyberprzest\u0119pstwa - ZIEW.ONLINE<\/title>\n<meta name=\"description\" content=\"Drony i cyberprzest\u0119pstwa? Oszem, da si\u0119! Czyli o tym jak przest\u0119pcy wykorzystuj\u0105 te urz\u0105dzenia do wykonywania &quot;brudnej&quot; roboty.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ziew.online\/index.php\/2025\/04\/11\/drony-i-cyberprzestepstwa\/\" \/>\n<meta property=\"og:locale\" content=\"pl_PL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Drony i cyberprzest\u0119pstwa\" \/>\n<meta property=\"og:description\" content=\"Drony i cyberprzest\u0119pstwa? Oszem, da si\u0119! Czyli o tym jak przest\u0119pcy wykorzystuj\u0105 te urz\u0105dzenia do wykonywania &quot;brudnej&quot; roboty.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ziew.online\/index.php\/2025\/04\/11\/drony-i-cyberprzestepstwa\/\" \/>\n<meta property=\"og:site_name\" content=\"ZIEW.ONLINE\" \/>\n<meta property=\"article:published_time\" content=\"2025-04-11T10:21:19+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-11T10:21:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ziew.online\/wp-content\/uploads\/2025\/04\/pexels-inmortal-producciones-108299-336232.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"450\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Ziew_acz\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Drony i cyberprzest\u0119pstwa\" \/>\n<meta name=\"twitter:description\" content=\"Drony i cyberprzest\u0119pstwa? Oszem, da si\u0119! Czyli o tym jak przest\u0119pcy wykorzystuj\u0105 te urz\u0105dzenia do wykonywania &quot;brudnej&quot; roboty.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/ziew.online\/wp-content\/uploads\/2025\/04\/pexels-inmortal-producciones-108299-336232.jpg\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/twitter.com\/i\/flow\/login?redirect_after_login=Ziew_acz\" \/>\n<meta name=\"twitter:site\" content=\"@Ziew_acz\" \/>\n<meta name=\"twitter:label1\" content=\"Napisane przez\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ziew_acz\" \/>\n\t<meta name=\"twitter:label2\" content=\"Szacowany czas czytania\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minut\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/ziew.online\\\/index.php\\\/2025\\\/04\\\/11\\\/drony-i-cyberprzestepstwa\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/ziew.online\\\/index.php\\\/2025\\\/04\\\/11\\\/drony-i-cyberprzestepstwa\\\/\"},\"author\":{\"name\":\"Ziew_acz\",\"@id\":\"https:\\\/\\\/ziew.online\\\/#\\\/schema\\\/person\\\/fb4b16a3abc014b8e9e886d7a57b7bdd\"},\"headline\":\"Drony i cyberprzest\u0119pstwa\",\"datePublished\":\"2025-04-11T10:21:19+00:00\",\"dateModified\":\"2025-04-11T10:21:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/ziew.online\\\/index.php\\\/2025\\\/04\\\/11\\\/drony-i-cyberprzestepstwa\\\/\"},\"wordCount\":878,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/ziew.online\\\/#\\\/schema\\\/person\\\/fb4b16a3abc014b8e9e886d7a57b7bdd\"},\"image\":{\"@id\":\"https:\\\/\\\/ziew.online\\\/index.php\\\/2025\\\/04\\\/11\\\/drony-i-cyberprzestepstwa\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/ziew.online\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/pexels-inmortal-producciones-108299-336232.jpg\",\"keywords\":[\"bezpiecze\u0144stwo\",\"cyberbezpiecze\u0144stwo\",\"drony\",\"inteligentne urz\u0105dzenia\"],\"articleSection\":[\"Bezpiecze\u0144stwo\",\"Cyberstrefa\"],\"inLanguage\":\"pl-PL\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/ziew.online\\\/index.php\\\/2025\\\/04\\\/11\\\/drony-i-cyberprzestepstwa\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/ziew.online\\\/index.php\\\/2025\\\/04\\\/11\\\/drony-i-cyberprzestepstwa\\\/\",\"url\":\"https:\\\/\\\/ziew.online\\\/index.php\\\/2025\\\/04\\\/11\\\/drony-i-cyberprzestepstwa\\\/\",\"name\":\"Drony i cyberprzest\u0119pstwa - ZIEW.ONLINE\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/ziew.online\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/ziew.online\\\/index.php\\\/2025\\\/04\\\/11\\\/drony-i-cyberprzestepstwa\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/ziew.online\\\/index.php\\\/2025\\\/04\\\/11\\\/drony-i-cyberprzestepstwa\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/ziew.online\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/pexels-inmortal-producciones-108299-336232.jpg\",\"datePublished\":\"2025-04-11T10:21:19+00:00\",\"dateModified\":\"2025-04-11T10:21:20+00:00\",\"description\":\"Drony i cyberprzest\u0119pstwa? Oszem, da si\u0119! Czyli o tym jak przest\u0119pcy wykorzystuj\u0105 te urz\u0105dzenia do wykonywania \\\"brudnej\\\" roboty.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/ziew.online\\\/index.php\\\/2025\\\/04\\\/11\\\/drony-i-cyberprzestepstwa\\\/#breadcrumb\"},\"inLanguage\":\"pl-PL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/ziew.online\\\/index.php\\\/2025\\\/04\\\/11\\\/drony-i-cyberprzestepstwa\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\\\/\\\/ziew.online\\\/index.php\\\/2025\\\/04\\\/11\\\/drony-i-cyberprzestepstwa\\\/#primaryimage\",\"url\":\"https:\\\/\\\/ziew.online\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/pexels-inmortal-producciones-108299-336232.jpg\",\"contentUrl\":\"https:\\\/\\\/ziew.online\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/pexels-inmortal-producciones-108299-336232.jpg\",\"width\":600,\"height\":450,\"caption\":\"Photo by Inmortal Producciones: https:\\\/\\\/www.pexels.com\\\/photo\\\/drone-flying-against-blue-sky-336232\\\/\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/ziew.online\\\/index.php\\\/2025\\\/04\\\/11\\\/drony-i-cyberprzestepstwa\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Strona g\u0142\u00f3wna\",\"item\":\"https:\\\/\\\/ziew.online\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Drony i cyberprzest\u0119pstwa\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/ziew.online\\\/#website\",\"url\":\"https:\\\/\\\/ziew.online\\\/\",\"name\":\"ZIEW.ONLINE\",\"description\":\"Nie prze\u015bpij \u017cycia...\",\"publisher\":{\"@id\":\"https:\\\/\\\/ziew.online\\\/#\\\/schema\\\/person\\\/fb4b16a3abc014b8e9e886d7a57b7bdd\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/ziew.online\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pl-PL\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/ziew.online\\\/#\\\/schema\\\/person\\\/fb4b16a3abc014b8e9e886d7a57b7bdd\",\"name\":\"Ziew_acz\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\\\/\\\/ziew.online\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/Ziew_logo_mikr_10_www.png\",\"url\":\"https:\\\/\\\/ziew.online\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/Ziew_logo_mikr_10_www.png\",\"contentUrl\":\"https:\\\/\\\/ziew.online\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/Ziew_logo_mikr_10_www.png\",\"width\":378,\"height\":170,\"caption\":\"Ziew_acz\"},\"logo\":{\"@id\":\"https:\\\/\\\/ziew.online\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/Ziew_logo_mikr_10_www.png\"},\"sameAs\":[\"http:\\\/\\\/ziew.online\",\"https:\\\/\\\/x.com\\\/https:\\\/\\\/twitter.com\\\/i\\\/flow\\\/login?redirect_after_login=Ziew_acz\"],\"url\":\"https:\\\/\\\/ziew.online\\\/index.php\\\/author\\\/eacecce9ec312ba9\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Drony i cyberprzest\u0119pstwa - ZIEW.ONLINE","description":"Drony i cyberprzest\u0119pstwa? Oszem, da si\u0119! Czyli o tym jak przest\u0119pcy wykorzystuj\u0105 te urz\u0105dzenia do wykonywania \"brudnej\" roboty.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ziew.online\/index.php\/2025\/04\/11\/drony-i-cyberprzestepstwa\/","og_locale":"pl_PL","og_type":"article","og_title":"Drony i cyberprzest\u0119pstwa","og_description":"Drony i cyberprzest\u0119pstwa? Oszem, da si\u0119! Czyli o tym jak przest\u0119pcy wykorzystuj\u0105 te urz\u0105dzenia do wykonywania \"brudnej\" roboty.","og_url":"https:\/\/ziew.online\/index.php\/2025\/04\/11\/drony-i-cyberprzestepstwa\/","og_site_name":"ZIEW.ONLINE","article_published_time":"2025-04-11T10:21:19+00:00","article_modified_time":"2025-04-11T10:21:20+00:00","og_image":[{"width":600,"height":450,"url":"https:\/\/ziew.online\/wp-content\/uploads\/2025\/04\/pexels-inmortal-producciones-108299-336232.jpg","type":"image\/jpeg"}],"author":"Ziew_acz","twitter_card":"summary_large_image","twitter_title":"Drony i cyberprzest\u0119pstwa","twitter_description":"Drony i cyberprzest\u0119pstwa? Oszem, da si\u0119! Czyli o tym jak przest\u0119pcy wykorzystuj\u0105 te urz\u0105dzenia do wykonywania \"brudnej\" roboty.","twitter_image":"https:\/\/ziew.online\/wp-content\/uploads\/2025\/04\/pexels-inmortal-producciones-108299-336232.jpg","twitter_creator":"@https:\/\/twitter.com\/i\/flow\/login?redirect_after_login=Ziew_acz","twitter_site":"@Ziew_acz","twitter_misc":{"Napisane przez":"Ziew_acz","Szacowany czas czytania":"5 minut"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ziew.online\/index.php\/2025\/04\/11\/drony-i-cyberprzestepstwa\/#article","isPartOf":{"@id":"https:\/\/ziew.online\/index.php\/2025\/04\/11\/drony-i-cyberprzestepstwa\/"},"author":{"name":"Ziew_acz","@id":"https:\/\/ziew.online\/#\/schema\/person\/fb4b16a3abc014b8e9e886d7a57b7bdd"},"headline":"Drony i cyberprzest\u0119pstwa","datePublished":"2025-04-11T10:21:19+00:00","dateModified":"2025-04-11T10:21:20+00:00","mainEntityOfPage":{"@id":"https:\/\/ziew.online\/index.php\/2025\/04\/11\/drony-i-cyberprzestepstwa\/"},"wordCount":878,"commentCount":0,"publisher":{"@id":"https:\/\/ziew.online\/#\/schema\/person\/fb4b16a3abc014b8e9e886d7a57b7bdd"},"image":{"@id":"https:\/\/ziew.online\/index.php\/2025\/04\/11\/drony-i-cyberprzestepstwa\/#primaryimage"},"thumbnailUrl":"https:\/\/ziew.online\/wp-content\/uploads\/2025\/04\/pexels-inmortal-producciones-108299-336232.jpg","keywords":["bezpiecze\u0144stwo","cyberbezpiecze\u0144stwo","drony","inteligentne urz\u0105dzenia"],"articleSection":["Bezpiecze\u0144stwo","Cyberstrefa"],"inLanguage":"pl-PL","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/ziew.online\/index.php\/2025\/04\/11\/drony-i-cyberprzestepstwa\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/ziew.online\/index.php\/2025\/04\/11\/drony-i-cyberprzestepstwa\/","url":"https:\/\/ziew.online\/index.php\/2025\/04\/11\/drony-i-cyberprzestepstwa\/","name":"Drony i cyberprzest\u0119pstwa - ZIEW.ONLINE","isPartOf":{"@id":"https:\/\/ziew.online\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ziew.online\/index.php\/2025\/04\/11\/drony-i-cyberprzestepstwa\/#primaryimage"},"image":{"@id":"https:\/\/ziew.online\/index.php\/2025\/04\/11\/drony-i-cyberprzestepstwa\/#primaryimage"},"thumbnailUrl":"https:\/\/ziew.online\/wp-content\/uploads\/2025\/04\/pexels-inmortal-producciones-108299-336232.jpg","datePublished":"2025-04-11T10:21:19+00:00","dateModified":"2025-04-11T10:21:20+00:00","description":"Drony i cyberprzest\u0119pstwa? Oszem, da si\u0119! Czyli o tym jak przest\u0119pcy wykorzystuj\u0105 te urz\u0105dzenia do wykonywania \"brudnej\" roboty.","breadcrumb":{"@id":"https:\/\/ziew.online\/index.php\/2025\/04\/11\/drony-i-cyberprzestepstwa\/#breadcrumb"},"inLanguage":"pl-PL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ziew.online\/index.php\/2025\/04\/11\/drony-i-cyberprzestepstwa\/"]}]},{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/ziew.online\/index.php\/2025\/04\/11\/drony-i-cyberprzestepstwa\/#primaryimage","url":"https:\/\/ziew.online\/wp-content\/uploads\/2025\/04\/pexels-inmortal-producciones-108299-336232.jpg","contentUrl":"https:\/\/ziew.online\/wp-content\/uploads\/2025\/04\/pexels-inmortal-producciones-108299-336232.jpg","width":600,"height":450,"caption":"Photo by Inmortal Producciones: https:\/\/www.pexels.com\/photo\/drone-flying-against-blue-sky-336232\/"},{"@type":"BreadcrumbList","@id":"https:\/\/ziew.online\/index.php\/2025\/04\/11\/drony-i-cyberprzestepstwa\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Strona g\u0142\u00f3wna","item":"https:\/\/ziew.online\/"},{"@type":"ListItem","position":2,"name":"Drony i cyberprzest\u0119pstwa"}]},{"@type":"WebSite","@id":"https:\/\/ziew.online\/#website","url":"https:\/\/ziew.online\/","name":"ZIEW.ONLINE","description":"Nie prze\u015bpij \u017cycia...","publisher":{"@id":"https:\/\/ziew.online\/#\/schema\/person\/fb4b16a3abc014b8e9e886d7a57b7bdd"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ziew.online\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pl-PL"},{"@type":["Person","Organization"],"@id":"https:\/\/ziew.online\/#\/schema\/person\/fb4b16a3abc014b8e9e886d7a57b7bdd","name":"Ziew_acz","image":{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/ziew.online\/wp-content\/uploads\/2024\/08\/Ziew_logo_mikr_10_www.png","url":"https:\/\/ziew.online\/wp-content\/uploads\/2024\/08\/Ziew_logo_mikr_10_www.png","contentUrl":"https:\/\/ziew.online\/wp-content\/uploads\/2024\/08\/Ziew_logo_mikr_10_www.png","width":378,"height":170,"caption":"Ziew_acz"},"logo":{"@id":"https:\/\/ziew.online\/wp-content\/uploads\/2024\/08\/Ziew_logo_mikr_10_www.png"},"sameAs":["http:\/\/ziew.online","https:\/\/x.com\/https:\/\/twitter.com\/i\/flow\/login?redirect_after_login=Ziew_acz"],"url":"https:\/\/ziew.online\/index.php\/author\/eacecce9ec312ba9\/"}]}},"_links":{"self":[{"href":"https:\/\/ziew.online\/index.php\/wp-json\/wp\/v2\/posts\/6563","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ziew.online\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ziew.online\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ziew.online\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ziew.online\/index.php\/wp-json\/wp\/v2\/comments?post=6563"}],"version-history":[{"count":20,"href":"https:\/\/ziew.online\/index.php\/wp-json\/wp\/v2\/posts\/6563\/revisions"}],"predecessor-version":[{"id":6585,"href":"https:\/\/ziew.online\/index.php\/wp-json\/wp\/v2\/posts\/6563\/revisions\/6585"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ziew.online\/index.php\/wp-json\/wp\/v2\/media\/6583"}],"wp:attachment":[{"href":"https:\/\/ziew.online\/index.php\/wp-json\/wp\/v2\/media?parent=6563"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ziew.online\/index.php\/wp-json\/wp\/v2\/categories?post=6563"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ziew.online\/index.php\/wp-json\/wp\/v2\/tags?post=6563"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}