Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementPhysicalSecurity NewswireTechnologies & SolutionsSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecurityPhysical SecurityVideo SurveillanceCybersecurity News

Amazon unveils "flying camera" that launches if intrusions are detected

By Maria Henriquez
amazon ring

Amazon's Ring latest home security camera — the new Always Home Cam. Image courtesy of Amazon

September 28, 2020

Amazon's smart home security division Ring has unveiled a flying camera that launches if sensors detect a potential home break-in. It is designed to activate only when residents are out, works indoors, and is limited to one floor of a building.

According to an Amazon blog, this autonomous indoor security camera flies an user's chosen, personalized paths so that users can easily check in on their home for peace of mind — like whether someone left a window open or forgot to turn the stove off.

The Ring Always Home Cam also integrates with Ring Alarm — Ring's home security system. When Ring Alarm is triggered while in Away Mode, the Always Home Cam will automatically fly a set path to see what’s happening. Users will be able to stream video while the camera is in-flight via the Ring App, making sure that users are aware of what is happening at home.

Amazon says the autonomous indoor security camera was developed with "privacy and security" in mind. They note the device rests in the base and the camera is physically blocked when docked. The camera will only start recording when the device leaves the base and starts flying via one of the preset paths. Obstacle avoidance technology in the device allows it to avoid unexpected objects as it moves on the pre-set paths, and its small size, lightweight design and shrouded propellers enable it to move safely throughout the home, Amazon claims. 

Cybersecurity professionals, however, raise questions and concerns over the device's privacy. 

“Smart home devices, such as Ring, collect an inordinate amount of sensitive personal data in real time – this is typically transmitted to a cloud service for processing. A critical question is who has access to the data collected by the device, and whether it is processed and stored in a lawful manner that protects personal data from unauthorized use," says Emma Bickerstaffe, Senior Research Analyst at the Information Security Forum, a London-based authority on cyber, information security and risk management.

"A privacy concern raised by existing smart home devices is the ability to take the personal data captured by sensor technology and together with connections to devices, identify patterns in an individual’s daily routine and build a comprehensive, digital picture of their activities. The ability for Ring to conduct private videoing within an household exponentially accelerates the ability for organizations to track individuals’  daily life, habits and preferences, and use this information for commercial gain."

Rick Holland, Chief Information Security Officer, Vice President Strategy at Digital Shadows, a San Francisco-based provider of digital risk protection solutions, also notes that for privacy advocates, the concept of an untethered IoT device surveilling the house is disturbing. "Coupled with Ring's controversial privacy practices, the adoption of the drone could be low. However, those that have already embraced the concept of in-house security cameras are likely to be excited. The prospect of having a single drone monitor your house instead of multiple individual cameras could be alluring," Holland explains.

Joseph Carson, chief security scientist at Thycotic, a Washington D.C. based provider of privileged access management (PAM) solutions, claims that the responsibility of drones falls on both manufacturers and regulators within countries to ensure that they meet minimum safety specifications preventing them from being easily abused. "Moving forward, drones should require a basic safety requirement, registration or automatic prevention from flying in certain areas that require a code to unlock, which is of course pre-registered,” Carson adds. 

"Close attention should be paid to the security controls adopted by Ring. Cybercriminals are already maximizing the opportunity to exploit vulnerabilities in smart home devices as a stepping stone to target the network on which these devices are installed. Now that much of the world is currently working from home, smart home devices play even more to the advantage of cyber attackers, presenting an attractive way for adversaries to access and compromise valuable business information,” Bickerstaffe says.

Holland adds, "For those that do opt for the security drone, the proper configuration will be critical to minimize security and privacy risks as much as possible. Consumers must enable multi-factor authentication and automatic software updates to ensure that any vulnerabilities are quickly resolved.”

KEYWORDS: Amazon drones privacy security cameras surveillance

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Maria Henriquez is a former Associate Editor of Security. She covered topics including cybersecurity and physical security, risk management and more.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Get Your Water Bottle in Hand When Flying Again, If You Fly Out of Europe in 2013

    See More
  • edu7-900px.jpg

    NYC Mayor Unveils Plan that Places Restrictions on In and Out of School Arrests

    See More
  • Using IoT security devices to get more value at your enterprise

    If IoT devices are being cyber-certified, why aren’t mobile applications?

    See More

Related Products

See More Products
  • Risk Analysis and the Security Survey, 4th Edition

  • The Database Hacker's Handboo

  • 9780367667887.jpg

    Surveillance, Privacy and Security

See More Products

Events

View AllSubmit An Event
  • February 8, 2012

    2-Day AXIS Camera Station

    AXIS Camera Station training is an introduction course developed for salespersons and system designers. The course will give you the skills you need to successfully deploy and manage a small to mid-size video surveillance system. The training is carried out through a mix of presentations and hands-on exercises.
  • March 22, 2012

    2-Day Advanced AXIS Camera Station Training

    AXIS Camera Station training is an introduction course developed for salespersons and system designers.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing