The purpose of the research is identification of organizational and technical methods of countering attacks on command and telemetry data transmission lines between aviation robotic devices and ground control points, as well as the formation of comprehensive information protection of the communication channels under consideration.Methods. The scientific article substantiates methods for mitigating and countering attacks at the physical level of the ISO/OSI open systems interaction model for organizing communication using the MAVLINK protocol for the purpose of controlling aviation robotic devices (noise-resistant coding with a high code rate (using the example of the most common code - Viterbi), extension method Frequency Hopping Spectrum (FHSS), Direct Sequence Spread Spectrum (DSSS), Multiple Input Multiple Output (MIMO) technology). A method for organizing the selection of protection and countermeasures when controlling aviation robotic devices is outlined, which consists of assessing the risks and consequences of the implementation of vulnerabilities in order to introduce countermeasures there and in such quantities that they have the greatest benefit.Results. The article discusses the main possibilities for intentional interference on the control and data transmission channels of consumer aviation robotic devices, an algorithm for assessing the risk of "leaving the route" is considered; a risk assessment option is provided in relation to the risk of an aircraft going off route, indicating the name of the attack, its likelihood, impact and resulting risk, as well as the acceptability of this risk and recommendations regarding the urgency of mitigating it; recommendations for countermeasures are presented in accordance with the acceptability of likelihood and impact; describes the relationship between risk and countermeasures used to reduce unauthorized exposure, in accordance with weighting coefficients.Conclusion. The scientific article discusses the main methods of countering attacks and unauthorized access when controlling autonomous robotic devices. The risk coefficients of attacks and countermeasures taken are considered.