In Demand: New Tech Against Drone Attacks

With the commercialisation of drones, public security and critical infrastructure security have been exposed to, potential drone attacks, thus becoming a major concern for law enforcement services around the globe. Aerial drones are being used by criminal organisations and other hostile elements. 

An Australian company specialising in equipment to counter improvised explosive devices has launched a product that can disable and control drones entering defined air spaces in a bid to increase public safety.

EPE Australia partnered with United States firm, Department 13, to help bring the counter drone capability, known as MESMER, to Australia.

The company’s managing director Warwick Penrose said: “We are seeing criminal activity using drones now for surveillance assets for law enforcement. the bad guys are using drone technology to look at what we are doing and how we are doing it to try and avoid capture.”

“Military organisations worldwide are grappling with this problem of how we can detect and mitigate drones…we are trying to think about ways we can protect the airspace,” he said.

“Certainly for our public safety perspective it is an issue out there for our critical infrastructure such as our airports.” “Co-ordinated drone attacks, that is something we are seeing at airports now, four or five drones working in conjunction with each other.”

Earlier this year, an international criminal syndicate, busted smuggling $30 million worth of cocaine into the Port of Melbourne, attempted to use a drone to make sure their meetings were not being watched by police. The technology, which allows the user to stop, redirect, land or take control of a target drone, was demonstrated to the Australian Defence Force as well as state police forces earlier this year.

“We listen for the signals of the drones and based on what we hear we throw out a couple of packets of data to handshake with the drone and effectively convince the drone to talk to us, to speak to its controller,” he said. “We can detect and mitigate up to five kilometres.”

The technology is different to, other counter drone systems, that use radio jamming or standard electronic mitigation techniques. The platform is low power, it can be operated below one watt, and will not affect non-targeted communications signals, according to an article on the Department of State Development website.

I-HLS

You Might Also Read:

India Cracks Down On Drones:

No Need To Shoot Down Drones – Just Hijack Them:

« Russia’s Digital Weapons Refined Against Ukraine
More Sensitive US Voter Records Leaked »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

HyTrust

HyTrust

HyTrust specialises in security, compliance and control software for virtualization and cloud environments.

Magal Security Systems (Magal S3)

Magal Security Systems (Magal S3)

Magal Security Systems is a leading international provider of integrated solutions and products for physical and cyber security, safety and site management.

ERMProtect

ERMProtect

ERMProtect is a leading Information Security & Training Company that helps businesses improve their cybersecurity posture and comply with regulations.

The Cyber Security Expert

The Cyber Security Expert

The Cyber Security Expert delivers cyber security consultancy, website and cloud security monitoring services, and specialist training services.

Center for Research on Scientific & Technical Information (CERIST)

Center for Research on Scientific & Technical Information (CERIST)

CERIST is a scientific and technical research centre with activities focused in the area of networks, information systems and IT security.

GuardSI

GuardSI

GuardSI was created to protect companies from growing threats to security such as fraud, hacking, internal theft, accidents and human mistakes that can directly affect the business.

Recovery Point Systems

Recovery Point Systems

Recovery Point is a leading national provider of IT secure and compliant infrastructure and business resilience services.

Dellfer

Dellfer

Dellfer secures connected cars and other IOT devices through Intrinsic protection, enabling the most sophisticated cybersecurity attacks to be seen instantly and remediated with precision.

Arctic Wolf Networks

Arctic Wolf Networks

Arctic Wolf Networks delivers the industry-leading security operations center (SOC)-as-a-service that redefines the economics of cybersecurity.

HENSOLDT Cyber

HENSOLDT Cyber

HENSOLDT Cyber introduces a paradigm shift to cyber security. Our products have been designed to ensure the integrity of embedded systems at the core: the operating system and the processor.

HolistiCyber

HolistiCyber

HolistiCyber provide state-of-the art consulting, services, and solutions to help proactively and holistically defend against a new era of constantly evolving cyber threats.

Green Enterprise Solutions

Green Enterprise Solutions

Green Enterprise Solutions are a Namibian company providing Information and Communication Technology (ICT) services to corporate Namibia.

Trustaira

Trustaira

Trustaira is the first deep tech solution and service company in Bangladesh.

Awareness Software Limited (ASL)

Awareness Software Limited (ASL)

As Hosting Specialists, Awareness Software offer practical and affordable hosting solutions including backup and disaster recovery and a range of cybersecurity services.

SPYROS Information & Technology Consulting

SPYROS Information & Technology Consulting

SPYROS specializes in providing highly qualified professionals in Computer Network Operations, Signals Intelligence, Technical Training and Certifications, Network Administration and Security.

LMNTRIX

LMNTRIX

LMNTRIX eliminates the complexity and burden of cyber security for organizations struggling to prepare for, prevent and respond to cyberattacks.