India Cracks Down On Drones

India will upgrade its airports and airstrips in view of the constant threat from terror groups.

The security of 43 unused airports and 355 airstrips in the India will be enhanced with the Home Ministry planning to review their vulnerability from terror attacks and drones.

The move comes after security agencies carried out a nation-wide security audit of unused airports and airstrips considering the possibility of terrorists using remote airports to carry out terror attacks.

Of the 355 airstrips, around 100 belong to the Indian Air Force while around 60 are private. The rest are owned by either central or state governments, paramilitary forces, army or navy.

Home ministry officials said the security threat arises from the unregulated operation of microlight aircraft, powered hang-gliders, hot air balloons, paragliders and Unmanned Aerial Vehicles or drones.

The central government has been sensitising state governments regularly that such flying objects must not intrude into the air space beyond the authorised licensed area of operation and that such unregulated adventure flying needs proper monitoring.

The home ministry is also stressing that authorised users should not be allowed to carry any weapon or photography/video recording equipment while operating the microlight aircraft, hang gliders or hot air balloons.

However, another official said, in the absence of a formal policy for low flying objects, buying and selling and flying drones is largely going without monitoring.

According to timesofoman.com, the Civil Aviation Ministry is expected to come out with a drone or UAV policy soon to regulate their flight.

In December 2015, Union Home Secretary Rajiv Mehrishi had said the government is preparing to deal with threats from “rogue elements” who could carry out terror attacks using low flying objects.

Mehrishi had said there was a need to regulate UAVs to prevent their misuse in sensitive areas like airports. But, he said, the government is looking at dual aspects of enabling features like licensing it for its use on the borders as well as in guarding vital installations inside the country and disaster relief works.

The policy should have preventive features to ensure that there is no misuse by terrorist groups or other anti-national elements, he had said. Currently, there are 98 functional airports in the country of which 59 are under security cover of the Central Industrial Security Force (CISF).

I-HLS

You Might Also Read: 

Drones, Satellites And Cyber Warfare:

Drones: The Looming Threat:

 

 

« Spy Chiefs Set Sights On AI And Cyber
Put Your Physical Security Into The Cloud »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

ASU Online - Information Technology Program

ASU Online - Information Technology Program

The Information Technology program at ASU Online provides you with the expertise to design, select, implement and administer computer-based information solutions.

Optimal IdM

Optimal IdM

Optimal IdM is a leading global provider of identity management solutions and services.

Bit4id

Bit4id

Bit4id provides software and systems for security and identification based on PKI technology.

EdgeWave

EdgeWave

EdgeWave provides simple but highly effective data security and advanced threat protection in solutions that are affordable, scalable and easy to use.

ThreatAdvice

ThreatAdvice

ThreatAdvice is a provider of cybersecurity education, awareness and threat intelligence.

Exeon Analytics

Exeon Analytics

Exeon Analytics is a Swiss cyber security company that is specialized in detecting hidden data breaches and advanced cyber attacks.

SecuLetter

SecuLetter

SecuLetter is able to detect unknown attacks with hybrid approaches, static and dynamic analysis.

INFRA Security & Vulnerability Scanner

INFRA Security & Vulnerability Scanner

INFRA is a powerful platform with an easy interface for any kind of Ethical Hacking, from corporate monitoring and VAPT (vulnerability assessments and penetration testing) to military intelligence.

IT Acceleration

IT Acceleration

IT Acceleration is a full-service IT management and support, IT compliance and Digital Forensics company.

Green Radar

Green Radar

Green Radar is a next generation cybersecurity company which combines technologies and services together to deliver Threat Detection for Emails and Deep Threat Analytics and Response.

Unified Solutions

Unified Solutions

Unified Solutions provide a full continuum of cyber security services, compliance, and technology solutions.

Darknone Global

Darknone Global

Darknone is a consortium of elite hackers and security leaders united by an unbridled passion for augmenting the security of the digital realm.

Corona IT Solutions

Corona IT Solutions

At Corona IT Solutions, our team of specialists in networking, wireless and VoIP are dedicated to providing proactive monitoring and management of your IT systems.

MIS Solutions

MIS Solutions

MIS Solutions is a managed cloud and IT security partner making technology work for you.

ZEST Security

ZEST Security

The ZEST platform natively integrates into your technology stack to make efficient risk remediation possible.

XY Cyber

XY Cyber

XY Cyber enable Generative AI for Cyber Operations. We simplify the complex world of cyber threats into actionable strategies, empowering your defense with AI-powered solutions.