India Cracks Down On Drones

India will upgrade its airports and airstrips in view of the constant threat from terror groups.

The security of 43 unused airports and 355 airstrips in the India will be enhanced with the Home Ministry planning to review their vulnerability from terror attacks and drones.

The move comes after security agencies carried out a nation-wide security audit of unused airports and airstrips considering the possibility of terrorists using remote airports to carry out terror attacks.

Of the 355 airstrips, around 100 belong to the Indian Air Force while around 60 are private. The rest are owned by either central or state governments, paramilitary forces, army or navy.

Home ministry officials said the security threat arises from the unregulated operation of microlight aircraft, powered hang-gliders, hot air balloons, paragliders and Unmanned Aerial Vehicles or drones.

The central government has been sensitising state governments regularly that such flying objects must not intrude into the air space beyond the authorised licensed area of operation and that such unregulated adventure flying needs proper monitoring.

The home ministry is also stressing that authorised users should not be allowed to carry any weapon or photography/video recording equipment while operating the microlight aircraft, hang gliders or hot air balloons.

However, another official said, in the absence of a formal policy for low flying objects, buying and selling and flying drones is largely going without monitoring.

According to timesofoman.com, the Civil Aviation Ministry is expected to come out with a drone or UAV policy soon to regulate their flight.

In December 2015, Union Home Secretary Rajiv Mehrishi had said the government is preparing to deal with threats from “rogue elements” who could carry out terror attacks using low flying objects.

Mehrishi had said there was a need to regulate UAVs to prevent their misuse in sensitive areas like airports. But, he said, the government is looking at dual aspects of enabling features like licensing it for its use on the borders as well as in guarding vital installations inside the country and disaster relief works.

The policy should have preventive features to ensure that there is no misuse by terrorist groups or other anti-national elements, he had said. Currently, there are 98 functional airports in the country of which 59 are under security cover of the Central Industrial Security Force (CISF).

I-HLS

You Might Also Read: 

Drones, Satellites And Cyber Warfare:

Drones: The Looming Threat:

 

 

« Spy Chiefs Set Sights On AI And Cyber
Put Your Physical Security Into The Cloud »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Maureen Data Systems (MDS)

Maureen Data Systems (MDS)

Our mission at Maureen Data Systems is to digitally transform business environments with the use of cloud infrastructure, security and privacy controls, data analytics, and managed services.

EclecticIQ

EclecticIQ

EclecticIQ is a global provider of threat intelligence, hunting and response technology and services.

Ground Labs

Ground Labs

Ground Labs is a security software company dedicated to making sensitive data discovery products that help organisations prevent sensitive data loss.

MNCERT/CC

MNCERT/CC

MNCERT/CC is the national Computer Emergency Response Team for Mongolia.

IABG

IABG

IABG offer independent, product-neutral consulting as well as technical and scientific services for the use of safety-relevant systems and technologies.

Open Information Security Foundation (OISF)

Open Information Security Foundation (OISF)

OISF is a non-profit organization led by world-class security experts, programmers, and others dedicated to open source security technologies.

Cybersecurity Collaborative

Cybersecurity Collaborative

CyberSecurity Collaborative is a forum for CISOs to share information that will collectively make us stronger, and better equipped to protect our enterprises from those seeking to damage them.

Sonda

Sonda

SONDA is the leading systems integrator and IT service provider in Latin America.

GulfTalent

GulfTalent

GulfTalent is the leading job site for professionals in the Middle East and Gulf region covering all sectors and job categories, including cybersecurity.

Zerodium

Zerodium

Zerodium is the leading exploit acquisition platform for premium zero-days and advanced cybersecurity research.

Cobalt Iron

Cobalt Iron

Cobalt Iron is a global leader in SaaS-based enterprise backup and data protection technology.

CounterFind

CounterFind

CounterFind is turnkey technology that allows brands to find and remove counterfeit and infringing merchandise from online marketplaces and social media sites.

Cisco Networking Academy

Cisco Networking Academy

Cisco Networking Academy is the world's largest classroom, bringing technology education, 21st-century skills, and improved jobs prospects since 1997.

Oxford Internet Institute - University of Oxford

Oxford Internet Institute - University of Oxford

The Oxford Internet Institute is a multidisciplinary research and teaching department of the University of Oxford, dedicated to the social science of the Internet.

Team Secure

Team Secure

Team Secure provide Enterprise-grade Cyber Security consultancy, managed security services and cyber security staffing services.

Avocado Consulting

Avocado Consulting

Avocado helps clients deliver with certainty on their complex IT change, with technology services that automate, monitor and optimise.