UK Police Deploy Drone-Jamming Technology at Major Public Events

British police are planning to use sophisticated unmanned aerial vehicle (UAV) detection and jamming technology at major public events at risk of terrorist attack.

The Anti-UAV Defence System (AUDS) was trialed in London during the Remembrance Day ceremonies on 11 November 2015. The London Metropolitan Police reportedly “really liked” the performance of the system.

The AUDS uses cameras to track UAVs, and if the need arises, can within 15 seconds jam the radio signals used to control them.

 “What is reassuring is that this is the security forces getting ahead of the game, so they have defensive measures in place before something actually happens,” said Elizabeth Quintana, a senior research fellow at the Royal United Services Institute (RUSI), a British defence and security think-tank.

Over the last few months concerns have been raised by security specialists that terrorists could employ explosive laden UAVs to attack crowds. ISIS is likely to have already tested the carrying capacity of several drones to find out how much explosives they can carry, and even experimented with detonation devices.

“There is a genuine threat from Islamists wishing to deliver high explosives by drone to crowded areas – the effects could be devastating,” Col Richard Kemp, who has advised the UK Government on terrorism, told The Mirror.

While promising, this solution is not foolproof. Advanced UAVs, of the sort terrorists are likely trying to acquire, can fly and perform missions semi- and fully-autonomously. Further, with some modification UAVs can be made to communicate on frequencies not targeted by the jammer.

To properly ensure that no radio communication with drones is taking place, police would have to jam communications across all radio frequencies. This could have far-reaching unintended consequences, with large masses of people losing all ability to use phones and communicate.

I-HLS: http://bit.ly/1ZGyZDd

« 2016 Cyber Threat - Use To Advantage
2016 Is On The Cusp Of A Machine Revolution »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

securitycurrent

securitycurrent

Security Current's proprietary content and events provide insight, actionable advice and analysis giving executives the latest information to make knowledgeable decisions.

ODVA

ODVA

ODVA is a global trade and standards development organization whose members comprise the world’s leading industrial automation companies.

Entersekt

Entersekt

Entersekt is an innovator in push-based authentication and app security.

Securely

Securely

Securely Ltd. is an IT consulting and services firm specializing in PKI solutions and products.

StackRox

StackRox

StackRox delivers a container-native security platform that adapts detection and response to new threats.

Ekran System

Ekran System

Ekran System is an advanced insider threat detection solution for companies of any size.

CyPhyCon

CyPhyCon

CyPhyCon is an annual event exploring threats and solutions to cyber attacks on cyber-physical systems such as industrial control systems, Internet of Things and Industrial Internet of Things.

Nemko

Nemko

Nemko offers testing, inspection, and certification services worldwide, mainly concerning products and systems, but also for machinery, installations, and personnel.

Privakey

Privakey

Transaction Intent Verification. Privakey delivers a secure channel to streamline high risk transactions, enabling digital trust between services and their users.

NetBlocks

NetBlocks

NetBlocks is a global internet monitor working at the intersection of digital rights, cyber-security and internet governance.

Moore ClearComm

Moore ClearComm

Moore ClearComm is part of Moore Kingston Smith a leading UK firm of accountants and business advisers. Our services include Data Privacy, Cyber Security, Business Continuity and Information Security.

Hawk AI

Hawk AI

Hawk AI’s mission is to help financial institutions detect financial crime more effectively and efficiently using AI to enhance rules and find anomalies.

iNovex

iNovex

iNovex is a community of innovators that work together to solve hard problems. We partner with you to meet problems head-on and push boundaries with technology solutions.

Reaktr.ai

Reaktr.ai

Reaktr.ai is founded on the vision of using AI as a catalyst to propel industries into a future where we redefine what's possible. Fortify your cybersecurity defense with our AI-powered platform.

Tracebit

Tracebit

Tracebit uses decoys to detect and respond to cloud intrusions in minutes.

Nothreat

Nothreat

Nothreat has revolutionized how businesses like yours protect themselves from damaging cyber attacks. Our tech learns and adapts in real time, protecting clients from even zero-day attacks.