UK Police Deploy Drone-Jamming Technology at Major Public Events

British police are planning to use sophisticated unmanned aerial vehicle (UAV) detection and jamming technology at major public events at risk of terrorist attack.

The Anti-UAV Defence System (AUDS) was trialed in London during the Remembrance Day ceremonies on 11 November 2015. The London Metropolitan Police reportedly “really liked” the performance of the system.

The AUDS uses cameras to track UAVs, and if the need arises, can within 15 seconds jam the radio signals used to control them.

 “What is reassuring is that this is the security forces getting ahead of the game, so they have defensive measures in place before something actually happens,” said Elizabeth Quintana, a senior research fellow at the Royal United Services Institute (RUSI), a British defence and security think-tank.

Over the last few months concerns have been raised by security specialists that terrorists could employ explosive laden UAVs to attack crowds. ISIS is likely to have already tested the carrying capacity of several drones to find out how much explosives they can carry, and even experimented with detonation devices.

“There is a genuine threat from Islamists wishing to deliver high explosives by drone to crowded areas – the effects could be devastating,” Col Richard Kemp, who has advised the UK Government on terrorism, told The Mirror.

While promising, this solution is not foolproof. Advanced UAVs, of the sort terrorists are likely trying to acquire, can fly and perform missions semi- and fully-autonomously. Further, with some modification UAVs can be made to communicate on frequencies not targeted by the jammer.

To properly ensure that no radio communication with drones is taking place, police would have to jam communications across all radio frequencies. This could have far-reaching unintended consequences, with large masses of people losing all ability to use phones and communicate.

I-HLS: http://bit.ly/1ZGyZDd

« 2016 Cyber Threat - Use To Advantage
2016 Is On The Cusp Of A Machine Revolution »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Veracode

Veracode

Veracode delivers the most widely used cloud-based platform for securing web, mobile, legacy and third-party enterprise applications.

RPC

RPC

RPC is a business law firm. Practice areas include technology and cyber risk.

Cymbel

Cymbel

Cymbel provides businesses and government agencies with the tools and expertise they need to manage the most complex security and compliance challenges.

Centurion Information Security

Centurion Information Security

Centurion Information Security is a consulting firm based in Singapore that specialises in penetration testing and security assessment services.

NITA Uganda (NITA-U)

NITA Uganda (NITA-U)

NITA-U has put in place the Information security framework to provide Uganda with the necessary process, policies, standards and guideline to help in Information Assurance.

Cyber Threat Alliance

Cyber Threat Alliance

CTA is working to improve cybersecurity of our digital ecosystem by enabling near real-time cyber threat information sharing among companies and organizations in the cybersecurity field.

BLOCKO

BLOCKO

BLOCKO is a blockchain specialized technology company that has experienced and achieved the largest amount of business in South Korea.

IntelligInts

IntelligInts

IntelligInts provide 24×7 threat monitoring, hunting, alerting, and mitigation in our world class Security Operations Center.

HacWare

HacWare

HacWare is a data driven cybersecurity awareness product that leverages machine learning and behavior analytics help IT professionals combat phishing.

Athreon

Athreon

Athreon utilizes a fusion of AI technology, human interpretation, and the latest in cybersecurity to deliver sound business solutions that help our clients make better data-driven decisions.

SideChannel

SideChannel

At SideChannel, we match companies with an expert virtual CISO (vCISO), so your organization can assess cyber risk and ensure cybersecurity compliance.

Northrop Grumman

Northrop Grumman

Northrop Grumman is a global provider and integrator of complex, advanced and rapidly adapting information technology, cybersecurity, mobility and optimized services and solutions.

AWARE7

AWARE7

IT security for human and machine. With the help of our products and services, we work with you to increase the IT security level of your organization.

NetHope

NetHope

NetHope is a membership-based organization serving the international nonprofit humanitarian, development, and conservation sector through digital transformation.

Security Compliance Associates (SCA)

Security Compliance Associates (SCA)

The sole focus of SCA is safeguarding critical information and complying with information security regulations.

Zafran

Zafran

Zafran is a Risk & Mitigation Platform that defuses threat exploitation by mobilizing existing security tools.