UK Police Deploy Drone-Jamming Technology at Major Public Events

British police are planning to use sophisticated unmanned aerial vehicle (UAV) detection and jamming technology at major public events at risk of terrorist attack.

The Anti-UAV Defence System (AUDS) was trialed in London during the Remembrance Day ceremonies on 11 November 2015. The London Metropolitan Police reportedly “really liked” the performance of the system.

The AUDS uses cameras to track UAVs, and if the need arises, can within 15 seconds jam the radio signals used to control them.

 “What is reassuring is that this is the security forces getting ahead of the game, so they have defensive measures in place before something actually happens,” said Elizabeth Quintana, a senior research fellow at the Royal United Services Institute (RUSI), a British defence and security think-tank.

Over the last few months concerns have been raised by security specialists that terrorists could employ explosive laden UAVs to attack crowds. ISIS is likely to have already tested the carrying capacity of several drones to find out how much explosives they can carry, and even experimented with detonation devices.

“There is a genuine threat from Islamists wishing to deliver high explosives by drone to crowded areas – the effects could be devastating,” Col Richard Kemp, who has advised the UK Government on terrorism, told The Mirror.

While promising, this solution is not foolproof. Advanced UAVs, of the sort terrorists are likely trying to acquire, can fly and perform missions semi- and fully-autonomously. Further, with some modification UAVs can be made to communicate on frequencies not targeted by the jammer.

To properly ensure that no radio communication with drones is taking place, police would have to jam communications across all radio frequencies. This could have far-reaching unintended consequences, with large masses of people losing all ability to use phones and communicate.

I-HLS: http://bit.ly/1ZGyZDd

« 2016 Cyber Threat - Use To Advantage
2016 Is On The Cusp Of A Machine Revolution »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Synopsys

Synopsys

Synopsys delivers trusted and comprehensive silicon to systems design solutions, from electronic design automation to silicon IP and system verification and validation.

DataLocker

DataLocker

DataLocker offers both hardware based external storage and software based cloud storage encryption solutions.

Absolute IT Asset Disposals

Absolute IT Asset Disposals

Absolute IT Asset Disposals is an IT asset disposal (ITAD) company providing safe and secure recycling of IT assets.

Cyber Security & Cloud Expo

Cyber Security & Cloud Expo

The Cyber Security & Cloud Expo is an international event series in London, Amsterdam and Silicon Valley.

Center for Education & Research in Information Assurance & Security (CERIAS)

Center for Education & Research in Information Assurance & Security (CERIAS)

CERIAS is one of the world’s leading centers for research and education in areas of information and cyber security.

Industrial Defender

Industrial Defender

Committed to ICS Cybersecurity. Industrial Defender provides a fully automated solution to discover, track and report on assets across your ICS footprint.

LTIMindtree

LTIMindtree

LTIMindtree is a new kind of technology consulting firm. We help businesses transform – from core to experience – to thrive in the marketplace of the future.

VLATACOM Institute

VLATACOM Institute

Vlatacom Institute is privately owned accredited research and development institute, system integrator and turn-key solution provider. Areas of expertise include encryption and authentication.

Akito

Akito

Akito was set up to become a point of reference in the ICT market for issues related to Security and in particular Cyber Security.

Wavex Technology

Wavex Technology

Wavex Technology is an award winning IT Services firm offering clients a secure and fully managed IT service.

du

du

du is a telecommunications service provider providing UAE businesses with a vast range of ICT and managed services.

Swish Data Corp.

Swish Data Corp.

Swish delivers when the problems are complex, requirements are difficult, and the mission is absolutely critical.

IPKeys Cyber Partners

IPKeys Cyber Partners

IPKeys Cyber Partners, together with the IPKeys Power Partners unit, provide Cyber Security and CIP Compliance for utilities, grid operators and public safety organization across the USA.

Venticento

Venticento

Venticento is an IT company specialized in consulting and network support and assistance for companies that need to make their business processes more effective.

The Hacking Games

The Hacking Games

The Hacking Games' Mission is to inspire, educate and mobilise a generation of ethical hackers to make the world a safer place.

Digital Technologies Group (DTG)

Digital Technologies Group (DTG)

DTG are a digital transformation company helping process organisations embrace smarter manufacturing through the adoption of industry 4.0 technologies and solutions.