UK Police Deploy Drone-Jamming Technology at Major Public Events

British police are planning to use sophisticated unmanned aerial vehicle (UAV) detection and jamming technology at major public events at risk of terrorist attack.

The Anti-UAV Defence System (AUDS) was trialed in London during the Remembrance Day ceremonies on 11 November 2015. The London Metropolitan Police reportedly “really liked” the performance of the system.

The AUDS uses cameras to track UAVs, and if the need arises, can within 15 seconds jam the radio signals used to control them.

 “What is reassuring is that this is the security forces getting ahead of the game, so they have defensive measures in place before something actually happens,” said Elizabeth Quintana, a senior research fellow at the Royal United Services Institute (RUSI), a British defence and security think-tank.

Over the last few months concerns have been raised by security specialists that terrorists could employ explosive laden UAVs to attack crowds. ISIS is likely to have already tested the carrying capacity of several drones to find out how much explosives they can carry, and even experimented with detonation devices.

“There is a genuine threat from Islamists wishing to deliver high explosives by drone to crowded areas – the effects could be devastating,” Col Richard Kemp, who has advised the UK Government on terrorism, told The Mirror.

While promising, this solution is not foolproof. Advanced UAVs, of the sort terrorists are likely trying to acquire, can fly and perform missions semi- and fully-autonomously. Further, with some modification UAVs can be made to communicate on frequencies not targeted by the jammer.

To properly ensure that no radio communication with drones is taking place, police would have to jam communications across all radio frequencies. This could have far-reaching unintended consequences, with large masses of people losing all ability to use phones and communicate.

I-HLS: http://bit.ly/1ZGyZDd

« 2016 Cyber Threat - Use To Advantage
2016 Is On The Cusp Of A Machine Revolution »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Crypta Labs

Crypta Labs

Crypta Labs is an Award Winning IOT Security startup that is developing a quantum-based encryption chip to secure the Internet of Things.

Global Security Network (GSN)

Global Security Network (GSN)

GSN focuses on specialized IT Security solutions & services for the military, law enforcement, critical infrastructure and oil & gas sectors in the Middle East.

Temasoft

Temasoft

TEMASOFT is a software company focused on developing security and infrastructure products.

Total Cyber-Sec

Total Cyber-Sec

Total Cyber-Sec is a company specialized in providing Professional Information Security and Cybersecurity Services.

Red4Sec

Red4Sec

Red4Sec are experts in ethical hacking, audits of web and mobile applications, code audits, cryptocurrency audits, perimeter security and incident response.

Navixia

Navixia

As a leading Swiss IT security specialist, Navixia offers a global and pragmatic approach to information security.

Cyber Defence Solutions (CDS)

Cyber Defence Solutions (CDS)

Cyber Defence Solutions is a cyber and privacy Consultancy with extensive experience in the development and implementation of cyber and data security solutions to your assets.

Avancer Corporation

Avancer Corporation

Avancer Corporation is a multi-system integrator focusing on Identity and Access Management (IAM) Technology. Founded in 2004.

Viettel Cyber Security

Viettel Cyber Security

Viettel Cyber Security is an organization under the Military Telecommunication Industry Group, conducting research and developing information security solutions for domestic and foreign customers.

Sotero

Sotero

Sotero is the first cloud-native, zero trust data security platform that consolidates your entire security stack into one easy-to-manage environment.

rSolutions

rSolutions

rSolutions delivers managed cybersecurity services to clients in many industry sectors including financial services, telecommunications, energy, government and retail.

HWG Sababa

HWG Sababa

HWG Sababa is a cybersecurity provider that offers a comprehensive suite of strategic managed security solutions, services, and consultancy.

Tychon

Tychon

Tychon develops advanced enterprise endpoint management technology that enables commercial and government organizations to bridge the gap between security and IT operations.

Manifest

Manifest

Manifest is a cybersecurity company dedicated to helping enterprises secure their software supply chains.

Inroad Technologies

Inroad Technologies

Inroad Technologies provide IT services that help keep your business computers, servers and networks secure and trouble-free.

AC3

AC3

AC3 is a leading secure cloud services provider, focused on turning your technology challenges into real results.