Drones Interrupt International Flights

London's Metropolitan police and the British military are helping Heathrow Airport management after a drone was sighted at the Airport. Flights from Heathrow West were suspended for an hour, before resuming later in the day. 

The drone was sighted just before 5pm on Tuesday 8th January. Some  police officers from other forces have suggested that the earlier Gatwick Airport shutdown was due to misuse by Sussex police of their own drones. although  Sussex Police deny the allegation. Sussex have five Aeyyon SkyRangers that have cameras and cost £64k.

Gatwick Airport has recently spent almost £5m on anti-drone apparatus after the airport had to shut down because of drones being reported around the airfield and Heathrow has said it has also now got the equipment to help control visiting drones.

Heathrow Airport said: “The safety of our passengers and colleagues remains our top priority. Working closely with relevant authorities including the  Police, we are constantly looking at the best technologies that help remove the threat of drones.”

The UK government has legislation which attempts to stop drones from flying 400ft above or within 1km of all airports. However, legislation ensuring drone owners register and take safety tests does not come into action until November 2019.

Gatwick previously had a near-drone collision with an aircraft in July 2017. An investigation found that the drone “was endangering other aircraft at that location and altitude” and that “a definite risk of collision had existed”.

Gatwick Airport has put forward a £50,000 reward, through Crimestoppers, and another £10,000 has been put up by the charity's chairman Lord Ashcroft to catch the culprits responsible for the drone problem, which affected 140,000 passengers and meant travelling was shut down.

News by CSI:

You Might Also Read: 

Munich Airport Receives Accreditation For Cybersecurity Training:

The Cyber Threat To Airports:

« Cybersecurity In Israel
Cybersecurity Threats In 2019 »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

EfficientIP

EfficientIP

EfficientIP helps organizations drive business efficiency through agile, secure and reliable network infrastructures.

FAMOC

FAMOC

FAMOC is an enterprise mobile management solution that delivers comprehensive security and management for applications, documents, email, and mobile devices.

Israel National Cyber Directorate (INCD)

Israel National Cyber Directorate (INCD)

The Israel National Cyber Directorate is the national security and technological agency responsible for defending Israel’s national cyberspace and for establishing and advancing Israel’s cyber power.

Communications Security Establishment (CSE) - Canada

Communications Security Establishment (CSE) - Canada

CSE is Canada's national cryptologic agency, providing the Government of Canada with IT Security and foreign signals intelligence (SIGINT) services.

KOS-CERT

KOS-CERT

KOS-CERT is the national Computer Incident Response Team for Kosovo.

IEEE Cyber Science and Technology Congress (CyberSciTech)

IEEE Cyber Science and Technology Congress (CyberSciTech)

CyberSciTech provides a platform for scientists, researchers, and engineers to share their latest ideas and advances in the broad scope of cyber-related science, technology, and application topics.

CSC Digital Brand Services

CSC Digital Brand Services

Our brand protection and security expertise give our customers peace of mind that no matter how fast the digital world changes, their intellectual property and digital assets will be secure.

InfusionPoints

InfusionPoints

InfusionPoints is your independent trusted partner dedicated to assisting you in building your secure and compliant business solutions.

Tenet3

Tenet3

Tenet3's vision is to make optimal cyber strategy development tractable, data driven, with concrete success metrics. The result is cost effective cyber resilience for our customers.

HashDit

HashDit

HashDit products and services focus on helping build a safe ecosystem for both protocol users and smart contract developers on BNB Chain.

Techmentum

Techmentum

At Techmentum, our mission is to utilize technology to help companies succeed. Our expertise includes fully managed IT services, cybersecurity, cloud, and custom technology solutions.

Transatlantic Cyber Security Business Network

Transatlantic Cyber Security Business Network

The Transatlantic Cyber Security Business Network is a coalition of UK and US cyber security companies which facilitates collaboration to help address critical cyber security challenges.

ThreatER

ThreatER

ThreateER (formerly ThreatBlockr / Bandura Cyber) is a cybersecurity platform that provides active network defense by automating the discovery, enforcement, and analysis of cyber threats at scale.

42Crunch

42Crunch

42Crunch provides API security testing and threat protection. We proactively test, fix and protect your APIs from development to runtime.

Zeus Cloud

Zeus Cloud

Zeus Cloud provide clients with world-class web hosting services to businesses both big and small.

Entitle

Entitle

Entitle's SaaS-based platform automates how permissions are managed, enabling organizations to eliminate bottlenecks and implement robust cloud least privilege access.