In Demand: New Tech Against Drone Attacks

With the commercialisation of drones, public security and critical infrastructure security have been exposed to, potential drone attacks, thus becoming a major concern for law enforcement services around the globe. Aerial drones are being used by criminal organisations and other hostile elements. 

An Australian company specialising in equipment to counter improvised explosive devices has launched a product that can disable and control drones entering defined air spaces in a bid to increase public safety.

EPE Australia partnered with United States firm, Department 13, to help bring the counter drone capability, known as MESMER, to Australia.

The company’s managing director Warwick Penrose said: “We are seeing criminal activity using drones now for surveillance assets for law enforcement. the bad guys are using drone technology to look at what we are doing and how we are doing it to try and avoid capture.”

“Military organisations worldwide are grappling with this problem of how we can detect and mitigate drones…we are trying to think about ways we can protect the airspace,” he said.

“Certainly for our public safety perspective it is an issue out there for our critical infrastructure such as our airports.” “Co-ordinated drone attacks, that is something we are seeing at airports now, four or five drones working in conjunction with each other.”

Earlier this year, an international criminal syndicate, busted smuggling $30 million worth of cocaine into the Port of Melbourne, attempted to use a drone to make sure their meetings were not being watched by police. The technology, which allows the user to stop, redirect, land or take control of a target drone, was demonstrated to the Australian Defence Force as well as state police forces earlier this year.

“We listen for the signals of the drones and based on what we hear we throw out a couple of packets of data to handshake with the drone and effectively convince the drone to talk to us, to speak to its controller,” he said. “We can detect and mitigate up to five kilometres.”

The technology is different to, other counter drone systems, that use radio jamming or standard electronic mitigation techniques. The platform is low power, it can be operated below one watt, and will not affect non-targeted communications signals, according to an article on the Department of State Development website.

I-HLS

You Might Also Read:

India Cracks Down On Drones:

No Need To Shoot Down Drones – Just Hijack Them:

« Russia’s Digital Weapons Refined Against Ukraine
More Sensitive US Voter Records Leaked »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Synology

Synology

Synology provides high-performance, reliable, and secure Network Attached Storage (NAS) products.

Synopsys

Synopsys

Synopsys is a global leader in electronic design automation and semiconductor IP and is growing its leadership in software quality and security solutions.

Finjan Holdings

Finjan Holdings

Finjan solutions are aimed at keeping the web, networks, and endpoints safe from malicious code and security threats.

Sucuri

Sucuri

Sucuri have offered holistic website security solutions since 2008 including malware removal, malware monitoring and website protection services.

Clavister

Clavister

Clavister is a network security vendor delivering a full range of network security solutions for both physical and virtualized environments.

Beame.io

Beame.io

Beame.io is an information security company that distributes open source authentication infrastructure based on encryption.

Xage Security

Xage Security

Xage is the world’s first blockchain-protected security platform for Industrial IoT.

Hypersecu Information Systems

Hypersecu Information Systems

Hypersecu Information Systems, Inc. is a solution provider dedicated to multi-factor authentication, public key infrastructure and software copyright protection.

Pipeline Security

Pipeline Security

Pipeline Security protects businesses with real-time threat data, threat detection & prevention, continuous cyber security monitoring and security analytics.

Recovery Point Systems

Recovery Point Systems

Recovery Point is a leading national provider of IT secure and compliant infrastructure and business resilience services.

Axio Global

Axio Global

Axio is a leading cyber risk management SaaS company. Our Axio360 platform gives companies visibility to their cyber risk, and enables them to prioritize investments to protect their business.

Trusted Security Solutions (TSS)

Trusted Security Solutions (TSS)

TSS are specialist in IT Security and providing Cybersecurity Solutions & Services combined with storage and backup.

Maxxsure

Maxxsure

Maxxsure provides a platform for executive management, leveraging proprietary technology that identifies, measures, and scores a company’s cyber risks.

VectorRock

VectorRock

Save Your Business From Cyber Criminals. We specialize in uncovering cyber risks which threaten your organization and fixing them.

Ipstack

Ipstack

Ipstack offers one of the leading IP to geolocation APIs and global IP database services worldwide. Protect your site and web application by detecting proxies, crawlers or tor users at first glance.

Intel 471

Intel 471

Intel 471 provides adversary and malware intelligence for leading intelligence, security and fraud teams.