In Demand: New Tech Against Drone Attacks

With the commercialisation of drones, public security and critical infrastructure security have been exposed to, potential drone attacks, thus becoming a major concern for law enforcement services around the globe. Aerial drones are being used by criminal organisations and other hostile elements. 

An Australian company specialising in equipment to counter improvised explosive devices has launched a product that can disable and control drones entering defined air spaces in a bid to increase public safety.

EPE Australia partnered with United States firm, Department 13, to help bring the counter drone capability, known as MESMER, to Australia.

The company’s managing director Warwick Penrose said: “We are seeing criminal activity using drones now for surveillance assets for law enforcement. the bad guys are using drone technology to look at what we are doing and how we are doing it to try and avoid capture.”

“Military organisations worldwide are grappling with this problem of how we can detect and mitigate drones…we are trying to think about ways we can protect the airspace,” he said.

“Certainly for our public safety perspective it is an issue out there for our critical infrastructure such as our airports.” “Co-ordinated drone attacks, that is something we are seeing at airports now, four or five drones working in conjunction with each other.”

Earlier this year, an international criminal syndicate, busted smuggling $30 million worth of cocaine into the Port of Melbourne, attempted to use a drone to make sure their meetings were not being watched by police. The technology, which allows the user to stop, redirect, land or take control of a target drone, was demonstrated to the Australian Defence Force as well as state police forces earlier this year.

“We listen for the signals of the drones and based on what we hear we throw out a couple of packets of data to handshake with the drone and effectively convince the drone to talk to us, to speak to its controller,” he said. “We can detect and mitigate up to five kilometres.”

The technology is different to, other counter drone systems, that use radio jamming or standard electronic mitigation techniques. The platform is low power, it can be operated below one watt, and will not affect non-targeted communications signals, according to an article on the Department of State Development website.

I-HLS

You Might Also Read:

India Cracks Down On Drones:

No Need To Shoot Down Drones – Just Hijack Them:

« Russia’s Digital Weapons Refined Against Ukraine
More Sensitive US Voter Records Leaked »

Directory of Suppliers

ENTWRX

ENTWRX

We set the benchmark in secure mobile communications.The team that devised the world's most secure and widely shipped mobile technology is now bringing you more ground breaking innovations.

Resilience Jobs

Resilience Jobs

The only job board dedicated to jobs in risk, security, guarding, health and safety, fraud, BCM, disaster recovery, cyber, information security, audit

RSA

RSA

RSA provide cybersecurity products for Threat Detection and Response, Identity and Access Management, Governance, Risk and Compliance, Fraud Prevention

BlueCat Networks

BlueCat Networks

BlueCat provides software to automate, manage and secure your network.

ID-SIRTII/CC

ID-SIRTII/CC

Security Incident Response Team for Internet Infrastructure in Indonesia.

Cyber Together

Cyber Together

Cyber Together is dedicated to advancing the cyber security industry by giving businesses access to Israel’s leaders, innovators and great minds in the field of cyber security.

Camouflage

Camouflage

Camouflage are pioneers in the field of data masking and provide patented technologies/products and expert services in this field.

MSAB

MSAB

MSAB is a pioneer in forensic technology for mobile device examination.

Oceansblue

Oceansblue

Oceansblue provides secure data and asset management solutions.

ASU Online - Information Technology

ASU Online - Information Technology

The Information Technology program at ASU Online provides you with the expertise to design, select, implement and administer computer-based information solutions.

Osirium

Osirium

Osirium's Privileged Access Management addresses security and compliance requirements by defining who gets access to what and when.

PCI Tutor

PCI Tutor

PCI Tutor delivers cost effective e-learning courses for people needing to understand the PCI Data Security Standard.

OmniNet

OmniNet

OmniNet delivers the next generation of cybersecurity and is the only provider in the market to move the edge of small businesses to a virtual, omnipresent perimeter.

TowerSec Automotive Cyber Security

TowerSec Automotive Cyber Security

TowerSec Automotive Cyber Security is a leading global solution vendor, specializes in delivering on-board cyber security software products.

Seltek Technology Solutions

Seltek Technology Solutions

Seltek provides Digital Forensics, eDiscovery, Cybersecurity Assessments and IT Support services.