In Demand: New Tech Against Drone Attacks

With the commercialisation of drones, public security and critical infrastructure security have been exposed to, potential drone attacks, thus becoming a major concern for law enforcement services around the globe. Aerial drones are being used by criminal organisations and other hostile elements. 

An Australian company specialising in equipment to counter improvised explosive devices has launched a product that can disable and control drones entering defined air spaces in a bid to increase public safety.

EPE Australia partnered with United States firm, Department 13, to help bring the counter drone capability, known as MESMER, to Australia.

The company’s managing director Warwick Penrose said: “We are seeing criminal activity using drones now for surveillance assets for law enforcement. the bad guys are using drone technology to look at what we are doing and how we are doing it to try and avoid capture.”

“Military organisations worldwide are grappling with this problem of how we can detect and mitigate drones…we are trying to think about ways we can protect the airspace,” he said.

“Certainly for our public safety perspective it is an issue out there for our critical infrastructure such as our airports.” “Co-ordinated drone attacks, that is something we are seeing at airports now, four or five drones working in conjunction with each other.”

Earlier this year, an international criminal syndicate, busted smuggling $30 million worth of cocaine into the Port of Melbourne, attempted to use a drone to make sure their meetings were not being watched by police. The technology, which allows the user to stop, redirect, land or take control of a target drone, was demonstrated to the Australian Defence Force as well as state police forces earlier this year.

“We listen for the signals of the drones and based on what we hear we throw out a couple of packets of data to handshake with the drone and effectively convince the drone to talk to us, to speak to its controller,” he said. “We can detect and mitigate up to five kilometres.”

The technology is different to, other counter drone systems, that use radio jamming or standard electronic mitigation techniques. The platform is low power, it can be operated below one watt, and will not affect non-targeted communications signals, according to an article on the Department of State Development website.

I-HLS

You Might Also Read:

India Cracks Down On Drones:

No Need To Shoot Down Drones – Just Hijack Them:

« Russia’s Digital Weapons Refined Against Ukraine
More Sensitive US Voter Records Leaked »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

maCERT

maCERT

maCERT is the national Computer Emergency Response Team for Morocco.

Dionach

Dionach

Dionach are a certified information security specialists who provide Penetration Testing, IT Security Auditing and Information Security Consultancy.

SCIPP International

SCIPP International

SCIPP’s courses are based on internationally recognized best business practices for security awareness, for both technical and non-technical staff and to comply with regulatory mandates.

Data61

Data61

Data61 is Australia’s leading digital research network offering the research capabilities, IP and collaboration programs to unleash the country’s digital & data-driven potential.

CERT-PH

CERT-PH

CERT-PH is the National Computer Emergency Response Team and the highest body for cybersecurity related activities in the Philippines.

Blaze Information Security

Blaze Information Security

Blaze Information Security is a privately held, independent information security firm born from years of combined experience and international presence.

Solidified

Solidified

Solidified is the largest audit platform for smart contracts. Our community has the highest concentration of top Blockchain security specialists and best-in-class code auditors.

AgileBlue (Agile1)

AgileBlue (Agile1)

AgileBlue (formerly Agile1) is a managed breach detection company with an Autonomous SOC-as-a-Service for 24×7 monitoring, detection and guided response.

East Midlands Cyber Resilience Centre (EMCRC)

East Midlands Cyber Resilience Centre (EMCRC)

The East Midlands Cyber Resilience Centre is set up to support and help protect businesses across the region against cyber crime.

Spyderbat

Spyderbat

Spyderbat ATI closes the manual investigation gap between detection and response by instantly presenting causally connected threat activity to security analysts at the onset of an investigation.

Triangle

Triangle

Triangle enable innovative business transformation by ensuring critical hybrid infrastructures are optimised, interoperable and secure.

Cybalt

Cybalt

Cybalt is a security services company that provides end-to-end security solutions to help clients achieve their business goals.

Redpoint Cybersecurity

Redpoint Cybersecurity

Redpoint Cybersecurity is a human-led, technology-enabled managed cybersecurity provider specializing in Digital Forensics, Incident Response and proactive cyberattack prevention.

EmberOT

EmberOT

EmberOT is at the forefront of operational technology (OT) security, offering cutting-edge solutions designed to protect critical infrastructure within energy, utilities, and manufacturing sectors.

Heritage Cyber World

Heritage Cyber World

Heritage Cyber World is a one stop solution for all your security needs that brings together a team of security experts and analysts to deliver high-class security services.

Adaptive Security

Adaptive Security

Adaptive is a next-generation cybersecurity platform. We're working with pioneering security teams to protect critical systems from AI-powered cyber attacks.