In Demand: New Tech Against Drone Attacks

With the commercialisation of drones, public security and critical infrastructure security have been exposed to, potential drone attacks, thus becoming a major concern for law enforcement services around the globe. Aerial drones are being used by criminal organisations and other hostile elements. 

An Australian company specialising in equipment to counter improvised explosive devices has launched a product that can disable and control drones entering defined air spaces in a bid to increase public safety.

EPE Australia partnered with United States firm, Department 13, to help bring the counter drone capability, known as MESMER, to Australia.

The company’s managing director Warwick Penrose said: “We are seeing criminal activity using drones now for surveillance assets for law enforcement. the bad guys are using drone technology to look at what we are doing and how we are doing it to try and avoid capture.”

“Military organisations worldwide are grappling with this problem of how we can detect and mitigate drones…we are trying to think about ways we can protect the airspace,” he said.

“Certainly for our public safety perspective it is an issue out there for our critical infrastructure such as our airports.” “Co-ordinated drone attacks, that is something we are seeing at airports now, four or five drones working in conjunction with each other.”

Earlier this year, an international criminal syndicate, busted smuggling $30 million worth of cocaine into the Port of Melbourne, attempted to use a drone to make sure their meetings were not being watched by police. The technology, which allows the user to stop, redirect, land or take control of a target drone, was demonstrated to the Australian Defence Force as well as state police forces earlier this year.

“We listen for the signals of the drones and based on what we hear we throw out a couple of packets of data to handshake with the drone and effectively convince the drone to talk to us, to speak to its controller,” he said. “We can detect and mitigate up to five kilometres.”

The technology is different to, other counter drone systems, that use radio jamming or standard electronic mitigation techniques. The platform is low power, it can be operated below one watt, and will not affect non-targeted communications signals, according to an article on the Department of State Development website.

I-HLS

You Might Also Read:

India Cracks Down On Drones:

No Need To Shoot Down Drones – Just Hijack Them:

« Russia’s Digital Weapons Refined Against Ukraine
More Sensitive US Voter Records Leaked »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Nixon Peabody LLP

Nixon Peabody LLP

Nixon Peabody LLP is an international law firm with offices across the USA, Europe and Asia. Practice areas include Data Privacy and Cyber Security.

BackBox Software

BackBox Software

BackBox is a leading provider of solutions for automated backup and recovery software for security and network devices.

Vector InfoTech

Vector InfoTech

Vector InfoTech is a leader in Industrial Security, Networks, IT and Telecommunications.

ClearBlade

ClearBlade

ClearBlade is the Edge Computing software company enabling enterprises to rapidly engineer and run secure, real-time, scalable IoT applications.

CSIRT Italia

CSIRT Italia

CSIRT Italia is the national Computer Security Incident Response Team for Italy.

Slovak National Accreditation Service (SNAS)

Slovak National Accreditation Service (SNAS)

SNAS is the national accreditation body for Slovakia. The directory of members provides details of organisations offering certification services for ISO 27001.

Gigacycle

Gigacycle

Gigacycle is one of the leading IT disposal and recycling providers in the UK. We specialise in IT asset disposal (ITAD) and data destruction.

Root9B (R9B)

Root9B (R9B)

R9B offers advanced cybersecurity products, services, and training to enhance the way organizations protect their networks.

Ten Eleven Ventures

Ten Eleven Ventures

Ten Eleven is a specialized venture capital firm exclusively dedicated to helping cybersecurity companies thrive.

Stratosphere Networks

Stratosphere Networks

Stratosphere Networks offer managed cybersecurity services rooted in Managed Detection and Response and Security Operations Center services that our team can tailor to meet your needs.

Nucleon Security

Nucleon Security

Nucleon Endpoint Detection and Response EDR is the most effective way to protect the value created by your organization against any threat.

Qascom

Qascom

Qascom is an engineering company offering security solutions in satellite navigation and space cybersecurity. We are one of the European key players in GNSS authentication and security.

Qevlar AI

Qevlar AI

Qevlar AI empowers SOC teams, to eliminate redundant tasks and refocus on what truly matters - making the most of every employee within the SecOps team.

Cloud Software Group

Cloud Software Group

Cloud Software Group provides mission-critical software to enterprises at scale.

Dispel

Dispel

Dispel makes the fastest secure remote access for industrial networks. Built by operators for operators: a zero trust engine for your entire OT, IoT, and xIoT stack.

Cassini

Cassini

Cassini Cyber Threat Intelligence (CTI) helps protect your organisation from cyber attacks using threat intelligence from trusted New Zealand agencies.