India Cracks Down On Drones

India will upgrade its airports and airstrips in view of the constant threat from terror groups.

The security of 43 unused airports and 355 airstrips in the India will be enhanced with the Home Ministry planning to review their vulnerability from terror attacks and drones.

The move comes after security agencies carried out a nation-wide security audit of unused airports and airstrips considering the possibility of terrorists using remote airports to carry out terror attacks.

Of the 355 airstrips, around 100 belong to the Indian Air Force while around 60 are private. The rest are owned by either central or state governments, paramilitary forces, army or navy.

Home ministry officials said the security threat arises from the unregulated operation of microlight aircraft, powered hang-gliders, hot air balloons, paragliders and Unmanned Aerial Vehicles or drones.

The central government has been sensitising state governments regularly that such flying objects must not intrude into the air space beyond the authorised licensed area of operation and that such unregulated adventure flying needs proper monitoring.

The home ministry is also stressing that authorised users should not be allowed to carry any weapon or photography/video recording equipment while operating the microlight aircraft, hang gliders or hot air balloons.

However, another official said, in the absence of a formal policy for low flying objects, buying and selling and flying drones is largely going without monitoring.

According to timesofoman.com, the Civil Aviation Ministry is expected to come out with a drone or UAV policy soon to regulate their flight.

In December 2015, Union Home Secretary Rajiv Mehrishi had said the government is preparing to deal with threats from “rogue elements” who could carry out terror attacks using low flying objects.

Mehrishi had said there was a need to regulate UAVs to prevent their misuse in sensitive areas like airports. But, he said, the government is looking at dual aspects of enabling features like licensing it for its use on the borders as well as in guarding vital installations inside the country and disaster relief works.

The policy should have preventive features to ensure that there is no misuse by terrorist groups or other anti-national elements, he had said. Currently, there are 98 functional airports in the country of which 59 are under security cover of the Central Industrial Security Force (CISF).

I-HLS

You Might Also Read: 

Drones, Satellites And Cyber Warfare:

Drones: The Looming Threat:

 

 

« Spy Chiefs Set Sights On AI And Cyber
Put Your Physical Security Into The Cloud »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Cypress Semiconductor

Cypress Semiconductor

Cypress is a semiconductor design and manufacturing company providing embedded devices for secure IoT applications.

S2 Grupo

S2 Grupo

S2 Grupo is the benchmark company in Europe and Latin America, for Cyber Intelligence and mission critical systems operations.

Austrian Trust Circle

Austrian Trust Circle

Austrian Trust Circle is an initiative of CERT.at and the Austrian Federal Chancellery and consists of Security Information Exchanges in the areas of the strategic information infrastructure.

National Authority for Electronic Certification and Cyber Security (AKCESK) - Albania

National Authority for Electronic Certification and Cyber Security (AKCESK) - Albania

AKCESK ensures security for trusted services, in particular reliability and security in electronic transactions between citizens, businesses and public authorities.

Lineal Services

Lineal Services

Lineal supports clients in meeting their digital forensics, cyber security and eDiscovery needs by providing bespoke solutions to complex problems.

Xilinx

Xilinx

Xilinx is the inventor of the FPGA, programmable SoCs, and now, the ACAP. We are building the Adaptable, Intelligent World.

EPIC Insurance Brokers & Consultants

EPIC Insurance Brokers & Consultants

EPIC is an insuarnce broker and consultancy firm. Risk management services include risk consultancy and cybersecurity insurance.

QI ANXIN Technology Group

QI ANXIN Technology Group

QI ANXIN specializes in serving the cybersecurity market by offering next generation enterprise-class cybersecurity products and services to government and businesses.

Digital Fingerprints

Digital Fingerprints

Digital Fingerprints provides continuous authentication with behavioural biometrics. Protection against account takeover and session takeover. Compliant with GDPR and PSD2.

SecondWrite

SecondWrite

SecondWrite’s next-generation malware detection engine delivers a combination of automatic deep code inspection and accurate scoring of zero-day malware.

Dutch Institute for Vulnerability Disclosure (DIVD)

Dutch Institute for Vulnerability Disclosure (DIVD)

DIVD's aim is to make the digital world safer by reporting vulnerabilities we find in digital systems to the people who can fix them.

NVISIONx

NVISIONx

NVISIONx data risk governance platform enables companies to gain control of their enterprise data to reduce data risks, compliance scopes and storage costs.

Obscure Technologies

Obscure Technologies

Obscure Technologies is a firm of experts, specialised in brokering the best security solutions to market.

AI EdgeLabs

AI EdgeLabs

AI EdgeLabs is a powerful and autonomous cybersecurity AI platform that helps security teams respond immediately to ongoing attacks and protect Edge/IoT infrastructures.

St Fox

St Fox

St. Fox is a leading consultancy helping enterprises secure their Cloud, Data, endpoints, and applications.

Cyver Core

Cyver Core

Cyver Core is a pentest management and pentest report automation platform that consolidates cybersecurity work, automates overhead, and frees cybersecurity professionals up for the work that matters.