India Cracks Down On Drones

India will upgrade its airports and airstrips in view of the constant threat from terror groups.

The security of 43 unused airports and 355 airstrips in the India will be enhanced with the Home Ministry planning to review their vulnerability from terror attacks and drones.

The move comes after security agencies carried out a nation-wide security audit of unused airports and airstrips considering the possibility of terrorists using remote airports to carry out terror attacks.

Of the 355 airstrips, around 100 belong to the Indian Air Force while around 60 are private. The rest are owned by either central or state governments, paramilitary forces, army or navy.

Home ministry officials said the security threat arises from the unregulated operation of microlight aircraft, powered hang-gliders, hot air balloons, paragliders and Unmanned Aerial Vehicles or drones.

The central government has been sensitising state governments regularly that such flying objects must not intrude into the air space beyond the authorised licensed area of operation and that such unregulated adventure flying needs proper monitoring.

The home ministry is also stressing that authorised users should not be allowed to carry any weapon or photography/video recording equipment while operating the microlight aircraft, hang gliders or hot air balloons.

However, another official said, in the absence of a formal policy for low flying objects, buying and selling and flying drones is largely going without monitoring.

According to timesofoman.com, the Civil Aviation Ministry is expected to come out with a drone or UAV policy soon to regulate their flight.

In December 2015, Union Home Secretary Rajiv Mehrishi had said the government is preparing to deal with threats from “rogue elements” who could carry out terror attacks using low flying objects.

Mehrishi had said there was a need to regulate UAVs to prevent their misuse in sensitive areas like airports. But, he said, the government is looking at dual aspects of enabling features like licensing it for its use on the borders as well as in guarding vital installations inside the country and disaster relief works.

The policy should have preventive features to ensure that there is no misuse by terrorist groups or other anti-national elements, he had said. Currently, there are 98 functional airports in the country of which 59 are under security cover of the Central Industrial Security Force (CISF).

I-HLS

You Might Also Read: 

Drones, Satellites And Cyber Warfare:

Drones: The Looming Threat:

 

 

« Spy Chiefs Set Sights On AI And Cyber
Put Your Physical Security Into The Cloud »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Teneo

Teneo

Teneo is a Solutions Provider focused on reducing complexity. We combine leading technology with deep expertise to create new ideas on how to simplify IT operations.

Ubisecure

Ubisecure

Ubisecure provide Identity & Access Management solutions.

MIT Internet Policy Research Initiative (IPRI)

MIT Internet Policy Research Initiative (IPRI)

IPRI's mission is to work with policy makers and technologists to increase the trustworthiness and effectiveness of interconnected digital systems

Avatier

Avatier

Avatier identity management software products automate identity access management, user provisioning and IT governance to ensure information security and compliance.

Rewertz

Rewertz

Rewterz is a cyber security company based out of Dubai, serving customers in UAE, Oman, Qatar, Bahrain, Saudi Arabia, and Pakistan.

Enosys Solutions

Enosys Solutions

Enosys Solutions is an IT security specialist with a skilled professional services team and 24x7 security operations centre servicing corporate and public sector organisations across Australia.

DefCamp

DefCamp

DefCamp is the most important annual conference on Hacking & Information Security in Central Eastern Europe.

Checksum Consultancy

Checksum Consultancy

Checksum Consultancy specializes in Information security, Risk management, and IT governance.

Kippeo Technologies

Kippeo Technologies

Kippeo is a security systems integrator providing innovative solutions that look at all the parameters and connect all the dots.

IP Twins

IP Twins

IP Twins offer a wide range of services related to domain names and online brand protection.

SecureData

SecureData

SecureData provide professional data recovery services, digital forensics, data recovery software and FIPS 140-2 Level 3 Validated hardware encrypted drives.

HACKNER Security Intelligence

HACKNER Security Intelligence

HACKNER Security Intelligence is an independent security consultancy delivering comprehensive security assessments across IT security, physical security, and social engineering.

Cybaverse

Cybaverse

Cybaverse (formerly North Star Cyber Security) was founded to create the perfect blend of a Managed Security Service Provider (MSSP) and a Cyber Security Consultancy in one.

Oxeye

Oxeye

Oxeye fills the gap between cloud and code to show exploitable vulnerabilities, and their path from API to code. More visibility. Less noise. More time to build.

CovertSwarm

CovertSwarm

Since 2020 CovertSwarm have been radically redefining how enterprise security risks are discovered. We outpace the cyber threats faced by our clients using a constant cyber attack methodology.

CloudBees

CloudBees

CloudBees is building the world’s first end-to-end automated software delivery system, enabling companies to balance governance and developer freedom.