India Cracks Down On Drones

India will upgrade its airports and airstrips in view of the constant threat from terror groups.

The security of 43 unused airports and 355 airstrips in the India will be enhanced with the Home Ministry planning to review their vulnerability from terror attacks and drones.

The move comes after security agencies carried out a nation-wide security audit of unused airports and airstrips considering the possibility of terrorists using remote airports to carry out terror attacks.

Of the 355 airstrips, around 100 belong to the Indian Air Force while around 60 are private. The rest are owned by either central or state governments, paramilitary forces, army or navy.

Home ministry officials said the security threat arises from the unregulated operation of microlight aircraft, powered hang-gliders, hot air balloons, paragliders and Unmanned Aerial Vehicles or drones.

The central government has been sensitising state governments regularly that such flying objects must not intrude into the air space beyond the authorised licensed area of operation and that such unregulated adventure flying needs proper monitoring.

The home ministry is also stressing that authorised users should not be allowed to carry any weapon or photography/video recording equipment while operating the microlight aircraft, hang gliders or hot air balloons.

However, another official said, in the absence of a formal policy for low flying objects, buying and selling and flying drones is largely going without monitoring.

According to timesofoman.com, the Civil Aviation Ministry is expected to come out with a drone or UAV policy soon to regulate their flight.

In December 2015, Union Home Secretary Rajiv Mehrishi had said the government is preparing to deal with threats from “rogue elements” who could carry out terror attacks using low flying objects.

Mehrishi had said there was a need to regulate UAVs to prevent their misuse in sensitive areas like airports. But, he said, the government is looking at dual aspects of enabling features like licensing it for its use on the borders as well as in guarding vital installations inside the country and disaster relief works.

The policy should have preventive features to ensure that there is no misuse by terrorist groups or other anti-national elements, he had said. Currently, there are 98 functional airports in the country of which 59 are under security cover of the Central Industrial Security Force (CISF).

I-HLS

You Might Also Read: 

Drones, Satellites And Cyber Warfare:

Drones: The Looming Threat:

 

 

« Spy Chiefs Set Sights On AI And Cyber
Put Your Physical Security Into The Cloud »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Ovarro

Ovarro

Ovarro is the new name for Servelec Technologies and Primayer. Ovarro's technology is used throughout the world to monitor, control and manage critical and national infrastructure.

Stealthcare

Stealthcare

Stealthcare is a full service, global cyber security firm offering solutions that educate, empower and protect.

ThirdWatch

ThirdWatch

ThirdWatch is a Data Science company with real-time automated fraud prevention solutions.

TAC Security (TAC Infosec)

TAC Security (TAC Infosec)

TAC Security (aka TAC Infosec) is a leading and trusted cyber security consulting partner that specializes in securing the IT infrastructure and assets of enterprises.

White Cloud Security

White Cloud Security

White Cloud is a cloud-based Application Trust-Listing security service that prevents unauthorized programs from running on your computers.

Venkon

Venkon

Venkon provides effective and unique solutions to cyber-security threats and IT compliance requirements of your organization.

Barikat Cyber Security

Barikat Cyber Security

Barikat is a provider of information security solution and services including security analysis and compliance, security testing, managed security services, incident response and training.

Cipher

Cipher

Founded in 2000, Cipher is a global cybersecurity company that delivers a wide range of Managed Security Services.

Acmetek Global Solutions

Acmetek Global Solutions

Acmetek is a Global Distributor and a Trusted Advisor of PKI /IOT & SSL Security Products and a Managed Services Company.

Gunnison Consulting Group

Gunnison Consulting Group

Gunnison Consulting Group serves the Federal Government with high quality IT consulting services.

McDonald Hopkins

McDonald Hopkins

McDonald Hopkins is a business advisory and advocacy law firm. We focus on insightful legal solutions that help our clients strategically plan for an increasingly competitive future.

SOOS

SOOS

SOOS is the easy-to-integrate software security solution for your whole team. Build, catch, and fix vulnerabilities with SOOS Software Composition Analysis.

UM6P Ventures

UM6P Ventures

UM6P Ventures is an African based early-stage ventures firm operating two funds; a Digital Transformation fund and a Deeptech Ventures fund.

Socura

Socura

Socura helps make the digital world a safer place; changing the way organisations think about cyber security through a dynamic, innovative, and human approach.

SalvageData Recovery Services

SalvageData Recovery Services

Since 2003, SalvageData has been providing high-quality data recovery with the certifications needed to work with any storage media manufacturer.

Silicon Valley Cybersecurity Institute (SVCSI)

Silicon Valley Cybersecurity Institute (SVCSI)

SVCSI aims to investigate, develop, and promote technical excellence and the best security practices for dependable and secure systems and applications.