UK Police Deploy Drone-Jamming Technology at Major Public Events

British police are planning to use sophisticated unmanned aerial vehicle (UAV) detection and jamming technology at major public events at risk of terrorist attack.

The Anti-UAV Defence System (AUDS) was trialed in London during the Remembrance Day ceremonies on 11 November 2015. The London Metropolitan Police reportedly “really liked” the performance of the system.

The AUDS uses cameras to track UAVs, and if the need arises, can within 15 seconds jam the radio signals used to control them.

 “What is reassuring is that this is the security forces getting ahead of the game, so they have defensive measures in place before something actually happens,” said Elizabeth Quintana, a senior research fellow at the Royal United Services Institute (RUSI), a British defence and security think-tank.

Over the last few months concerns have been raised by security specialists that terrorists could employ explosive laden UAVs to attack crowds. ISIS is likely to have already tested the carrying capacity of several drones to find out how much explosives they can carry, and even experimented with detonation devices.

“There is a genuine threat from Islamists wishing to deliver high explosives by drone to crowded areas – the effects could be devastating,” Col Richard Kemp, who has advised the UK Government on terrorism, told The Mirror.

While promising, this solution is not foolproof. Advanced UAVs, of the sort terrorists are likely trying to acquire, can fly and perform missions semi- and fully-autonomously. Further, with some modification UAVs can be made to communicate on frequencies not targeted by the jammer.

To properly ensure that no radio communication with drones is taking place, police would have to jam communications across all radio frequencies. This could have far-reaching unintended consequences, with large masses of people losing all ability to use phones and communicate.

I-HLS: http://bit.ly/1ZGyZDd

« 2016 Cyber Threat - Use To Advantage
2016 Is On The Cusp Of A Machine Revolution »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

Arsenal Insurance Company

Arsenal Insurance Company

Arsenal is an insurance provider based in Moscow, Russia. Services offered include Cyber Risk insurance.

Qolcom

Qolcom

Qolcom is a leading UK based integrator of secure wireless network and mobile device management solutions.

Praetorian

Praetorian

Praetorian is an offensive cybersecurity company whose mission is to prevent breaches before they occur.

ShadowDragon

ShadowDragon

ShadowDragon develops digital tools that simplify the complexities of modern investigations that involve multiple online environments and technologies.

TunnelBear

TunnelBear

TunnelBear is a Virtual Private Network services provider offering secure encrypted access to the internet.

Certis

Certis

Certis is a leading advanced integrated security organisation that develops and delivers multi-disciplinary security and integrated services.

SEPPmail

SEPPmail

SEPPmail is a patented e-mail encryption solution to secure your electronic communication.

Morphus Information Security

Morphus Information Security

Morphus is an information security company providing Red Team, Blue Team and GRC services as well as conducting research in cybersecurity and threat analysis.

ST Engineering

ST Engineering

ST Engineering is a leading provider of trusted and innovative cybersecurity solutions.

Data Theorem

Data Theorem

Data Theorem is a leading provider in modern application security. Its core mission is to analyze and secure any modern application anytime, anywhere.

Armenia Startup Academy

Armenia Startup Academy

Armenia Startup Academy is a pre-acceleration program for selected Armenian tech companies and startups in areas including cybersecurity.

tru.ID

tru.ID

We’re tru.ID, and we're reimagining mobile authentication, one API at a time.

MoogleLabs

MoogleLabs

MoogleLabs leverage AI/ML, Blockchain, DevOps, and Data Science to come up with the best solutions for diverse businesses.

Protexxa

Protexxa

Protexxa is a B2B SaaS cybersecurity platform that leverages Artificial Intelligence to rapidly identify, evaluate, predict, and resolve cyber issues for employees.

OSP Cyber Academy

OSP Cyber Academy

OSP Cyber Academy are a managed service provider of cyber, information security and data protection training.

SecureLake

SecureLake

SecureLake (formerly Managni) is one of the most trusted US-based IT security and infrastructure companies.