Hostile Intent - Combatting rogue drone threats

Hostile Intent - Combatting rogue drone threats

The once disruptive drones have now become decidedly dangerous when put in the hands of actors with a nefarious, criminal and terrorist intent. While they offer a new tactic for these operators, they present a threat to nations and organizations which are still trying to play catch-up in order to defend against them.

Ahead of this year’s Countering Drones, Andrew Staniforth, Director of Innovation, Saher-Europe and Chairman of the conference, outlines the threat landscape of rogue drones, and how organizations can prepare to protect themselves against the use of drones by malicious actors.

Download the article here >>

Key benefits of downloading the article:

  • Understand the wide range of criminal activities drones can be used for
  • Analyse the current threat landscape of rogue drones
  • Learn how to prepare against the malicious use of drones

Read an exclusive preview of the article below:

The illegal use of drones is now a pressing security concern across the world as terrorists, activists and criminals are adopting drone technology and developing new, creative and sophisticated ways in which to commit crime and terrorism. The use of drones for hostile reconnaissance in theatres of conflict, and combined with their adaption to carry Improvised Explosive Devices (IEDs), has signalled the use of drones as a deadly and determined terrorist tactic. Organised Crime Groups (OCGs) profiting from human trafficking and people smuggling into and across Europe, are using drone technologies to monitor security measures at ports and border checkpoints. As a direct result of … To continue reading, please download the article.

As well as being the conference Chairman, Andrew Staniforth will also lead a workshop on DENI (Detection, Evaluation, Neutralisation & Investigation) Counter-Unmanned Aerial Vehicle training. You can download the full agenda of the conference here.

Please note: That all fields marked with an asterisk (*) are required.