India's Ministry of Home Affairs has founded the Safe City project to identify gender-based crime hotspots and make public spaces safer for women in Bengaluru. Honeywell will provide over 7,000 cameras and a control center, among other assets, to the city.
Law enforcement officials in Hartford, Conn. will use an unmanned aircraft system (UAS) to help with police pursuits and investigations. The department will have a total of four certified drone pilots.
Today, off-the-shelf commercial drone technology poses a significant threat to governments, corporations and the public. While the positive use cases for deploying commercial drones are many, like all technologies, drones have a dark side that security professionals must prepare for.
The U.S. Department of Commerce’s National Institute of Standards and Technology (NIST) has launched a new prize competition to advance the use of unmanned aircraft systems (UAS) in first responder search and rescue operations.
The final rules requiring remote identification of drones and allowing some flights over people, over moving vehicles and at night under certain conditions will go into effect on April 21, 2021, the Federal Aviation Administration (FAA) announced.
American Security Drone Act of 2021 The American Security Drone Act of 2021, formerly introduced as the American Security Drone Act of 2019, was given new life in January 2021 with bipartisan support and now incorporates drone detection and mitigation systems, not just drones. Here are five questions you can ask RF-based technology vendors to determine if they are in compliance with the federal advisory or could be banned by the American Security Drone Act of 2021 for security and cybersecurity reasons.
With no one size fits all solution, there have always been different ways to tackle the plethora of security threats. However, the increasing use of drones, or unmanned aerial vehicles (UAVs) as they are often called, is changing that. Fully automated drones can be operated by security agents, with no pilot certification, and are directly integrated into existing security networks and processes. But aren’t they expensive? And won’t the technology turn out to be just a passing trend?