Preserving capacity, General Tom Lawson, Chief of the Defence Staff, Keys to Canadian SAR
Issue link: http://vanguardcanada.uberflip.com/i/1065131
Product showcase In an era of advanced Unmanned Aerial vehicle (UAv) innovation, govern- ment, military, and correctional facilities are all facing new challenges posed by terrorists, spies, and smugglers who are enlisting the use of drones for illegal activity. Dedrone, a California-based company, has emerged as the international market and technology leader in drone detection. Dedrone provides an automatic, integrated, and self-contained drone detection, identification, and counter-measures platform to defeat drone threats and their operators 24/7. Gap Wireless – a leading distributor of products and services for the mobile broadband and wireless markets, based in Mississauga, ontario – stocks and distributes Dedrone products. "Innovation in Unmanned Aerial vehicle technology is positively impacting inspections and operations in Public Safety, energy, telecom, agriculture, and other key sectors, but at the same time is being applied to illegal ac- tivities," said Kevin Toderel, Product line Manager, UAv Solutions. "We're pleased to stock and distribute leading-edge solutions from Dedrone that offer protection against unauthorized drone incursions." Dedrone provides end-to-end detection and threat mitigation including: • Identifying and classifying drones: Dedrone's DroneTracker software de- tects, recognizes and classifies malicious drones of all kinds, using De- drone's DroneDNA database to track RF, WiFi, and non-WiFi drones. • Locating perpetrators: Localization technology pinpoints drones and their pilots, even enabling detection of drones before they leave the ground. • Neutralizing threats: Dedrone's solutions can deploy countermeasures to protect an organization or neutralize the drone. • Capturing data: A combination of forensic data is automatically captured by the DroneTracker software including drone manufacturer, model, time and duration of drone activity, and video verification. At government installations, intrusive drones intended for espionage and data hacking can be detected, tracked and reported using Dedrone's solutions. For military applications, government agencies use drone detection to not only track their own drone traffic, but also to identify when an unauthorized drone has entered their airspace. Drone detection can be integrated into de- fense systems to automatically trigger alerts and countermeasures. Correctional facilities face the threat of contraband delivery via drones. De- drone's solutions can detect drones before they fly over a facility, auto-trigger alerts to staff, capture and record forensic evidence, and can even be inte- grated into physical security systems and used to augment existing video surveillance. visit www.gapwireless.com/manufacturers/dedrone/ for more informa- tion about Dedrone's airspace security platform stocked and distributed by Gap Wireless. Dedrone solutions distributed by Gap Wireless protect against unauthorized drones www.vanguardcanada.com DECEMBER 2018/JANUARY 2019 19 commanders need to ensure that systems have the technical 'plumbing' required for leveraging national or centralized capabili- ties. The need for this may be counterin- tuitive as commanders do not usually need to make sure that third line support and lo- gistics systems have been set up to be com- patible with the mission. Further require- ments can be identified to allow for local and operational support elements to have access to cyber tools. To enable this sup- port, national elements will ask for context about the mission, events, configuration, etc., which they need to customize their support. Ensure that the conditions are set to obtain support from cyber capabilities external to the mission. This requires ask- ing for assistance and working to ensure that anyone providing support has what they require. Commanders should not mistake the existence of centralized cyber authorities as a removal of their responsi- bility to risk manage their mission. Avoid pitfalls Making sense of the cyber environment and making effective decisions at a senior level is often made more complicated than it needs to be. These complications often originate in how IT security, IT systems, and cyber were grown over time. Com- manders need to be aware of major pitfalls in decision-making and how they can be overcome. A key risk is to allocate a disproportion- ate amount of focus on 'cyber-meteors', which are high impact scenarios that are technically possible but highly unlikely. Something that is possible is not always likely. Expending resources on dealing with 'cyber-meteors', which are very low risk due to a lack of likelihood, is a drain on resources that could otherwise be put to more effective use. Stuxnet, a virus that spread around the world while attempt- ing to locate and disable Iranian uranium centrifuges at the Natanz nuclear facility, is a prime example of a meteor. Looking at the technical elements of Stuxnet, it is easy to draw the conclusion that all networks and weapons platforms are vulnerable to Stuxnet-like attacks. Consider the sheer scope and scale of the long running intel- ligence efforts required for Stuxnet to be cYBer Dedrone's airspace security platform detects, classifies, and mitigates all drone threats.