Feeds

Fearful of the drone-filled skies? Get some protection

No, not a shotgun, but a 'Personal Drone Detection System'

Bridging the IT gap between rising business demands and ageing tools

Those fearful of a future where the skies are darkened by swarms of camera-bearing drones peering over their garden fences and peeking through their bedroom windows should proceed directly to Kickstarter and the "Personal Drone Detection System".

Rattling the tin in defence of personal privacy is Domestic Drone Countermeasures, which kicks off its pitch with the chilling:

On May 8, 2014 a drone shooting high definition video crashed into a high rise building in downtown St. Louis. Who was flying it and why they were shooting video so close to the building is still unknown.

Could this drone be flying around your building and invading your privacy in the near future?

The answer is yes, and so you'd better arm yourself against the Rise of the Drones™ with a "first line of defense" against airborne incursion.

The Drone Detection System

The Personal Drone Detection System features "a Primary Command and Control Module and two Detection Sensor Nodes", which together "create a mesh grid network that can triangulate moving transmitters". Detection is apparently within 50ft of any node.

The blurb continues:

The Primary Command and Control Module offers a simplified user interface via WiFi, such as through your tablet, smartphone or PC.

If a signal is not purposely ignored by you, then the system assumes that the rogue transmitter is hostile and alerts you to its presence within the mesh grid. It sounds an alarm (which can be disabled) or sends a message to your tablet or smartphone. This allows the system to notify you, even if you are not home.

It adds:

The module and nodes utilize a mesh grid network that only communicates within itself, but the Primary Command and Control Module can communicate with your personal WiFi network as an isolated device. Neither the module nor nodes extend your personal WiFi network so your personal WiFi network is not susceptible to outside hacking or infiltration through the mesh grid.

Should you need extended protection, you can simply add nodes and Bob's your uncle - you're covered.

Yes, we know what you're thinking, and in response to the FAQ "Isn't this just fear-mongering?", Domestic Drone Countermeasures bluntly says: "We are just reporting what other people are saying in the news. If you don't like what we're doing, please don't buy a system. But don't deny that opportunity to someone else."

Fair enough. The Kickstarter campaign had this morning raised $1,375 of the $8,500 target, with 21 days left to run. For $499, you can become an "alpha tester" with the 1st generation three-box system, while $699 will get you a tested 2nd generation package. ®

Mobile application security vulnerability report

More from The Register

next story
Bad back? Show some spine and stop popping paracetamol
Study finds common pain-killer doesn't reduce pain or shorten recovery
Malaysian Airlines flight MH17 claimed lives of HIV/AIDS cure scientists
Researchers, advocates, health workers among those on shot-down plane
World Solar Challenge contender claims new speed record
One charge sees Sunswift travel 500kms at over 100 km/h
Mwa-ha-ha-ha! Eccentric billionaire Musk gets his PRIVATE SPACEPORT
In the Lone Star State, perhaps appropriately enough
SMELL YOU LATER, LOSERS – Dumbo tells rats, dogs... humans
Junk in the trunk? That's what people have
All those new '5G standards'? Here's the science they rely on
Radio professor tells us how wireless will get faster in the real world
The Sun took a day off last week and made NO sunspots
Someone needs to get that lazy star cooking again before things get cold around here
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.