This briefing is provided as a supplement to the Open Briefing/Remote Control Project report Hostile drones: The hostile use of drones by non-state actors against civilian targets. Our findings are based on a risk assessment involving 270 individual likelihood/impact judgements taking into account the type of threat group, the type of unmanned vehicle, the theatre, the nature of the threat and the target.
Tag: Steve Hathorn
Hostile drones: The hostile use of drones by non-state actors against British targets
In this groundbreaking report for the Remote Control project, Open Briefing has analysed over 200 commercially-available drones and assessed known drone use by non-state groups, including terrorist organisations, insurgent groups, organised crime groups, corporations and activists. The report sets out a series of recommendations to mitigate the threat from the hostile use of drones, including specific regulatory, passive and active countermeasures.
Securing change: Recommendations for the British government regarding remote-control warfare
The United States has led the way in developing a new way of conceptualising and executing war. With the rise of austerity in Europe, other Western states have adopted part or all of this ‘remote-control warfare’ approach. However, the assessment of recent trends contained in this report makes it increasingly clear that remote-control warfare has its limits. As such, this report makes 31 specific recommendations to the British government.
Remote-control warfare briefing #11, April 2015: US special operations forces withdraw from Yemen, advocacy groups seek halt to autonomous military vehicles and weapons, China’s cyber operations acknowledged by PLA
Monthly briefing from the Open Briefing intelligence unit on developments in remote-control warfare. This month: US special operations forces withdraw from Yemen, severely limiting US counter-terrorism campaign; advocacy groups seek halt to autonomous military vehicles and weapons; China’s cyber operations acknowledged in influential People’s Liberation Army publication; and more.
Intelligence brief: Reducing the supply of weapons to Boko Haram
This briefing assesses Boko Haram's arsenal, where those munitions come from, and how best to reduce the flow of weapons to the group. The group’s weaponry is predominantly of Russian and Eastern European stock looted from police stations and military bases within Nigeria. It will be impossible to stem the flow of weapons to Boko Haram completely. Ultimately, it will be efforts to tackle the deep structural socio-economic problems in northern Nigeria that will have the most success in fundamentally weakening Boko Haram.
Remote-control warfare briefing #9, February 2015: US president acknowledges cyber security challenges, surge in private security in Yemen, US urges Europe to develop more advanced military technology
Monthly briefing from the Open Briefing intelligence unit on developments in remote-control warfare. This month: US president acknowledges cyber security challenges in State of the Union address; deteriorating security situation sparks surge in private security spending in Yemen; United States urges Europe to develop more advanced military technology; and more.
Terrorist use of drones presents major potential threat to key sites and personnel in West
The recent crash-landing of a small drone in the White House grounds has highlighted the risk posed by terrorists operating unmanned aerial vehicles fitted with remotely-control explosive devices. Such platforms could be used to target nuclear power plants, government or military infrastructure, tourist sites and high-value targets, such as politicians.
Remote-control warfare briefing #8, January 2015: Attacks in Paris, terrorist use of drones, Sony Pictures hack
Monthly briefing from the Open Briefing intelligence unit on developments in remote-control warfare. This month: attacks in France, Australia and Canada highlight domestic deployment of special operations forces for counter-terrorism operations; terrorist use of drones presents major potential threat to key sites and personnel in West; hack on Sony Pictures highlights key challenges in cyber security and conflict; and more.