Skip to main content

UK council trials drone technology for bridge inspections

West Sussex County Council in the UK, in partnership with Balfour Beatty Living Places, has begun trialling the use of drones to inspect bridges across the county. Trials have so far been carried out on two bridges, resulting, they say, in around US$10,000 (£8,000) of savings compared to traditional inspections. Routine inspections are carried out on all bridges every two years to ensure they are safe for public use. Traditionally, inspection work requires traffic management to allow inspectors to safely ca
May 12, 2017 Read time: 2 mins
West Sussex County Council in the UK, in partnership with 3902 Balfour Beatty Living Places, has begun trialling the use of drones to inspect bridges across the county. Trials have so far been carried out on two bridges, resulting, they say, in around US$10,000 (£8,000) of savings compared to traditional inspections.


Routine inspections are carried out on all bridges every two years to ensure they are safe for public use. Traditionally, inspection work requires traffic management to allow inspectors to safely carry out works at height and over water, causing disruption to the public and road users. The use of drones to review the condition of a bridge reduces potential health and safety risks, as well as dramatically reducing costs, disruption and inconvenience to members of the public by removing the need for traffic management.

Operated by one of Balfour Beatty’s six Civil Aviation Authority licensed drone pilots, each drone is fitted with recording equipment to allow the workforce on the ground to review the condition of the bridge once filming is completed. To make sure the drone is operated safely, a second camera is used to film the drone in action, with an assistant reviewing the safety parameters around the drone in real-time.

The drones are also fitted with protective floats to enable them to safely land on water if required, as well as a GPS system to prevent them flying into ‘no fly zones’, such as airport space, without permission.

For more information on companies in this article

Related Content

  • Hawaii backs road user charging to replace fuel tax
    August 7, 2019
    Fuel tax revenue in Hawaii is falling - and even in paradise, someone has to pay. Adam Hill talks to Hawaii DoT’s Scot Uruda about a major change in the way the state funds road improvements All over the world, governments, transportation agencies and local authorities are casting around for new forms of revenue as the money from taxes imposed on fuel begins to trickle away. Spending is outstripping tax take as a combination of more efficient internal combustion engines and the increasing take-up of cars
  • Bridge condition sensor
    February 6, 2012
    LifeSpan Technologies, a specialist in advanced structural condition assessment solutions for civil infrastructure, has announced the commercial availability of its newest PeakStrain sensor, allowing rapid and accurate evaluation of bridge conditions after a seismic event.
  • UK Home Office type approval for Truvelo’s D-CAM
    March 21, 2014
    Truvelo UK’s D-CAM digital speed and red light enforcement camera has now gained UK Home Office Type Approval. The camera has been approved for both front and rear photography which, together with choices for the positioning of road markings for secondary speed checks, dramatically increases siting flexibility, as well for as speed on green enforcement. A patented solution which forms a part of the Home Office type approval is the ability to monitor signal phases on newer-generation LED traffic lights.
  • Need for secure approach to connected vehicle technology
    January 7, 2013
    Accidental or malicious issue of false messages to connected vehicles could result in dire consequences, so secure systems of authentication and certification are likely to be necessary, write Paul Avery and Sandra Dykes. Connectivity among vehicles in urban traffic systems will provide opportunity for beneficial impacts such as congestion reduction and greater safety. However, it also creates security risks with the potential for targeted disruption. Security algorithms, protocols and procedures must take