Voting to Protect U.S. Airports from Drone Threats: The Counter-Drone Imperative
This blog is not about politics. However, with election season upon us, it’s an opportune moment to reflect on how we can safeguard our ...
In the ever-evolving landscape of security threats, critical infrastructure sites like nuclear facilities face an increasingly complex challenge: commercially available drones. Once viewed as mainly recreational devices, these versatile platforms now pose a potentially significant security risk.
This blog post explores the growing threat of unauthorized drone activity around nuclear facilities and discusses effective strategies for implementing effective drone defense systems.
Nuclear facilities encompass a range of vital national assets, including power plants that generate electricity, research institutions focused on nuclear science and engineering, reprocessing plants for recycling nuclear materials, and secure storage sites for nuclear waste.
Additionally, some facilities are responsible for the development and maintenance of nuclear weaponry. Each of these facilities requires stringent security measures due to the hazardous nature of the materials housed within and the critical role they play in energy production and national security.
However, the growing accessibility of drones introduces a layer of complexity to safeguarding these facilities. Drones can bypass traditional ground-based security measures, potentially:
Under the Freedom of Information Act (FOIA), the UK has recently revealed multiple drone sightings near British nuclear facilities from 2021 to 2023. While specific locations were withheld for national security reasons, the report provides valuable insights into the nature and frequency of these occurrences.
2021: Ten episodes were recorded, including unauthorized drone flights that led to alarm activations and substantial searches, although no substantial threats were detected.
2022: Nine incidents were reported, including a particularly alarming report from a pilot about a drone sighted at an extraordinary altitude of 20,000 feet.
2023: Through August, there were six drone sightings, mostly followed by thorough but unsuccessful searches.
The Ministry of Defence Police has maintained confidentiality over specific details of these incidents. This discretion underscores the seriousness of these drone sightings and the critical need for stringent security measures at such sensitive sites.
Between 2015 and 2019, the U.S. witnessed a disturbing rise in drone activities over nuclear sites, with at least 57 drone incursions reported across 24 facilities, according to data obtained through the Freedom of Information Act (FoIA). This series of incidents highlights significant ongoing challenges in securing critical infrastructure against new technological threats.
Notably, the Palo Verde Nuclear Power Plant in Arizona—a major facility contributing approximately 35% of Arizona’s total power output—faced several security breaches during this period. Reports detail multiple incidents where small groups of about five or six drones were observed flying around the plant’s three-unit site. Security personnel observed but could not respond as the drones carried out their incursions before disappearing.
France has witnessed a series of unidentified drone flights over several of its nuclear facilities, sparking considerable concern due to the strategic importance and high security of these sites.
Électricité de France (EDF), the state-run power firm, reported that drones were spotted over seven nuclear plants, including facilities in operation. The sightings occurred primarily at night or early in the morning prompting EDF to file multiple complaints with the police.
These incidents have not impacted the safety or operation of the plants, according to EDF. However, the pattern of flights—especially the simultaneous drone activity over four plants—suggests a coordinated effort that could signify a significant security threat.
As demonstrated in the incidents discussed above, drones can bypass conventional ground-based security measures making them a serious threat. The repercussions of unauthorized drone activities in such sensitive zones are potentially severe. This reality accentuates the urgent need for comprehensive and robust drone defense systems.
Effective drone defense strategies are crucial for preserving the operational integrity of nuclear facilities, safeguarding sensitive information, and upholding public and environmental safety.
Currently, nuclear facilities have detailed and significant ground surveillance and detection systems. However, these should be augmented with a reliable drone detection system that provides early warning, including the drone’s flight path, place of origin, and the location of the drone pilot. This is critical not only for early warning of an incoming drone, but also to allow the Nuclear Site Protection services to develop their deterrence plan, and if required, to contact local police authorities to deal with the drone operator who is often several kilometers away from the site.
A crucial step in managing drone threats at nuclear facilities is the development of a comprehensive reporting protocol. This protocol is indispensable for documenting and swiftly addressing all drone sightings in a systematic manner. It involves setting clear guidelines on who should be notified upon the detection of a drone, tailored to the severity of the incursion. The protocol must also specify the information to be collected from observers, including the time of sighting, drone behavior and appearance, and its last known location. This information is vital for assessing threat levels and determining the appropriate response by security personnel.
With a robust reporting protocol in place, ongoing monitoring and assessment become fundamental to maintaining security at nuclear facilities. This process integrates advanced detection technologies, such as RF Cyber-Takeover systems, enabling the detection of unauthorized drones in real time.
Continuous monitoring facilitates the immediate identification of anomalies and potential threats, allowing for swift responses by authorized personnel. Additionally, data collected from these monitoring efforts are analyzed to detect trends and identify typical drone activity patterns, allowing for preemptive adjustments to defense strategies, and enhancing the facility’s resilience against existing and emerging threats.
As several nuclear facilities do not have policing powers outside of their protected areas, it is imperative that they can interact rapidly with local police departments for enforcement, ideally, sharing information about nuisance and nefarious drones and their operators.
The nuclear power industry prides itself on being risk averse to the point at which it ensures that there are sufficient redundancies in place to ensure the safety of both their operations and that of the public. Public safety is the number one concern of the nuclear industry. This level of safety will be further enhanced as regulations evolve to confront the rogue drone problem and support C-UAS protection around critical infrastructure sites such as nuclear facilities, defending them against the targeting of these facilities by nefarious drone operators.
Building upon a robust reporting protocol and continuous monitoring, RF Cyber-Takeover C-UAS technology serves as a critical component of the defense strategy. This advanced system empowers security teams to effectively manage and neutralize potential drone threats.
By taking control of unauthorized drones, the technology allows for these drones to be redirected without causing collateral damage or disruption. This approach is instrumental in maintaining the security of the facility, minimizing the risk of breaches, and protecting the integrity of the infrastructure.
Learn more about the drone incident lifecycle and building an effective defense strategy that protects critical infrastructure such as Nuclear facilities against evolving threats.
The commercial drone industry has revolutionized efficiency and safety across numerous sectors. However, this versatility also presents a growing concern: the potential misuse of drones by both careless and nefarious operators to either target or disrupt critical infrastructure is a real threat. To counter this evolving threat, robust counter-drone technology has emerged as a crucial layer of security.
So, how can this technology fortify critical infrastructure security and safeguard essential operations?
In safeguarding critical infrastructure, counter-drone technology has the potential to become an invaluable tool, offering robust defense against diverse threats posed by unauthorized and malicious drone activities. These threats can be multifaceted, ranging from disrupting essential services and causing physical damage to compromising sensitive information. By integrating advanced detection, identification, and mitigation systems, this counter-drone technology can establish a formidable shield against these potential disruptions and damages.
As airspace becomes more congested and drone applications more diverse, the ability to swiftly detect, accurately identify, and effectively mitigate threats becomes paramount for the protection of critical infrastructure. Even more critical is the requirement to distinguish between truly threatening drones versus those being legitimately employed in and around the sites by authorized operators. Advanced counter-drone measures enhance operational security, safeguarding continuity, and integrity amidst escalating aerial threats. Effective counter-drone technology must also be agile and adaptable, enhancing resilience against an evolving threat landscape.
Commercially available drones can be easily used by nefarious operators to gather information on security within establishments, tracking security patrol movements and identifying alarm systems. Drones repurposed for malicious intent and equipped with destructive payloads pose a significant threat to critical infrastructure. Readily available drones can too easily be transformed into instruments of terrorism or sabotage. Even seemingly small attacks can disrupt essential services and endanger public safety. Damage to a power grid can cause widespread blackouts, crippling communication networks and leaving households without electricity. Similarly, a strike on a water treatment plant could contaminate water supplies, triggering public health crises. Such attacks would not only compromise the physical integrity of structures but also endanger the security and well-being of the communities they serve.
In such cases, counter-drone systems are urgently needed to neutralize threats before they can reach their targets. Non-kinetic systems, for example, utilize a combination of radio frequency, advanced sensors, RF technology, and AI to identify threats from a distance. They analyze unique identifiers such as the drone’s make, model, serial number, and other factors allowing for accurate differentiation between authorized and unauthorized drones. Upon detection, these systems can take control of the drone, guiding it to a safe landing zone. Such systems could be vital in sensitive environments like those related to critical infrastructure, where safety and precision are crucial.
Drones, possessing the ability to hover unnoticed and maneuver at various altitudes, serve as adept tools for data collection. Enhanced by features like high-resolution cameras, thermal imaging, and other sensing technologies, they can capture detailed visual and structural data from even heavily secured areas. While these capabilities make drones valuable tools for many applications, they also raise serious concerns about security. The potential for drones to infiltrate sensitive zones and gather confidential information poses significant risks to the security of critical infrastructure. The growing sophistication of drone technology, including miniaturization that makes them even harder to detect, necessitates a robust counter-drone strategy to protect critical infrastructure, sensitive environments, and national interests.
Cyber-centric counter-drone technology, equipped with high-precision tracking capabilities, can play a pivotal role in addressing the espionage threat from drones. By taking control of the communication channels with the drone, these systems have the capacity to effectively mitigate such activities.
Furthermore, some counter-drone systems possess the capability to quickly determine its source or take-off location, facilitating swift law enforcement action to identify and apprehend perpetrators engaged in unauthorized activities, when allowed by local law and regulations.
Drones that erroneously deviate from their intended course or lack proper control pose significant risks, particularly if they were to collide with critical infrastructure like telecommunications towers, electrical substations, or aircraft. These collisions can result in immediate physical damage and could potentially lead to widespread service disruptions, affecting communications, power distribution, and transportation.
The risk of such incidents is even more acute in densely populated urban environments or heavily industrialized areas where airspace congestion and critical infrastructure co-exist. Misguided drones may inadvertently collide with vital assets due to factors like operator error or technical malfunctions.
In such scenarios, kinetic counter-drone methods may be inappropriate and/or otherwise not allowed since they may potentially exacerbate accidents and disruptions, such as debris fallout or interruptions to authorized activities. Hence, the adoption of drone mitigation technology that does not contribute to the collateral damage risk, as well as managing unauthorized drones without compromising the surrounding environment or public safety is imperative.
The threats to critical infrastructure from nefarious drones have been amplified over the last few years and innovative technologies, such as non-kinetic, RF sensor based types of systems are developing to meet this threat. Policy makers are starting to gradually adopt regulations to evolve such that those tasked with the protection of these sites can acquire and effectively use non-kinetic, RF Cyber solutions to keep these facilities and structures safe and secure. For critical infrastructure to remain safe and secure, regulations should adapt to put the tools into the hands of those tasked with keeping not only the physical sites, but the skies over them safe and secure from terrorist threats.
As drone technology swiftly advances, examining past incidents is key to foreseeing upcoming challenges and seizing new opportunities. Past drone mishaps have highlighted weaknesses in the security of vital facilities, leading to necessary enhancements. By looking at these historical trends, we can predict potential threats. Such insights are crucial for creating strong defense strategies and encouraging safe drone operations.
The real-life incidents gathered in this updated drone incident tracker are useful to consider when refining readiness and response strategies. Data can be sorted by date, location, and sector, such as that for Critical Facilities and Infrastructure.
The rapid advancement of drone technology has fundamentally reshaped airspace dynamics, with UAVs finding applications across a myriad of sectors. This proliferation, however, brings with it a multifaceted and evolving threat to national security, particularly at sensitive sites along U.S. borders, military installations, and critical domestic infrastructure.
These agile and versatile devices have become tools for nefarious activities, bypassing traditional security measures with ease – an issue that doesn’t seem to be slowing down. In fact, In fact, there are over 1,000 drone incursions into U.S. airspace that occur from the southern border every month.
Such developments starkly accentuate the urgent need to address this security vulnerability and deploy effective counter-UAS solutions.
The challenge lies in implementing these countermeasures in a manner that is both safe and secure. The crux of the solution rests within the development and deployment of counter-UAS technologies designed to address and mitigate the risks posed by unauthorized drones with careful consideration to minimize collateral impacts on surrounding environments and populations.
This article delves into the intricacies of this pressing issue, exploring the balance between effective countermeasures and the imperative to minimize collateral impacts.
The U.S. border has witnessed a surge in illegal drone incursions facilitating the smuggling of people, drugs, and weapons into the country. The agility of drones, traversing rugged terrain and evading detection, exposes vulnerabilities in border security. Drones also pose a threat to national security by enabling espionage on law enforcement and military operations, potentially compromising personnel and infrastructure via reconnaissance used for planning precision strikes.
The threat extends beyond military and border security to vital national infrastructure. Critical sectors such as power generation, water treatment, communications, and transportation are increasingly vulnerable to drone attacks. Drone strikes targeting these infrastructures could potentially lead to widespread service outages that could cripple essential services and have devastating repercussions on the economy, public safety, and overall national security.
Given the complex nature of these threats, there is a pressing need to implement robust countermeasures. A range of counter-UAS solutions are available for authorized personnel to address the drone threat effectively. However, their suitability varies across different environments, influenced by the potential for collateral damage associated with their use.
Kinetic or physical shooting options represent a very wide range of methods, including, for example, net guns and intelligent shooters. These may risk harming bystanders and damaging property in densely populated areas. Similarly, jamming, spoofing, and other electronic warfare-based technologies might unintentionally disrupt essential systems, creating a cascade of safety concerns that affect not only hostile drones but also authorized operations in the vicinity.
In contrast to the traditional counter-UAS solutions mentioned above, low or no collateral options offer a targeted, proportionate, and cost-effective approach to mitigating drone threats. These systems equip authorized security personnel with the ability to mitigate hostile drones quickly and effectively with lower risks to bystanders, infrastructure, and the environment.
Unlike kinetic or jamming methods, EnforceAir2‘s cyber-takeover technology avoids collateral damage and disruption to surrounding communications and electronic systems. Its versatility makes it suitable for a broad range of environments, including urban areas and critical infrastructure, effectively safeguarding these areas without impacting non-targeted electronics or causing unintended consequences.
The recognition of the urgent need for low or no-collateral effect counter-UAS Solutions is widespread among defense, homeland security, and law enforcement operators. These sectors are acutely aware of the sophisticated array of drone threats and the critical gaps in defensive capabilities. In response, significant investment has been made in the research and development (R&D) of counter UAS technologies. This R&D phase is crucial for advancing the technological capabilities needed to address the evolving drone threats effectively and with minimal damage.
In addition to the research and development updating policy implementation initiatives is imperative – especially regarding low collateral counter-UAS solutions. The swift adoption of these systems into operational use is essential to bridge the ever-growing gap between drone capabilities and appropriate defense solutions while empowering authorized security personnel to effectively counter the evolving threat posed by dangerous drones.
As the threat landscape evolves, so too must our approach to national security. The deployment of low or no collateral counter-UAS Solutions represents a pivotal advancement in the ongoing battle for creating safe airspace.
The future of airspace security hinges on developing and deploying counter-UAS solutions that are not only effective but also sustainable and low collateral.
For a deeper understanding and evaluation of counter-UAS solutions, check out these Detection Technologies and Mitigation Technologies white papers.
CNN obtained a U.S. federal law enforcement bulletin that details an attempted drone attack on energy infrastructure in the U.S. in 2020. A drone crashing near a Pennsylvania power substation was likely part of an attempt to damage or disrupt the electric equipment.
Popular Mechanics has some illuminating details about the incident:
The perpetrators specifically modified a commercially available DJI Mavic 2 drone to short out an electrical substation that provided power to thousands of people…The bad actors also modified the drone with two four-foot-long nylon ropes connected by a length of copper wire. Federal intelligence experts believe the drone was meant to overfly the substation, using the copper wire in order to create a ‘short circuit to cause damage to transformers or distribution lines,’ according to CNN.
Maybe it seems surprising that the perpetrator(s) used a commercially available drone, but this is often the case. The combination of technological advances, lower prices, intuitive controls and increased consumer interest means that the number of consumer drones is quickly multiplying around the globe. Many consumer drones can fly long distances and carry heavy payloads, and they are even durable in inclement weather, making them an attractive prospect for criminals.
A CNN article about this incident contains an important quote preparing us to expect more attacks on critical facilities:
“All of the attention being paid to cybersecurity right now is important, but we have to remember that physical threats to the grid like this are quite real,” said Marty Edwards, a former senior DHS official who is now vice president of operational technology at security firm Tenable.
Lay people tend to think of terror attacks or assassination attempts when they hear the term “drone incident.” Such attacks certainly get a lot of play in the media, as we saw with the attempted assassination of the Iraqi Prime Minister earlier this week. But a critical infrastructure attack could potentially affect millions of people and could cause severe disruption in a city, state or even country. Facilities that do not yet have effective counter-drone technology in place should begin preparing immediately.
Please stay tuned for my next blog post, which will look at the Iraqi drone incident and two important lessons we can learn from it…
Anti-Drone protection for Critical Facilities & Infrastructure
D-Fend Solutions’ Constantly Updated Drone Incident Tracker
I love the song “Jamming” by Bob Marley and the Wailers. It instantly relaxes me and puts a smile on my face, and gets me thinking about a traditional counter-small, unmanned aerial system (C-sUAS) approach:
Jamming-based solutions, or hybrid solutions featuring jammers for mitigation, emit large amounts of energy to block drones’ controller signals. Looking at a specific sector, such as critical facilities and infrastructure, shows why jamming is not the ideal core for a comprehensive counter-drone strategy.
Jammers can interfere with radio communications, which could hamper communications in the vicinity during an intrusion, such as a potentially hostile rogue drone rapidly approaching a power plant. Think such an intrusion is a far-fetched scenario?
Two different drone swarms invaded the Palo Verde nuclear power plant in September 2019, according to David Hambling, a Forbes contributor: “Security forces watched, but were apparently helpless to act as the drones carried out their incursions before disappearing into the night.”
Jamming solutions do not provide full control, as drone operators can regain access to the drone once the jamming ceases. This means that a critical facilities security team member could temporarily disconnect a hostile drone from its remote control, only to watch the operator regain access to that threatening drone the second the jamming ceased!
Also, drones that get jammed can behave unpredictably, sometimes plummeting to the ground, which could endanger the facility’s employees or machinery.
To be clear, jamming can be a nice complement to radio frequency (RF)-based takeover technology as part of a multi-layered, holistic defense.
During a high-stress situation, a critical facilities security team needs a dependable counter-drone solution that will not only quickly neutralize the threat, but also preserve their operational continuity and communications. Takeover technology will offer critical facilities personnel, as well as organizations in other sectors, peace of mind:
Don’t worry about a thing,
‘Cause every little thing gonna be all right.
– Bob Marley, Three Little Birds
This blog is not about politics. However, with election season upon us, it’s an opportune moment to reflect on how we can safeguard our ...
As drones continue to proliferate, they present a growing and complex set of security challenges. For the past 100 weeks, we’ve spotlighted notable ...
South Korea has experienced a sharp rise in unauthorized drone activities in recent years, posing serious threats to national security, public safety, and ...
In today’s world, where technology evolves at a breakneck pace, unmanned aerial systems (UAS), or drones have become both a marvel and a menace. While ...
The Growing Threat of Drones in Complex Environments In the rugged terrain of a conflict zone, a covert military mission is underway. Suddenly, the ...
The rapid evolution of drone technology has brought about significant benefits across various industries, from agriculture to entertainment. However, it ...
The proliferation of unmanned aerial vehicles (UAVs) in cross-border illicit activities is a growing concern for border security agencies, ...
The Federal Aviation Administration (FAA) has ramped up its enforcement of drone safety violations, proposing over $341,000 in civil fines between ...
In a recent episode of the Irregular Warfare Initiative (IWI) podcast, titled "Drones Are Here to Stay: The Proliferation of Unmanned Aerial Systems ...
The booming popularity of unmanned aerial vehicles (UAVs) or drones, has introduced a new layer of complexity for stadium security, especially during ...
In the ever-evolving landscape of security threats, critical infrastructure sites like nuclear facilities face an increasingly complex challenge: ...
Miniature unmanned aerial vehicles (sUAVs), categorized by the Department of Defense as Types 1 and 2, encompass a wide array of aerial systems ...
The soaring popularity of drones has ushered in a new era of convenience and innovation. However, their increasing presence has not come without its ...
Enhancing Modern Naval Defense Against the Ever-Present Drone Threat: The proliferation of commercially available drones, or Unmanned Aerial Systems ...
The commercial drone industry has revolutionized efficiency and safety across numerous sectors. However, this versatility also presents a growing concern: ...
The rapid proliferation of cheap commercial drones, particularly those manufactured by Chinese companies, is creating a significant security challenge for ...
Drones, with their rapidly advancing design and functionality, could potentially become the weapon of choice for terrorists seeking to conduct ...
The rapid advancement of drone technology has fundamentally reshaped airspace dynamics, with UAVs finding applications across a myriad of sectors. This ...
The drone threat landscape is constantly evolving. From the battlefield all the way to our own neighborhoods, keeping the skies safe and confronting ...
The swift evolution of Unmanned Aircraft Systems (UAS) has ushered in a wave of significant changes across numerous fields, from delivery logistics to ...
Drone technology has advanced dramatically since its inception, and the proliferation of drones buzzing around urban environments is surging. From ...
Weaponized drones may dominate war zone headlines, but a different aerial threat looms over the American homeland. The increasing availability of cheap, ...
As drone-related disruptions surge globally, it’s evident that traditional security measures are inadequate against the evolving threat posed by ...
When you think of drone incidents and airports what comes to mind? The Dublin Airport incidents? Or what about the Reagan Airport incident? While years ...
From airspace intrusions to surveillance to smuggling contraband, drones have become the tool of choice for different degrees of malicious activities. ...
This year was the 25 th edition of Intersec , a leading business event for safety and security, and it was a great opportunity for our team to ...
Conquer, Soar, and Roar! What an epic week in Athens, Greece, at D-Fend Solutions ’ SKO! Our 2024 Sales Kick-Off was a massive success, filled ...
Five years have passed since the infamous incident at Gatwick Airport. Since then, some airports around the world started to ‘arm’ themselves with ...
As part of my role at D-Fend Solutions, I track open-source drone incidents in the public domain, which makes for a revealing journey into the world of ...
When D-Fend announced the launch of EnforceAir2 a few months ago, the many benefits that the new system offers became very clear, including enhanced, ...
We recently had the opportunity to attend the AUSA 2023 Annual Meeting & Exposition , in Washington, DC. AUSA is an annual gathering that serves as ...
D-Fend Solutions has recently taken a transformative step, concurrent with the introduction of EnforceAir2 , in offering new Multiuse Deployment Bundles ...
In the ever-evolving landscape of technology and security, my journey has taken a compelling turn with my recent foray into the world of counter-drone at ...
In a display of solidarity and support, I had the opportunity to participate in the Border Patrol Protection Foundation’s Honoring the Green 2023 charity ...
D-Fend Solutions is proud to introduce EnforceAir2 – a next generation, counter-drone solution that delivers more power, performance, portability, ...
Remote ID (RID) refers to a drone’s transmission of its location and certain identification data in a standardized, public, and non-encrypted format. ...
Artificial Intelligence (AI) has emerged as a game-changer across many industries, revolutionising the way we conduct our lives, and the drone industry is ...
In the first half of 2023, the wave of significant drone incidents continued to capture headlines, pointing to the need for effective counter-drone ...
In June 2023, we had the privilege of participating in the National Sheriffs Association (NSA) Conference. This influential gathering brought together ...
Attending the 2023 AUVSI XPONENTIAL show in Denver last month was an unforgettable experience for me, as a Presales Engineer at D-Fend Solutions. The ...
Port operations are crucial for global trade, with ports serving as gateways for billions of dollars' worth of cargo. However, the increase in unauthorized ...
In my last blog ‘ Airpor t Drone Mitigation -Part 6: So, Is Jamming a Viable Solution for Airports? , ’ we discussed how a hand-held jammer ...
Drone safety is the law, as the Federal Aviation Administration explains. Before flying a drone in the US, many rules must be considered, particularly ...
In a series of recent blog posts focused on airport drone mitigation , Mark Rutherford , our Sales Director in the UK, explained what is jamming, its ...
Civil aviation provides the means of transporting millions of passengers and tons of goods to all corners of the globe. In the U.S. alone, more than 5,000 ...
My previous blog examined the current state of the rogue drone threat in the context of notable incidents perpetrated by criminals across various ...
The commercial drone market experienced major growth in 2022, and this trend is expected to continue as drones become more affordable, accessible, and ...
The start of 2023 has seen drone incidents at prisons happening everywhere, which brings to mind the title of the current movie “ Everything Everywhere ...
Why Study Jammers? As a reminder of why we’re looking at jamming in this series of blogs, it’s clear that many airports either have no C-UAS or ...
The Intersec Expo has been around for more than 20 years, addressing issues facing world-leading emergency services, security, and safety. This year, the ...
In the previous post - Drone Jamming Effectiveness at Airports - we discussed the effectiveness, features, and limitations of jammers. Specifically, we ...
As we get older, it seems that we celebrate the New Year more frequently, doesn’t it? I mean, it feels like the year gets shorter and shorter, even ...
Not a simple issue. As discussed in my previous post ( Types of Jammers ), each type of jammer brings drawbacks and limitations to airport ...
In my last post - The Issues with Jamming Drone Frequencies - we started to dig into why jammers may not be the ideal solution to protect airports from ...
Delivering service is a privilege. As a global professional service team leader, with years of experience, I can say that delivering service is not only ...
In my previous blog post– What is Jamming and How does it Work? , we reviewed “Jamming 101” topics – what are jammers, and how they operate. In ...
In my previous blog – Why Mitigating the Increase in Rogue Drone Activity in the Vicinity of Airports Has Been Such a Hard Nut to Crack – Until Now? ...
There are thousands of drone companies today, some focused on specific vertical industry fields or sectors, others on more horizontal general commercial, ...
A few years ago, it became clear that the coordination and management of unmanned aircraft systems (UAS) – or drones – was an important and critical ...
D-Fend Solutions was proud to attend and exhibit at this year’s Association of the United States Army (AUSA) convention! AUSA is a well-established and ...
Drone delivery-driven consumer commerce, from giant retailers such as Amazon and Walmart , is becoming a reality. In the US, California, Texas, Ohio and ...
I am a technology guy. I love all aspects of technology and its innovative capabilities. More than ten years ago, I started working with the US Marine ...
Last month, I had the pleasure of attending the IDGA Counter-UAS USA Summit in Alexandria, VA. The event featured many impressive speakers, including US ...
The constantly broadening range of Counter-Drone (C-UAS) Detection and Mitigation Technologies available today makes an efficient assessment incredibly ...
I was born and grew up in Brazil. Back then, there was so much hope, and Brazil was often called “The Country of the Future.” (Even though this hopeful ...
While drone incidents at airports have garnered headlines recently, see Ilana Brodesky’s blog The Challenge of Drone Incidents at Airports , there is ...
On July 21, 2022, a drone incident at Ronald Reagan National Airport in Washington, DC, halted flights for about 45 minutes. While this is by far ...
Drone Proliferation: The Good, the Bad, and the Dangerous In 2020, the total number of consumer drone shipments worldwide was around five million ...
Military forces, airports, borders, and prisons all saw notable dangerous drone incidents While 2022 has seen drones continue to become integrated ...
As drones increasingly become a significant threat around the world, security and safety are imperative. In fact, the Russia-Ukraine war has brought ...
In a previous blog post , I explained the importance of operational flexibility when handling drone threats in today’s society, given different ...
The threat from rogue or nefarious drones is not going anywhere. In fact, as drones continue to evolve, the risks will increase and add further dangers and ...
An entire book can be written about drone accidents and incidents that occur worldwide, either due to careless, inexperienced drone operators, or ...
Last week, I joined some of my colleagues at D-Fend Solutions and attended the Special Operations Forces Industry Conference – SOFIC . It counts as one ...
As drone usage continues to thrive offering a variety of benefits to different sectors around the world, the potential threats caused by rogue drone ...
Although it sounds like a weird question, truth is, there is some logic to it… There are drones, and there are rogue drones. Commercial and DIY drone ...
The BBC reports that last month there were days’ worth of mysterious drones sightings over key sites in Sweden, including three nuclear sites and the ...
Rogue drones smuggling contraband – weapons, drugs, cellphones, etc. – has been an issue for years, but it seems to have significantly spiked in the ...
America’s stalled supply chain has become a problem and U.S. Transportation Secretary Pete Buttigieg offered a partial ...
There seems to be some confusion in the counter-drone space about the definitions of “cyber-takeover” and “spoofing.” I have even heard top ...
After blogging about the attempted drone attack on electrical infrastructure in Pennsylvania, I want to turn my attention to another major incident that ...
CNN obtained a U.S. federal law enforcement bulletin that details an attempted drone attack on energy infrastructure in the U.S. in 2020. A drone ...
Drone tracking methods and the associated technology are constantly evolving, but there is an important capability that many security teams are currently ...
The issue of cybersecurity is expanding and evolving in the drone and counter-drone spaces. Traditional cyber concerns in the drone world referred either ...
The Federal Aviation Administration (FAA) recently released a Part 139 CertAlert informing Part 139 airport operators that airport emergency plans ...
Drones smuggling contraband into correctional facilities is still a major problem. An Associated Press story notes that following a deadly prison riot at ...
Effectively keeping borders safe from rogue drones has long been a challenging mission . Rogue or unauthorized drones are increasingly used to smuggle ...
Drones pose a major threat, according to a relatively recent article by Major Thomas G. Pledger, an Infantry officer in the U.S. Army National Guard, ...
D-Fend Solutions often leads discussions that encompass both detection and mitigation, due to our end-to-end full incident lifecycle capabilities. ...
Many of the traditional counter-small, unmanned aerial systems (C-sUASs) were designed for the battlefield. It seemed natural for military personnel to ...
My previous blog post was intended to help clarify some of the industry confusion around the term “remote ID ready” following the announcement of the ...
A Confusing Conversation There have been many industry discussions recently about remote ID for small, unmanned aerial systems (sUASs), following the ...
Four core concepts are at the heart of D-Fend Solutions’ product development, execution and roadmap: control , safety , focus and ...
Law enforcement personnel in California arrested a man this week that they allege was operating a small, unmanned aerial system (sUAS), or drone, with a ...
An EasyJet plane traveling at 320 miles per hour just after leaving the Manchester, UK airport, nearly collided with a recklessly piloted drone, according ...
As a child, I was fascinated by the poster in science class that showed zoological lifecycles. Seeing how an egg became a tadpole and then a tadpole ...
Misleading claims about the counter-drone space continue to proliferate, particularly regarding radio frequency (RF)-based, takeover technology. There are ...
A scary collision between a Chilean Navy helicopter and an unmanned aerial system (UAS) has once again highlighted the tremendous risk to aircraft posed by ...
I love the song “Jamming” by Bob Marley and the Wailers . It instantly relaxes me and puts a smile on my face, and gets me thinking about a ...
The Counter-Drone Drill blog has officially launched, and the sky is the limit. D-Fend Solutions’ talented team of bloggers is comprised of experts ...