Airports

Countless stories have been appearing in the news over the years regarding drone activity in federal airspace, citing safety concerns for passenger aircraft and disruption of airline operations. These risks are clear – a drone crash into an aircraft will cause damage to both vehicles. In 2012, the FAA established The FAA Modernization and Reauthorization Act, putting into law a requirement for hobbyist drone operators to contact their local airport management and the air traffic control tower if they plan to fly their drone within five miles of an airport.

Solution Overview

dedrone Solutions

  • Protects airport facilities and nearby flights
  • Compatible with radar technology and installations
  • Integrates into security and monitoring systems
  • Provides forensic evidence for law enforcements

How Dedrone Can Help

Detect drone

DedroneSensors detect drones up to 5 km away and give early warning of drone-based threats, often even before the drone takes off.

Alert Security Teams

Warnings and alerts are triggered automatically and can be sent to a mobile phone, monitoring platform, or any API-compatible system.

Seize Contraband

By knowing exactly when and where a rogue drone intrudes, authorities can seize any contraband the drone drops.

Capture drone

Once a drone is disabled, it can be retrieved, confiscated, and examined to determine the nature of the threat.

Track drone

By incorporating DedroneSensors and other sensors, such as camera, users can track the flight path of the drone and reveal the location of the pilot.

Provide evidence

All alerts, flight paths, and video footage of drone threats are automatically recorded and catalogued. These are easily exported to share with law enforcement.

Locate and arrest pilot

Dedrone’s direction-finding technology locates the positions of drones and their pilots, adding important situational awareness of the airspace.

Harden Security

Drones often look for security gaps, on both physical and IT infrastructure. By identifying potential areas of exploit, teams can examine their security for potential gaps.

Want to learn more?