Countless stories have been appearing in the news over the years regarding drone activity in federal airspace, citing safety concerns for passenger aircraft and disruption of airline operations. These risks are clear – a drone crash into an aircraft will cause damage to both vehicles. In 2012, the FAA established The FAA Modernization and Reauthorization Act, putting into law a requirement for hobbyist drone operators to contact their local airport management and the air traffic control tower if they plan to fly their drone within five miles of an airport.Solution Overview
Between December 19 and December 22, 2018, London’s Gatwick Airport runway was closed due to continued drone sightings, resulting in hundreds of canceled flights and thousands of affected passengers.
While Dedrone technology is deployed at many organizations around the world, international aviation organizations have not yet widely adopted counter-drone technology, leaving airports vulnerable to drone threats and incursions.
Every possible measure will be put in place to make sure this can’t happen again
DedroneSensors detect drones up to 5 km away and give early warning of drone-based threats, often even before the drone takes off.
Warnings and alerts are triggered automatically and can be sent to a mobile phone, monitoring platform, or any API-compatible system.
By knowing exactly when and where a rogue drone intrudes, authorities can seize any contraband the drone drops.
Once a drone is disabled, it can be retrieved, confiscated, and examined to determine the nature of the threat.
By incorporating DedroneSensors and other sensors, such as camera, users can track the flight path of the drone and reveal the location of the pilot.
All alerts, flight paths, and video footage of drone threats are automatically recorded and catalogued. These are easily exported to share with law enforcement.
Dedrone’s direction-finding technology locates the positions of drones and their pilots, adding important situational awareness of the airspace.
Drones often look for security gaps, on both physical and IT infrastructure. By identifying potential areas of exploit, teams can examine their security for potential gaps.