Detecting and Neutralizing Drone Threats

WHITE PAPER

Detecting and Neutralizing Drone Threats

Detecting and Neutralizing Drone Threats

WHITE PAPER

Detecting and Neutralizing Drone Threats

Types of Drone Detection Technology

How Drones Are Detected, and Threats Eliminated

Just as the drone market continues to develop rapidly, so does the airspace security market. Many come to Dedrone to help make sense of it all - starting with how does drone detection work? In our thousands of conversations across the world, we always begin by building a foundation of terminology.

Active detection: to radiate

  • Radar: A device that uses radio energy to detect an object. A radar sends out a signal, and then it catches the reflection, and uses this information to measure direction and distance.
DedroneSensor, Radar and PTZ
DedroneSensor (RF), Radar, PTZ Camera

Passive detection: to receive

  • Radio receiver: This is a sensor that has antennas to identify radio frequencies and radio waves.
  • Audio sensor: Also known as a microphone, which acts as the “ears” to detect sound.
  • Optical sensor: Another way to say a camera, which is a device that can sense changes of light and can record images and video.

Dedrone’s system gathers information from various sensors, analyzes it, and triggers a response. Our software is sensor agnostic, meaning it can connect to a variety of detection technologies. Dedrone’s data processing software, DedroneTracker, is a machine-learning program that fuses sensor data to make a near instantaneous decision whether or not a drone is a threat.

Passive Drone Countermeasures

Passive Drone Countermeasures

Passive countermeasures protect your facility by leading people to safety, blocking sensitive areas from view, locking (cell) doors and gates, shutting down parts of the IT infrastructure, and searching for dropped objects.

  • Trigger alerts: Security personnel can be immediately alerted to the presence of a drone through alarms or messages sent to their computers or other monitoring devices.
  • Secure Wi-Fi network: For those concerned with data hacking, shutting off the Wi-Fi network temporarily while the drone is located will prevent hacking threats.
  • Lead people and sensitive information out of the line of sight: If a drone is hovering over a crowd, move them to a covered area.Another example would be to move people in an office or conference room away from a window.
  • Block view: Deploy a retractable roof, close windows or shield protected assets and people.
  • Deploy fog bombs, strobe lights, or other distractions:  Interrupts the line of sight to the drone pilot’s intended target. Particularly useful for espionage.
Block view
Automatically triggered windows in case of a drone alert

Take precautions to protect your facility

Drone pilots can easily conduct reconnaissance of a protected site with a drone. DroneTracker’s analytics and instant reporting allows security teams to recognize patterns in drone activity and use this information to adjust standard operating and response procedures. Protect your site from drones before an incident occurs!

Advantages

  • Highly effective
  • Does not need authorization or approval
  • Granular control

Disadvantages

  • Does not directly stop drone flight

Active Defense

Active Defense

Active countermeasures stop the drones in flight. Many drone defensive measures require legal permission to implement, or are reserved for use by government agencies.

  • Jammer: A jammer sends a jamming signal that overrides and interrupts the radio link between the remote control and the sUAS. The jammer’s signal interferes with the drone’s communication channels and hinders navigation. In most cases, this causes the sUAS to stop and forces landing. Jamming is considered the most effective countermeasure. Learn more about the DedroneDefender and DroneDefender.
  • Spoofer: Spoofing involves sending false data signals to the sUAS, over- powering its original signal. The spoofed data signals cause the sUAS to think these new signals are correct. Spoofing can be used to divert the drone from its actual route.
  • Hacking: Similar to spoofing, the sUAS is sent exploit tools to override the drone signal. The aircraft becomes confused and deviates from its course. In a few cases, depending on the drone model, it is even possible to take control.
  • Net Gun: A net that captures an sUAS, shot from an air cannon.
  • DroneCatcher: An sUAS equipped with a safety net that chases the malicious or unwanted drone and tries to capture it.
DedroneDefender

Destroyers

  • Laser: An optical device that shines a powerful beam of light or radio energy at the drone. Depending on the power of the laser, it can burn or blind the hard- ware or camera.
  • Electromagnetic Pulse (EMP): A generator emits a pulse of energy that, if strong enough, can damage weakly shielded electronics.
  • High Energy Microwave: Microwaves are generated by an antenna - like the ones in microwave ovens that heat food. If a kernel of corn is placed in a microwave, it will explode into popcorn. If a high energy microwave targets a drone, it will be destroyed.

DedroneDefender

DedroneDefender

DedroneDefender reimagines mitigation technology by delivering a sleek, connected gun for targeted precision Radio Frequency (RF) jamming. Given its small, lightweight form factor and ease of use, DedroneDefender is the ideal counter-drone mitigation solution for civilian, state and local law enforcement in urban environments.

At only 7.5 pounds and just 22 inches long, DedroneDefender is one of the lightest and smallest precision jamming systems available on the market. It comes equipped with narrow-band jamming to minimize disruption to other devices and meets military standard MIL-STD-810H. DedroneDefender’s use of narrow-band or “comb” jamming reduces the risk of interference with other systems in the area like Wi-Fi and is specifically configured to the identified malicious drone’s protocols as prescribed by DedroneTracker detection solution. Once communications are interrupted on a drone, it enters a pre-programmed safety mode to minimize risk to others and damage to the drone.

DroneDefender

Dedrone’s capabilities seamlessly integrate with a wide variety of sensing and mitigation products to amplify capabilities and allow for personalized solutions. For organizations with authorization to use offensive mitigation technologies, Dedrone offers DroneDefender. DroneDefender is an RF-based defeat system that has been adopted as a handheld solution to counter small UAS such as quadcopters and fixed wing airframes, without compromising surrounding safety or risking collateral damage.

  • Remote Control disruption
  • GPS receiver disruption
  • Non-kinetic
  • Handheld
  • Minimizes risk for collateral damage

How to start

How to Start

Contact our team for more information. We would also be pleased to put you in contact with a Dedrone customer in your industry!

Free Download

Download White Paper

You can get a PDF version of this White Paper for free here.

Detecting and Neutralizing Drone Threats

Get the Friends of Dedrone News

Get in touch

  • US DC area (HQ)
    +1 703 2608051
  • US SF number
    +1 415-813-6116
  • UK number
    +44 3303 410920
  • DE number
    +49 561 8617990

© Dedrone   |   Privacy   |   Patents   |   Credits