The Current & Future State of Airspace Defense

White Paper

The State of Airspace Defense Today and What’s Next

Introduction

The Threat of Warfare Has Changed: Airspace is the New Frontline

Changing Battlefield

For more than one hundred years, from the start of World War I in 1914 through Russia’s full-scale illegal invasion of Ukraine in 2022, airspace supremacy in battle, was defined by the nation with the most advanced crewed aircraft and the best-trained pilots. These platforms were expensive, built to last, and financially painful to lose. That model no longer holds. Uncrewed Aerial Systems (UAS) — cheap, autonomous, and increasingly stealthy — are rewriting the rules of modern warfare. Drones require no runways, no hangars, nor flight crews, and in some cases, no pilots at all. They can be launched from parked trucks, flown from outside national borders, and even controlled remotely from thousands of miles away.

Two recent operations underscore how decisively drones have upended traditional air defense. First, on 1st June, 2025, Ukraine’s “Spider’s Web” operation deployed 117 explosive drones concealed in cargo trucks deep inside Russia. These drones destroyed nuclear-capable bombers across five regions, inflicting an estimated US$7 billion in damage. With an operational cost of roughly US$234,000, this is a stark illustration of how an inexpensive drone can disable or destroy a US$100 million aircraft.

Ukraine’s “Spider’s Web” operation

Twelve days later, Israel’s “Operation Rising Lion” operation demonstrated the power of prepositioned drones paired with a more traditional attack. Small explosive drones, planted months earlier, disrupted Iranian radar and communications, clearing the way for over 200 fighter jets, including advanced F-35s, to strike more than 100 military and nuclear targets. The result was a seamless integration of autonomous platforms and crewed airpower in a single, synchronized assault.

Governments are Responding

The EU’s €800 billion ‘ReArm’ initiative, running through 2027, lists drone and counter-UAS (cUAS) as a “pressing capability priority.” NATO allies have committed to raising defense spending to 5% of GDP, more than double the previous target. These investments acknowledge not only the threat from low-cost commercial copter drones but also the rise of advanced systems like fibre-optically controlled drones, immune to jamming¹, fixed-wing, DIY, insect-sized, spoofing² drones and more.

The implications are clear: airspace can now be breached without an attacker ever entering the target country. Drones can cross borders without using airfields, remain dormant for weeks or months, and strike with precision while operators stay undetected, unchallenged, and often untraceable.

This report draws on Dedrone’s operational datasets from 2024 and 2025 across Europe, the Middle East, and Asia, to examine evolving drone behaviors and tactics. It analyzes patterns in border crossings, night operations, manufacturer profiles, and detection methods, identifying how these behaviors are shifting and what they reveal about the next phase of the threat.

¹ Jamming — Disrupting communications or sensor signals to prevent systems from operating normally.
² Spoofing — Sending false signals to mislead systems or operators into acting on inaccurate information.

Section 1

Drones Rule the Skies

Today, inexpensive and expendable or attritable drones are overturning more than a century of assumptions about air defense and reshaping how nations protect themselves. Real-world conflicts have proven this shift and exposed the limits of air defenses designed for conventional threats. Drones, especially when deployed in swarms or paired with real-time intelligence and traditional attack systems, can dismantle defensive systems before they even activate. These are not isolated anomalies — they are early demonstrations of a broader change in how military power is applied.

Dedrone’s 2025 network data confirms that these tactics are becoming routine. With only three months remaining in the year, 37.5% of detections across Europe, the Middle East, and Asia have occurred at night, indicating operators are deliberately exploiting reduced-visibility conditions to bypass traditional surveillance.

New technologies are further amplifying the threat. Drones equipped with electronic warfare (EW) capabilities can jam or spoof communications, disrupting both detection and countermeasures. Many operate quietly enough to avoid notice until it is too late, creating a persistent psychological pressure on those personnel charged with holding ground or physically protecting key assets. These loitering threats that are invisible, unpredictable, and capable of striking without warning.

Taken together, these patterns signal a strategic upheaval. The combination of low-cost platforms, stealth-focused tactics, and advanced counter-surveillance tools means that airspace can no longer be secured by traditional measures alone. Drones are not just adding a new layer to the threat environment, they are redefining it. This is forcing militaries to rethink how, where, and when defenses must operate. The countries that fail to adapt will face adversaries able to strike with precision, cross borders at will, and exploit vulnerabilities faster than legacy systems can respond.

Section 2

The Tactical and Economic Imbalance of Today’s Warfare

For decades, air defenses were expensive and built on the assumptions that threats would be both detected with time to react as well as worth meeting with equally expensive countermeasures. That logic has collapsed. Inexpensive, UAS now force militaries to either employ multimillion-dollar interceptors or improvise dangerous, close-range responses — both of which hand the advantage to the attacker.

Dedrone’s 2025 data from Europe, the Middle East, and Asia shows that just three categories - DJI, Autel, and DIY builds -  accounted for 94.70% of all detections:

  • DJI is the global consumer drone leader known for its compact quadcopters and cinematic camera drones used by hobbyists, enterprises, and prosumers alike. Their drones accounted for 83.48%  of all drone detections in our 2025 dataset. Even as DJI faces bans and restrictions in the U.S., its systems remain widely available and heavily employed internationally, giving it a dominant role in operational theaters.
  • Autel is a growing competitor offering high-performance camera drones and industrial-grade platforms used in mapping, inspection, and surveillance missions. The percentage of Autel drones detected in 2025 accounted for 1.40% of the total etected drones.
  • DIY builds is a category representing home-assembled drones including some first-person-view (FPV) kits built from off-the-shelf components often used by hobbyists, skill-users, and improvised operators. Detections of DIY drones grew accounted for 9.82% of all drones detected in 2025, representing a 4.3x from 2024.

The remaining 5.3% of detections are spread thinly across dozens of other manufacturers. This concentration means that today, the overwhelming majority of drones in operational theaters come from well-known, commercially available ecosystems, and they’re being used at scale.

Looking back at 2024 (Jan–Aug), DJI also dominated the threat picture but to a much greater extent. DIY has grown as have many smaller other drones that gained share. This shift toward diversity indicates the fast pace of evolution of drone threats as pilots expand their horizons to other, harder to detect, platforms.

With this narrow but growing set of platforms, the defender’s economics become even more lopsided if they fail to adapt. Consider:

  • An explosive-laden $500 FPV build (seen in all categories) can destroy an F-35 Fighter Jet costing $82.5M
  • An off-the-shelf DJI quadcopter, retailing for under $2,000, can still be enough to trigger scrambling interceptors or activating other high-cost systems.
  • Even when militaries use cheaper intercept options, each engagement still consumes valuable time, personnel, and logistical resources. These costs add up fast.

Because attackers can mass-produce and replace these drones for a fraction of the cost it takes to stop them, the economic imbalance is unsustainable for defenders.

The concentration in DJI, Autel, and DIY is a problem, but it is also an opportunity:

  • Detection & classification tuning: Optimizing systems for the radio frequency (RF) signatures, telemetry, and flight behaviors of these three categories will immediately improve detection rates and reduce false positives.
  • Playbooks & drills: Operators can train on realistic engagement scenarios that reflect almost 95% of the actual threat environment, instead of spreading training thin across dozens of unlikely cases.
  • Cost-effective intercept options: By designing or procuring counter-UAS systems specifically optimized for the most common platforms, militaries can close the gap between the cost to attack and the cost to defend.

Right now, the concentration of detections around DJI, Autel, and DIY builds looks like an opportunity for defenders: tune sensors, optimize countermeasures, and focus operational planning against the nearly 95% of known threats. But the reality is harsher. In this kind of warfare, even if defenses neutralize nearly all of that 95%, a single drone slipping through can cause outsized damage. That asymmetry does not disappear; it simply shifts. This is what makes the new battlespace so unsettling: defenders cannot afford to miss even once.

Section 3

The Persistent and Fast Pace of Drone Evolution

Drone warfare is evolving at a pace that traditional defense systems were never built to match. What once required years of research, prototyping, testing and procurement can now be achieved in a matter of months, or even weeks, thanks to cheap components, global supply chains, and open-source knowledge. This isn’t just a technological shift, it’s a complete inversion of the old rules of air dominance, one where speed and adaptability matter more than size or cost.

Every breakthrough in drone capability has triggered an equally creative response from defenders, only to be met with yet another adaptation from attackers. Early off-the-shelf quadcopters were vulnerable to radio jamming. Pre-programmed drones bypassed this by eliminating the need for a live signal. GPS jammers appeared, so attackers adopted inertial navigation to fly without satellite guidance. Then came fiber-optic tethers, removing radio emissions entirely, making drones undetectable by conventional sensors. The cycle continued with FPV kamikaze drones, which turned consumer tech into precision-guided weapons, and swarms that overwhelm defenses through sheer volume.

These advances are no longer the domain of state militaries. DIY kits, 3D printing, and global online marketplaces mean insurgents, militias, and even criminal networks can field sophisticated aerial capabilities. The tools required, coding forums, consumer-grade parts, and a few thousand dollars, are far more accessible than the fleets of jets and trained pilots that defined air power for the last century+. The “minimum viable air force” is now a hobbyist’s project, and that reality permanently shifts the balance of power.

Artificial intelligence (AI) is supercharging this cycle. Generative AI and adversarial simulation allow operators to design, test, and refine novel drone tactics in virtual environments before they are ever flown. This means autonomous targeting, real-time swarm coordination, and adaptive mission profiles can be developed and deployed MUCH faster than traditional defense R&D can respond. Open-source AI models make these capabilities available not only to militaries but to non-state actors. Soon, autonomous drones could adjust their own routes mid-flight, respond to jamming attempts, or select alternate targets without any human input.

The speed of this evolution means governments are often reacting to yesterday’s threat while tomorrow’s is already airborne. Defense agencies no longer have exclusive control over the rules of air dominance. AI-driven, low-cost innovation gives adversaries the ability to challenge even the most advanced militaries and the advantage will go to whoever can adapt fastest. If defenders fail to match this pace, the skies will belong to the most agile, not the most powerful.

The image above is from Crazyswarm2, an open-source drone swarm AI project on GitHub. It provides code, documentation, and examples that make coordinated multi-drone flight accessible to anyone with basic skills. What once required state labs and defense budgets can now be learned and deployed by hobbyists or armed groups using free online resources. This open access accelerates the spread of swarm tactics and puts advanced aerial capabilities into the hands of non-state actors.

Section 4

Expanding Threat Types Require a Sensor Shift

The modern drone threat is not just different, it is more complex. Over 80% of 2025 detections in Europe, the Middle East, and Asia were identified via RF systems, but the growing number of RF-silent flights shows how quickly the detection challenge is evolving. Operators are now employing drones in more varied and sophisticated ways than ever before:

  • RF-silent platforms that avoid detection by eliminating or masking signal emissions.
  • Swarms coordinating attacks to overwhelm defenses through shared targeting logic.
  • GPS-free navigation using Simultaneous Localization and Mapping (SLAM), Light Detection and Ranging (LiDAR), inertial navigation, or visual odometry.
  • Fiber-optic tethers that bypass jamming entirely.
  • Drone spoofing systems that impersonate friendly aircraft or feed false data into sensor networks.

At the heart of this adaptability is modularity, the ability to swap payloads, navigation systems, or sensor manipulators to fit the mission. A single airframe can be a decoy, a jammer, and a weapon in the same operation. This versatility blurs the line between kinetic and non-kinetic warfare, complicating decision-making and delaying coordinated responses. Drones are no longer just tools of war, they are adaptable disruption platforms.

The foundations of traditional airspace security were built around previously known threats such as fast aircraft at high altitude, steady radio emissions, and radar signatures large enough to stand out from background clutter. Drones break all of those assumptions. They fly low and slow, often without RF signals, and present radar cross-sections as small as birds. This matters because RF detection has long been the backbone of CUAS operations. When that backbone weakens, the rest of the system is at risk. An RF-silent drone does not just evade one sensor, it can create a blind spot across an entire defense network. The fight is no longer just to spot drones, but to anticipate new configurations before they appear. Without that shift in mindset, defenses will remain one step behind attackers who can change shape overnight.

Even if RF-silent flights remain a minority for the near-term, their impact is disproportionate. They force defenders to rethink their sensor mix, retrain personnel, and rework response procedures. Each adjustment takes time and resources, which is exactly what hostile operators hope to exploit.

The drop in RF detections is a warning, not a footnote. It signals that the tactics we face are evolving faster than many defenses are adapting. If counter-UAS strategies remain anchored to an RF-first approach, a growing share of the threat will be missed. The future of airspace defense will belong to those who can detect drones regardless of the signals they emit.

Section 5

Looking Ahead: Defense with Intelligence and Connectivity

The next generation of drone threats will be defined less by the airframes themselves and more by the intelligence, connectivity, and tactics behind them. These systems are already moving from concept to prototype to battlefield at a pace that outstrips traditional policy, planning and procurement cycles. The coming wave of capabilities will challenge both how we detect drones, and how we defend against them.

Emerging threats fall into three broad categories:

  • Saturation and Scale: Large “mothership” drones capable of carrying and deploying dozens of microdrones mid-flight are transforming how swarms are launched. Ukraine’s GOGOL-M, for example, has already been used to release explosive drones deep inside Russia. Once dispersed, microdrones can act independently or as a coordinated swarm, overwhelming defenses through sheer numbers. AI-driven swarm networks could take this further, with one operator controlling 100 or more drones, each able to adapt mid-mission without human direction.
  • Stealth and Evasion: The race to stay unseen is producing drones engineered with radar-absorbing materials, low-heat propulsion, and minimal electronic signatures. These systems can loiter undetected for extended periods before striking. Other designs eliminate or mask RF emissions entirely, navigating with visual or LiDAR based Simultaneous Localization and Mapping (SLAM), inertial systems, or even acoustic mapping to bypass GPS and avoid jamming. Advances in next-generation electric propulsion are pushing the possibility of near-silent flight closer to reality, making both RF and acoustic detection less reliable. Experimental concepts like insect-sized “cybugs” illustrate how miniaturization and biological integration could slip past conventional defenses to carry out espionage or sabotage inside secure facilities.
  • Cross-Domain Expansion: The drone threat is no longer confined to the sky. Uncrewed surface vessels (USVs) and underwater uncrewed vehicles (UUVs) are emerging as tools for port surveillance, ship sabotage, and maritime disruption, exploiting blind spots in traditional radar and sonar coverage. On land, unmanned ground vehicles (UGVs) are being adapted for reconnaissance, logistics, and explosive delivery in urban terrain. Supporting technologies such as multi-band communication relays and satellite-linked systems extend control across LTE, 5G, satellite, and private networks, ensuring operators can maintain contact even in contested environments.

These capabilities point to a fundamental shift: the fight will no longer be against individual drones but against complex, multi-domain operations that span air, surface, sub-surface, and land, often supported by electronic warfare such as jamming, spoofing, or digital sabotage. Defenses designed for one threat vector will fail when faced with many acting in concert. The advantage will go to those who can integrate sensors, interceptors, and decision-making across domains into an intelligent and networked line of detection linked to defense systems as quickly as the threat evolves. The battlefield of the future will belong to the side that can adapt not just to new drones, but to entirely new ways of employing them.

Section 6

Looking Ahead: Defense with Intelligence and Connectivity

The next generation of drone threats will be defined less by the airframes themselves and more by the intelligence, connectivity, and tactics behind them. These systems are already moving from concept to prototype to battlefield at a pace that outstrips traditional policy, planning and procurement cycles. The coming wave of capabilities will challenge both how we detect drones, and how we defend against them.

Emerging threats fall into three broad categories:

  • Saturation and Scale: Large “mothership” drones capable of carrying and deploying dozens of microdrones mid-flight are transforming how swarms are launched. Ukraine’s GOGOL-M, for example, has already been used to release explosive drones deep inside Russia. Once dispersed, microdrones can act independently or as a coordinated swarm, overwhelming defenses through sheer numbers. AI-driven swarm networks could take this further, with one operator controlling 100 or more drones, each able to adapt mid-mission without human direction.
  • Stealth and Evasion: The race to stay unseen is producing drones engineered with radar-absorbing materials, low-heat propulsion, and minimal electronic signatures. These systems can loiter undetected for extended periods before striking. Other designs eliminate or mask RF emissions entirely, navigating with visual or LiDAR based Simultaneous Localization and Mapping (SLAM), inertial systems, or even acoustic mapping to bypass GPS and avoid jamming. Advances in next-generation electric propulsion are pushing the possibility of near-silent flight closer to reality, making both RF and acoustic detection less reliable. Experimental concepts like insect-sized “cybugs” illustrate how miniaturization and biological integration could slip past conventional defenses to carry out espionage or sabotage inside secure facilities.
  • Cross-Domain Expansion: The drone threat is no longer confined to the sky. Uncrewed surface vessels (USVs) and underwater uncrewed vehicles (UUVs) are emerging as tools for port surveillance, ship sabotage, and maritime disruption, exploiting blind spots in traditional radar and sonar coverage. On land, unmanned ground vehicles (UGVs) are being adapted for reconnaissance, logistics, and explosive delivery in urban terrain. Supporting technologies such as multi-band communication relays and satellite-linked systems extend control across LTE, 5G, satellite, and private networks, ensuring operators can maintain contact even in contested environments.

These capabilities point to a fundamental shift: the fight will no longer be against individual drones but against complex, multi-domain operations that span air, surface, sub-surface, and land, often supported by electronic warfare such as jamming, spoofing, or digital sabotage. Defenses designed for one threat vector will fail when faced with many acting in concert. The advantage will go to those who can integrate sensors, interceptors, and decision-making across domains into an intelligent and networked line of detection linked to defense systems as quickly as the threat evolves. The battlefield of the future will belong to the side that can adapt not just to new drones, but to entirely new ways of employing them.

Conclusion

Looking Ahead: Defense with Intelligence and Connectivity

The next generation of drone threats will be defined less by the airframes themselves and more by the intelligence, connectivity, and tactics behind them. These systems are already moving from concept to prototype to battlefield at a pace that outstrips traditional policy, planning and procurement cycles. The coming wave of capabilities will challenge both how we detect drones, and how we defend against them.

Emerging threats fall into three broad categories:

  • Saturation and Scale: Large “mothership” drones capable of carrying and deploying dozens of microdrones mid-flight are transforming how swarms are launched. Ukraine’s GOGOL-M, for example, has already been used to release explosive drones deep inside Russia. Once dispersed, microdrones can act independently or as a coordinated swarm, overwhelming defenses through sheer numbers. AI-driven swarm networks could take this further, with one operator controlling 100 or more drones, each able to adapt mid-mission without human direction.
  • Stealth and Evasion: The race to stay unseen is producing drones engineered with radar-absorbing materials, low-heat propulsion, and minimal electronic signatures. These systems can loiter undetected for extended periods before striking. Other designs eliminate or mask RF emissions entirely, navigating with visual or LiDAR based Simultaneous Localization and Mapping (SLAM), inertial systems, or even acoustic mapping to bypass GPS and avoid jamming. Advances in next-generation electric propulsion are pushing the possibility of near-silent flight closer to reality, making both RF and acoustic detection less reliable. Experimental concepts like insect-sized “cybugs” illustrate how miniaturization and biological integration could slip past conventional defenses to carry out espionage or sabotage inside secure facilities.
  • Cross-Domain Expansion: The drone threat is no longer confined to the sky. Uncrewed surface vessels (USVs) and underwater uncrewed vehicles (UUVs) are emerging as tools for port surveillance, ship sabotage, and maritime disruption, exploiting blind spots in traditional radar and sonar coverage. On land, unmanned ground vehicles (UGVs) are being adapted for reconnaissance, logistics, and explosive delivery in urban terrain. Supporting technologies such as multi-band communication relays and satellite-linked systems extend control across LTE, 5G, satellite, and private networks, ensuring operators can maintain contact even in contested environments.

These capabilities point to a fundamental shift: the fight will no longer be against individual drones but against complex, multi-domain operations that span air, surface, sub-surface, and land, often supported by electronic warfare such as jamming, spoofing, or digital sabotage. Defenses designed for one threat vector will fail when faced with many acting in concert. The advantage will go to those who can integrate sensors, interceptors, and decision-making across domains into an intelligent and networked line of detection linked to defense systems as quickly as the threat evolves. The battlefield of the future will belong to the side that can adapt not just to new drones, but to entirely new ways of employing them.