{"id":12858131,"date":"2026-02-16T15:21:10","date_gmt":"2026-02-16T20:21:10","guid":{"rendered":"https:\/\/www.philstockworld.com\/?p=12858131"},"modified":"2026-02-16T15:25:55","modified_gmt":"2026-02-16T20:25:55","slug":"counter-drone-technologies-are-evolving-but-theres-no-surefire-way-to-defend-against-drone-attacks","status":"publish","type":"post","link":"https:\/\/www.philstockworld.com\/2026\/02\/16\/counter-drone-technologies-are-evolving-but-theres-no-surefire-way-to-defend-against-drone-attacks\/","title":{"rendered":"Counter-drone technologies are evolving \u2013 but there\u2019s no surefire way to defend against drone\u00a0attacks"},"content":{"rendered":"<h2 class=\"theconversation-article-title\"><span class=\"nobr\">Counter-drone<\/span> technologies are evolving \u2013 but there\u2019s no surefire way to defend against drone attacks<\/h2>\n<div class=\"theconversation-article-body\"><a href=\"https:\/\/theconversation.com\/profiles\/jamey-jacob-1436174\">By Jamey Jacob<\/a>, <em><a href=\"https:\/\/theconversation.com\/institutions\/oklahoma-state-university-2062\">Oklahoma State University<\/a><\/em><\/div>\n<div>\u00a0<\/div>\n<div class=\"theconversation-article-body\">\n<p>When the Federal Aviation Administration <a href=\"https:\/\/apnews.com\/article\/faa-el-paso-texas-air-space-closed-1f774bdfd46f5986ff0e7003df709caa\">closed the airport in El Paso, Texas<\/a>, and the airspace around it on Feb. 10, 2026, the cause was, ironically, the nearby use of a technology that could be key to keeping airports and airspace open and safe.<\/p>\n<p>According to news reports, Customs and Border Protection officials used a Department of Defense anti-drone laser weapon to <a href=\"https:\/\/www.nytimes.com\/2026\/02\/11\/us\/trump-administration-el-paso-airspace-closure-questions.html\">target what they identified as a drone<\/a> crossing the border from Mexico. The FAA closed the El Paso airport and airspace <a href=\"https:\/\/www.cbsnews.com\/news\/airspace-closure-followed-spat-over-drone-related-tests-and-party-balloon-shoot-down-sources-say\/\">out of concern<\/a> that the weapon inadvertently posed a threat to air traffic in the area.<\/p>\n<p>The targeted drone turned out <a href=\"https:\/\/www.nytimes.com\/2026\/02\/11\/us\/trump-administration-el-paso-airspace-closure-questions.html\">to be a party balloon<\/a>, though U.S. officials claim that drug cartels based in Mexico <a href=\"https:\/\/www.nytimes.com\/2026\/02\/11\/us\/trump-administration-el-paso-airspace-closure-questions.html\">have flown drones at the U.S.-Mexico border<\/a>. The episode highlights the need for counter-drone technologies, the state-of-the-art systems used by the U.S. military, and the challenges to safely and effectively countering drones, which are also known as uncrewed aircraft systems.<\/p>\n<p>I am an <a href=\"https:\/\/scholar.google.com\/citations?hl=en&amp;user=qiBGBO4AAAAJ&amp;view_op=list_works&amp;sortby=pubdate\">aerospace engineer<\/a> and director of the <a href=\"https:\/\/go.okstate.edu\/aerospace\/centers\/cuas\/\">Counter-UAS Center of Excellence<\/a> at Oklahoma State University, where we develop and evaluate technologies to detect, identify and counter drone threats. The military laser weapon CBP that personnel used near El Paso is an example of one of three categories of counter-drone technologies: directed energy weapons. The other two are radio frequency jamming and kinetic, or physical, weapons like missiles and nets.<\/p>\n<h2>The emerging threat<\/h2>\n<p>Starting in 2015, the ISIS terrorist group <a href=\"https:\/\/www.defenseone.com\/technology\/2017\/01\/drones-isis\/134542\/\">modified commercial off-the-shelf drones<\/a> to drop grenades and mortars on U.S. troops in Iraq and Syria, who had little way to combat the threat. This started the trend of modifying consumer drones for military purposes that continues to this day <a href=\"https:\/\/theconversation.com\/cult-of-the-drone-at-the-two-year-mark-uavs-have-changed-the-face-of-war-in-ukraine-but-not-outcomes-221397\">on the Russian-Ukrainian front lines<\/a>.<\/p>\n<p>While military bases ostensibly have some protective capabilities, critical U.S. infrastructure such as airports and power plants have few methods to track, let alone defend against, drones. For example, in 2018, traffic at London Gatwick International Airport in the U.K. was shut down for three days <a href=\"https:\/\/www.bbc.com\/news\/uk-england-sussex-46623754\">because of an unidentified drone<\/a> in the airport\u2019s airspace. Hundreds of flights were canceled, affecting over 100,000 passengers.<\/p>\n<p>Sites such as civilian and military airports, power plants and stadiums are vulnerable to drone flights, both from malicious and negligent operators. Drone flight over open stadiums such as those hosting upcoming FIFA World Cup soccer matches are banned by the FAA. But the ban wouldn\u2019t prevent an errant civilian drone or a drone used in a terrorist attack from entering a stadium and potentially causing serious harm to spectators.<\/p>\n<figure class=\"align-center zoomable\"><a href=\"https:\/\/images.theconversation.com\/files\/686572\/original\/file-20250820-56-nqlp80.png?ixlib=rb-4.1.0&amp;rect=0%2C154%2C2103%2C1182&amp;q=45&amp;auto=format&amp;w=1000&amp;fit=clip\"><img decoding=\"async\" src=\"https:\/\/images.theconversation.com\/files\/686572\/original\/file-20250820-56-nqlp80.png?ixlib=rb-4.1.0&amp;rect=0%2C154%2C2103%2C1182&amp;q=45&amp;auto=format&amp;w=754&amp;fit=clip\" sizes=\"(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px\" srcset=\"https:\/\/images.theconversation.com\/files\/686572\/original\/file-20250820-56-nqlp80.png?ixlib=rb-4.1.0&amp;q=45&amp;auto=format&amp;w=600&amp;h=428&amp;fit=crop&amp;dpr=1 600w, https:\/\/images.theconversation.com\/files\/686572\/original\/file-20250820-56-nqlp80.png?ixlib=rb-4.1.0&amp;q=30&amp;auto=format&amp;w=600&amp;h=428&amp;fit=crop&amp;dpr=2 1200w, https:\/\/images.theconversation.com\/files\/686572\/original\/file-20250820-56-nqlp80.png?ixlib=rb-4.1.0&amp;q=15&amp;auto=format&amp;w=600&amp;h=428&amp;fit=crop&amp;dpr=3 1800w, https:\/\/images.theconversation.com\/files\/686572\/original\/file-20250820-56-nqlp80.png?ixlib=rb-4.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;h=537&amp;fit=crop&amp;dpr=1 754w, https:\/\/images.theconversation.com\/files\/686572\/original\/file-20250820-56-nqlp80.png?ixlib=rb-4.1.0&amp;q=30&amp;auto=format&amp;w=754&amp;h=537&amp;fit=crop&amp;dpr=2 1508w, https:\/\/images.theconversation.com\/files\/686572\/original\/file-20250820-56-nqlp80.png?ixlib=rb-4.1.0&amp;q=15&amp;auto=format&amp;w=754&amp;h=537&amp;fit=crop&amp;dpr=3 2262w\" alt=\"A drone and a small airplane in the air near each other\" \/><\/a><figcaption><span class=\"caption\">A drone flies near a small airplane in a test at Oklahoma State University.<\/span> <span class=\"attribution\"><span class=\"source\">Jamey Jacob<\/span><\/span><\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p>On June 1, 2025, Ukrainian forces deployed more than 100 <a href=\"https:\/\/defensefeeds.com\/analysis\/what-is-a-kamikaze-drone\/\">\u201ckamikaze\u201d drones<\/a> deep in Russian territory in an attack labeled <a href=\"https:\/\/www.csis.org\/analysis\/how-ukraines-spider-web-operation-redefines-asymmetric-warfare\">Operation Spiderweb<\/a> that damaged a significant portion of Russia\u2019s bomber fleet. There is little stopping something like this from happening in the U.S.<\/p>\n<p>To address this threat, companies are evaluating numerous ways to track, identify and, most importantly, defeat drones and protect critical U.S. infrastructure. At present, however, there is no one-size-fits-all solution.<\/p>\n<h2>Counter-drone technologies<\/h2>\n<p>Radio frequency waves that both track and jam drones have become widely used in the Russia-Ukraine war. Like all remote control devices, drones use radio frequencies to control flight and monitor video coming from the drone camera. Detectors can track these radio frequency signals to determine a drone\u2019s location.<\/p>\n<p>Devices that emit radio frequency signals can be used to block, or jam, communications between drones and their operators or send false, or spoofed, signals. Jamming or spoofing a drone typically causes it to enter into a \u201creturn to home\u201d mode and leave the defended area. Radio frequency systems are helpful in situations where a low-impact response is required, because they prevent drones from completing their intended mission without causing physical damage to them.<\/p>\n<p>However, this doesn\u2019t necessarily work if a drone is operating in a \u201crun silent\u201d mode by not transmitting information back to a remote operator. Similarly, jamming GPS can cause a drone to lose its ability to navigate using the satellite system, but this also blocks GPS signals for other users. Drones can also navigate without GPS, with less accurate techniques such as following terrain with cameras or the <a href=\"https:\/\/www.britannica.com\/technology\/dead-reckoning-navigation\">dead reckoning<\/a> approach commonly used by pilots.<\/p>\n<p>Directed energy systems, on the other hand, use high-energy lasers or microwave beams to disable drones. These systems work by directing a concentrated beam of energy toward an incoming drone. A laser or microwave can heat components rapidly until the drone becomes inoperative. A laser can also disable a drone\u2019s camera, disabling its surveillance capability. Additionally, because these systems use energy beams, they can engage multiple drones at once.<\/p>\n<p>However, fast-moving drones may be difficult for the weapons to target, and the cost of such systems makes them prohibitively expensive for widespread use.<\/p>\n<p>Kinetic systems involve physically intercepting drones to neutralize them. This category includes everything from net-carrying interceptor drones to traditional projectile weapons, such as firearms and missiles. Kinetic systems physically disable or capture drones, making them particularly useful in scenarios where it is necessary to quickly remove drones from sensitive areas or when the drone presents an immediate threat.<\/p>\n<p>However, because a damaged aircraft can crash in unpredictable locations, these systems may be more effective in battlefields where falling debris is less likely to cause unwanted damage on the ground.<\/p>\n<figure><iframe loading=\"lazy\" src=\"https:\/\/www.youtube.com\/embed\/xb5qMvie9sU?wmode=transparent&amp;start=0\" width=\"440\" height=\"260\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><figcaption><span class=\"caption\">The U.S. military uses several counter-drone systems to defend against small drones.<\/span><\/figcaption><\/figure>\n<h2>Swiss cheese safety<\/h2>\n<p>Together, these three types of counter-drone technologies \u2013 radio frequency, directed energy and kinetic \u2013 provide a comprehensive tool kit for addressing the diverse threats posed by unauthorized drones. However, there is no single ideal solution to counter these threats.<\/p>\n<p>To maximize safety, the <a href=\"https:\/\/www.ebsco.com\/research-starters\/consumer-health\/swiss-cheese-model\">Swiss cheese model<\/a> is often the best approach. In this analogy, each defensive strategy is a slice of the familiar holey cheese. While some threats may pass through a hole in one layer, the next layer can capture what passes through. This way, a drone making it through the weaknesses in one system can be defeated by the next slice of cheese.<!-- Below is The Conversation's page counter tag. Please DO NOT REMOVE. --><img loading=\"lazy\" decoding=\"async\" style=\"border: none !important; box-shadow: none !important; margin: 0 !important; max-height: 1px !important; max-width: 1px !important; min-height: 1px !important; min-width: 1px !important; opacity: 0 !important; outline: none !important; padding: 0 !important;\" src=\"https:\/\/counter.theconversation.com\/content\/229595\/count.gif?distributor=republish-lightbox-basic\" alt=\"The Conversation\" width=\"1\" height=\"1\" \/><!-- End of code. If you don't see any code above, please get new code from the Advanced tab after you click the republish button. The page counter does not collect any personal data. More info: https:\/\/theconversation.com\/republishing-guidelines --><\/p>\n<p><a href=\"https:\/\/theconversation.com\/profiles\/jamey-jacob-1436174\">Jamey Jacob<\/a>, Regents Professor of Aerospace Engineering and Executive Director, Oklahoma Aerospace Institute for Research and Education, <em><a href=\"https:\/\/theconversation.com\/institutions\/oklahoma-state-university-2062\">Oklahoma State University<\/a><\/em><\/p>\n<p>This article is republished from <a href=\"https:\/\/theconversation.com\">The Conversation<\/a> under a Creative Commons license. Read the <a href=\"https:\/\/theconversation.com\/counter-drone-technologies-are-evolving-but-theres-no-surefire-way-to-defend-against-drone-attacks-229595\">original article<\/a>.<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Counter-drone technologies are evolving \u2013 but there\u2019s no surefire way to defend against drone attacks By Jamey Jacob, Oklahoma State University \u00a0 When the Federal Aviation Administration closed the airport in El Paso, Texas, and the airspace around it on Feb. 10, 2026, the cause was, ironically, the nearby use of a technology that could [&hellip;]<\/p>\n","protected":false},"author":183,"featured_media":12858132,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[26922,21,1,12,25391,26281,26295],"tags":[371,858,26302],"class_list":{"0":"post-12858131","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-market-news","8":"category-available","9":"category-uncategorized","10":"category-phils-favorites","11":"category-members-corner","12":"category-sciences","13":"category-technology","14":"tag-politics","15":"tag-science","16":"tag-tech"},"_links":{"self":[{"href":"https:\/\/www.philstockworld.com\/wp-json\/wp\/v2\/posts\/12858131","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.philstockworld.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.philstockworld.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.philstockworld.com\/wp-json\/wp\/v2\/users\/183"}],"replies":[{"embeddable":true,"href":"https:\/\/www.philstockworld.com\/wp-json\/wp\/v2\/comments?post=12858131"}],"version-history":[{"count":1,"href":"https:\/\/www.philstockworld.com\/wp-json\/wp\/v2\/posts\/12858131\/revisions"}],"predecessor-version":[{"id":12858133,"href":"https:\/\/www.philstockworld.com\/wp-json\/wp\/v2\/posts\/12858131\/revisions\/12858133"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.philstockworld.com\/wp-json\/wp\/v2\/media\/12858132"}],"wp:attachment":[{"href":"https:\/\/www.philstockworld.com\/wp-json\/wp\/v2\/media?parent=12858131"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.philstockworld.com\/wp-json\/wp\/v2\/categories?post=12858131"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.philstockworld.com\/wp-json\/wp\/v2\/tags?post=12858131"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}