To recap from part one of our cUAS Technology Series, there are two primary functions of cUAS technology: the first is to identify or detect drone activity. The second function is to intercept the airspace threat or defeat the drone.

Dedrone’s cUAS Technology Series covers each of these elements, breaking down the types of technologies and common questions. In this edition, we explore types of detection software. cUAS software takes the data collected from hardware, such as RF, cameras, acoustic sensors, and radar. Software amalgamates sensor inputs, performs machine-learning analysis, and is the central nervous system for a complete solution.

‍Counterdrone software is designed to make it easy to assess data and make decisions on how to approach an unwanted drone. The core elements of counterdrone software include:

‍Reliable, automated notifications and reporting

Security providers must be alerted in real-time when there is an intrusion, whether by email, SMS or through other operating picture/monitoring systems. Counterdrone software should have the ability to easily and quickly showcase archive data for past events, so users can dig deeper into incidents as needed

‍Intuitive user interface

A user interface should be easy to use and not require extensive training or a dedicated specialist to operate. Additionally, the software should provide tiered multi-user access and provide real-time notifications of an approaching drone. Graphical summary reports should be automatically produced and available on-demand for easy analysis of the most critical airspace security data.

‍Open API

Counterdrone software should be nimble and flexible enough to integrate into third party command and control platforms (C2), providing one common operating picture for security or operations personnel. An open API allows for easy integration of alert data and tracking data to be passed to whoever and wherever the data is most relevant and needed for display.

‍Automatic updates and machine learning platform

Drone detection software should constantly be updating, much like antivirus software and malware protection tools. Automatic software updates that deliver major new features ensure the system keeps up with the evolution of the drone industry and users’ security needs.

‍Accessible data in the cloud or on-premise

Counterdrone software needs to be readily accessible while meeting the user’s specific technology requirements and security policies. Using an on-premise deployment, people who must host software locally can do so. Those who can deploy cloud-based systems can access their data anytime, anywhere.

The next edition in this series will discuss drone defeat systems, and how it uses the data collected from the hardware to make a decision whether or not an object in the sky is a drone or otherwise.

We welcome your feedback on this series, and our readers can reach us with questions and comments at info@dedrone.com

Part One: cUAS Technology Series: Detection Hardware

Susan Friedberg

About the author

Susan is the Director of Communications at Dedrone and has researched, developed, and led the conversation on drones, counter-drone technology, and airspace security since 2016.

Susan Friedberg

marketing@dedrone.com

Originally published Apr 24, 2019, updated Mar 25, 2024