{"id":4040,"date":"2025-08-28T09:36:03","date_gmt":"2025-08-28T09:36:03","guid":{"rendered":"https:\/\/sentrycs.com\/?p=4040"},"modified":"2026-04-09T09:09:13","modified_gmt":"2026-04-09T09:09:13","slug":"cyber-over-rf-the-future-of-counter-drone-technology-is-already-here","status":"publish","type":"post","link":"https:\/\/sentrycs.com\/es\/the-counter-drone-blog\/cyber-over-rf-the-future-of-counter-drone-technology-is-already-here\/","title":{"rendered":"Ciberradiofrecuencia: el futuro de la tecnolog\u00eda contra drones ya est\u00e1 aqu\u00ed"},"content":{"rendered":"<p>Los sistemas a\u00e9reos no tripulados (UAS), com\u00fanmente conocidos como drones, se han convertido en una realidad cotidiana. Inspeccionan tendidos el\u00e9ctricos, filman pel\u00edculas de \u00e9xito, prestan apoyo a los servicios de emergencia y entregan paquetes. Pero los drones tambi\u00e9n plantean amenazas crecientes: contrabando en prisiones, vigilancia de lugares sensibles, alteraci\u00f3n del espacio a\u00e9reo en aeropuertos e incluso armamento en zonas de conflicto.<\/p>\n\n\n\n<p>Al multiplicarse los incidentes en todo el mundo, una pregunta se repite una y otra vez: <strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-blue-color\">\u00bfCu\u00e1l es la mejor soluci\u00f3n contra drones para mi entorno?<\/mark><\/strong><\/p>\n\n\n\n<p>La respuesta est\u00e1 en <strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-blue-color\">Ciberradiofrecuencia (CoRF)<\/mark><\/strong>una tecnolog\u00eda que va m\u00e1s all\u00e1 de la detecci\u00f3n y la interrupci\u00f3n, ofreciendo <strong>control seguro, preciso y conforme de drones no tripulados<\/strong>.<\/p>\n\n\n\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"555\" data-id=\"4053\" src=\"https:\/\/sentrycs.com\/wp-content\/uploads\/2025\/08\/RF-Signal.png\" alt=\"\" class=\"wp-image-4053\" srcset=\"https:\/\/sentrycs.com\/wp-content\/uploads\/2025\/08\/RF-Signal.png 1000w, https:\/\/sentrycs.com\/wp-content\/uploads\/2025\/08\/RF-Signal-300x167.png 300w, https:\/\/sentrycs.com\/wp-content\/uploads\/2025\/08\/RF-Signal-768x426.png 768w, https:\/\/sentrycs.com\/wp-content\/uploads\/2025\/08\/RF-Signal-18x10.png 18w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/figure>\n<\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-the-problem-with-traditional-c-uas-technologies\"><span class=\"ez-toc-section\" id=\"The_Problem_With_Traditional_C-UAS_Technologies\"><\/span><strong>El problema de las tecnolog\u00edas C-UAS tradicionales<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Organizaciones de todo el mundo -desde autoridades aeroportuarias a centros penitenciarios y operadores de infraestructuras cr\u00edticas- buscan soluciones que sean <strong>eficaz, legal y pr\u00e1ctico<\/strong>. Sin embargo, muchas herramientas tradicionales no est\u00e1n a la altura.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-rf-jamming-not-suitable-for-civilian-environments\"><span class=\"ez-toc-section\" id=\"RF_Jamming_Not_Suitable_for_Civilian_Environments\"><\/span>Interferencias de RF: No apto para entornos civiles<br><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Cuando la gente pregunta <em>\"\u00bfQu\u00e9 tecnolog\u00eda antidrones es segura para los aeropuertos?\".<\/em> o <em>\"\u00bfC\u00f3mo puedo detener los drones sin interferir con los servicios de emergencia?\".<\/em> la respuesta es <strong>no interferir<\/strong>. Los inhibidores de radiofrecuencia son indiscriminados y perturban las frecuencias utilizadas por la aviaci\u00f3n, las fuerzas del orden y los equipos de primera intervenci\u00f3n. En zonas urbanas o eventos p\u00fablicos, estas interferencias colaterales los hacen peligrosos y a menudo ilegales.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-gnss-spoofing-limited-and-risky\"><span class=\"ez-toc-section\" id=\"GNSS_Spoofing_Limited_and_Risky\"><\/span><strong>Suplantaci\u00f3n del GNSS: Limitado y arriesgado<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Preguntas como <em>\"\u00bfSon fiables los falsificadores de GPS para la seguridad perimetral continua?\".<\/em> o <em>\"\u00bfPuede la suplantaci\u00f3n de identidad desviar los drones del espacio a\u00e9reo restringido?\"<\/em> destacan el inter\u00e9s por la suplantaci\u00f3n de identidad. Pero la suplantaci\u00f3n no es fiable porque muchos drones utilizan sistemas de navegaci\u00f3n internos o m\u00e9todos de salto de frecuencia. Peor a\u00fan, la suplantaci\u00f3n puede inducir a error no solo al dron hostil, sino tambi\u00e9n a aeronaves civiles o drones amigos cercanos.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-sensor-only-systems-detection-without-action\"><span class=\"ez-toc-section\" id=\"Sensor-Only_Systems_Detection_Without_Action\"><\/span><strong>Sistemas basados \u00fanicamente en sensores: Detecci\u00f3n sin acci\u00f3n<br><\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Mucha gente se pregunta por las integraciones:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><em>\"\u00bfQu\u00e9 sistemas de detecci\u00f3n de drones se integran con el radar?\"<\/em><\/li>\n\n\n\n<li><em>\"\u00bfC\u00f3mo puedo combinar EO\/IR con detecci\u00f3n ac\u00fastica?\"<\/em><\/li>\n<\/ul>\n\n\n\n<p>De hecho, los sistemas de radar y EO\/IR son \u00fatiles para la vigilancia de \u00e1reas amplias, pero se detienen en <strong>detecci\u00f3n<\/strong>. No neutralizan las amenazas. Los sistemas ac\u00fasticos se ven a\u00fan m\u00e1s debilitados por entornos urbanos ruidosos o dise\u00f1os de drones m\u00e1s silenciosos.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-kinetic-solutions-are-risky\"><span class=\"ez-toc-section\" id=\"Kinetic_Solutions_Are_Risky\"><\/span><strong>Las soluciones cin\u00e9ticas son arriesgadas<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Cuando la gente pregunta:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><em>\"\u00bfQu\u00e9 plataformas contra drones pueden capturar f\u00edsicamente los UAV?\".<\/em><\/li>\n\n\n\n<li><em>\"\u00bfLos l\u00e1seres son eficaces contra los enjambres?\"<\/em><\/li>\n<\/ul>\n\n\n\n<p>Existen soluciones cin\u00e9ticas -redes, l\u00e1seres, drones interceptores-, pero est\u00e1n dise\u00f1adas para campos de batalla militares, no para estadios, aeropuertos o ciudades. El riesgo colateral es simplemente demasiado alto.<\/p>\n\n\n\n<p>En resumen, los planteamientos tradicionales perturban demasiado o consiguen muy poco. Lo que hace falta es seguridad y control, no caos.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-cyber-over-rf-a-new-paradigm\"><span class=\"ez-toc-section\" id=\"Cyber_Over_RF_A_New_Paradigm\"><\/span><strong>Ciberradiofrecuencia: un nuevo paradigma<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>En lugar de bombardear las ondas o recurrir a la fuerza bruta, <strong>Ciberradiofrecuencia (CoRF)<\/strong> aprovecha los mismos protocolos que utilizan los drones para comunicarse con sus operadores. En lugar de bloquear o enga\u00f1ar las se\u00f1ales, los sistemas CoRF las comprenden y manipulan, convirtiendo los drones rebeldes en dispositivos controlables.<\/p>\n\n\n\n<p>Pi\u00e9nsalo como la diferencia entre cortar la l\u00ednea telef\u00f3nica de alguien o acceder a su llamada para desviar la conversaci\u00f3n.<\/p>\n\n\n\n<p>Esta es la esencia del CDRF: <strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-blue-color\">seguridad, control y continuidad<\/mark><\/strong>.<\/p>\n\n\n\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-2 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"512\" data-id=\"4052\" src=\"https:\/\/sentrycs.com\/wp-content\/uploads\/2025\/08\/WP_images3-1024x512.jpg\" alt=\"\" class=\"wp-image-4052\" srcset=\"https:\/\/sentrycs.com\/wp-content\/uploads\/2025\/08\/WP_images3-1024x512.jpg 1024w, https:\/\/sentrycs.com\/wp-content\/uploads\/2025\/08\/WP_images3-300x150.jpg 300w, https:\/\/sentrycs.com\/wp-content\/uploads\/2025\/08\/WP_images3-768x384.jpg 768w, https:\/\/sentrycs.com\/wp-content\/uploads\/2025\/08\/WP_images3-1536x768.jpg 1536w, https:\/\/sentrycs.com\/wp-content\/uploads\/2025\/08\/WP_images3-2048x1024.jpg 2048w, https:\/\/sentrycs.com\/wp-content\/uploads\/2025\/08\/WP_images3-18x9.jpg 18w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-how-corf-works-a-5-step-process\"><span class=\"ez-toc-section\" id=\"How_CoRF_Works_A_5-Step_Process\"><\/span><strong>C\u00f3mo funciona el FRCV: Un proceso en 5 pasos<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Cyber Over RF es algo m\u00e1s que una manipulaci\u00f3n inteligente de se\u00f1ales. Es una secuencia inteligente por capas que aprovecha la dependencia de los drones de la comunicaci\u00f3n basada en RF. As\u00ed es como funciona:<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-1-spectrum-scanning\"><span class=\"ez-toc-section\" id=\"1_Spectrum_Scanning\"><\/span><strong>1. Exploraci\u00f3n del espectro<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<p>El sistema CoRF escanea pasivamente el entorno de radiofrecuencia (RF) para detectar se\u00f1ales activas de drones. A diferencia de los esc\u00e1neres convencionales, que se limitan a detectar picos de energ\u00eda, CoRF interpreta la propia comunicaci\u00f3n, extrayendo datos como el tipo de dron, la altitud, la direcci\u00f3n de la c\u00e1mara e incluso la ubicaci\u00f3n del operador.<\/p>\n\n\n\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-3 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"219\" data-id=\"4050\" src=\"https:\/\/sentrycs.com\/wp-content\/uploads\/2025\/08\/WP_images4-1024x219.jpg\" alt=\"\" class=\"wp-image-4050\" srcset=\"https:\/\/sentrycs.com\/wp-content\/uploads\/2025\/08\/WP_images4-1024x219.jpg 1024w, https:\/\/sentrycs.com\/wp-content\/uploads\/2025\/08\/WP_images4-300x64.jpg 300w, https:\/\/sentrycs.com\/wp-content\/uploads\/2025\/08\/WP_images4-768x165.jpg 768w, https:\/\/sentrycs.com\/wp-content\/uploads\/2025\/08\/WP_images4-1536x329.jpg 1536w, https:\/\/sentrycs.com\/wp-content\/uploads\/2025\/08\/WP_images4-2048x439.jpg 2048w, https:\/\/sentrycs.com\/wp-content\/uploads\/2025\/08\/WP_images4-18x4.jpg 18w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/figure>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-2-protocol-analysis\"><span class=\"ez-toc-section\" id=\"2_Protocol_Analysis\"><\/span><strong>2. An\u00e1lisis de protocolos<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<p>Una vez detectado un dron, el sistema disecciona su protocolo de comunicaci\u00f3n: el \"lenguaje\" utilizado entre el dron y el controlador. Las primeras herramientas CoRF se basaban en bibliotecas est\u00e1ticas. Los sistemas actuales, como los pioneros de Sentrycs, pueden analizar y adaptarse a protocolos nuevos o personalizados en tiempo real.<\/p>\n\n\n\n<p>Esto permite una identificaci\u00f3n y clasificaci\u00f3n casi instant\u00e1neas, eliminando la anticuada secuencia DTI (Detectar, Rastrear, Identificar).<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-3-vulnerability-assessment\"><span class=\"ez-toc-section\" id=\"3_Vulnerability_Assessment\"><\/span><strong>3. Evaluaci\u00f3n de la vulnerabilidad<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<p>Una vez investigado y comprendido el protocolo, el sistema descodifica los enlaces de datos, encuentra puntos d\u00e9biles y prepara una estrategia para asumir el control.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-4-mitigation-strategy\"><span class=\"ez-toc-section\" id=\"4_Mitigation_Strategy\"><\/span><strong>4. Estrategia de mitigaci\u00f3n<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<p>En funci\u00f3n del nivel de amenaza, el FRC puede:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Interrumpe su navegaci\u00f3n basada en v\u00eddeo<\/li>\n\n\n\n<li>Toma el control del dron y aterriza con seguridad<\/li>\n\n\n\n<li>Redirigirlo a otra ubicaci\u00f3n<\/li>\n\n\n\n<li>Cong\u00e9lalo en el aire<\/li>\n\n\n\n<li>Devu\u00e9lvelo a una nueva ubicaci\u00f3n \"de origen<\/li>\n\n\n\n<li><\/li>\n<\/ul>\n\n\n\n<p>Todo ello sin afectar a los drones ni a las infraestructuras cercanas.<\/p>\n\n\n\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-4 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"695\" data-id=\"4051\" src=\"https:\/\/sentrycs.com\/wp-content\/uploads\/2025\/08\/WP_images7-1024x695.jpg\" alt=\"\" class=\"wp-image-4051\" srcset=\"https:\/\/sentrycs.com\/wp-content\/uploads\/2025\/08\/WP_images7-1024x695.jpg 1024w, https:\/\/sentrycs.com\/wp-content\/uploads\/2025\/08\/WP_images7-300x204.jpg 300w, https:\/\/sentrycs.com\/wp-content\/uploads\/2025\/08\/WP_images7-768x521.jpg 768w, https:\/\/sentrycs.com\/wp-content\/uploads\/2025\/08\/WP_images7-1536x1042.jpg 1536w, https:\/\/sentrycs.com\/wp-content\/uploads\/2025\/08\/WP_images7-2048x1390.jpg 2048w, https:\/\/sentrycs.com\/wp-content\/uploads\/2025\/08\/WP_images7-18x12.jpg 18w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/figure>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-5-execution\"><span class=\"ez-toc-section\" id=\"5_Execution\"><\/span><strong>5. Ejecuci\u00f3n<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<p>La fase final consiste en inyectar se\u00f1ales de radiofrecuencia de baja potencia muy selectivas que imitan \u00f3rdenes leg\u00edtimas. El dron responde como si siguiera a su operador original, s\u00f3lo que ahora est\u00e1 bajo el control del sistema de defensa.<\/p>\n\n\n\n<p>Esta toma de control quir\u00fargica es silenciosa, conforme y no deja rastro de interferencias en los sistemas adyacentes.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-why-cyber-over-rf-is-the-smart-choice\"><span class=\"ez-toc-section\" id=\"Why_Cyber_Over_RF_Is_the_Smart_Choice\"><\/span><strong>Por qu\u00e9 la ciberfrecuencia es la opci\u00f3n m\u00e1s inteligente<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>CoRF no es s\u00f3lo una nueva herramienta: es un enfoque fundamentalmente nuevo. Veamos por qu\u00e9 est\u00e1 redefiniendo el panorama de los C-UAS.<\/p>\n\n\n\n<p><strong>\u2705<\/strong><strong> Certeza<\/strong><\/p>\n\n\n\n<p>CoRF proporciona seguridad y un conocimiento preciso de la situaci\u00f3n. Identifica los drones hasta su n\u00famero de serie, localiza con precisi\u00f3n a sus pilotos y sus ubicaciones de origen, y neutraliza la aeronave de forma segura permitiendo la toma y el aterrizaje del dron. <strong><\/strong><\/p>\n\n\n\n<p><strong>\u2705<\/strong><strong> Precisi\u00f3n milim\u00e9trica, cero colaterales<\/strong><\/p>\n\n\n\n<p>A diferencia de los inhibidores o los efectores cin\u00e9ticos, CoRF apunta a un solo dron, dejando intactos a otros usuarios del espacio a\u00e9reo, servicios de emergencia y sistemas de comunicaci\u00f3n. Es la soluci\u00f3n ideal para aeropuertos, estadios, centros urbanos y zonas civiles de alto riesgo.<\/p>\n\n\n\n<p><strong>\u2705<\/strong><strong> Control total<\/strong><\/p>\n\n\n\n<p>Los inhibidores interrumpen. Los spoofers enga\u00f1an. CoRF <strong>controla<\/strong>. Esto permite aterrizajes seguros, recogida de pruebas, localizaci\u00f3n de operadores y toma de decisiones en tiempo real, especialmente cruciales para la aplicaci\u00f3n de la ley y la protecci\u00f3n de infraestructuras cr\u00edticas.<\/p>\n\n\n\n<p><strong>\u2705<\/strong><strong> Continuidad de las operaciones leg\u00edtimas<\/strong><\/p>\n\n\n\n<p>Como interact\u00faa a nivel de protocolo, CoRF no interfiere con los drones autorizados. Esto permite la cohabitaci\u00f3n segura de drones comerciales, de seguridad p\u00fablica y militares dentro del mismo espacio a\u00e9reo.<\/p>\n\n\n\n<p><strong>\u2705<\/strong><strong> Cumplimiento de la normativa<\/strong><\/p>\n\n\n\n<p>La mayor\u00eda de los pa\u00edses restringen o proh\u00edben las interferencias y los m\u00e9todos destructivos. CoRF ofrece una alternativa legal y conforme a las normas para la mitigaci\u00f3n de drones en el espacio a\u00e9reo regulado.<\/p>\n\n\n\n<p><strong>\u2705<\/strong><strong> Soluciones de futuro<\/strong><\/p>\n\n\n\n<p>Gracias a las radios definidas por software y a la descodificaci\u00f3n asistida por inteligencia artificial, los mejores sistemas CoRF se mantienen al d\u00eda de las amenazas en constante cambio. Pueden actualizarse para nuevos modelos y protocolos de drones, cambios de firmware e incluso drones personalizados o de bricolaje.<\/p>\n\n\n\n<p><strong>\u2705<\/strong><strong> Despliegue flexible<\/strong><\/p>\n\n\n\n<p>Ya sea montado en tejados, veh\u00edculos patrulla m\u00f3viles, mochilas t\u00e1cticas o puestos de control fronterizo, CoRF es una soluci\u00f3n modular y escalable adaptada a las necesidades de su misi\u00f3n.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-comparison-table-corf-vs-other-c-uas-technologies\"><span class=\"ez-toc-section\" id=\"Comparison_Table_CoRF_vs_Other_C-UAS_Technologies\"><\/span><strong>Tabla comparativa: CoRF frente a otras tecnolog\u00edas C-UAS<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-5 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"427\" data-id=\"4046\" src=\"https:\/\/sentrycs.com\/wp-content\/uploads\/2025\/08\/WP_images8-1024x427.jpg\" alt=\"\" class=\"wp-image-4046\" srcset=\"https:\/\/sentrycs.com\/wp-content\/uploads\/2025\/08\/WP_images8-1024x427.jpg 1024w, https:\/\/sentrycs.com\/wp-content\/uploads\/2025\/08\/WP_images8-300x125.jpg 300w, https:\/\/sentrycs.com\/wp-content\/uploads\/2025\/08\/WP_images8-768x320.jpg 768w, https:\/\/sentrycs.com\/wp-content\/uploads\/2025\/08\/WP_images8-1536x640.jpg 1536w, https:\/\/sentrycs.com\/wp-content\/uploads\/2025\/08\/WP_images8-2048x854.jpg 2048w, https:\/\/sentrycs.com\/wp-content\/uploads\/2025\/08\/WP_images8-18x8.jpg 18w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-black-color\">Cuadro 1 - Cuadro comparativo de tecnolog\u00edas C-UAS<\/mark><\/em><\/figcaption><\/figure>\n<\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-from-military-to-civilian-why-corf-matters-now\"><span class=\"ez-toc-section\" id=\"From_Military_to_Civilian_Why_CoRF_Matters_Now\"><\/span><strong>De militar a civil: por qu\u00e9 es importante ahora el CDFR<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Muchas de las primeras tecnolog\u00edas C-UAS se desarrollaron para entornos militares, en los que destruir un dron suele ser el objetivo. Pero en el entorno civil actual, esa l\u00f3gica no es v\u00e1lida. El principal reto no es simplemente detener los drones, sino hacerlo de forma segura, legal e inteligente. Con decenas de miles de drones registrados s\u00f3lo en Estados Unidos, distinguir entre la negligencia de un aficionado y la intenci\u00f3n maliciosa ya no es una tarea clara. Y dado que los drones se utilizan para todo, desde el reparto de alimentos hasta la recopilaci\u00f3n de informaci\u00f3n, los responsables de la toma de decisiones necesitan herramientas que <strong>comprender el contexto<\/strong>no s\u00f3lo amenazas.<\/p>\n\n\n\n<p>Eso es exactamente lo que ofrece el FRCV.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-sentrycs-pioneering-the-corf-movement\"><span class=\"ez-toc-section\" id=\"Sentrycs_Pioneering_the_CoRF_Movement\"><\/span><strong>Sentrycs: Pioneros del movimiento CoRF<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>En Sentrycs, hemos construido nuestra plataforma C-UAS en torno a los principios de <strong>Sencillez, eficacia y rendimiento demostrado<\/strong>. Nuestra soluci\u00f3n CoRF no se limita a detectar drones: toma el control.<\/p>\n\n\n\n<p>Proporcionamos:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Funcionamiento aut\u00f3nomo<\/strong> - con una formaci\u00f3n m\u00ednima del operador<\/li>\n\n\n\n<li><strong>Opciones de implantaci\u00f3n modular<\/strong> - para uso fijo, m\u00f3vil o t\u00e1ctico<\/li>\n\n\n\n<li><strong>Detecci\u00f3n basada en protocolos<\/strong> - para una identificaci\u00f3n instant\u00e1nea<\/li>\n\n\n\n<li><strong>V\u00edas seguras de mitigaci\u00f3n<\/strong> - que se ajustan a la normativa mundial<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-conclusion-certainty-without-compromise\"><span class=\"ez-toc-section\" id=\"Conclusion_Certainty_Without_Compromise\"><\/span><strong>Conclusi\u00f3n: Certidumbre sin compromiso<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Las principales agencias de seguridad nacional, operadores de infraestructuras cr\u00edticas y socios de defensa de todo el mundo conf\u00edan en nuestra tecnolog\u00eda. No interferimos. No destruimos. <strong>Le damos seguridad, y<\/strong> <strong>nos hacemos cargo.<\/strong><\/p>\n\n\n\n<p>El panorama de las amenazas de los drones ya no es s\u00f3lo \"rojo contra azul\" o \"amigo contra enemigo\". Es matizado, complejo y evoluciona constantemente. Las herramientas tradicionales no pueden seguirle el ritmo, pero Cyber Over RF s\u00ed.<\/p>\n\n\n\n<p>Al interactuar directamente con el protocolo de comunicaci\u00f3n del dron, CoRF ofrece un control, una seguridad y una adaptabilidad inigualables. No es solo el siguiente paso en la defensa de drones, es un salto hacia un futuro m\u00e1s inteligente y seguro.<\/p>\n\n\n\n<p>En Sentrycs, creemos que el futuro de la seguridad del espacio a\u00e9reo no se ganar\u00e1 por la fuerza bruta. Se ganar\u00e1 con <strong>inteligencia, precisi\u00f3n y control<\/strong>. Y estamos orgullosos de liderar ese futuro, protocolo a protocolo, <strong>con certeza.<\/strong><\/p>\n\n\n\n<p><\/p>","protected":false},"excerpt":{"rendered":"<p>Los sistemas a\u00e9reos no tripulados (UAS), com\u00fanmente conocidos como drones, se han convertido en una realidad cotidiana. Inspeccionan tendidos el\u00e9ctricos, filman pel\u00edculas de \u00e9xito, prestan apoyo a los servicios de emergencia y entregan paquetes. Pero los drones tambi\u00e9n plantean amenazas crecientes: contrabando en prisiones, vigilancia de lugares sensibles, alteraci\u00f3n del espacio a\u00e9reo en aeropuertos e incluso armamento en zonas de conflicto. Al multiplicarse los incidentes en todo el mundo, una pregunta es <a class=\"more-link\" href=\"https:\/\/sentrycs.com\/es\/the-counter-drone-blog\/cyber-over-rf-the-future-of-counter-drone-technology-is-already-here\/\" title=\"Ciberradiofrecuencia: el futuro de la tecnolog\u00eda contra drones ya est\u00e1 aqu\u00ed\">Seguir leyendo<\/a><\/p>","protected":false},"author":2,"featured_media":4053,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_editorskit_title_hidden":false,"_editorskit_reading_time":0,"_editorskit_is_block_options_detached":false,"_editorskit_block_options_position":"{}","footnotes":"","_links_to":"","_links_to_target":""},"categories":[69],"tags":[],"class_list":["post-4040","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technology"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v23.3 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cyber Over RF: The Future of Counter-Drone Tech | Sentrycs<\/title>\n<meta name=\"description\" content=\"Learn how Cyber Over RF by Sentrycs delivers safe, precise drone control without jamming - the ideal C-UAS solution for airports and infrastructure.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sentrycs.com\/es\/the-counter-drone-blog\/cyber-over-rf-the-future-of-counter-drone-technology-is-already-here\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Over RF: The Future of Counter-Drone Tech | Sentrycs\" \/>\n<meta property=\"og:description\" content=\"Learn how Cyber Over RF by Sentrycs delivers safe, precise drone control without jamming - the ideal C-UAS solution for airports and infrastructure.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sentrycs.com\/es\/the-counter-drone-blog\/cyber-over-rf-the-future-of-counter-drone-technology-is-already-here\/\" \/>\n<meta property=\"og:site_name\" content=\"Sentrycs\" \/>\n<meta property=\"article:published_time\" content=\"2025-08-28T09:36:03+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-09T09:09:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sentrycs.com\/wp-content\/uploads\/2025\/08\/RF-Signal.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"555\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Audelia Boker\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Sentrycs\" \/>\n<meta name=\"twitter:site\" content=\"@Sentrycs\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Audelia Boker\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/sentrycs.com\/the-counter-drone-blog\/cyber-over-rf-the-future-of-counter-drone-technology-is-already-here\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/sentrycs.com\/the-counter-drone-blog\/cyber-over-rf-the-future-of-counter-drone-technology-is-already-here\/\"},\"author\":{\"name\":\"Audelia Boker\",\"@id\":\"https:\/\/sentrycs.com\/#\/schema\/person\/15607ca3aaaff18fe43ade0cb3476e2a\"},\"headline\":\"Cyber Over RF: The Future of Counter-Drone Technology is Already Here\",\"datePublished\":\"2025-08-28T09:36:03+00:00\",\"dateModified\":\"2026-04-09T09:09:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/sentrycs.com\/the-counter-drone-blog\/cyber-over-rf-the-future-of-counter-drone-technology-is-already-here\/\"},\"wordCount\":1313,\"publisher\":{\"@id\":\"https:\/\/sentrycs.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/sentrycs.com\/the-counter-drone-blog\/cyber-over-rf-the-future-of-counter-drone-technology-is-already-here\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sentrycs.com\/wp-content\/uploads\/2025\/08\/RF-Signal.png\",\"articleSection\":[\"Technology\"],\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sentrycs.com\/the-counter-drone-blog\/cyber-over-rf-the-future-of-counter-drone-technology-is-already-here\/\",\"url\":\"https:\/\/sentrycs.com\/the-counter-drone-blog\/cyber-over-rf-the-future-of-counter-drone-technology-is-already-here\/\",\"name\":\"Cyber Over RF: The Future of Counter-Drone Tech | Sentrycs\",\"isPartOf\":{\"@id\":\"https:\/\/sentrycs.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/sentrycs.com\/the-counter-drone-blog\/cyber-over-rf-the-future-of-counter-drone-technology-is-already-here\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/sentrycs.com\/the-counter-drone-blog\/cyber-over-rf-the-future-of-counter-drone-technology-is-already-here\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sentrycs.com\/wp-content\/uploads\/2025\/08\/RF-Signal.png\",\"datePublished\":\"2025-08-28T09:36:03+00:00\",\"dateModified\":\"2026-04-09T09:09:13+00:00\",\"description\":\"Learn how Cyber Over RF by Sentrycs delivers safe, precise drone control without jamming - the ideal C-UAS solution for airports and infrastructure.\",\"breadcrumb\":{\"@id\":\"https:\/\/sentrycs.com\/the-counter-drone-blog\/cyber-over-rf-the-future-of-counter-drone-technology-is-already-here\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sentrycs.com\/the-counter-drone-blog\/cyber-over-rf-the-future-of-counter-drone-technology-is-already-here\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/sentrycs.com\/the-counter-drone-blog\/cyber-over-rf-the-future-of-counter-drone-technology-is-already-here\/#primaryimage\",\"url\":\"https:\/\/sentrycs.com\/wp-content\/uploads\/2025\/08\/RF-Signal.png\",\"contentUrl\":\"https:\/\/sentrycs.com\/wp-content\/uploads\/2025\/08\/RF-Signal.png\",\"width\":1000,\"height\":555,\"caption\":\"counter UAS system\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sentrycs.com\/the-counter-drone-blog\/cyber-over-rf-the-future-of-counter-drone-technology-is-already-here\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/sentrycs.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Over RF: The Future of Counter-Drone Technology is Already Here\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sentrycs.com\/#website\",\"url\":\"https:\/\/sentrycs.com\/\",\"name\":\"Sentrycs\",\"description\":\"Counter-drone Solutions Adapting at the Speed of Threat\",\"publisher\":{\"@id\":\"https:\/\/sentrycs.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sentrycs.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/sentrycs.com\/#organization\",\"name\":\"Sentrycs Counter Drone Solutions\",\"url\":\"https:\/\/sentrycs.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/sentrycs.com\/#\/schema\/logo\/image\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Sentrycs Counter Drone Solutions\"},\"image\":{\"@id\":\"https:\/\/sentrycs.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/Sentrycs\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/sentrycs.com\/#\/schema\/person\/15607ca3aaaff18fe43ade0cb3476e2a\",\"name\":\"Audelia Boker\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/sentrycs.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b08a31199f1b8afaca01425d52f90ac3b2f5ea19208c8e50053756f0dd0bd041?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b08a31199f1b8afaca01425d52f90ac3b2f5ea19208c8e50053756f0dd0bd041?s=96&d=mm&r=g\",\"caption\":\"Audelia Boker\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Ciberradiofrecuencia: el futuro de la tecnolog\u00eda contra drones | Sentrycs","description":"Descubra c\u00f3mo Cyber Over RF de Sentrycs ofrece un control seguro y preciso de drones sin interferencias: la soluci\u00f3n C-UAS ideal para aeropuertos e infraestructuras.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sentrycs.com\/es\/the-counter-drone-blog\/cyber-over-rf-the-future-of-counter-drone-technology-is-already-here\/","og_locale":"es_ES","og_type":"article","og_title":"Cyber Over RF: The Future of Counter-Drone Tech | Sentrycs","og_description":"Learn how Cyber Over RF by Sentrycs delivers safe, precise drone control without jamming - the ideal C-UAS solution for airports and infrastructure.","og_url":"https:\/\/sentrycs.com\/es\/the-counter-drone-blog\/cyber-over-rf-the-future-of-counter-drone-technology-is-already-here\/","og_site_name":"Sentrycs","article_published_time":"2025-08-28T09:36:03+00:00","article_modified_time":"2026-04-09T09:09:13+00:00","og_image":[{"width":1000,"height":555,"url":"https:\/\/sentrycs.com\/wp-content\/uploads\/2025\/08\/RF-Signal.png","type":"image\/png"}],"author":"Audelia Boker","twitter_card":"summary_large_image","twitter_creator":"@Sentrycs","twitter_site":"@Sentrycs","twitter_misc":{"Escrito por":"Audelia Boker","Tiempo de lectura":"7 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sentrycs.com\/the-counter-drone-blog\/cyber-over-rf-the-future-of-counter-drone-technology-is-already-here\/#article","isPartOf":{"@id":"https:\/\/sentrycs.com\/the-counter-drone-blog\/cyber-over-rf-the-future-of-counter-drone-technology-is-already-here\/"},"author":{"name":"Audelia Boker","@id":"https:\/\/sentrycs.com\/#\/schema\/person\/15607ca3aaaff18fe43ade0cb3476e2a"},"headline":"Cyber Over RF: The Future of Counter-Drone Technology is Already Here","datePublished":"2025-08-28T09:36:03+00:00","dateModified":"2026-04-09T09:09:13+00:00","mainEntityOfPage":{"@id":"https:\/\/sentrycs.com\/the-counter-drone-blog\/cyber-over-rf-the-future-of-counter-drone-technology-is-already-here\/"},"wordCount":1313,"publisher":{"@id":"https:\/\/sentrycs.com\/#organization"},"image":{"@id":"https:\/\/sentrycs.com\/the-counter-drone-blog\/cyber-over-rf-the-future-of-counter-drone-technology-is-already-here\/#primaryimage"},"thumbnailUrl":"https:\/\/sentrycs.com\/wp-content\/uploads\/2025\/08\/RF-Signal.png","articleSection":["Technology"],"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/sentrycs.com\/the-counter-drone-blog\/cyber-over-rf-the-future-of-counter-drone-technology-is-already-here\/","url":"https:\/\/sentrycs.com\/the-counter-drone-blog\/cyber-over-rf-the-future-of-counter-drone-technology-is-already-here\/","name":"Ciberradiofrecuencia: el futuro de la tecnolog\u00eda contra drones | Sentrycs","isPartOf":{"@id":"https:\/\/sentrycs.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sentrycs.com\/the-counter-drone-blog\/cyber-over-rf-the-future-of-counter-drone-technology-is-already-here\/#primaryimage"},"image":{"@id":"https:\/\/sentrycs.com\/the-counter-drone-blog\/cyber-over-rf-the-future-of-counter-drone-technology-is-already-here\/#primaryimage"},"thumbnailUrl":"https:\/\/sentrycs.com\/wp-content\/uploads\/2025\/08\/RF-Signal.png","datePublished":"2025-08-28T09:36:03+00:00","dateModified":"2026-04-09T09:09:13+00:00","description":"Descubra c\u00f3mo Cyber Over RF de Sentrycs ofrece un control seguro y preciso de drones sin interferencias: la soluci\u00f3n C-UAS ideal para aeropuertos e infraestructuras.","breadcrumb":{"@id":"https:\/\/sentrycs.com\/the-counter-drone-blog\/cyber-over-rf-the-future-of-counter-drone-technology-is-already-here\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sentrycs.com\/the-counter-drone-blog\/cyber-over-rf-the-future-of-counter-drone-technology-is-already-here\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/sentrycs.com\/the-counter-drone-blog\/cyber-over-rf-the-future-of-counter-drone-technology-is-already-here\/#primaryimage","url":"https:\/\/sentrycs.com\/wp-content\/uploads\/2025\/08\/RF-Signal.png","contentUrl":"https:\/\/sentrycs.com\/wp-content\/uploads\/2025\/08\/RF-Signal.png","width":1000,"height":555,"caption":"counter UAS system"},{"@type":"BreadcrumbList","@id":"https:\/\/sentrycs.com\/the-counter-drone-blog\/cyber-over-rf-the-future-of-counter-drone-technology-is-already-here\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sentrycs.com\/"},{"@type":"ListItem","position":2,"name":"Cyber Over RF: The Future of Counter-Drone Technology is Already Here"}]},{"@type":"WebSite","@id":"https:\/\/sentrycs.com\/#website","url":"https:\/\/sentrycs.com\/","name":"Sentrycs","description":"Las soluciones contra drones se adaptan a la velocidad de las amenazas","publisher":{"@id":"https:\/\/sentrycs.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sentrycs.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/sentrycs.com\/#organization","name":"Soluciones Sentrycs contra drones","url":"https:\/\/sentrycs.com\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/sentrycs.com\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Sentrycs Counter Drone Solutions"},"image":{"@id":"https:\/\/sentrycs.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/Sentrycs"]},{"@type":"Person","@id":"https:\/\/sentrycs.com\/#\/schema\/person\/15607ca3aaaff18fe43ade0cb3476e2a","name":"Audelia Boker","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/sentrycs.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/b08a31199f1b8afaca01425d52f90ac3b2f5ea19208c8e50053756f0dd0bd041?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b08a31199f1b8afaca01425d52f90ac3b2f5ea19208c8e50053756f0dd0bd041?s=96&d=mm&r=g","caption":"Audelia Boker"}}]}},"_links":{"self":[{"href":"https:\/\/sentrycs.com\/es\/wp-json\/wp\/v2\/posts\/4040","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sentrycs.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sentrycs.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sentrycs.com\/es\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/sentrycs.com\/es\/wp-json\/wp\/v2\/comments?post=4040"}],"version-history":[{"count":11,"href":"https:\/\/sentrycs.com\/es\/wp-json\/wp\/v2\/posts\/4040\/revisions"}],"predecessor-version":[{"id":4210,"href":"https:\/\/sentrycs.com\/es\/wp-json\/wp\/v2\/posts\/4040\/revisions\/4210"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sentrycs.com\/es\/wp-json\/wp\/v2\/media\/4053"}],"wp:attachment":[{"href":"https:\/\/sentrycs.com\/es\/wp-json\/wp\/v2\/media?parent=4040"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sentrycs.com\/es\/wp-json\/wp\/v2\/categories?post=4040"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sentrycs.com\/es\/wp-json\/wp\/v2\/tags?post=4040"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}