{"id":1215,"date":"2023-06-06T14:32:48","date_gmt":"2023-06-06T14:32:48","guid":{"rendered":"https:\/\/sentrycs.com\/?p=1215"},"modified":"2026-04-23T15:46:27","modified_gmt":"2026-04-23T15:46:27","slug":"misuse-of-drones-drone-attacks-and-incidents","status":"publish","type":"post","link":"https:\/\/sentrycs.com\/lt\/the-counter-drone-blog\/misuse-of-drones-drone-attacks-and-incidents\/","title":{"rendered":"Netinkamas bepilo\u010di\u0173 orlaivi\u0173 naudojimas: Dron\u0173 atakos ir incidentai"},"content":{"rendered":"<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"2560\" height=\"1440\" src=\"https:\/\/sentrycs.com\/wp-content\/uploads\/2023\/06\/shutterstock_1374833051-scaled-1.jpg\" alt=\"\" class=\"wp-image-2349\" srcset=\"https:\/\/sentrycs.com\/wp-content\/uploads\/2023\/06\/shutterstock_1374833051-scaled-1.jpg 2560w, https:\/\/sentrycs.com\/wp-content\/uploads\/2023\/06\/shutterstock_1374833051-scaled-1-300x169.jpg 300w, https:\/\/sentrycs.com\/wp-content\/uploads\/2023\/06\/shutterstock_1374833051-scaled-1-1024x576.jpg 1024w, https:\/\/sentrycs.com\/wp-content\/uploads\/2023\/06\/shutterstock_1374833051-scaled-1-768x432.jpg 768w, https:\/\/sentrycs.com\/wp-content\/uploads\/2023\/06\/shutterstock_1374833051-scaled-1-1536x864.jpg 1536w, https:\/\/sentrycs.com\/wp-content\/uploads\/2023\/06\/shutterstock_1374833051-scaled-1-2048x1152.jpg 2048w, https:\/\/sentrycs.com\/wp-content\/uploads\/2023\/06\/shutterstock_1374833051-scaled-1-18x10.jpg 18w\" sizes=\"auto, (max-width: 2560px) 100vw, 2560px\" \/><\/figure>\n\n\n\n<p><strong>\u012evadas<\/strong><\/p>\n\n\n\n<p>Bepilot\u0117s orlaivi\u0173 sistemos (UAS), dar \u017einomos kaip dronai, atne\u0161\u0117 didel\u0119 pa\u017eang\u0105 ir naud\u0105 \u012fvairioms pramon\u0117s \u0161akoms, tod\u0117l matome, kad j\u0173 naudojimas spar\u010diai auga.  Ta\u010diau kartu su gerais dalykais atsiranda ir blog\u0173, nes vis didesn\u012f susir\u016bpinim\u0105 kelia nusikalt\u0117li\u0173 ir piktavali\u0173 asmen\u0173 netinkamas j\u0173 naudojimas.&nbsp;<\/p>\n\n\n\n<p>\u0160iame straipsnyje ap\u017evelgsime nerim\u0105 kelian\u010dius incidentus, susijusius su dronais (UAS) ir bepilo\u010diais orlaiviais, pavyzd\u017eiui, i\u0161puolius prie\u0161 teis\u0117saugos institucijas, svarbi\u0173 objekt\u0173 veiklos sutrikdym\u0105 ir konfliktus pasienyje. Nagrin\u0117dami \u0161iuos incidentus, pabr\u0117\u0161ime, kad reikia suprasti su netinkamu dron\u0173 naudojimu susijusi\u0105 rizik\u0105 ir \u012fgyvendinti <a href=\"https:\/\/sentrycs.com\/lt\/our-technology\/\">veiksminga kovos su dronais technologija<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-drones-uas-exploited-by-criminals-nbsp\"><span class=\"ez-toc-section\" id=\"Drones_UAS_Exploited_by_Criminals\"><\/span>Nusikalt\u0117liai naudojasi dronais (UAS)&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Bepilo\u010diai dronai tapo patrauklia priemone nusikalt\u0117liams, siekiantiems diskreti\u0161kai ir nuotoliniu b\u016bdu vykdyti \u017ealing\u0105 veikl\u0105. D\u0117l universalumo ir prieinamumo, galimyb\u0117s \u012fvairiuose bepilo\u010diuose orlaiviuose ir (arba) dronuose \u012frengti GPS, kameras, naktinio matymo \u012frang\u0105 ir net pavojingus sprogmenis jie tapo pageidaujamu \u012fvairi\u0173 nusikalstam\u0173 \u012fmoni\u0173 pasirinkimu.&nbsp;<\/p>\n\n\n\n<p>Nusikalt\u0117liai dronus naudoja kontrabandai, steb\u0117jimui ir \u017evalgybai bei paprastiems i\u0161puoliams.&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>kontrabandos, pavyzd\u017eiui, nelegali\u0173 narkotik\u0173, tabako, ginkl\u0173 ir draud\u017eiam\u0173 preki\u0173, gabenimas per sienas naudojant pa\u017eangi\u0173 galimybi\u0173 bepilo\u010dius orlaivius. \u0160ie geb\u0117jimai leid\u017eia bepilo\u010diams orlaiviams skraidyti nepasteb\u0117tiems, tod\u0117l vald\u017eios institucijoms sunku perimti j\u0173 operacijas arba surasti j\u0173 valdytoj\u0105.&nbsp;<\/li>\n\n\n\n<li>steb\u0117jimo ir \u017evalgybos bepilo\u010di\u0173 orlaivi\u0173 dislokavimas siekiant rinkti \u017evalgybin\u0119 informacij\u0105 ir steb\u0117ti \u012fvairias vietoves. Toks bepilo\u010di\u0173 orlaivi\u0173 (UAV dron\u0173) naudojimas suteikia nusikalt\u0117liams didel\u012f prana\u0161um\u0105 planuojant ir vykdant neteis\u0117tas operacijas:<\/li>\n<\/ul>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Jungtin\u0117je Karalyst\u0117je nustatyta, kad bepilo\u010diai orlaiviai naudojami nusikalstamos veiklos vietoms steb\u0117ti, o teis\u0117saugos institucij\u0173 \u012fsiki\u0161imo atveju - kaip persp\u0117jimo apie nusikalt\u0117lius priemon\u0117.<\/li>\n\n\n\n<li>Teigiama, kad dronu buvo nuskenuotas kal\u0117jimas, kuriame 25 met\u0173 laisv\u0117s at\u0117mimo bausm\u0119 atliko li\u016bdnai pagars\u0117j\u0119s pranc\u016bz\u0173 nusikalt\u0117lis Redoine'as Faidas, ir rasta silpna vieta, i\u0161 kurios jo organizacija gal\u0117jo atskraidinti sraigtasparn\u012f ir j\u012f i\u0161gelb\u0117ti.&nbsp;<\/li>\n<\/ol>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Pastaruoju metu nusikalstamos organizacijos suaktyvino savo veikl\u0105 ir \u017eudyn\u0117ms naudoja ginkluotus dronus. <a href=\"https:\/\/www.jpost.com\/israel-news\/article-712601\">Kadangi \u0161ie nusikalt\u0117liai<\/a> ie\u0161kojo prieglobs\u010dio vir\u0161utiniuose dideli\u0173 gyvenam\u0173j\u0173 pastat\u0173 auk\u0161tuose, j\u0173 prie\u0161ininkai taip pat pritaik\u0117 savo taktik\u0105 ir panaudojo bepilo\u010dius orlaivius kaip \u012frankius, kad gal\u0117t\u0173 jiems pakenkti ir likti neatpa\u017einti.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-rogue-drones-a-true-prison-plague-nbsp\"><span class=\"ez-toc-section\" id=\"Rogue_Drones_A_True_Prison_Plague\"><\/span>\"Rogue Drones\": Tikras kal\u0117jim\u0173 maras&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Nes\u0105\u017eining\u0173 bepilo\u010di\u0173 orlaivi\u0173 atsiradimas tapo rimta problema \u012fkalinimo \u012fstaigose, kelian\u010dia ypating\u0173 i\u0161\u0161\u016bki\u0173 apsaugos darbuotojams. Nusikalt\u0117liai naudojasi \u0161iomis neautorizuotomis bepilot\u0117mis skraidykl\u0117mis (UAV) kontrabandai \u012f \u012fkalinimo \u012fstaigas gabenti, apeidami tradicines saugumo priemones. Nes\u0105\u017eining\u0173 bepilo\u010di\u0173 orlaivi\u0173 kontrabandos pristatymo \u012f kal\u0117jimus atvejai yra \u0161ie:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Bepilo\u010diai dronai kaliniams pristato narkotikus ir skatina piktnaud\u017eiavim\u0105 narkotin\u0117mis med\u017eiagomis kal\u0117jim\u0173 aplinkoje.<\/li>\n\n\n\n<li>ginkl\u0173, \u012fskaitant peilius, pistoletus ar kitus pavojingus daiktus, gabenimas, kad b\u016bt\u0173 galima apginkluoti kalinius ir kurstyti smurt\u0105.<\/li>\n\n\n\n<li>neleistin\u0173 ry\u0161io priemoni\u0173, pavyzd\u017eiui, mobili\u0173j\u0173 telefon\u0173, kuriais kaliniai gali palaikyti neteis\u0117tus ry\u0161ius ir koordinuoti neteis\u0117t\u0105 veikl\u0105, pristatymas.<\/li>\n\n\n\n<li>Bepilo\u010diai orlaiviai gabena pinigus \u012f kal\u0117jimus, palengvindami neteis\u0117tas finansines operacijas \u012fkalinimo \u012fstaigose.<\/li>\n\n\n\n<li>Bepilo\u010di\u0173 orlaivi\u0173 naudojimas tabako gaminiams gabenti, d\u0117l kurio tabako gaminiai platinami juodojoje rinkoje, o nuteistieji i\u0161 to gali gauti pelno.<\/li>\n\n\n\n<li>Prie kal\u0117jim\u0173 dislokuoti steb\u0117jimo dronai, skirti neleistinai steb\u0117ti ir rinkti \u017evalgybin\u0119 informacij\u0105, pa\u017eeid\u017eiant saugumo protokolus ir kalini\u0173 privatum\u0105.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-drone-attacks-against-or-hindering-law-enforcement\"><span class=\"ez-toc-section\" id=\"Drone_Attacks_Against_or_Hindering_Law_Enforcement\"><\/span>Dron\u0173 atakos prie\u0161 teis\u0117saugos institucijas arba trukdymas joms<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Kitas i\u0161\u0161\u016bkis, kylantis d\u0117l bepilo\u010di\u0173 orlaivi\u0173 plitimo, yra dron\u0173 atakos prie\u0161 teis\u0117saugos institucijas, d\u0117l kuri\u0173 kyla pavojus visuomen\u0117s saugumui ir tvarkai. Nusikalt\u0117liai i\u0161naudojo bepilo\u010dius orlaivius, kad taikyt\u0173si \u012f teis\u0117saugos operacijas arba trukdyt\u0173 joms, keldami pavoj\u0173 pareig\u016bn\u0173 gyvybei ir neleisdami jiems veiksmingai atlikti savo pareig\u0173. \u0160ie incidentai i\u0161ry\u0161kino, kad teis\u0117saugos institucijos turi prisitaikyti ir kurti strategijas, skirtas kovoti su \u0161iomis bepilo\u010di\u0173 orlaivi\u0173 keliamomis gr\u0117sm\u0117mis.<\/p>\n\n\n\n<p>Bepilo\u010di\u0173 orlaivi\u0173 atak\u0173, kelian\u010di\u0173 pavoj\u0173 teis\u0117saugos institucijoms, pavyzd\u017eiai:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Bepilo\u010diai orlaiviai naudojami siekiant sutrikdyti svarbiausias policijos operacijas, pavyzd\u017eiui, stebint vykstan\u010dius tyrimus arba atitraukiant d\u0117mes\u012f didel\u0117s rizikos situacijose, ir taip trukdo pareig\u016bnams veiksmingai reaguoti.<\/li>\n\n\n\n<li>ty\u010dinis teis\u0117saugos darbuotoj\u0173 ap\u0161audymas ginkluotais dronais, kelian\u010diais tiesiogin\u0119 gr\u0117sm\u0119 pareig\u016bn\u0173 saugumui ir galin\u010diais sukelti su\u017eeidimus ar \u017e\u016btis.<\/li>\n\n\n\n<li>Bepilo\u010diai orlaiviai naudojami teis\u0117saugos taktikai ir operacijoms rinkti, tod\u0117l nusikalt\u0117liai gali planuoti ir vykdyti nusikaltimus tur\u0117dami i\u0161ankstini\u0173 \u017eini\u0173 apie policijos veikl\u0105. Pavyzd\u017eiui, neseniai dronas praskrido vir\u0161 MI6 pastato Londone, o tai suteik\u0117 \u012fgaliojimus JK policijai, kuri dabar gali kovoti su \u017emon\u0117mis, neatsakingai ar neteis\u0117tai skraidinan\u010diais dronais, o specialios komandos ie\u0161ko taisykli\u0173 pa\u017eeid\u0117j\u0173.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-uas-drone-attacks-at-critical-facilities-amp-infrastructure\"><span class=\"ez-toc-section\" id=\"UASDrone_Attacks_At_Critical_Facilities_Infrastructure\"><\/span>Nepilotuojam\u0173 orlaivi\u0173 ir dron\u0173 atakos prie\u0161 svarbius objektus ir infrastrukt\u016br\u0105<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Dron\u0173 prieinamumas, manevringumas ir galimyb\u0117 i\u0161likti anonimi\u0161kiems juos paver\u010dia patrauklia priemone tiems, kurie siekia sutrikdyti ar padaryti \u017ealos strategin\u0117ms vietov\u0117ms. \u0160ie i\u0161puoliai i\u0161ry\u0161kina kritin\u0117s svarbos objekt\u0173 pa\u017eeid\u017eiamum\u0105 ir poreik\u012f imtis grie\u017et\u0173 atsakom\u0173j\u0173 priemoni\u0173, kad jie b\u016bt\u0173 apsaugoti nuo galim\u0173 dron\u0173 keliam\u0173 gr\u0117smi\u0173.<\/p>\n\n\n\n<p><a href=\"https:\/\/sentrycs.com\/lt\/solution\/critical-infrastructures\/\">Dron\u0173 atak\u0173 pavyzd\u017eiai<\/a> svarbiausiuose objektuose ir infrastrukt\u016broje:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Tikslin\u0117 veikla, nukreipta \u012f elektrines, <a href=\"https:\/\/sentrycs.com\/lt\/the-counter-drone-blog\/knowing-the-drill-combating-the-emerging-risk-of-unidentified-drones-looming-over-oil-and-gas-platforms\/\">naftos ir duj\u0173 \u012frenginiai<\/a> arba elektros tinklus ginkluotais bepilo\u010diais l\u0117ktuvais, siekdami sukelti plataus masto elektros energijos tiekimo sutrikimus ir sutrikdyti svarbiausi\u0173 paslaug\u0173 teikim\u0105.<\/li>\n\n\n\n<li>bepilo\u010di\u0173 orlaivi\u0173 ir (arba) bepilo\u010di\u0173 orlaivi\u0173 be \u012fgulos skraidymas netoli oro uost\u0173 ir trukdymas skryd\u017ei\u0173 operacijoms, keliantis pavoj\u0173 aviacijos saugai ir trikdantis oro eism\u0105, kaip da\u017enai nutinka netoli Gatviko oro uosto (JK).&nbsp;&nbsp;<\/li>\n\n\n\n<li>bepilo\u010di\u0173 orlaivi\u0173 naudojimas nesankcionuotai stebint svarbius vyriausybinius pastatus ar didelio saugumo objektus, pavyzd\u017eiui, branduolines elektrines \u0160vedijoje, Pranc\u016bzijoje, JAV, pa\u017eeid\u017eiant saugumo protokolus ir galimai sudarant palankesnes s\u0105lygas b\u016bsimiems i\u0161puoliams.<\/li>\n<\/ul>\n\n\n\n<div class=\"wp-block-group has-background is-layout-constrained wp-container-core-group-is-layout-d89aad35 wp-block-group-is-layout-constrained\" style=\"background-color:#75a5be38;margin-top:0;margin-bottom:0;padding-top:var(--wp--preset--spacing--50);padding-right:var(--wp--preset--spacing--50);padding-bottom:var(--wp--preset--spacing--50);padding-left:var(--wp--preset--spacing--50)\">\n<p><strong>Patarimai skaitytojui<\/strong><\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>B\u016bkite informuoti<\/strong>: Reguliariai atnaujinkite informacij\u0105 apie naujausius dron\u0173 technologij\u0173 ir j\u0173 taikymo sri\u010di\u0173 poky\u010dius, kad suprastum\u0117te j\u0173 naud\u0105 ir rizik\u0105.<\/li>\n\n\n\n<li><strong>Reglament\u0173 gyn\u0117jas<\/strong>: Remti ir remti taisykles, kuriomis skatinamas atsakingas dron\u0173 naudojimas ir atgrasoma nuo neteis\u0117tos veiklos. Bendradarbiavimas su vietos politikos formuotojais gali pad\u0117ti u\u017etikrinti, kad b\u016bt\u0173 taikomos tinkamos priemon\u0117s.<\/li>\n\n\n\n<li><strong>Saugumo priemoni\u0173 stiprinimas<\/strong>: Jei valdote svarbius objektus, apsvarstykite galimyb\u0119 investuoti \u012f pa\u017eangias kovos su dronais technologijas, pavyzd\u017eiui, integruot\u0105 \"Sentrycs\" sprendim\u0105, kad apsaugotum\u0117te savo veikl\u0105 nuo galim\u0173 dron\u0173 keliam\u0173 gr\u0117smi\u0173.<\/li>\n\n\n\n<li><strong>Suprasti vietos \u012fstatymus<\/strong>: Susipa\u017einkite su vietin\u0117mis taisykl\u0117mis, reglamentuojan\u010diomis dron\u0173 naudojim\u0105 j\u016bs\u0173 vietov\u0117je. \u0160ios \u017einios gali pad\u0117ti jums orientuotis teisin\u0117je aplinkoje ir skatinti laikytis reikalavim\u0173.<\/li>\n\n\n\n<li><strong>\u012egyvendinti prie\u017ei\u016bros strategijas<\/strong>: Organizacijoms, kurios yra pa\u017eeid\u017eiamos d\u0117l dron\u0173 keliam\u0173 gr\u0117smi\u0173, apsvarstykite galimyb\u0119 \u012fgyvendinti steb\u0117jimo strategijas, kad b\u016bt\u0173 galima steb\u0117ti dron\u0173 veikl\u0105 aplink svarbi\u0105 infrastrukt\u016br\u0105 ir u\u017etikrinti greito reagavimo galimybes.<\/li>\n<\/ol>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-drone-uas-attacks-at-borders-against-border-police\"><span class=\"ez-toc-section\" id=\"DroneUAS_Attacks_at_Borders_against_Border_Police\"><\/span>Dron\u0173 ir bepilo\u010di\u0173 orlaivi\u0173 atakos prie sien\u0173 prie\u0161 pasienio policij\u0105<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Nusikalstamos organizacijos ir pavieniai asmenys naudojasi bepilo\u010diais orlaiviais, kad sutrikdyt\u0173 pasienio kontrol\u0117s operacijas, i\u0161vengt\u0173 aptikimo ir galimai pad\u0117t\u0173 vykdyti neteis\u0117t\u0105 veikl\u0105, pavyzd\u017eiui, kontraband\u0105 ar prekyb\u0105 \u017emon\u0117mis. \u0160ie i\u0161puoliai rodo, kad reikia sustiprinti sien\u0173 steb\u0117jim\u0105 ir kovos su dronais priemones, kad b\u016bt\u0173 apsaugotos pasienio teritorijos ir paremtos pasienio policijos pastangos.<\/p>\n\n\n\n<p>Pasienyje prie\u0161 pasienio policij\u0105 nukreipt\u0173 bepilo\u010di\u0173 orlaivi\u0173 atak\u0173 pavyzd\u017eiai:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Bepilo\u010diai orlaiviai naudojami kontrabandai per sien\u0105 gabenti, apeinant tradicines saugumo priemones ir kenkiant sien\u0173 kontrolei. Pvz, <a href=\"https:\/\/edition.cnn.com\/2015\/01\/22\/world\/drug-drone-crashes-us-mexico-border\/index.html\" rel=\"nofollow\">netoli JAV sienos sudu\u017eo narkotikus gaben\u0119s dronas<\/a>, nes\u0117kmingai bandant juos pergabenti per Meksikos ir JAV sien\u0105.&nbsp;&nbsp;<\/li>\n\n\n\n<li>ty\u010dinis trukdymas pasienio patruli\u0173 operacijoms skraidinant bepilo\u010dius orlaivius ribotoje oro erdv\u0117je, atitraukiant d\u0117mes\u012f ir trukdant teis\u0117saugos institucijoms reaguoti. Pavyzd\u017eiui, neseniai \u012fvykusio \u012fvykio metu \"JAV muitin\u0117s ir sienos apsaugos tarnybos (CBP) sraigtasparnis, kaip prane\u0161ama, buvo ap\u0161audytas \"didel\u0117s galios\" dronu, kuris j\u012f sek\u0117 dideliame auk\u0161tyje. Kelios teis\u0117saugos institucijos taip pat band\u0117 sekti dron\u0105 tiek, kad gal\u0117t\u0173 nustatyti jo operatori\u0173, ta\u010diau joms nepavyko\".<\/li>\n\n\n\n<li>\u017evalgybiniais tikslais naudojami dronai, kuriais renkama \u017evalgybin\u0117 informacija apie pasienio patruli\u0173 veikl\u0105, tod\u0117l nusikalt\u0117liai gali pasinaudoti pa\u017eeid\u017eiamomis vietomis ir i\u0161vengti sulaikymo.<\/li>\n<\/ul>\n\n\n\n<p><strong>I\u0161vada<\/strong><\/p>\n\n\n\n<p>Kiekviena technologin\u0117 pa\u017eanga turi teigiam\u0173 ir neigiam\u0173 aspekt\u0173. Pavyzd\u017eiui, socialin\u0117s \u017einiasklaidos platformos sujung\u0117 \u017emones visame pasaulyje, palengvino bendravim\u0105 ir dalijim\u0105si informacija, ta\u010diau taip pat suk\u0117l\u0117 susir\u016bpinim\u0105 d\u0117l privatumo, psichin\u0117s sveikatos ir dezinformacijos sklaidos. Pana\u0161iai ir autonomin\u0117s transporto priemon\u0117s gali padidinti saugum\u0105 keliuose ir pagerinti transporto efektyvum\u0105, ta\u010diau j\u0173 k\u016brimas taip pat kelia etini\u0173 klausim\u0173 d\u0117l atsakomyb\u0117s, darbo viet\u0173 perk\u0117limo ir reguliavimo sistem\u0173 poreikio.<\/p>\n\n\n\n<p>Ne i\u0161imtis ir bepilo\u010di\u0173 orlaivi\u0173 plitimas. Kaip matome i\u0161 \u012fvairi\u0173 pavyzd\u017ei\u0173, bepilo\u010diai orlaiviai ir bepilo\u010diai orlaiviai atne\u0161\u0117 ir ateityje atne\u0161 didel\u0119 naud\u0105 ir pa\u017eang\u0105 daugeliui pramon\u0117s \u0161ak\u0173, sukeldami revoliucij\u0105 tokiose srityse kaip fotografavimas i\u0161 oro, geodeziniai matavimai, logistika ir pristatymas. Ta\u010diau greta \u0161i\u0173 teigiam\u0173 pritaikym\u0173 i\u0161ry\u0161k\u0117jo ir tamsioji dron\u0173 technologijos pus\u0117. Nusikalstamos organizacijos ir asmenys pasinaudojo dron\u0173 universalumu ir prieinamumu neteis\u0117tai veiklai vykdyti.<\/p>\n\n\n\n<p>Labai svarbu pripa\u017einti dvejop\u0105 dron\u0173 technologijos pob\u016bd\u012f ir siekti veiksmingo reguliavimo, vykdymo u\u017etikrinimo ir atsakom\u0173j\u0173 priemoni\u0173, kad b\u016bt\u0173 galima pasinaudoti jos teikiama nauda ir kartu suma\u017einti neigiam\u0105 poveik\u012f visuomenei.<\/p>\n\n\n\n<p>Svetain\u0117 <a href=\"https:\/\/sentrycs.com\/lt\/\">Sentrycs<\/a> integruotas <a href=\"https:\/\/sentrycs.com\/lt\/our-technology\/\">kovos su dronais technologija<\/a> yra vienintelis perspektyvus b\u016bdas padidinti bendr\u0105 oro erdv\u0117s saugum\u0105 tankiai apgyvendintoje miesto aplinkoje, nes netrukdo kitiems ry\u0161io signalams ir nesukelia \u0161alutin\u0117s \u017ealos. Pasitelkdama pa\u017eangi\u0105 protokol\u0173 analiz\u0117s technologij\u0105, \"Sentrycs\" si\u016blo \u012fvairioms organizacijoms, nuo vyriausybi\u0173 iki<a href=\"https:\/\/sentrycs.com\/lt\/solution\/border-security\/\"> sien\u0173 apsauga<\/a> agent\u016broms, kal\u0117jimams, ypatingos svarbos infrastrukt\u016bros objektams, federalin\u0117ms institucijoms ir daugeliui kit\u0173 - galinga dangaus apsaugos sistema. Integruotas kovos su dronais sprendimas apima aptikimo, sekimo, atpa\u017einimo ir ma\u017einimo (DTIM) galimybes, taip pat integruot\u0105 valdymo centr\u0105.  Pa\u017eangi protokol\u0173 analiz\u0117, pa\u017eang\u016bs ma\u0161ininio mokymosi algoritmai ir automatizuotos tyrim\u0173 sistemos leid\u017eia atlikti grei\u010diausi\u0105 ry\u0161io protokol\u0173 analiz\u0119 ir u\u017etikrinti trumpiausi\u0105 iki \u0161iol prieinam\u0173 DTIM galimybi\u0173 pateikimo rinkai laik\u0105.&nbsp;<\/p>\n\n\n\n<p>Naudodami \u0161\u012f pa\u017eang\u0173 technologin\u012f sprendim\u0105 atsakingose rankose, galime kurti saugesn\u0119 ir veiksmingesn\u0119 dron\u0173 ekosistem\u0105. \u0160is sprendimas, pasi\u017eymintis patikimomis galimyb\u0117mis ir veiksminga kontrole, pad\u0117s skatinti atsaking\u0105 dron\u0173 naudojim\u0105, sustiprinti saugos priemones ir u\u017etikrinti teigiam\u0105 dron\u0173 poveik\u012f pasaulio ekonomikai.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-faqs\"><span class=\"ez-toc-section\" id=\"FAQs\"><\/span>DUK<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<div class=\"schema-faq wp-block-yoast-faq-block\"><div class=\"schema-faq-section\" id=\"faq-question-1686061343338\"><strong class=\"schema-faq-question\"><strong>Kokia yra da\u017eniausia bepilo\u010di\u0173 orlaivi\u0173 incident\u0173 prie\u017eastis?<\/strong><\/strong> <p class=\"schema-faq-answer\">Da\u017eniausia bepilo\u010di\u0173 orlaivi\u0173 ir (arba) dron\u0173 incident\u0173 prie\u017eastis yra \u017emogaus klaidos, pavyzd\u017eiui, problemos pilotuojant bepilot\u012f orlaiv\u012f arba neteisingas sprendimas, po to - techniniai dron\u0173 komponent\u0173, pavyzd\u017eiui, ry\u0161i\u0173 ar navigacijos sistem\u0173, gedimai.<\/p> <\/div> <div class=\"schema-faq-section\" id=\"faq-question-1686061379342\"><strong class=\"schema-faq-question\"><strong>Kas yra dron\u0173 ataka?<\/strong><\/strong> <p class=\"schema-faq-answer\">Dron\u0173 ataka - tai s\u0105moningas bepilo\u010di\u0173 orlaivi\u0173 (UAV) naudojimas agresyviais tikslais, \u012fskaitant tikslinius sm\u016bgius. Tokiose atakose dalyvauja bepilo\u010diai orlaiviai, kuriuose \u012frengtos kameros, jutikliai arba ginklai, nukreipti \u012f asmenis, vietoves, infrastrukt\u016br\u0105 arba karinius taikinius. Nusikalt\u0117liai gali b\u016bti valstybiniai arba nevalstybiniai subjektai, keliantys saugumo ir saugos i\u0161\u0161\u016bki\u0173, galin\u010di\u0173 padaryti \u017ealos gyvybei ir turtui.<\/p> <\/div> <div class=\"schema-faq-section\" id=\"faq-question-1686061415253\"><strong class=\"schema-faq-question\"><strong>Koks buvo garsusis bepilo\u010dio l\u0117ktuvo sm\u016bgis?\u00a0<\/strong><\/strong> <p class=\"schema-faq-answer\">Vienas i\u0161 garsiausi\u0173 bepilo\u010di\u0173 orlaivi\u0173 sm\u016bgi\u0173 - 2020 m. sausio m\u0117n. Jungtini\u0173 Valstij\u0173 bepilo\u010dio orlaivio sm\u016bgis, kuriuo buvo tikslingai nu\u017eudytas auk\u0161to rango Irano kariuomen\u0117s pareig\u016bnas Qasemas Soleimani.<\/p> <\/div> <div class=\"schema-faq-section\" id=\"faq-question-1686061435593\"><strong class=\"schema-faq-question\"><strong>Kod\u0117l bepilo\u010diai orlaiviai yra problema?\u00a0<\/strong><\/strong> <p class=\"schema-faq-answer\">Dronai kelia kelet\u0105 i\u0161\u0161\u016bki\u0173 ir problem\u0173 d\u0117l j\u0173 prieinamumo ir piktnaud\u017eiavimo galimybi\u0173. Susir\u016bpinim\u0105 d\u0117l privatumo kelia tai, kad bepilo\u010diai orlaiviai su kameromis be sutikimo pa\u017eeid\u017eia asmens privatum\u0105. Saugumui kyla pavojus, kai dronai veikia ribotoje oro erdv\u0117je arba netoli oro uost\u0173 ir kelia susid\u016brimo su pilotuojamais orlaiviais gr\u0117sm\u0119. Be to, dronai gali b\u016bti naudojami neteis\u0117tai veiklai, \u012fskaitant kontraband\u0105 ir neleistin\u0105 steb\u0117jim\u0105.\u00a0<\/p> <\/div> <\/div>\n\n\n\n<p><strong>Moksliniai tyrimai<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/eprints.lancs.ac.uk\/id\/eprint\/141917\/\"><strong>https:\/\/eprints.lancs.ac.uk\/id\/eprint\/141917\/<\/strong><\/a><strong>&nbsp;<\/strong><\/li>\n\n\n\n<li><a href=\"https:\/\/www.gov.uk\/government\/news\/action-to-detect-deter-and-disrupt-the-misuse-of-drones\"><strong>https:\/\/www.gov.uk\/government\/news\/action-to-detect-deter-and-disrupt-the-misuse-of-drones<\/strong><\/a><strong>&nbsp;<\/strong><\/li>\n\n\n\n<li><a href=\"https:\/\/www.washingtonpost.com\/transportation\/2021\/12\/03\/drones-flying-prosecutions\/\"><strong>https:\/\/www.washingtonpost.com\/transportation\/2021\/12\/03\/drones-flying-prosecutions\/<\/strong><\/a><strong>&nbsp;<\/strong><\/li>\n\n\n\n<li><a href=\"https:\/\/fcw.com\/congress\/2022\/06\/new-bill-sets-federal-penalties-drone-misuse\/368148\/\"><strong>https:\/\/fcw.com\/congress\/2022\/06\/new-bill-sets-federal-penalties-drone-misuse\/368148\/<\/strong><\/a><strong>&nbsp;<\/strong><\/li>\n\n\n\n<li><a href=\"https:\/\/www.psni.police.uk\/safety-and-support\/advice-and-information\/unmanned-aircraft-systems-drones\"><strong>https:\/\/www.psni.police.uk\/safety-and-support\/advice-and-information\/unmanned-aircraft-systems-drones<\/strong><\/a><\/li>\n<\/ul>","protected":false},"excerpt":{"rendered":"<p>Introduction Unmanned Aerial Systems (UAS), a.k.a drones, have brought significant advancements and benefits to various industries, and so we can see their use is growing exponentially.&nbsp; However, the good goes hand in hand with the bad as their misuse by criminals and individuals with malicious intent has become a growing concern as well.&nbsp; In this <a class=\"more-link\" href=\"https:\/\/sentrycs.com\/lt\/the-counter-drone-blog\/misuse-of-drones-drone-attacks-and-incidents\/\" title=\"Netinkamas bepilo\u010di\u0173 orlaivi\u0173 naudojimas: Dron\u0173 atakos ir incidentai\">Skaityti daugiau<\/a><\/p>","protected":false},"author":2,"featured_media":2349,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_editorskit_title_hidden":false,"_editorskit_reading_time":0,"_editorskit_is_block_options_detached":false,"_editorskit_block_options_position":"{}","footnotes":"","_links_to":"","_links_to_target":""},"categories":[3,49],"tags":[],"class_list":["post-1215","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-drone-incidents","category-first-responders"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v23.3 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Misuse of Drones: Drone Attacks and Incidents | Sentrycs<\/title>\n<meta name=\"description\" content=\"Explore documented drone attacks at prisons, airports, and borders. Learn how Sentrycs&#039; counter-drone solutions protect against UAV misuse and terrorism.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sentrycs.com\/lt\/the-counter-drone-blog\/misuse-of-drones-drone-attacks-and-incidents\/\" \/>\n<meta property=\"og:locale\" content=\"lt_LT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Misuse of Drones: Drone Attacks and Incidents | Sentrycs\" \/>\n<meta property=\"og:description\" content=\"Explore documented drone attacks at prisons, airports, and borders. Learn how Sentrycs&#039; counter-drone solutions protect against UAV misuse and terrorism.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sentrycs.com\/lt\/the-counter-drone-blog\/misuse-of-drones-drone-attacks-and-incidents\/\" \/>\n<meta property=\"og:site_name\" content=\"Sentrycs\" \/>\n<meta property=\"article:published_time\" content=\"2023-06-06T14:32:48+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-23T15:46:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sentrycs.com\/wp-content\/uploads\/2023\/06\/shutterstock_1374833051-scaled-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1440\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Audelia Boker\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Sentrycs\" \/>\n<meta name=\"twitter:site\" content=\"@Sentrycs\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Audelia Boker\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minut\u0117s\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/sentrycs.com\/the-counter-drone-blog\/misuse-of-drones-drone-attacks-and-incidents\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/sentrycs.com\/the-counter-drone-blog\/misuse-of-drones-drone-attacks-and-incidents\/\"},\"author\":{\"name\":\"Audelia Boker\",\"@id\":\"https:\/\/sentrycs.com\/#\/schema\/person\/15607ca3aaaff18fe43ade0cb3476e2a\"},\"headline\":\"Misuse of Drones: Drone Attacks and Incidents\",\"datePublished\":\"2023-06-06T14:32:48+00:00\",\"dateModified\":\"2026-04-23T15:46:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/sentrycs.com\/the-counter-drone-blog\/misuse-of-drones-drone-attacks-and-incidents\/\"},\"wordCount\":1824,\"publisher\":{\"@id\":\"https:\/\/sentrycs.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/sentrycs.com\/the-counter-drone-blog\/misuse-of-drones-drone-attacks-and-incidents\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sentrycs.com\/wp-content\/uploads\/2023\/06\/shutterstock_1374833051-scaled-1.jpg\",\"articleSection\":[\"Drone Incidents\",\"First Responders\"],\"inLanguage\":\"lt-LT\"},{\"@type\":[\"WebPage\",\"FAQPage\"],\"@id\":\"https:\/\/sentrycs.com\/the-counter-drone-blog\/misuse-of-drones-drone-attacks-and-incidents\/\",\"url\":\"https:\/\/sentrycs.com\/the-counter-drone-blog\/misuse-of-drones-drone-attacks-and-incidents\/\",\"name\":\"Misuse of Drones: Drone Attacks and Incidents | Sentrycs\",\"isPartOf\":{\"@id\":\"https:\/\/sentrycs.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/sentrycs.com\/the-counter-drone-blog\/misuse-of-drones-drone-attacks-and-incidents\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/sentrycs.com\/the-counter-drone-blog\/misuse-of-drones-drone-attacks-and-incidents\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sentrycs.com\/wp-content\/uploads\/2023\/06\/shutterstock_1374833051-scaled-1.jpg\",\"datePublished\":\"2023-06-06T14:32:48+00:00\",\"dateModified\":\"2026-04-23T15:46:27+00:00\",\"description\":\"Explore documented drone attacks at prisons, airports, and borders. Learn how Sentrycs' counter-drone solutions protect against UAV misuse and terrorism.\",\"breadcrumb\":{\"@id\":\"https:\/\/sentrycs.com\/the-counter-drone-blog\/misuse-of-drones-drone-attacks-and-incidents\/#breadcrumb\"},\"mainEntity\":[{\"@id\":\"https:\/\/sentrycs.com\/the-counter-drone-blog\/misuse-of-drones-drone-attacks-and-incidents\/#faq-question-1686061343338\"},{\"@id\":\"https:\/\/sentrycs.com\/the-counter-drone-blog\/misuse-of-drones-drone-attacks-and-incidents\/#faq-question-1686061379342\"},{\"@id\":\"https:\/\/sentrycs.com\/the-counter-drone-blog\/misuse-of-drones-drone-attacks-and-incidents\/#faq-question-1686061415253\"},{\"@id\":\"https:\/\/sentrycs.com\/the-counter-drone-blog\/misuse-of-drones-drone-attacks-and-incidents\/#faq-question-1686061435593\"}],\"inLanguage\":\"lt-LT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sentrycs.com\/the-counter-drone-blog\/misuse-of-drones-drone-attacks-and-incidents\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"lt-LT\",\"@id\":\"https:\/\/sentrycs.com\/the-counter-drone-blog\/misuse-of-drones-drone-attacks-and-incidents\/#primaryimage\",\"url\":\"https:\/\/sentrycs.com\/wp-content\/uploads\/2023\/06\/shutterstock_1374833051-scaled-1.jpg\",\"contentUrl\":\"https:\/\/sentrycs.com\/wp-content\/uploads\/2023\/06\/shutterstock_1374833051-scaled-1.jpg\",\"width\":2560,\"height\":1440},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sentrycs.com\/the-counter-drone-blog\/misuse-of-drones-drone-attacks-and-incidents\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/sentrycs.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Misuse of Drones: Drone Attacks and Incidents\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sentrycs.com\/#website\",\"url\":\"https:\/\/sentrycs.com\/\",\"name\":\"Sentrycs\",\"description\":\"Counter-drone Solutions Adapting at the Speed of Threat\",\"publisher\":{\"@id\":\"https:\/\/sentrycs.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sentrycs.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"lt-LT\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/sentrycs.com\/#organization\",\"name\":\"Sentrycs Counter Drone Solutions\",\"url\":\"https:\/\/sentrycs.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"lt-LT\",\"@id\":\"https:\/\/sentrycs.com\/#\/schema\/logo\/image\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Sentrycs Counter Drone Solutions\"},\"image\":{\"@id\":\"https:\/\/sentrycs.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/Sentrycs\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/sentrycs.com\/#\/schema\/person\/15607ca3aaaff18fe43ade0cb3476e2a\",\"name\":\"Audelia Boker\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"lt-LT\",\"@id\":\"https:\/\/sentrycs.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b08a31199f1b8afaca01425d52f90ac3b2f5ea19208c8e50053756f0dd0bd041?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b08a31199f1b8afaca01425d52f90ac3b2f5ea19208c8e50053756f0dd0bd041?s=96&d=mm&r=g\",\"caption\":\"Audelia Boker\"}},{\"@type\":\"Question\",\"@id\":\"https:\/\/sentrycs.com\/the-counter-drone-blog\/misuse-of-drones-drone-attacks-and-incidents\/#faq-question-1686061343338\",\"position\":1,\"url\":\"https:\/\/sentrycs.com\/the-counter-drone-blog\/misuse-of-drones-drone-attacks-and-incidents\/#faq-question-1686061343338\",\"name\":\"What is the most common cause of UAV drone incidents?\",\"answerCount\":1,\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"The most common cause of UAS\/Drone incidents is human error, such as problems with the piloting of the UAV or wrong judgment, followed by technical failures in the drone's components, such as communication or navigation systems.\",\"inLanguage\":\"lt-LT\"},\"inLanguage\":\"lt-LT\"},{\"@type\":\"Question\",\"@id\":\"https:\/\/sentrycs.com\/the-counter-drone-blog\/misuse-of-drones-drone-attacks-and-incidents\/#faq-question-1686061379342\",\"position\":2,\"url\":\"https:\/\/sentrycs.com\/the-counter-drone-blog\/misuse-of-drones-drone-attacks-and-incidents\/#faq-question-1686061379342\",\"name\":\"What is a drone attack?\",\"answerCount\":1,\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"A drone attack is the deliberate use of unmanned aerial vehicles (UAVs) for aggressive purposes, including targeted strikes. These attacks involve drones equipped with cameras, sensors, or weapons, aimed at individuals, locations, infrastructure, or military targets. Perpetrators can be state or non-state actors, posing security and safety challenges with potential harm to lives and property.\",\"inLanguage\":\"lt-LT\"},\"inLanguage\":\"lt-LT\"},{\"@type\":\"Question\",\"@id\":\"https:\/\/sentrycs.com\/the-counter-drone-blog\/misuse-of-drones-drone-attacks-and-incidents\/#faq-question-1686061415253\",\"position\":3,\"url\":\"https:\/\/sentrycs.com\/the-counter-drone-blog\/misuse-of-drones-drone-attacks-and-incidents\/#faq-question-1686061415253\",\"name\":\"What was the famous drone strike?\u00a0\",\"answerCount\":1,\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"One of the most famous drone strikes is the targeted killing of Qasem Soleimani, a high-ranking Iranian military official, by a United States drone strike in January 2020.\",\"inLanguage\":\"lt-LT\"},\"inLanguage\":\"lt-LT\"},{\"@type\":\"Question\",\"@id\":\"https:\/\/sentrycs.com\/the-counter-drone-blog\/misuse-of-drones-drone-attacks-and-incidents\/#faq-question-1686061435593\",\"position\":4,\"url\":\"https:\/\/sentrycs.com\/the-counter-drone-blog\/misuse-of-drones-drone-attacks-and-incidents\/#faq-question-1686061435593\",\"name\":\"Why are drones a problem?\u00a0\",\"answerCount\":1,\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"Drones present several challenges and problems due to their availability and potential for misuse. Privacy concerns arise from drones equipped with cameras invading personal privacy without consent. Safety risks emerge when drones operate in restricted airspace or near airports, posing a collision threat to manned aircraft. Drones can also be exploited for illegal activities, including smuggling and unauthorized surveillance.\u00a0\",\"inLanguage\":\"lt-LT\"},\"inLanguage\":\"lt-LT\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Netinkamas bepilo\u010di\u0173 orlaivi\u0173 naudojimas: Dron\u0173 atakos ir incidentai | Sentrycs","description":"Explore documented drone attacks at prisons, airports, and borders. Learn how Sentrycs' counter-drone solutions protect against UAV misuse and terrorism.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sentrycs.com\/lt\/the-counter-drone-blog\/misuse-of-drones-drone-attacks-and-incidents\/","og_locale":"lt_LT","og_type":"article","og_title":"Misuse of Drones: Drone Attacks and Incidents | Sentrycs","og_description":"Explore documented drone attacks at prisons, airports, and borders. Learn how Sentrycs' counter-drone solutions protect against UAV misuse and terrorism.","og_url":"https:\/\/sentrycs.com\/lt\/the-counter-drone-blog\/misuse-of-drones-drone-attacks-and-incidents\/","og_site_name":"Sentrycs","article_published_time":"2023-06-06T14:32:48+00:00","article_modified_time":"2026-04-23T15:46:27+00:00","og_image":[{"width":2560,"height":1440,"url":"https:\/\/sentrycs.com\/wp-content\/uploads\/2023\/06\/shutterstock_1374833051-scaled-1.jpg","type":"image\/jpeg"}],"author":"Audelia Boker","twitter_card":"summary_large_image","twitter_creator":"@Sentrycs","twitter_site":"@Sentrycs","twitter_misc":{"Written by":"Audelia Boker","Est. reading time":"9 minut\u0117s"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sentrycs.com\/the-counter-drone-blog\/misuse-of-drones-drone-attacks-and-incidents\/#article","isPartOf":{"@id":"https:\/\/sentrycs.com\/the-counter-drone-blog\/misuse-of-drones-drone-attacks-and-incidents\/"},"author":{"name":"Audelia Boker","@id":"https:\/\/sentrycs.com\/#\/schema\/person\/15607ca3aaaff18fe43ade0cb3476e2a"},"headline":"Misuse of Drones: Drone Attacks and Incidents","datePublished":"2023-06-06T14:32:48+00:00","dateModified":"2026-04-23T15:46:27+00:00","mainEntityOfPage":{"@id":"https:\/\/sentrycs.com\/the-counter-drone-blog\/misuse-of-drones-drone-attacks-and-incidents\/"},"wordCount":1824,"publisher":{"@id":"https:\/\/sentrycs.com\/#organization"},"image":{"@id":"https:\/\/sentrycs.com\/the-counter-drone-blog\/misuse-of-drones-drone-attacks-and-incidents\/#primaryimage"},"thumbnailUrl":"https:\/\/sentrycs.com\/wp-content\/uploads\/2023\/06\/shutterstock_1374833051-scaled-1.jpg","articleSection":["Drone Incidents","First Responders"],"inLanguage":"lt-LT"},{"@type":["WebPage","FAQPage"],"@id":"https:\/\/sentrycs.com\/the-counter-drone-blog\/misuse-of-drones-drone-attacks-and-incidents\/","url":"https:\/\/sentrycs.com\/the-counter-drone-blog\/misuse-of-drones-drone-attacks-and-incidents\/","name":"Netinkamas bepilo\u010di\u0173 orlaivi\u0173 naudojimas: Dron\u0173 atakos ir incidentai | Sentrycs","isPartOf":{"@id":"https:\/\/sentrycs.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sentrycs.com\/the-counter-drone-blog\/misuse-of-drones-drone-attacks-and-incidents\/#primaryimage"},"image":{"@id":"https:\/\/sentrycs.com\/the-counter-drone-blog\/misuse-of-drones-drone-attacks-and-incidents\/#primaryimage"},"thumbnailUrl":"https:\/\/sentrycs.com\/wp-content\/uploads\/2023\/06\/shutterstock_1374833051-scaled-1.jpg","datePublished":"2023-06-06T14:32:48+00:00","dateModified":"2026-04-23T15:46:27+00:00","description":"Explore documented drone attacks at prisons, airports, and borders. Learn how Sentrycs' counter-drone solutions protect against UAV misuse and terrorism.","breadcrumb":{"@id":"https:\/\/sentrycs.com\/the-counter-drone-blog\/misuse-of-drones-drone-attacks-and-incidents\/#breadcrumb"},"mainEntity":[{"@id":"https:\/\/sentrycs.com\/the-counter-drone-blog\/misuse-of-drones-drone-attacks-and-incidents\/#faq-question-1686061343338"},{"@id":"https:\/\/sentrycs.com\/the-counter-drone-blog\/misuse-of-drones-drone-attacks-and-incidents\/#faq-question-1686061379342"},{"@id":"https:\/\/sentrycs.com\/the-counter-drone-blog\/misuse-of-drones-drone-attacks-and-incidents\/#faq-question-1686061415253"},{"@id":"https:\/\/sentrycs.com\/the-counter-drone-blog\/misuse-of-drones-drone-attacks-and-incidents\/#faq-question-1686061435593"}],"inLanguage":"lt-LT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sentrycs.com\/the-counter-drone-blog\/misuse-of-drones-drone-attacks-and-incidents\/"]}]},{"@type":"ImageObject","inLanguage":"lt-LT","@id":"https:\/\/sentrycs.com\/the-counter-drone-blog\/misuse-of-drones-drone-attacks-and-incidents\/#primaryimage","url":"https:\/\/sentrycs.com\/wp-content\/uploads\/2023\/06\/shutterstock_1374833051-scaled-1.jpg","contentUrl":"https:\/\/sentrycs.com\/wp-content\/uploads\/2023\/06\/shutterstock_1374833051-scaled-1.jpg","width":2560,"height":1440},{"@type":"BreadcrumbList","@id":"https:\/\/sentrycs.com\/the-counter-drone-blog\/misuse-of-drones-drone-attacks-and-incidents\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sentrycs.com\/"},{"@type":"ListItem","position":2,"name":"Misuse of Drones: Drone Attacks and Incidents"}]},{"@type":"WebSite","@id":"https:\/\/sentrycs.com\/#website","url":"https:\/\/sentrycs.com\/","name":"Sentrycs","description":"Kovos su dronais sprendimai, prisitaikantys prie gr\u0117sm\u0117s grei\u010dio","publisher":{"@id":"https:\/\/sentrycs.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sentrycs.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"lt-LT"},{"@type":"Organization","@id":"https:\/\/sentrycs.com\/#organization","name":"\"Sentrycs\" kovos su dronais sprendimai","url":"https:\/\/sentrycs.com\/","logo":{"@type":"ImageObject","inLanguage":"lt-LT","@id":"https:\/\/sentrycs.com\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Sentrycs Counter Drone Solutions"},"image":{"@id":"https:\/\/sentrycs.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/Sentrycs"]},{"@type":"Person","@id":"https:\/\/sentrycs.com\/#\/schema\/person\/15607ca3aaaff18fe43ade0cb3476e2a","name":"Audelia Boker","image":{"@type":"ImageObject","inLanguage":"lt-LT","@id":"https:\/\/sentrycs.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/b08a31199f1b8afaca01425d52f90ac3b2f5ea19208c8e50053756f0dd0bd041?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b08a31199f1b8afaca01425d52f90ac3b2f5ea19208c8e50053756f0dd0bd041?s=96&d=mm&r=g","caption":"Audelia Boker"}},{"@type":"Question","@id":"https:\/\/sentrycs.com\/the-counter-drone-blog\/misuse-of-drones-drone-attacks-and-incidents\/#faq-question-1686061343338","position":1,"url":"https:\/\/sentrycs.com\/the-counter-drone-blog\/misuse-of-drones-drone-attacks-and-incidents\/#faq-question-1686061343338","name":"Kokia yra da\u017eniausia bepilo\u010di\u0173 orlaivi\u0173 incident\u0173 prie\u017eastis?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"The most common cause of UAS\/Drone incidents is human error, such as problems with the piloting of the UAV or wrong judgment, followed by technical failures in the drone's components, such as communication or navigation systems.","inLanguage":"lt-LT"},"inLanguage":"lt-LT"},{"@type":"Question","@id":"https:\/\/sentrycs.com\/the-counter-drone-blog\/misuse-of-drones-drone-attacks-and-incidents\/#faq-question-1686061379342","position":2,"url":"https:\/\/sentrycs.com\/the-counter-drone-blog\/misuse-of-drones-drone-attacks-and-incidents\/#faq-question-1686061379342","name":"Kas yra dron\u0173 ataka?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"A drone attack is the deliberate use of unmanned aerial vehicles (UAVs) for aggressive purposes, including targeted strikes. These attacks involve drones equipped with cameras, sensors, or weapons, aimed at individuals, locations, infrastructure, or military targets. Perpetrators can be state or non-state actors, posing security and safety challenges with potential harm to lives and property.","inLanguage":"lt-LT"},"inLanguage":"lt-LT"},{"@type":"Question","@id":"https:\/\/sentrycs.com\/the-counter-drone-blog\/misuse-of-drones-drone-attacks-and-incidents\/#faq-question-1686061415253","position":3,"url":"https:\/\/sentrycs.com\/the-counter-drone-blog\/misuse-of-drones-drone-attacks-and-incidents\/#faq-question-1686061415253","name":"Koks buvo garsusis bepilo\u010dio l\u0117ktuvo sm\u016bgis?\u00a0","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"One of the most famous drone strikes is the targeted killing of Qasem Soleimani, a high-ranking Iranian military official, by a United States drone strike in January 2020.","inLanguage":"lt-LT"},"inLanguage":"lt-LT"},{"@type":"Question","@id":"https:\/\/sentrycs.com\/the-counter-drone-blog\/misuse-of-drones-drone-attacks-and-incidents\/#faq-question-1686061435593","position":4,"url":"https:\/\/sentrycs.com\/the-counter-drone-blog\/misuse-of-drones-drone-attacks-and-incidents\/#faq-question-1686061435593","name":"Kod\u0117l bepilo\u010diai orlaiviai yra problema?\u00a0","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Drones present several challenges and problems due to their availability and potential for misuse. Privacy concerns arise from drones equipped with cameras invading personal privacy without consent. Safety risks emerge when drones operate in restricted airspace or near airports, posing a collision threat to manned aircraft. Drones can also be exploited for illegal activities, including smuggling and unauthorized surveillance.\u00a0","inLanguage":"lt-LT"},"inLanguage":"lt-LT"}]}},"_links":{"self":[{"href":"https:\/\/sentrycs.com\/lt\/wp-json\/wp\/v2\/posts\/1215","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sentrycs.com\/lt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sentrycs.com\/lt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sentrycs.com\/lt\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/sentrycs.com\/lt\/wp-json\/wp\/v2\/comments?post=1215"}],"version-history":[{"count":20,"href":"https:\/\/sentrycs.com\/lt\/wp-json\/wp\/v2\/posts\/1215\/revisions"}],"predecessor-version":[{"id":3686,"href":"https:\/\/sentrycs.com\/lt\/wp-json\/wp\/v2\/posts\/1215\/revisions\/3686"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sentrycs.com\/lt\/wp-json\/wp\/v2\/media\/2349"}],"wp:attachment":[{"href":"https:\/\/sentrycs.com\/lt\/wp-json\/wp\/v2\/media?parent=1215"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sentrycs.com\/lt\/wp-json\/wp\/v2\/categories?post=1215"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sentrycs.com\/lt\/wp-json\/wp\/v2\/tags?post=1215"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}