{"id":2065,"date":"2024-02-07T09:24:44","date_gmt":"2024-02-07T09:24:44","guid":{"rendered":"https:\/\/sentrycs.com\/?p=2065"},"modified":"2025-06-30T13:24:53","modified_gmt":"2025-06-30T13:24:53","slug":"deconstructing-october-7-hamas-attacks-to-determine-counter-drone-technology-must-haves","status":"publish","type":"post","link":"https:\/\/sentrycs.com\/lt\/the-counter-drone-blog\/deconstructing-october-7-hamas-attacks-to-determine-counter-drone-technology-must-haves\/","title":{"rendered":"\"Hamas\" atak\u0173 dekonstravimas siekiant nustatyti, kokios kovos su dronais technologijos turi b\u016bti \u012fdiegtos"},"content":{"rendered":"<p><strong>Mokymasis i\u0161 precedento neturin\u010di\u0173 spalio 7 d. teroro i\u0161puoli\u0173 siekiant i\u0161vengti b\u016bsim\u0173 gr\u0117smi\u0173 dron\u0173 saugumui ir apibr\u0117\u017eti kovos su dronais technologij\u0173 operatyvinius poreikius.<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/sentrycs.com\/wp-content\/uploads\/2024\/01\/sentrycs-hamas-attack-2-1024x780.jpg\" alt=\"\" class=\"wp-image-2096\"\/><\/figure>\n\n\n\n<p class=\"has-blue-color has-text-color has-link-color wp-elements-2367ab5d5920f14466cb422d046b87ea\"><strong>\u012evadas<\/strong><\/p>\n\n\n\n<p>2023 m. spalio 7 d. \u012fvykiai tapo reik\u0161mingu pos\u016bkiu saugumo gr\u0117smi\u0173 srityje ir pabr\u0117\u017e\u0117, kad daugeliui \u0161ali\u0173 skubiai reikia visapusi\u0161ko po\u017ei\u016brio \u012f kovos su dronais technologijas ir strategij\u0105. \u0160iame tinklara\u0161\u010dio \u012fra\u0161e gilinsim\u0117s \u012f spalio 7 d. \"Hamas\" atak\u0173 pamokas, pateiksime \u012f\u017evalg\u0173 apie tai, k\u0105 prie\u0161 tai buvo galima padaryti kitaip, kokius operatyvinius reikalavimus akcentavo atakos ir kokie buvo v\u0117lesni kovos su dronais priemoni\u0173 poky\u010diai.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-blue-color has-text-color has-link-color wp-elements-1860119700908acd765c46d64b3b102c\" id=\"h-1-pre-october-7-anticipating-the-unthinkable\"><span class=\"ez-toc-section\" id=\"1_Pre-October_7_Anticipating_the_Unthinkable\"><\/span><strong>1. Prie\u0161 spalio 7 d.: ne\u012fsivaizduojamo \u012fvykio numatymas<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-understanding-rogue-drone-usage\"><span class=\"ez-toc-section\" id=\"Understanding_Rogue_Drone_Usage\"><\/span>Rogue Drone naudojimo supratimas<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Prie\u0161 spalio 7 d. i\u0161puolius b\u016bt\u0173 buv\u0119 labai naudinga nuodugniau i\u0161analizuoti \"Hamas\" naudojam\u0173 bepilo\u010di\u0173 orlaivi\u0173 tipus. \u0160ie bepilo\u010diai orlaiviai, daugiausia sudaryti i\u0161 komerciniais tikslais \u012fsigyjam\u0173 dron\u0173, d\u0117l savo prieinamumo ir plataus paplitimo k\u0117l\u0117 i\u0161skirtin\u012f i\u0161\u0161\u016bk\u012f. I\u0161 anksto \u017einant Gazos ruo\u017eo oro erdv\u0117je esan\u010di\u0173 bepilo\u010di\u0173 orlaivi\u0173 tipus, b\u016bt\u0173 buvusi suteikta technologin\u0117 pirmenyb\u0117, ypa\u010d kai kalbama apie bibliotekos pagrindu sukurtus sprendimus, kuri\u0173 sistemos gal\u0117jo b\u016bti i\u0161bandytos b\u016btent prie\u0161 \u0161iuos bepilo\u010dius orlaivius.<\/p>\n\n\n\n<p>Visi \u017einome, kad bepilo\u010di\u0173 orlaivi\u0173, naudojam\u0173 kariniuose veiksmuose, skai\u010dius auga, ta\u010diau kiekybini\u0173 duomen\u0173 nepakanka. Bibliotekomis pagr\u012fst\u0173 kovos su dronais priemoni\u0173 pardav\u0117jai turi i\u0161tirti kiekvieno rinkoje esan\u010dio komercinio drono ry\u0161io protokolus, kad gal\u0117t\u0173 sukurti tiksli\u0105 ir patikim\u0105 apsaug\u0105. Nors \u017evalgybin\u0117 informacija apie \"Hamas\" \u012frang\u0105 i\u0161lieka \u012fslaptinta, ji pateikiama \"Sentrycs\" ir kelioms kitoms Izraelio C-UAS (kovos su bepilo\u010diais orlaiviais sistemos) bendrov\u0117ms, kurios ja naudojasi, siekiant u\u017etikrinti, kad j\u0173 sprendimai b\u016bt\u0173 greitai pritaikomi ir visada aktual\u016bs.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"576\" height=\"420\" src=\"https:\/\/sentrycs.com\/wp-content\/uploads\/2024\/01\/Ukraine-UAV-Geolocation.png\" alt=\"GeoPatvirtintos bepilo\u010di\u0173 orlaivi\u0173 nustatytos Ukrainos geolokacijos 2023 m.\" class=\"wp-image-2066\" srcset=\"https:\/\/sentrycs.com\/wp-content\/uploads\/2024\/01\/Ukraine-UAV-Geolocation.png 576w, https:\/\/sentrycs.com\/wp-content\/uploads\/2024\/01\/Ukraine-UAV-Geolocation-300x219.png 300w, https:\/\/sentrycs.com\/wp-content\/uploads\/2024\/01\/Ukraine-UAV-Geolocation-16x12.png 16w\" sizes=\"auto, (max-width: 576px) 100vw, 576px\" \/><\/figure>\n\n\n\n<p>\u0160altinis: <a href=\"https:\/\/en.defence-ua.com\/industries\/ukrainian_fpv_drones_massively_outnumber_russian_ones_on_the_frontline_what_can_russia_do_about_it-8145.html\">\"Defense Express<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-building-a-heat-map-of-rogue-drone-activities\"><span class=\"ez-toc-section\" id=\"Building_a_Heat_Map_of_Rogue_Drone_Activities\"><\/span>\"Rogue Drone\" veiklos \u017eem\u0117lapio sudarymas<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Iniciatyvios steb\u0117senos priemon\u0117s, pavyzd\u017eiui, dron\u0173 veiklos \u017eem\u0117lapio suk\u016brimas, gal\u0117jo b\u016bti labai svarbi prevencin\u0117 strategija. Nusta\u010dius vietas, kuriose \u0161ie dronai buvo skraidinami, ir j\u0173 kilm\u0117s vietas, b\u016bt\u0173 buv\u0119 galima tikslingai vykdyti steb\u0117jim\u0105 ir u\u017etikrinti saugum\u0105 didel\u0117s rizikos zonose. To nepadarius tik sustipr\u0117ja dabartinis poreikis kariuomen\u0117ms, vidaus saugumo ir teis\u0117saugos institucijoms nuolat atid\u017eiai steb\u0117ti dang\u0173 vir\u0161 didel\u0117s rizikos zon\u0173, kuriose gali kilti potencial\u016bs konfliktai arba gali b\u016bti atakuojami svarb\u016bs objektai.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"821\" height=\"452\" src=\"https:\/\/sentrycs.com\/wp-content\/uploads\/2024\/01\/Heatmap.jpg\" alt=\"\" class=\"wp-image-2067\" srcset=\"https:\/\/sentrycs.com\/wp-content\/uploads\/2024\/01\/Heatmap.jpg 821w, https:\/\/sentrycs.com\/wp-content\/uploads\/2024\/01\/Heatmap-300x165.jpg 300w, https:\/\/sentrycs.com\/wp-content\/uploads\/2024\/01\/Heatmap-768x423.jpg 768w, https:\/\/sentrycs.com\/wp-content\/uploads\/2024\/01\/Heatmap-18x10.jpg 18w\" sizes=\"auto, (max-width: 821px) 100vw, 821px\" \/><\/figure>\n\n\n\n<p>\u0160altinis: <a href=\"https:\/\/drone.ua\/en\/blogs\/news\/statistika-poletov-dronov-v-kieve-iyun-2020go-goda\">DroneUA<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-intelligence-gathering-and-asset-targeting\"><span class=\"ez-toc-section\" id=\"Intelligence_Gathering_and_Asset_Targeting\"><\/span>\u017dvalgybos duomen\u0173 rinkimas ir turto nukreipimas<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Labai svarbu suprasti teroristini\u0173 organizacij\u0173 naudojam\u0173 bepilo\u010di\u0173 orlaivi\u0173 \u017evalgybos duomen\u0173 rinkimo galimybes ir konkre\u010dius objektus, \u012f kuriuos jie taikosi. Buvo galima parengti prevencin\u0119 strategij\u0105, pagal kuri\u0105 b\u016bt\u0173 galima perimti kai kuriuos \"Hamas\" bepilo\u010dius orlaivius ir, remiantis nustatytais \u017evalgybos modeliais, i\u0161gauti j\u0173 u\u017efiksuot\u0105 med\u017eiag\u0105, kad b\u016bt\u0173 galima apsaugoti svarbias vietas ir ypatingos svarbos infrastrukt\u016br\u0105.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-blue-color has-text-color has-link-color wp-elements-e85c9a0e1ebf50b320273d07f3d4679a\" id=\"h-2-c-uas-solutions-operational-requirements-emphasized-by-the-attacks\"><span class=\"ez-toc-section\" id=\"2_C-UAS_Solutions_Operational_Requirements_Emphasized_by_the_Attacks\"><\/span><strong>2. <\/strong><strong>C-UAS sprendimai <\/strong><strong>Operaciniai reikalavimai, kuriuos pabr\u0117\u017e\u0117 i\u0161puoliai<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-automated-and-autonomous-counter-drone-technology\"><span class=\"ez-toc-section\" id=\"Automated_and_Autonomous_Counter-drone_Technology\"><\/span>Automatizuota ir autonomin\u0117 kovos su dronais technologija<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Spalio 7 d. i\u0161puoliai pabr\u0117\u017e\u0117, kad b\u016btinai reikia pa\u017eangios kovos su bepilot\u0117mis orlaivi\u0173 sistemomis (C-UAS) technologijos, padedan\u010dios u\u017etikrinti vis\u0105 bepilo\u010di\u0173 orlaivi\u0173 saugumo cikl\u0105: nuo aptikimo, sekimo, identifikavimo ir galiausiai gr\u0117smi\u0173, kylan\u010di\u0173 d\u0117l bepilo\u010di\u0173 orlaivi\u0173, ma\u017einimo. Tokios sistemos, veikian\u010dios automatizuotai ir autonomi\u0161kai, gali greitai aptikti ir neutralizuoti dron\u0173 keliamas gr\u0117smes, suma\u017eindamos priklausomyb\u0119 nuo \u017emoni\u0173 reagavimo laiko. Tiek konfliktai Ukrainoje, tiek Gazos ruo\u017ee \u012frod\u0117, kad 24 valandas per par\u0105, 7 dienas per savait\u0119 veikianti autonomija yra b\u016btinas geb\u0117jimas, leid\u017eiantis kariams ant \u017eem\u0117s sutelkti d\u0117mes\u012f \u012f kitas u\u017eduotis, o ne pasteb\u0117ti ir \u0161audyti \u012f vir\u0161 j\u0173 galv\u0173 esan\u010dius dronus.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-counter-drone-solutions-operating-in-noisy-rf-radio-frequency-environments\"><span class=\"ez-toc-section\" id=\"Counter-drone_Solutions_Operating_in_Noisy_RF_Radio_Frequency_Environments\"><\/span>Kovos su dronais sprendimai, veikiantys triuk\u0161mingoje radijo da\u017eni\u0173 aplinkoje<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Po i\u0161puoli\u0173 paai\u0161k\u0117jo, kad svarbu sukurti kovos su dronais sistemas, galin\u010dias veikti triuk\u0161mingoje radijo da\u017eni\u0173 (RF) aplinkoje. Ne paslaptis, kad \u0161iuolaikinis karas apima daugyb\u0119 \u012fvairiausi\u0173 technologij\u0173. Prisitaikantis <a href=\"https:\/\/sentrycs.com\/lt\/our-technology\/\">kovos su dronais technologija<\/a> galin\u010dios orientuotis per trukd\u017eius, u\u017etikrina atsparesn\u0119 gynyb\u0105 nuo besikei\u010dian\u010di\u0173 dron\u0173 gr\u0117smi\u0173.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-differentiating-between-friends-and-foes\"><span class=\"ez-toc-section\" id=\"Differentiating_Between_Friends_and_Foes\"><\/span>Draug\u0173 ir prie\u0161\u0173 atskyrimas<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Svarbiausia, kad spalio 7 d. i\u0161puoliai ir v\u0117lesnis konfliktas Gazos ruo\u017ee, kur IDF intensyviai naudoja dronus steb\u0117jimui, ginkluot\u0173 terorist\u0173 grupuo\u010di\u0173 nustatymui arba sm\u016bgiams, parod\u0117, kad reikia sistem\u0173, kurios gal\u0117t\u0173 tiksliai atskirti draugi\u0161kus ir prie\u0161i\u0161kus dronus. Kad b\u016bt\u0173 i\u0161vengta atsitiktinio taikini\u0173 nukreipimo \u012f leid\u017eiamus bepilo\u010dius orlaivius, \u012fskaitant saugumo paj\u0117g\u0173 ar civili\u0173 gyventoj\u0173 naudojamus bepilo\u010dius orlaivius, kovos su dronais sistemos turi tur\u0117ti tikslaus atpa\u017einimo galimybes.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-locating-attacking-drones-operators\"><span class=\"ez-toc-section\" id=\"Locating_Attacking_Drones_Operators\"><\/span>Atakuojan\u010di\u0173 bepilo\u010di\u0173 orlaivi\u0173 operatori\u0173 nustatymas<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Kovos su bepilo\u010diais orlaiviais technologij\u0173 teik\u0117jams b\u016btina u\u017everti grandin\u0119 nustatant ir surandant atakuojan\u010di\u0173 bepilo\u010di\u0173 orlaivi\u0173 operatorius. \u0160i galimyb\u0117 ne tik u\u017etikrina greit\u0105 reagavim\u0105 \u012f tiesiogin\u0119 gr\u0117sm\u0119, bet ir palengvina teisinius veiksmus prie\u0161 atsakingus asmenis.<\/p>\n\n\n\n<div class=\"wp-block-group has-background is-layout-constrained wp-container-core-group-is-layout-05038074 wp-block-group-is-layout-constrained\" style=\"background-color:#75a5be38;margin-top:0;margin-bottom:0;padding-top:var(--wp--preset--spacing--20);padding-right:var(--wp--preset--spacing--50);padding-bottom:var(--wp--preset--spacing--50);padding-left:var(--wp--preset--spacing--50)\">\n<p style=\"margin-top:var(--wp--preset--spacing--30);margin-right:var(--wp--preset--spacing--30);margin-bottom:var(--wp--preset--spacing--30);margin-left:var(--wp--preset--spacing--30)\"><strong>Patarimai skaitytojui<\/strong><\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Suprasti \"Rogue Drone\" naudojim\u0105<\/strong>: Analizuokite ir supraskite prie\u0161inink\u0173 naudojam\u0173 bepilo\u010di\u0173 orlaivi\u0173 tipus. \u017dinodami konkre\u010dius modelius ir ry\u0161io protokolus galite \u012fgyti technologin\u012f prana\u0161um\u0105 kuriant tikslias kovos su dronais priemones.<\/li>\n\n\n\n<li><strong>\u012egyvendinti aktyvi\u0105 steb\u0117sen\u0105<\/strong>: Naudokite aktyvias steb\u0117senos priemones, pvz., \u0161ilumos \u017eem\u0117lapius, kad gal\u0117tum\u0117te steb\u0117ti dron\u0173 veikl\u0105. Tai gali pad\u0117ti nustatyti didel\u0117s rizikos zonas ir u\u017etikrinti tikslin\u012f steb\u0117jim\u0105, pagerinti prevencines saugumo strategijas.<\/li>\n\n\n\n<li><strong>Automatizuoti atsakymus \u012f prie\u0161prie\u0161inius skryd\u017eius su dronais<\/strong>: Investuokite \u012f automatizuotus ir autonominius <a href=\"https:\/\/sentrycs.com\/lt\/the-counter-drone-blog\/the-ultimate-2025-c-uas-technology-evaluation-checklist\/\">C-UAS technologija<\/a> kad pager\u0117t\u0173 reagavimo laikas. \u0160ios sistemos gali efektyviai aptikti, sekti, nustatyti ir su\u0161velninti dron\u0173 keliamas gr\u0117smes, taip suma\u017einant \u017emogaus \u012fsiki\u0161imo poreik\u012f.<br><div><span style=\"font-family: docs-Calibri; font-size: 16px; text-decoration-skip-ink: none;\"><\/span><\/div><\/li>\n\n\n\n<li><strong>Prisitaikymas prie triuk\u0161mingos radijo da\u017eni\u0173 aplinkos<\/strong>: U\u017etikrinkite, kad j\u016bs\u0173 kovos su dronais technologija gal\u0117t\u0173 veikti triuk\u0161mingoje radijo da\u017eni\u0173 aplinkoje. \u0160is geb\u0117jimas prisitaikyti yra labai svarbus siekiant i\u0161laikyti atspari\u0105 gynyb\u0105 nuo besikei\u010dian\u010di\u0173 dron\u0173 gr\u0117smi\u0173 \u0161iuolaikiniame kare.<\/li>\n<\/ol>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading has-blue-color has-text-color has-link-color wp-elements-255bdac135072ccb9a72ce753491dd0b\" id=\"h-3-post-october-7-adapting-and-protecting\"><span class=\"ez-toc-section\" id=\"3_Post-October_7_Adapting_and_Protecting\"><\/span>3. <strong>Po spalio 7 d.: prisitaikymas ir apsauga<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-protecting-populated-areas\"><span class=\"ez-toc-section\" id=\"Protecting_Populated_Areas\"><\/span>Apgyvendint\u0173 teritorij\u0173 apsauga<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>\u0160ie i\u0161puoliai primin\u0117, kad b\u016btina skubiai stiprinti saugumo priemones aplink gyvenam\u0105sias vietoves. Atsi\u017evelgiant \u012f tai, kad kai kurios i\u0161 \u0161i\u0173 viet\u0173 yra <a>tik\u0117tini taikiniai<\/a> dron\u0173 atakoms, tampa labai svarbu teikti pirmenyb\u0119 civiliams gyventojams ir ypatingos svarbos infrastrukt\u016brai skirtoms apsaugos priemon\u0117ms. Teis\u0117s aktai taip pat turi b\u016bti tobulinami ir suteikti daugiau saugumo agent\u016br\u0173 ir priva\u010di\u0173 institucij\u0173 \u012fgaliojim\u0173 imtis veiksm\u0173 realiuoju laiku prie\u0161 nes\u0105\u017einingus dronus, kelian\u010dius gr\u0117sm\u0119 j\u0173 \u017emon\u0117ms, patalpoms ir turtui.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-constant-adaptation-to-new-threats\"><span class=\"ez-toc-section\" id=\"Constant_Adaptation_to_New_Threats\"><\/span>Nuolatinis prisitaikymas prie nauj\u0173 gr\u0117smi\u0173<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>D\u0117l besikei\u010dian\u010dios dron\u0173 technologijos reikia nuolat prisitaikyti. Saugumo paj\u0117gos turi neatsilikti nuo kylan\u010di\u0173 gr\u0117smi\u0173, investuodamos \u012f mokslinius tyrimus ir technologin\u0119 pl\u0117tr\u0105, skatindamos inovacijas ir tobulindamos kovos su dronais technologijas ir paj\u0117gumus. Investicijos \u012f C-UAS turi did\u0117ti spar\u010diau nei investicijos \u012f dron\u0173 rink\u0105, jei norime, kad visa dron\u0173 ekonomika saugiai klest\u0117t\u0173. Kaip teigiama Jungtinio oro paj\u0117g\u0173 kompetencijos centro elektronin\u0117je knygoje \"<a href=\"https:\/\/www.japcc.org\/chapters\/c-uas-research-development-and-acquisition-of-counter-uas-technologies\/\">Visapusi\u0161kas po\u017ei\u016bris \u012f kov\u0105 su bepilo\u010di\u0173 orlaivi\u0173 sistemomis<\/a>\", C-UAS n\u0117ra \"sidabrin\u0117s kulkos\". Tod\u0117l \"<em>norint sutramdyti C-UAS problem\u0105, vienintel\u0117 galimyb\u0117 yra tur\u0117ti gil\u0173 supratim\u0105, numatyti tendencijas, \u012fsivaizduoti norim\u0105 galutin\u0119 b\u016bsen\u0105 ir jos siekti. Many\u010diau, kad garsioji \"sidabrin\u0117 kulka\" yra b\u016btent tai: informuotumas, eksperimentavimas, pasirengimas, bendradarbiavimas, koordinavimas ir geb\u0117jimas prisitaikyti.<\/em>\"<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-the-importance-of-international-collaboration\"><span class=\"ez-toc-section\" id=\"The_Importance_of_International_Collaboration\"><\/span>Tarptautinio bendradarbiavimo svarba<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Atsi\u017evelgiant \u012f spalio 7 d. i\u0161puolius, tarptautinis bendradarbiavimas tapo labai svarbiu kovos su dronais strategij\u0173 stiprinimo elementu. \u0160alys, susidurian\u010dios su pana\u0161iomis dron\u0173 gr\u0117sm\u0117mis, turi dalytis \u017evalgybos duomenimis, technologine pa\u017eanga ir geriausia praktika, kad sukurt\u0173 viening\u0105 kovos su nes\u0105\u017einingais dronais front\u0105. Bendradarbiavimo pastangos gali apimti bendras mokymo pratybas, dalijimosi \u017evalgybos informacija susitarimus ir s\u0105veiki\u0173 kovos su dronais sistem\u0173, kurios gali skland\u017eiai veikti skirtingose jurisdikcijose, k\u016brim\u0105. Sutelkusios i\u0161teklius ir \u017einias, valstyb\u0117s gali geriau numatyti ir reaguoti \u012f kylan\u010dias dron\u0173 keliamas gr\u0117smes, galiausiai pagerindamos bendr\u0105 saugumo situacij\u0105 pasauliniu mastu.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-investing-in-public-awareness-and-education\"><span class=\"ez-toc-section\" id=\"Investing_in_Public_Awareness_and_Education\"><\/span>Investicijos \u012f visuomen\u0117s informavim\u0105 ir \u0161vietim\u0105<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Did\u0117jant dron\u0173 atak\u0173 gr\u0117smei, visuomen\u0117s informuotumas ir \u0161vietimas taip pat labai svarb\u016bs stiprinant m\u016bs\u0173 apsaug\u0105. Saugumo agent\u016bros tur\u0117t\u0173 bendradarbiauti su bendruomen\u0117mis, kad informuot\u0173 jas apie rizik\u0105, susijusi\u0105 su nes\u0105\u017einingais dronais, ir apie tai, kaip svarbu prane\u0161ti apie \u012ftartin\u0105 veikl\u0105. \u0160vietimo iniciatyvos gali \u012fgalinti civilius gyventojus atpa\u017einti potencialias dron\u0173 keliamas gr\u0117smes ir suprasti institucij\u0173 persp\u0117jimo protokolus. Be to, budrumo kult\u016bros puosel\u0117jimas gali b\u016bti papildomas gynybos sluoksnis, didinantis kovos su dronais priemoni\u0173 veiksmingum\u0105 tiek miesto, tiek kaimo vietov\u0117se. Suteikdami visuomenei \u017eini\u0173 ir i\u0161tekli\u0173, galime sukurti labiau informuot\u0105 ir aktyvi\u0105 visuomen\u0119, kuri aktyviai dalyvaut\u0173 saugantis nuo su dronais susijusi\u0173 gr\u0117smi\u0173.<\/p>\n\n\n\n<p class=\"has-blue-color has-text-color has-link-color wp-elements-d71c2ddd8a50ab09f657e6ce18be8003\"><strong>I\u0161vada<\/strong><\/p>\n\n\n\n<p>Spalio 7 d. \"Hamas\" i\u0161puoliai suk\u0117l\u0117 <a>paradigmos pasikeitimas<\/a>, tod\u0117l vyriausyb\u0117s ir saugumo agent\u016bros turi i\u0161 naujo \u012fvertinti kovos su dronais strategijas. I\u0161nagrin\u0117j\u0119, k\u0105 buvo galima padaryti kitaip, pripa\u017ein\u0119 operatyvinius reikalavimus, kuriuos pabr\u0117\u017e\u0117 i\u0161puoliai, ir prisitaik\u0119 prie besikei\u010dian\u010dios situacijos po spalio 7 d., galime sukurti atsparesn\u0119 sistem\u0105, kuri pad\u0117t\u0173 kovoti su b\u016bsimomis dron\u0173 keliamomis gr\u0117sm\u0117mis. Siekis sukurti tvirt\u0105 ir adaptyvi\u0105 kovos su dronais strategij\u0105 yra nuolatinis procesas, reikalaujantis bendradarbiavimo, naujovi\u0173 ir nepalau\u017eiamo \u012fsipareigojimo apsaugoti m\u016bs\u0173 bendruomenes nuo besikei\u010dian\u010di\u0173 saugumo i\u0161\u0161\u016bki\u0173. Bendrov\u0117 \"Sentrycs\" yra idealiai pasirengusi pirmauti rinkoje, nes turi labai <a href=\"https:\/\/sentrycs.com\/lt\/our-technology\/\">prisitaikanti, integruota ir autonomin\u0117 technologija.<\/a>, remiantis ry\u0161i\u0173 protokol\u0173 analize. Jis u\u017etikrina patikimum\u0105 ir tikslum\u0105, reikaling\u0105 tiek kariniams, tiek civiliniams scenarijams vykdyti, kartu atskiriant \u012fgaliotus ir nes\u0105\u017einingus komercinius dronus.<\/p>","protected":false},"excerpt":{"rendered":"<p>Mokymasis i\u0161 precedento neturin\u010di\u0173 spalio 7 d. teroro i\u0161puoli\u0173 siekiant i\u0161vengti b\u016bsim\u0173 gr\u0117smi\u0173 dron\u0173 saugumui ir apibr\u0117\u017eti kovos su dronais technologij\u0173 operatyvinius poreikius. \u012evadas 2023 m. spalio 7 d. \u012fvykiai tapo reik\u0161mingu pos\u016bkiu saugumo gr\u0117smi\u0173 srityje ir pabr\u0117\u017e\u0117, kad daugeliui \u0161ali\u0173 skubiai reikia visapusi\u0161ko po\u017ei\u016brio \u012f kovos su dronais technologijas ir strategij\u0105. <a class=\"more-link\" href=\"https:\/\/sentrycs.com\/lt\/the-counter-drone-blog\/deconstructing-october-7-hamas-attacks-to-determine-counter-drone-technology-must-haves\/\" title=\"&quot;Hamas&quot; atak\u0173 dekonstravimas siekiant nustatyti, kokios kovos su dronais technologijos turi b\u016bti \u012fdiegtos\">Skaityti daugiau<\/a><\/p>","protected":false},"author":19,"featured_media":2094,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_editorskit_title_hidden":false,"_editorskit_reading_time":0,"_editorskit_is_block_options_detached":false,"_editorskit_block_options_position":"{}","footnotes":"","_links_to":"","_links_to_target":""},"categories":[4,47],"tags":[],"class_list":["post-2065","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-counter-drone-news","category-defence"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v23.3 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Sentrycs Deconstructing and Insights of the Hamas Attacks<\/title>\n<meta name=\"description\" content=\"An analysis of the October 7 Hamas attack to understand the importance of counter-drone technology and measures that can prevent future security threats.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sentrycs.com\/lt\/the-counter-drone-blog\/deconstructing-october-7-hamas-attacks-to-determine-counter-drone-technology-must-haves\/\" \/>\n<meta property=\"og:locale\" content=\"lt_LT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Sentrycs Deconstructing and Insights of the Hamas Attacks\" \/>\n<meta property=\"og:description\" content=\"An analysis of the October 7 Hamas attack to understand the importance of counter-drone technology and measures that can prevent future security threats.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sentrycs.com\/lt\/the-counter-drone-blog\/deconstructing-october-7-hamas-attacks-to-determine-counter-drone-technology-must-haves\/\" \/>\n<meta property=\"og:site_name\" content=\"Sentrycs\" \/>\n<meta property=\"article:published_time\" content=\"2024-02-07T09:24:44+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-30T13:24:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sentrycs.com\/wp-content\/uploads\/2024\/01\/sentrycs-hamas-attack.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1138\" \/>\n\t<meta property=\"og:image:height\" content=\"867\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Meir Avidan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Sentrycs\" \/>\n<meta name=\"twitter:site\" content=\"@Sentrycs\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Meir Avidan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minut\u0117s\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/sentrycs.com\/the-counter-drone-blog\/deconstructing-october-7-hamas-attacks-to-determine-counter-drone-technology-must-haves\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/sentrycs.com\/the-counter-drone-blog\/deconstructing-october-7-hamas-attacks-to-determine-counter-drone-technology-must-haves\/\"},\"author\":{\"name\":\"Meir Avidan\",\"@id\":\"https:\/\/sentrycs.com\/#\/schema\/person\/1c2ad048d79e691721ed015ae12bf7cd\"},\"headline\":\"Deconstructing Hamas Attacks to Determine Counter-Drone Technology Must-Haves\",\"datePublished\":\"2024-02-07T09:24:44+00:00\",\"dateModified\":\"2025-06-30T13:24:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/sentrycs.com\/the-counter-drone-blog\/deconstructing-october-7-hamas-attacks-to-determine-counter-drone-technology-must-haves\/\"},\"wordCount\":1383,\"publisher\":{\"@id\":\"https:\/\/sentrycs.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/sentrycs.com\/the-counter-drone-blog\/deconstructing-october-7-hamas-attacks-to-determine-counter-drone-technology-must-haves\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sentrycs.com\/wp-content\/uploads\/2024\/01\/sentrycs-hamas-attack.jpg\",\"articleSection\":[\"Counter-drone News\",\"Defence\"],\"inLanguage\":\"lt-LT\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sentrycs.com\/the-counter-drone-blog\/deconstructing-october-7-hamas-attacks-to-determine-counter-drone-technology-must-haves\/\",\"url\":\"https:\/\/sentrycs.com\/the-counter-drone-blog\/deconstructing-october-7-hamas-attacks-to-determine-counter-drone-technology-must-haves\/\",\"name\":\"Sentrycs Deconstructing and Insights of the Hamas Attacks\",\"isPartOf\":{\"@id\":\"https:\/\/sentrycs.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/sentrycs.com\/the-counter-drone-blog\/deconstructing-october-7-hamas-attacks-to-determine-counter-drone-technology-must-haves\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/sentrycs.com\/the-counter-drone-blog\/deconstructing-october-7-hamas-attacks-to-determine-counter-drone-technology-must-haves\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sentrycs.com\/wp-content\/uploads\/2024\/01\/sentrycs-hamas-attack.jpg\",\"datePublished\":\"2024-02-07T09:24:44+00:00\",\"dateModified\":\"2025-06-30T13:24:53+00:00\",\"description\":\"An analysis of the October 7 Hamas attack to understand the importance of counter-drone technology and measures that can prevent future security threats.\",\"breadcrumb\":{\"@id\":\"https:\/\/sentrycs.com\/the-counter-drone-blog\/deconstructing-october-7-hamas-attacks-to-determine-counter-drone-technology-must-haves\/#breadcrumb\"},\"inLanguage\":\"lt-LT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sentrycs.com\/the-counter-drone-blog\/deconstructing-october-7-hamas-attacks-to-determine-counter-drone-technology-must-haves\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"lt-LT\",\"@id\":\"https:\/\/sentrycs.com\/the-counter-drone-blog\/deconstructing-october-7-hamas-attacks-to-determine-counter-drone-technology-must-haves\/#primaryimage\",\"url\":\"https:\/\/sentrycs.com\/wp-content\/uploads\/2024\/01\/sentrycs-hamas-attack.jpg\",\"contentUrl\":\"https:\/\/sentrycs.com\/wp-content\/uploads\/2024\/01\/sentrycs-hamas-attack.jpg\",\"width\":1138,\"height\":867},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sentrycs.com\/the-counter-drone-blog\/deconstructing-october-7-hamas-attacks-to-determine-counter-drone-technology-must-haves\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/sentrycs.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Deconstructing Hamas Attacks to Determine Counter-Drone Technology Must-Haves\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sentrycs.com\/#website\",\"url\":\"https:\/\/sentrycs.com\/\",\"name\":\"Sentrycs\",\"description\":\"Counter-drone Solutions Adapting at the Speed of Threat\",\"publisher\":{\"@id\":\"https:\/\/sentrycs.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sentrycs.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"lt-LT\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/sentrycs.com\/#organization\",\"name\":\"Sentrycs Counter Drone Solutions\",\"url\":\"https:\/\/sentrycs.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"lt-LT\",\"@id\":\"https:\/\/sentrycs.com\/#\/schema\/logo\/image\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Sentrycs Counter Drone Solutions\"},\"image\":{\"@id\":\"https:\/\/sentrycs.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/Sentrycs\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/sentrycs.com\/#\/schema\/person\/1c2ad048d79e691721ed015ae12bf7cd\",\"name\":\"Meir Avidan\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"lt-LT\",\"@id\":\"https:\/\/sentrycs.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9a41f899c45791bec80ea895568ae5df9acf0e1652c2093be123998987815f8a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9a41f899c45791bec80ea895568ae5df9acf0e1652c2093be123998987815f8a?s=96&d=mm&r=g\",\"caption\":\"Meir Avidan\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/meir-avidan-260a2915a\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Sentrycs \"Hamas\" i\u0161puoli\u0173 dekonstravimas ir \u012f\u017evalgos","description":"Spalio 7 d. \"Hamas\" i\u0161puolio analiz\u0117 siekiant suprasti kovos su dronais technologij\u0173 svarb\u0105 ir priemones, galin\u010dias u\u017ekirsti keli\u0105 b\u016bsimoms gr\u0117sm\u0117ms saugumui.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sentrycs.com\/lt\/the-counter-drone-blog\/deconstructing-october-7-hamas-attacks-to-determine-counter-drone-technology-must-haves\/","og_locale":"lt_LT","og_type":"article","og_title":"Sentrycs Deconstructing and Insights of the Hamas Attacks","og_description":"An analysis of the October 7 Hamas attack to understand the importance of counter-drone technology and measures that can prevent future security threats.","og_url":"https:\/\/sentrycs.com\/lt\/the-counter-drone-blog\/deconstructing-october-7-hamas-attacks-to-determine-counter-drone-technology-must-haves\/","og_site_name":"Sentrycs","article_published_time":"2024-02-07T09:24:44+00:00","article_modified_time":"2025-06-30T13:24:53+00:00","og_image":[{"width":1138,"height":867,"url":"https:\/\/sentrycs.com\/wp-content\/uploads\/2024\/01\/sentrycs-hamas-attack.jpg","type":"image\/jpeg"}],"author":"Meir Avidan","twitter_card":"summary_large_image","twitter_creator":"@Sentrycs","twitter_site":"@Sentrycs","twitter_misc":{"Written by":"Meir Avidan","Est. reading time":"7 minut\u0117s"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sentrycs.com\/the-counter-drone-blog\/deconstructing-october-7-hamas-attacks-to-determine-counter-drone-technology-must-haves\/#article","isPartOf":{"@id":"https:\/\/sentrycs.com\/the-counter-drone-blog\/deconstructing-october-7-hamas-attacks-to-determine-counter-drone-technology-must-haves\/"},"author":{"name":"Meir Avidan","@id":"https:\/\/sentrycs.com\/#\/schema\/person\/1c2ad048d79e691721ed015ae12bf7cd"},"headline":"Deconstructing Hamas Attacks to Determine Counter-Drone Technology Must-Haves","datePublished":"2024-02-07T09:24:44+00:00","dateModified":"2025-06-30T13:24:53+00:00","mainEntityOfPage":{"@id":"https:\/\/sentrycs.com\/the-counter-drone-blog\/deconstructing-october-7-hamas-attacks-to-determine-counter-drone-technology-must-haves\/"},"wordCount":1383,"publisher":{"@id":"https:\/\/sentrycs.com\/#organization"},"image":{"@id":"https:\/\/sentrycs.com\/the-counter-drone-blog\/deconstructing-october-7-hamas-attacks-to-determine-counter-drone-technology-must-haves\/#primaryimage"},"thumbnailUrl":"https:\/\/sentrycs.com\/wp-content\/uploads\/2024\/01\/sentrycs-hamas-attack.jpg","articleSection":["Counter-drone News","Defence"],"inLanguage":"lt-LT"},{"@type":"WebPage","@id":"https:\/\/sentrycs.com\/the-counter-drone-blog\/deconstructing-october-7-hamas-attacks-to-determine-counter-drone-technology-must-haves\/","url":"https:\/\/sentrycs.com\/the-counter-drone-blog\/deconstructing-october-7-hamas-attacks-to-determine-counter-drone-technology-must-haves\/","name":"Sentrycs \"Hamas\" i\u0161puoli\u0173 dekonstravimas ir \u012f\u017evalgos","isPartOf":{"@id":"https:\/\/sentrycs.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sentrycs.com\/the-counter-drone-blog\/deconstructing-october-7-hamas-attacks-to-determine-counter-drone-technology-must-haves\/#primaryimage"},"image":{"@id":"https:\/\/sentrycs.com\/the-counter-drone-blog\/deconstructing-october-7-hamas-attacks-to-determine-counter-drone-technology-must-haves\/#primaryimage"},"thumbnailUrl":"https:\/\/sentrycs.com\/wp-content\/uploads\/2024\/01\/sentrycs-hamas-attack.jpg","datePublished":"2024-02-07T09:24:44+00:00","dateModified":"2025-06-30T13:24:53+00:00","description":"Spalio 7 d. \"Hamas\" i\u0161puolio analiz\u0117 siekiant suprasti kovos su dronais technologij\u0173 svarb\u0105 ir priemones, galin\u010dias u\u017ekirsti keli\u0105 b\u016bsimoms gr\u0117sm\u0117ms saugumui.","breadcrumb":{"@id":"https:\/\/sentrycs.com\/the-counter-drone-blog\/deconstructing-october-7-hamas-attacks-to-determine-counter-drone-technology-must-haves\/#breadcrumb"},"inLanguage":"lt-LT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sentrycs.com\/the-counter-drone-blog\/deconstructing-october-7-hamas-attacks-to-determine-counter-drone-technology-must-haves\/"]}]},{"@type":"ImageObject","inLanguage":"lt-LT","@id":"https:\/\/sentrycs.com\/the-counter-drone-blog\/deconstructing-october-7-hamas-attacks-to-determine-counter-drone-technology-must-haves\/#primaryimage","url":"https:\/\/sentrycs.com\/wp-content\/uploads\/2024\/01\/sentrycs-hamas-attack.jpg","contentUrl":"https:\/\/sentrycs.com\/wp-content\/uploads\/2024\/01\/sentrycs-hamas-attack.jpg","width":1138,"height":867},{"@type":"BreadcrumbList","@id":"https:\/\/sentrycs.com\/the-counter-drone-blog\/deconstructing-october-7-hamas-attacks-to-determine-counter-drone-technology-must-haves\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sentrycs.com\/"},{"@type":"ListItem","position":2,"name":"Deconstructing Hamas Attacks to Determine Counter-Drone Technology Must-Haves"}]},{"@type":"WebSite","@id":"https:\/\/sentrycs.com\/#website","url":"https:\/\/sentrycs.com\/","name":"Sentrycs","description":"Kovos su dronais sprendimai, prisitaikantys prie gr\u0117sm\u0117s grei\u010dio","publisher":{"@id":"https:\/\/sentrycs.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sentrycs.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"lt-LT"},{"@type":"Organization","@id":"https:\/\/sentrycs.com\/#organization","name":"\"Sentrycs\" kovos su dronais sprendimai","url":"https:\/\/sentrycs.com\/","logo":{"@type":"ImageObject","inLanguage":"lt-LT","@id":"https:\/\/sentrycs.com\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Sentrycs Counter Drone Solutions"},"image":{"@id":"https:\/\/sentrycs.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/Sentrycs"]},{"@type":"Person","@id":"https:\/\/sentrycs.com\/#\/schema\/person\/1c2ad048d79e691721ed015ae12bf7cd","name":"Meiras Avidanas","image":{"@type":"ImageObject","inLanguage":"lt-LT","@id":"https:\/\/sentrycs.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9a41f899c45791bec80ea895568ae5df9acf0e1652c2093be123998987815f8a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9a41f899c45791bec80ea895568ae5df9acf0e1652c2093be123998987815f8a?s=96&d=mm&r=g","caption":"Meir Avidan"},"sameAs":["https:\/\/www.linkedin.com\/in\/meir-avidan-260a2915a\/"]}]}},"_links":{"self":[{"href":"https:\/\/sentrycs.com\/lt\/wp-json\/wp\/v2\/posts\/2065","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sentrycs.com\/lt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sentrycs.com\/lt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sentrycs.com\/lt\/wp-json\/wp\/v2\/users\/19"}],"replies":[{"embeddable":true,"href":"https:\/\/sentrycs.com\/lt\/wp-json\/wp\/v2\/comments?post=2065"}],"version-history":[{"count":30,"href":"https:\/\/sentrycs.com\/lt\/wp-json\/wp\/v2\/posts\/2065\/revisions"}],"predecessor-version":[{"id":3766,"href":"https:\/\/sentrycs.com\/lt\/wp-json\/wp\/v2\/posts\/2065\/revisions\/3766"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sentrycs.com\/lt\/wp-json\/wp\/v2\/media\/2094"}],"wp:attachment":[{"href":"https:\/\/sentrycs.com\/lt\/wp-json\/wp\/v2\/media?parent=2065"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sentrycs.com\/lt\/wp-json\/wp\/v2\/categories?post=2065"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sentrycs.com\/lt\/wp-json\/wp\/v2\/tags?post=2065"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}