The Counter-drone Blog
5 Critical Lessons from Recent UAS Attacks Law Enforcement Cannot Afford to Miss
On October 15, 2025, a drone carrying an improvised explosive device flew over a crowded neighborhood in Tijuana and detonated inside the anti-kidnapping unit of the Baja California Attorney General’s Office. Mexican authorities believe the attack was carried out by a major organized crime group with the intent of disrupting investigative activities and intimidating law…
Mitigating Drone Threats: Why Speed and Range Are Key?
Effective drone mitigation hinges on two key factors: speed and distance. Advanced Counter-Unmanned Aircraft Systems (C-UAS) like those from Sentrycs…
The Rise of the Non-State Drone Threats:
The utilization of Unmanned Aerial Systems (UAS) by non-state actors has become a global security concern, transcending geographic and conflict…
Deconstructing Hamas Attacks to Determine Counter-Drone Technology Must-Haves
Learning from the unprecedented October 7 terror attacks to avoid future drone security threats and define counter-drone technology operational needs.…
The 2024 Forecast in Drone Technology & Drone Security: A Sentrycs Perspective
In an era where the sky is no longer the limit, 2024 stands as a crucial year in the evolution…
The Evolution of AI in Drones: Implications and Adaptations for Counter-Drone Technology
Introduction The integration of Artificial Intelligence (AI) into drones marks a significant technological shift, transforming them from relatively simple tools…
Securing Critical Infrastructure with Integrated Counter-Unmanned Aircraft Systems (C-UAS)
The advent of drone technology has introduced a novel risk to critical infrastructure, necessitating a robust defense mechanism. This article…
Countering Drone Terrorism: The Game-Changing Impact of Protocol Analytics
What You Will Learn in This Blog Introduction Drones, once a hobbyist’s delight, have morphed into potential tools for terrorism,…
Protect Critical Infrastructure Against Drones
By: Dawn Zoldi (Colonel, USAF Ret.) Background Tips for the Reader The Threat Legal Limitations Overcoming Concerns Recommendations We recommend…












