
Time:2026-01-08 Views:20

Against the backdrop of the boom in low-altitude economy and the coexistence of threats posed by "low, slow, and small" (LSS) drones, swarm drones, and autonomous drones, drone countermeasures systems are accelerating from a "passive interception" phase towards a new stage of comprehensive defense characterized by intelligence, multi-layered capabilities, coordination, compliance, and localization. The core objective is to establish an autonomous closed-loop system that spans the entire process from "perception to decision-making, countermeasures, and evaluation," balancing safety and the needs of low-altitude economic development.
1. Intelligentization: From "Humans in the Loop" to "Humans on the Loop", AI Empowers the Entire Domain
Perception layer: Cognitive electronic warfare + multimodal fusion
Signal fingerprint AI recognition (such as RFAI-ATK engine) analyzes thousands of drone signal features in real time, blindly de-spreads unknown protocols, and reduces false alarms and spectrum pollution; multi-source data (radar + optoelectronic + RF + acoustic) edge fusion achieves a recognition accuracy of 98%, with a detection rate of ≥90% for targets with RCS < 0.01㎡
Predictive defense: Predict the threat path through trajectory and behavior analysis, lock on to frequency-hopping/silent targets 45 seconds in advance, and achieve "early warning upon detection"
Decision-making layer: second-level closed loop + autonomous gradient counteraction
Upgrading from manual confirmation (human in the loop) to manual intervention only for high-threat situations (human on the loop); 0.05-second frequency band matching, 0.25-second combat decision-making, and 2.8-second completion of the entire process (validated in real combat during the Hangzhou Asian Games), supporting simultaneous tracking of 20+ targets and adapting to swarm saturation attacks
Software-defined platform: firmware online update, rapid adaptation to new drone communication protocols, and response to new threats that are constantly evolving
Evaluation layer: AI effect review + data-driven optimization
The combination of optoelectronic and spectrum dual verification achieves a processing success rate of ≥98%. A threat feature library is established, and algorithms are continuously optimized to enhance the ability to identify unknown targets
II. Multi-layered and coordinated soft and hard approaches: Prioritize soft damage while relying on hard destruction as a backup, to build a deep defense
Upgrading of soft-kill technology
Communication link jamming: 2.4GHz/5.8GHz directional jamming, with a jamming-to-communication ratio of ≥10:1, precisely suppressing consumer-grade drones; cognitive electronic warfare dynamically adjusts jamming parameters to counter encrypted communications
GNSS spoofing/jamming: Utilizing the dual-frequency coordination of Beidou B1 and GPS L1, the spoofing accuracy reaches the sub-meter level, effectively inducing drones to land in designated safe areas. It is compatible with the new 6GHz frequency band, enabling it to counteract new navigation systems
Protocol hijacking: For mainstream drones such as DJI, analyze the protocol and inject commands to achieve "lossless capture" for forensics
Breakthrough in hard destruction technology
Laser weapons: Vehicle-mounted systems (such as OW5, with a power of 8000W) have a range of 3km, with a single-use cost of less than 100 yuan and unlimited ammunition; after 2027, 50kW-level systems will be commercialized, suitable for military high-threat scenarios
High Power Microwave (HPM): Area denial, capable of simultaneously countering swarm targets, with a range of ≥2km; miniaturized equipment suitable for vehicle/shipborne applications, dual-use for both peacetime and wartime
Net capture / Kinetic energy: The drone is equipped with a carbon fiber net launcher, which ejects a 16-square-meter net to entangle the propeller blades and force a landing; intelligent bullets and cruise missiles are used for precise damage
III. Collaboration and Modularity: Distributed Networking, Flexible Deployment, Adapting to All Scenario Requirements
Holistic collaborative defense
A regional protection network is established through a combination of distributed sensor networks, centralized AI decision-making, and distributed countermeasure nodes. The 5G-A low-latency (<1ms) network supports cross-domain linkage, enabling "device networking - command closed loop"
Using swarm against swarm: Release bait drones to simulate targets, attract swarms of bees to gather, and then implement coordinated jamming. In 2025, a successful test was conducted in the Middle East battlefield to disintegrate an attack by a swarm of 200 drone-like flying machines
Modularization and mechanized deployment
Portable equipment for individual soldiers: Deployment time < 1 minute, jamming gun (weight < 3kg, coverage radius 300m), spectrum detector (< 2kg), suitable for border patrol and emergency response
Vehicle-mounted / ship-borne / fixed equipment: rapid deployment, integrated radar + electro-optical + weapons; fixed jamming station covers a radius of 1-3km, suitable for 24-hour duty of key facilities