NEWS

What is the development trend of drone countermeasure systems

Time:2026-01-08    Views:20

Against the backdrop of the boom in low-altitude economy and the coexistence of threats posed by "low, slow, and small" (LSS) drones, swarm drones, and autonomous drones, drone countermeasures systems are accelerating from a "passive interception" phase towards a new stage of comprehensive defense characterized by intelligence, multi-layered capabilities, coordination, compliance, and localization. The core objective is to establish an autonomous closed-loop system that spans the entire process from "perception to decision-making, countermeasures, and evaluation," balancing safety and the needs of low-altitude economic development.

1. Intelligentization: From "Humans in the Loop" to "Humans on the Loop", AI Empowers the Entire Domain

Perception layer: Cognitive electronic warfare + multimodal fusion

Signal fingerprint AI recognition (such as RFAI-ATK engine) analyzes thousands of drone signal features in real time, blindly de-spreads unknown protocols, and reduces false alarms and spectrum pollution; multi-source data (radar + optoelectronic + RF + acoustic) edge fusion achieves a recognition accuracy of 98%, with a detection rate of ≥90% for targets with RCS < 0.01㎡

Predictive defense: Predict the threat path through trajectory and behavior analysis, lock on to frequency-hopping/silent targets 45 seconds in advance, and achieve "early warning upon detection"

Decision-making layer: second-level closed loop + autonomous gradient counteraction

Upgrading from manual confirmation (human in the loop) to manual intervention only for high-threat situations (human on the loop); 0.05-second frequency band matching, 0.25-second combat decision-making, and 2.8-second completion of the entire process (validated in real combat during the Hangzhou Asian Games), supporting simultaneous tracking of 20+ targets and adapting to swarm saturation attacks

Software-defined platform: firmware online update, rapid adaptation to new drone communication protocols, and response to new threats that are constantly evolving

Evaluation layer: AI effect review + data-driven optimization

The combination of optoelectronic and spectrum dual verification achieves a processing success rate of ≥98%. A threat feature library is established, and algorithms are continuously optimized to enhance the ability to identify unknown targets

II. Multi-layered and coordinated soft and hard approaches: Prioritize soft damage while relying on hard destruction as a backup, to build a deep defense

Upgrading of soft-kill technology

Communication link jamming: 2.4GHz/5.8GHz directional jamming, with a jamming-to-communication ratio of ≥10:1, precisely suppressing consumer-grade drones; cognitive electronic warfare dynamically adjusts jamming parameters to counter encrypted communications

GNSS spoofing/jamming: Utilizing the dual-frequency coordination of Beidou B1 and GPS L1, the spoofing accuracy reaches the sub-meter level, effectively inducing drones to land in designated safe areas. It is compatible with the new 6GHz frequency band, enabling it to counteract new navigation systems

Protocol hijacking: For mainstream drones such as DJI, analyze the protocol and inject commands to achieve "lossless capture" for forensics

Breakthrough in hard destruction technology

Laser weapons: Vehicle-mounted systems (such as OW5, with a power of 8000W) have a range of 3km, with a single-use cost of less than 100 yuan and unlimited ammunition; after 2027, 50kW-level systems will be commercialized, suitable for military high-threat scenarios

High Power Microwave (HPM): Area denial, capable of simultaneously countering swarm targets, with a range of ≥2km; miniaturized equipment suitable for vehicle/shipborne applications, dual-use for both peacetime and wartime

Net capture / Kinetic energy: The drone is equipped with a carbon fiber net launcher, which ejects a 16-square-meter net to entangle the propeller blades and force a landing; intelligent bullets and cruise missiles are used for precise damage

III. Collaboration and Modularity: Distributed Networking, Flexible Deployment, Adapting to All Scenario Requirements

Holistic collaborative defense

A regional protection network is established through a combination of distributed sensor networks, centralized AI decision-making, and distributed countermeasure nodes. The 5G-A low-latency (<1ms) network supports cross-domain linkage, enabling "device networking - command closed loop"

Using swarm against swarm: Release bait drones to simulate targets, attract swarms of bees to gather, and then implement coordinated jamming. In 2025, a successful test was conducted in the Middle East battlefield to disintegrate an attack by a swarm of 200 drone-like flying machines

Modularization and mechanized deployment

Portable equipment for individual soldiers: Deployment time < 1 minute, jamming gun (weight < 3kg, coverage radius 300m), spectrum detector (< 2kg), suitable for border patrol and emergency response

Vehicle-mounted / ship-borne / fixed equipment: rapid deployment, integrated radar + electro-optical + weapons; fixed jamming station covers a radius of 1-3km, suitable for 24-hour duty of key facilities



Contact Us
+86-18911207562
WeChat:+86-18911207562
Email:18911207562@163.com
Address:Intersection of Renmin Street and Guanlan East Road, Qihe County, Dezhou City, Shandong Province
About Us
Feixingjia Low-Altitude Industry Group is a wholly-owned subsidiary of Shandong Liwei Group, dedicated to pioneering the low-altitude economy. The Group is committed to the integrated innovation of ...
Copyright Feixingjia Drone Technology (Shandong) Co., Ltd All Rights Reserved. 鲁ICP备2026004851号-1

TOP