Situation report / UAS threat

Threat analysis

The rapid evolution of drone technologies requires constant reassessment of security protocols. Drones are no longer neutral tools but complex, accessible and adaptive threat vectors.

Threat analysis

Understanding key risk dynamics

This page outlines the factors that make drone threats highly dynamic: platform democratization, diversified hostile uses, increasing sophistication and detection challenges.

Drone threats have rapidly expanded with the widespread adoption of civilian drones since 2015.

  • Mass democratization of drones
  • Dual-use: civil, criminal, military
  • Low cost / high impact
  • Key vector of asymmetric conflicts
  • Bypass traditional defenses
Drone threat expansion illustration

Threats come in various forms, from modified commercial drones to autonomous systems and coordinated swarms.

  • Modified commercial drones
  • Armed FPV drones
  • Autonomous drones
  • Coordinated swarms
  • Improvised ISR platforms
Drone typologies illustration

Counter-drone operations are complex due to low visibility, mobility and adaptability.

  • Low radar signature
  • Low altitude flight
  • High mobility
  • Legal constraints
  • Adaptive threat
Threat complexity illustration

The challenge lies in the lack of structured response systems.

  • A global and structured response is required.
Key message illustration

Transition

Understanding the threat prepares the response

Protecting sensitive sites requires a multi-layered defense architecture.