Blog

๐—ง๐—ต๐—ฒ ๐—ฏ๐—ถ๐—ด๐—ด๐—ฒ๐˜€๐˜ ๐˜€๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† ๐—ฟ๐—ถ๐˜€๐—ธ ๐˜๐—ผ ๐—ฐ๐—ฟ๐—ถ๐˜๐—ถ๐—ฐ๐—ฎ๐—น ๐—ถ๐—ป๐—ณ๐—ฟ๐—ฎ๐˜€๐˜๐—ฟ๐˜‚๐—ฐ๐˜๐˜‚๐—ฟ๐—ฒ ๐—บ๐—ถ๐—ด๐—ต๐˜ ๐—ฐ๐—ผ๐˜€๐˜ ๐—น๐—ฒ๐˜€๐˜€ ๐˜๐—ต๐—ฎ๐—ป ๐—ฎ๐—ป ๐—ถ๐—ฃ๐—ต๐—ผ๐—ป๐—ฒ

Photo of Odin Odin

Recent attacks in the Gulf highlight a new reality: low-cost drones are now strategic weapons. And this isnโ€™t limited to battlefields in the Middle East or Ukraine.

For ODIN, which has been protecting borders and critical infrastructure across Israel and Europe over the last 2 years, one thing is clear: ๐——๐—ฟ๐—ผ๐—ป๐—ฒ๐˜€ ๐—ฎ๐—ฟ๐—ฒ ๐—ฒ๐˜ƒ๐—ฒ๐—ฟ๐˜†๐˜„๐—ต๐—ฒ๐—ฟ๐—ฒ.

What weโ€™re seeing around critical infrastructure is no longer hobbyists flying DJI drones that are easily detected by decrypting their communication link.

Itโ€™s:
โ€ข Sophisticated DIY FPV drones
โ€ข Anonymized systems designed to evade attribution
โ€ข Adversaries using military-grade communications and tactics to surveil infrastructure

Power plants.
Transmission lines.
Desalination facilities.
Substations.

๐—ช๐—ฒ ๐—ฎ๐—ฟ๐—ฒ ๐˜„๐—ฎ๐˜๐—ฐ๐—ต๐—ถ๐—ป๐—ด ๐˜๐—ต๐—ฒ ๐—ฑ๐—ฒ๐—บ๐—ผ๐—ฐ๐—ฟ๐—ฎ๐˜๐—ถ๐˜‡๐—ฎ๐˜๐—ถ๐—ผ๐—ป ๐—ผ๐—ณ ๐—ฎ๐—ฒ๐—ฟ๐—ถ๐—ฎ๐—น ๐˜๐—ต๐—ฟ๐—ฒ๐—ฎ๐˜ ๐—ฐ๐—ฎ๐—ฝ๐—ฎ๐—ฏ๐—ถ๐—น๐—ถ๐˜๐—ถ๐—ฒ๐˜€.
Critical infrastructure is becoming a targetable battlespace.

The good news?

Most drones rely on RF links for control, telemetry, and navigation. That creates an opportunity.

๐—ข๐——๐—œ๐—ก passively analyses RF activity to enable operators to detect, classify, geolocate, and track any kind of drone ๐—ฎ๐—ป๐—ฑ ๐˜๐—ต๐—ฒ๐—ถ๐—ฟ ๐—ผ๐—ฝ๐—ฒ๐—ฟ๐—ฎ๐˜๐—ผ๐—ฟ๐˜€, without revealing its own position.

This capability works in dense urban environments and against ๐˜‚๐—ป๐—ธ๐—ป๐—ผ๐˜„๐—ป ๐—ฎ๐—ป๐—ฑ ๐—ฝ๐—ฟ๐—ฒ๐˜ƒ๐—ถ๐—ผ๐˜‚๐˜€๐—น๐˜† ๐˜‚๐—ป๐˜€๐—ฒ๐—ฒ๐—ป ๐—ฅ๐—™ ๐—ฒ๐—บ๐—ถ๐˜๐˜๐—ฒ๐—ฟ๐˜€.

The threat is evolving fast. ๐—ฅ๐—ฒ๐—ด๐˜‚๐—น๐—ฎ๐˜๐—ถ๐—ผ๐—ป ๐—ฎ๐—ป๐—ฑ ๐˜€๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† ๐˜€๐˜๐—ฟ๐—ฎ๐˜๐—ฒ๐—ด๐—ถ๐—ฒ๐˜€ ๐—บ๐˜‚๐˜€๐˜ ๐—ฒ๐˜ƒ๐—ผ๐—น๐˜ƒ๐—ฒ ๐˜„๐—ถ๐˜๐—ต ๐—ถ๐˜.

The question isnโ€™t whether drones will target infrastructure. ๐—ง๐—ต๐—ฒ ๐—พ๐˜‚๐—ฒ๐˜€๐˜๐—ถ๐—ผ๐—ป ๐—ถ๐˜€ ๐˜„๐—ต๐—ฒ๐˜๐—ต๐—ฒ๐—ฟ ๐˜„๐—ฒ ๐˜„๐—ถ๐—น๐—น ๐—ฎ๐—ฑ๐—ฎ๐—ฝ๐˜ ๐—ณ๐—ฎ๐˜€๐˜ ๐—ฒ๐—ป๐—ผ๐˜‚๐—ด๐—ต.

 

https://lnkd.in/gJamNkVz

Latest articles

  • GPS denial is an operational reality for modern forces

    โ€œ๐™‚๐™‹๐™Ž ๐™™๐™š๐™ฃ๐™ž๐™–๐™ก ๐™ž๐™จ ๐™ฃ๐™ค ๐™ก๐™ค๐™ฃ๐™œ๐™š๐™ง ๐™– ๐™ฉ๐™๐™š๐™ค๐™ง๐™š๐™ฉ๐™ž๐™˜๐™–๐™ก ๐™›๐™ช๐™ฉ๐™ช๐™ง๐™š ๐™ฉ๐™๐™ง๐™š๐™–๐™ฉ. ๐™„๐™ฉ ๐™ž๐™จ ๐™ฉ๐™๐™š ๐™š๐™ฃ๐™ซ๐™ž๐™ง๐™ค๐™ฃ๐™ข๐™š๐™ฃ๐™ฉ ๐™ž๐™ฃ ๐™ฌ๐™๐™ž๐™˜๐™ ๐™ข๐™ค๐™™๐™š๐™ง๐™ฃ ๐™›๐™ค๐™ง๐™˜๐™š๐™จ ๐™ž๐™ฃ๐™˜๐™ง๐™š๐™–๐™จ๐™ž๐™ฃ๐™œ๐™ก๐™ฎ ๐™ค๐™ฅ๐™š๐™ง๐™–๐™ฉ๐™š.โ€ That assessment in War on the Rocksโ€ฆ

  • Why RF libraries won’t save you?

    ๐™๐™ž๐™ง๐™จ๐™ฉ ๐™ž๐™ฉ ๐™ฌ๐™–๐™จ ๐™—๐™–๐™จ๐™ž๐™˜ ๐™๐™ ๐™ก๐™ž๐™ฃ๐™ ๐™จ. ๐™‰๐™ค๐™ฌ ๐™ž๐™ฉโ€™๐™จ ๐™™๐™ง๐™ค๐™ฃ๐™š๐™จ ๐™ง๐™ž๐™™๐™ž๐™ฃ๐™œ ๐™Ž๐™ฉ๐™–๐™ง๐™ก๐™ž๐™ฃ๐™ . ๐˜ผ๐™ฃ๐™™ ๐™จ๐™ค๐™ข๐™š ๐™ฅ๐™š๐™ค๐™ฅ๐™ก๐™š ๐™จ๐™ฉ๐™ž๐™ก๐™ก ๐™—๐™š๐™ก๐™ž๐™š๐™ซ๐™š ๐™– ๐™ฆ๐™ช๐™–๐™ง๐™ฉ๐™š๐™ง๐™ก๐™ฎ โ€œ๐™ก๐™ž๐™—๐™ง๐™–๐™ง๐™ฎ ๐™ช๐™ฅ๐™™๐™–๐™ฉ๐™šโ€ ๐™ฌ๐™ž๐™ก๐™ก ๐™จ๐™–๐™ซ๐™š ๐™ฉ๐™๐™š๐™ข. If your counter-UASโ€ฆ

  • Real-world threats donโ€™t wait for software updates

    Modern security works best when systems are layered, interoperable, and purpose-built. Across defense, law enforcement, and critical infrastructure security, we should be seekingย integrated security architecturesย that deliverโ€ฆ