The escalating use of uncrewed aerial systems (UAS) across various sectors has brought significant benefits but also poses security challenges. As drones become more sophisticated and accessible, robust counter-UAS (C-UAS) solutions remain crucial. A primary concern in C-UAS is the security of drone telemetry, especially concerning DJI drones. While secured telemetry aims to protect drone data from unauthorized access, it also complicates the task of C-UAS systems that rely on this data for threat detection and mitigation by potentially hindering efforts to identify and neutralize drone-based threats in sensitive environments. Software solutions, particularly those in RF cyber takeover C-UAS solutions, must effectively address this challenge.
The DJI Telemetry Landscape
DJI, the leading Chinese drone manufacturer whose products dominate the market, has faced scrutiny regarding the security of its drone telemetry. Telemetry data encompasses vital information, including the drone’s location, altitude, speed, flight path, and sensor data. C-UAS systems access this data to detect, track and neutralize potential drone-based threats.
Some C-UAS systems have traditionally used DJI Aeroscope based technology within their solutions to monitor DJI drones. DJI Aeroscope, a now discontinued proprietary system, reads drone telemetry and thereby provides critical location and identification information. However, reports and fears about Aeroscope disablement in certain regions, alongside its discontinuation, have raised concerns about its ongoing reliability – and its ability to track DJI drones.
As if this was not bad enough, reportedly in response to security concerns and potential vulnerabilities, including the DJI telemetry protocols reportedly being published in the public domain, DJI then introduced firmware upgrades for its drones which incorporated secured telemetry. This upgrade affects most new DJI drones like the Mavic 3 Pro and Cine models. It secures telemetry data and makes access more difficult. DJI’s introduction of secured telemetry presents new challenges for C-UAS experts – again, who need such access to track DJI drones.
In parallel, DJI released an Aeroscope Upgrade Module, a USB dongle “patch,” to address these secured telemetry challenges. However, it has since discontinued this hardware-based solution. This left a big gap in C-UAS capabilities vis-a-vis the latest DJI drones.
The C-UAS Industry’s Response: Software Solutions
DJI’s introduction of secured telemetry and the limitations of its hardware-based solutions have spurred the C-UAS industry to develop alternative approaches, with an emphasis on software-based solutions rather than hardware patches. Viable solutions include these 2 primary characteristics:
- Core Capability for Mission-Critical Cyber C-UAS: Scalable, updated software can determine the location and relevant information for drones with or without secured telemetry.
- Independence from Hardware and Remote ID: Solutions that do not depend on limited availability or discontinued DJI based hardware or remote ID technologies.
A focus on software-based solutions to overcome secured telemetry challenges offers key advantages:
- Scalability: Software should be easily updated and deployed in the cyber-C-UAS system software. This ensures compatibility with new drone models and firmware versions.
- Flexibility: Software-based solutions can adapt to different telemetry protocols and methods. This provides a more versatile approach to drone detection and tracking.
- Independence: By not relying on specific hardware or remote ID technologies, software-based solutions can operate effectively in diverse environments and scenarios.
When evaluating C-UAS systems, security experts should consider whether or not a C-UAS system possesses advanced software capabilities, including the ability to detect and mitigate drones with secured telemetry, from the software, in a form that is scalable and constantly updated, without dependency on hardware or remote ID. Given the immense market share, continued popularity, accessibility, and capabilities of DJI drones, this is clearly a mission critical capability.
Advanced Capability RF Cyber Software-Based Technology Overcomes the Challenge
D-Fend Solutions has pioneered RF cyber detection and takeover mitigation, offering non-kinetic solutions for authorized security personnel in sensitive environments. The company’s EnforceAir technology has been deployed in about 30 countries, including the U.S., for defense, homeland security and large events. D-Fend’s approach focuses on enabling a safe and thriving drone economy by surgically mitigating rogue drones while addressing challenges such as detecting. Tracking, identifying and mitigating DJI secured telemetry drones, utilizing advanced cyber and software capabilities.
Keeping One Step Ahead of the Drone Threat
As drones continue to evolve and become more integrated into our daily lives, the need for effective C-UAS solutions will only grow. Drone manufacturers, such as DJI, that incorporate secured telemetry, complicate C-UAS solutions by obfuscating critical data required to track drones. By adopting credible cyber software-based solutions, security experts can continue to ensure the safety and security of our airspace.
By: Dawn Zoldi (Colonel USAF Ret)