Frequently Asked Questions

1) Why consider the HAD System?

The HAD System detects the Radio Frequency (RF) signals of drones in a defined security zone. Two benefits of this technology are that this method is much more affordable than a radar system and has a much lower false alarm rate. Further, a single RF detection unit provides 360o of coverage unlike a camera system (visible or IR) that has a limited field of view and needs to be pointed in the direction of the drone that has entered your airspace. Conceptually, the HAD System creates a dome of coverage over your facility. Once this outer dome boundary is crossed, HAD will detect, identify, locate the drone and the location of its pilot.

2) Is it legal to interfere with a drone, even if it is engaged in nefarious activity?

No. Current U.S. laws do not address technological advances in the drone sector and most active countermeasures are limited by these statutes:

  • The Wiretap Act (18 USC 2510-2522)
  • The Pen Register and Trap and Trace Statute (18 USC 3121-3127)
  • The Computer Fraud and Abuse (18 USC 1030)
  • The Aircraft Sabotage Act (18 USC 32)

Despite current laws, there are a number of anti-drone systems manufacturers that tout their ability to “bring down a drone.” Clearly, this is prohibited. Detection, tracking, and monitoring are the only legally permitted actions that can be taken at this time with respect to operating a counter-drone system within the U.S. Read more regarding the latest efforts to modify these laws with respect to their applicability to drone security.

In anticipation of a change in unmanned aircraft systems laws, the HawkEye Aerial Defense (“HAD”) System is strategically positioned to engage drones by adding a mitigation hardware unit to the overall system. The addition of the mitigation unit will create a powerful new system than can actively control UAS activity in the area. An associated software update will enable the HAD System to take user-specified action once the geofence is crossed. By selecting the HAD System, security teams are effectively poised to respond quickly to changes in regulations.

3) Is the HAD System able to effectively detect multiple drones simultaneously?

Yes. The system has been tested numerous times against simultaneous triple drone flight profiles converging from several directions at once with a near perfect detection rate.

4) What variables impact the cost of a HAD System?

The cost of the system is dependent upon the coverage area and the security objectives and strategy. Hence, each project is unique as is its cost to design and deploy. A single unit system will only provide drone detection and has a limited range. Whereas a three unit system is the most robust option and uses triangulation to provide both enhanced detection and a sector geolocation so that a drone’s actual location is known. A larger number of units provides increased detection ranges and improved accuracies against unauthorized drone operations. Extra sensor units may be required if nearby building block the electronic signals of the system.

5) Is there a limit to the size of facility or property in terms of coverage?

The current system design is scalable for any location.

6) What are the hardware and installation requirements?

A single sensor networked to an integrator-provided server will generate basic detections. The detection software is installed on the server which interfaces with the most common video management systems.

A communications network is needed to send data back to the base CPU for real-time data processing.

A power source is needed and Power over Ethernet (PoE Plus) is built in.

Each sensor unit is mounted on the exterior of the facility or property and provides better performance when placed higher in the air. Each sensor is designed for a pole or building mounting and can be placed in locations similar adjacent existing exterior security cameras.

7) How much lead-time is required to have a system installed?

A typical system requries 4-6 weeks lead-time.

8) Is there a fee for installation?

Yes. Each location has a unique physical and electromagnetic environment which impacts the RF patterns. The installation team will generate a detailed map of the environment, run numerous computer simulations to determine the optimum installation locations, and assess the overall effectiveness of the HAD System on a pre-installed basis. Once HAD is installed at the site, actual drones will be flown in the area for final verification of the geo-fence location and overall system performance.

9) Can my own security team install?

SixTech Systems will schedule recurring training to educate end-users about the system as well as certify integrator installation teams. Automated mapping and simulation tools will be available to provide support for each team. Mounting, power, Ethernet connections, and overall unit installation can be accomplished via a trained security integration company.

10) How do I know the system is working?

Once a HAD System is installed, its operational readiness will be tested and confirmed using actual drones in test flights. Data from these flights, generated via the sensor software, is designed to provide inputs directly into an existing VMS system which can be custom configured in several ways to react to a detection:

  • Drone activity data can be sent to the security team for evaluation and action.
  • Cameras can be automatically triggered to locate and zoom in on a specific target(s).
  • Other security measures can be triggered automatically through the VMS. These actions can all be user-defined.
Data logs are also stored for a user-defined amount of time and can be analyzed by an in-house analyst or our support team if any issues are suspected.

11) How reliable is the system?

The HAD counter-UAS system shares legacy with military and government systems that have been tested extensively in harsh environments under demanding operating conditions before being adopted by the military.

The sensor units are independent of the base CPU unit to provide modularity in the unlikely event of hardware failure and can easily be replaced.

HAD’s proprietary software is updated via the Internet as new drone models arrive on the market. System upgrades are also available separately at the operator’s discretion via the same “over-the-air” mechanism.

12) How do Over-the-Air updates work?

A major benefit of the HAD System is that software updates can be pushed to each user’s system as they become available. As new threats evolve, and as new drone hardware enters the market, the HAD System rapidly addresses these new threats and ensures a timely response without waiting on complicated updates that are typically handled by the security team.

HAD will be integrated into your security system; some customers prefer not to have Internet access with their system. Under this scenario, software updates can easily be implemented locally by trained technicians who can verify system performance after each update.