Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Police Recruit Eagles to Take Out Illegal Drones... Seriously

b2ap3_thumbnail_eagles_for_drones_400.jpgWhile they might seem like glorified toys for adults, drones are fantastic tools that can help people take some breathtaking photos and videos of their local scenery. Unfortunately, as is the case with most good technology, there are people out there who want to use them for nefarious purposes. This leads authorities to a tough question: how do you knock an illegal or dangerous drone out of the sky without harming those down below? The answer is simple: eagles.

That’s right; there are now people in this world that are training eagles to take out illegal drones. The Dutch National Police in the Netherlands are working out ways to effectively terminate illegal drone activity by working with a raptor training company called Guard From Above. They firmly believe that eagles can be taught how to identify drones, capture them, and deliver them safely away from the public. You can see them in action in this video:

Since the drone popularity explosion began, there has been much controversy surrounding the remote-controlled flying machines. There have been stories of drones dropping drug deliveries into prisons, as well as armed drones exploiting semi-automatic weapons or even toting explosives on the frontlines. Another major domestic concern is that of privacy, as drones often come equipped with cameras. Plus, considering how drones can potentially mess with other aircrafts, their use naturally has to be limited in certain places. These reasons are part of why governments want to crack down on the use of drones in unauthorized locations.

If you think about it, hunting illegal drones with eagles would be a great, low-tech way of handling the drone problem. Birds of prey like the bald eagle, golden eagle, and others, are generally at the top of the avian food chain, so what better way to hunt down flying machines than with natural born aerial predators? There are some other ways to do it, like using other drones with nets, shooting them out of the sky, or jamming their sensors, but these tactics are somewhat difficult to maneuver around without endangering people in the nearby vicinity. If trained properly, the Dutch police force seems to think that eagles can snatch drones out of the sky and deliver them safely to the ground without incident.

Still, a common cause for concern is that the drones might, in some way, pose a threat to these birds of prey. What would happen if an eagle were to be hurt by the drone’s propeller blades, or if the drone is weaponized in some way? Should eagles be wearing protective armaments on their talons? While these details are being worked out, it’s likely that the practice of hunting drones with eagles won’t be a set-in-stone practice for some time, though it remains a viable option until proven otherwise.

Still, it seems that eagles are more than capable of taking out drones relatively effectively, though wild eagles are more likely to just see the drone as a threat and knock it out of the sky, rather than make sure it’s delivered to the authorities. Here’s another video that shows a slow-motion attack on a drone from a wedge-tailed eagle in Australia.

These powerfully-built birds of prey are definitely strong enough to stop drones in their tracks, but are they an effective countermeasure to more dangerous variants of drones? Let us know in the comments.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 29 October 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Hackers Cloud Network Security Hardware User Tips Efficiency Internet Malware IT Support Privacy Google Phishing Workplace Tips Computer Email Collaboration IT Services Users Hosted Solutions Workplace Strategy Ransomware Mobile Device Microsoft Small Business Passwords Quick Tips Backup Cybersecurity Saving Money Communication Data Backup Productivity Managed Service Smartphone Android Upgrade VoIP Business Management Smartphones Mobile Devices Data Recovery communications Disaster Recovery Windows Social Media AI Browser Microsoft Office Managed IT Services Current Events Network Remote Tech Term Internet of Things Information Automation Facebook Artificial Intelligence Cloud Computing Covid-19 Holiday Training Miscellaneous Gadgets Server Managed Service Provider Remote Work Outsourced IT Spam Compliance Encryption Employee/Employer Relationship IT Support Office Windows 10 Government Data Management Business Continuity Blockchain Wi-Fi Windows 10 Business Technology Virtualization Bandwidth Apps Data Security Mobile Office Vendor Two-factor Authentication Employer-Employee Relationship Apple Networking App BYOD Mobile Device Management Gmail Tip of the week Chrome Budget Managed Services Voice over Internet Protocol How To BDR Hacker Avoiding Downtime Marketing HIPAA Computing Applications Information Technology Access Control Office 365 WiFi Conferencing Bring Your Own Device Healthcare Managed IT Services Computers Website Operating System Router Virtual Private Network Risk Management Health Help Desk 2FA Office Tips Analytics Augmented Reality Big Data Retail Storage Password Scam Data loss Cooperation Customer Service Free Resource Project Management Going Green Patch Management Windows 7 Save Money Remote Monitoring Vulnerability Microsoft 365 End of Support Vendor Management Cybercrime Solutions Physical Security Display Firewall Printer Paperless Office Infrastructure Monitoring Windows 11 The Internet of Things Document Management Excel Social Remote Workers Telephone Mouse Licensing Customer Relationship Management iPhone Entertainment Administration Hacking Vulnerabilities Presentation Data Privacy Images 101 Telephone System Robot Wireless Technology Cost Management Multi-Factor Authentication Mobility Settings Printing Wireless Content Filtering IT Management VPN YouTube Meetings Word Cryptocurrency Employees User Tip Integration Modem Computer Repair Mobile Security Processor Virtual Desktop Data storage LiFi Holidays Safety Smart Technology Data Storage Outlook Supply Chain Machine Learning Video Conferencing Money Saving Time Managed Services Provider Humor Virtual Machines Professional Services Managed IT Service Maintenance Antivirus Sports Downloads Social Engineering Break Fix Net Neutrality Browsers SQL Server Technology Care Education Connectivity History Upload Business Communications Remote Computing Financial Data Smartwatch IT Mobile Computing Social Network Scams Multi-Factor Security Search Dark Web Competition Procurement Azure Hybrid Work Tablet IoT Cyber security Best Practice Trends Tech Human Resources Alert Telework CES Communitications Managed IT Customer Resource management Cables Buisness File Sharing Regulations Dark Data Google Calendar How To Microsoft Excel Supply Chain Management Legal Data Analysis IT solutions Star Wars Business Growth Gamification Term Google Apps Notifications Staff User FinTech IT Assessment IT Maintenance Travel Social Networking Legislation Cortana Flexibility Techology Fileless Malware Value Business Intelligence Google Maps Alt Codes Content Shortcuts Wearable Technology IP Address Organization Digital Security Cameras Smart Devices Health IT Ransmoware Downtime Unified Threat Management Motherboard Comparison Permissions Remote Working Unified Threat Management Directions Memory Vendors Hosted Solution Assessment Data Breach Typing Google Play Be Proactive Recovery Hard Drives Videos Electronic Health Records Workforce Network Congestion Specifications Knowledge Fraud Domains Google Drive User Error Microchip Wasting Time Threats Internet Exlporer Trend Micro Username Security Cameras Workplace Strategies Refrigeration Software as a Service Meta Point of Sale 5G Black Friday Experience Public Speaking Google Docs Managing Costs Amazon Unified Communications Database eCommerce Bitcoin Network Management SSID Running Cable Tech Support IT Technicians Lithium-ion battery Entrepreneur Surveillance Google Wallet Proxy Server Virtual Assistant Outsource IT Cookies Monitors Cyber Monday Media Hotspot Virtual Machine Environment Tactics Windows 8 Medical IT Laptop Websites Mirgation Reviews Undo Development Drones Transportation Small Businesses Nanotechnology Electronic Medical Records Language SharePoint Hypervisor Displays Addiction Shopping Optimization Management PowerPoint Halloween Chatbots Lenovo Employer/Employee Relationships Outsourcing Screen Reader Writing Distributed Denial of Service Service Level Agreement Navigation Virtual Reality Computing Infrastructure PCI DSS Gig Economy Hacks Server Management Workplace Scary Stories Private Cloud Identity Application Fun Internet Service Provider Superfish Bookmark Teamwork Hiring/Firing Identity Theft Smart Tech Deep Learning Download Evernote Paperless Twitter Alerts IBM Regulations Compliance Memes Co-managed IT Error

Blog Archive