Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Police Recruit Eagles to Take Out Illegal Drones... Seriously

b2ap3_thumbnail_eagles_for_drones_400.jpgWhile they might seem like glorified toys for adults, drones are fantastic tools that can help people take some breathtaking photos and videos of their local scenery. Unfortunately, as is the case with most good technology, there are people out there who want to use them for nefarious purposes. This leads authorities to a tough question: how do you knock an illegal or dangerous drone out of the sky without harming those down below? The answer is simple: eagles.

That’s right; there are now people in this world that are training eagles to take out illegal drones. The Dutch National Police in the Netherlands are working out ways to effectively terminate illegal drone activity by working with a raptor training company called Guard From Above. They firmly believe that eagles can be taught how to identify drones, capture them, and deliver them safely away from the public. You can see them in action in this video:

Since the drone popularity explosion began, there has been much controversy surrounding the remote-controlled flying machines. There have been stories of drones dropping drug deliveries into prisons, as well as armed drones exploiting semi-automatic weapons or even toting explosives on the frontlines. Another major domestic concern is that of privacy, as drones often come equipped with cameras. Plus, considering how drones can potentially mess with other aircrafts, their use naturally has to be limited in certain places. These reasons are part of why governments want to crack down on the use of drones in unauthorized locations.

If you think about it, hunting illegal drones with eagles would be a great, low-tech way of handling the drone problem. Birds of prey like the bald eagle, golden eagle, and others, are generally at the top of the avian food chain, so what better way to hunt down flying machines than with natural born aerial predators? There are some other ways to do it, like using other drones with nets, shooting them out of the sky, or jamming their sensors, but these tactics are somewhat difficult to maneuver around without endangering people in the nearby vicinity. If trained properly, the Dutch police force seems to think that eagles can snatch drones out of the sky and deliver them safely to the ground without incident.

Still, a common cause for concern is that the drones might, in some way, pose a threat to these birds of prey. What would happen if an eagle were to be hurt by the drone’s propeller blades, or if the drone is weaponized in some way? Should eagles be wearing protective armaments on their talons? While these details are being worked out, it’s likely that the practice of hunting drones with eagles won’t be a set-in-stone practice for some time, though it remains a viable option until proven otherwise.

Still, it seems that eagles are more than capable of taking out drones relatively effectively, though wild eagles are more likely to just see the drone as a threat and knock it out of the sky, rather than make sure it’s delivered to the authorities. Here’s another video that shows a slow-motion attack on a drone from a wedge-tailed eagle in Australia.

These powerfully-built birds of prey are definitely strong enough to stop drones in their tracks, but are they an effective countermeasure to more dangerous variants of drones? Let us know in the comments.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 11 June 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Hardware Internet Efficiency IT Support Malware Privacy Google Computer Phishing Email Workplace Tips IT Services Users Collaboration Hosted Solutions Mobile Device Workplace Strategy Ransomware Quick Tips Microsoft Cybersecurity Small Business Passwords Communication Data Backup Saving Money Smartphone Backup Managed Service Smartphones VoIP Android Business Management Mobile Devices Upgrade communications Disaster Recovery Data Recovery Browser Social Media Managed IT Services Windows Microsoft Office Remote Tech Term Current Events Network Productivity Internet of Things Artificial Intelligence Automation Facebook Gadgets Cloud Computing AI Covid-19 Remote Work Server Managed Service Provider Miscellaneous Outsourced IT Holiday Information Employee/Employer Relationship Spam Compliance Encryption Training Office Windows 10 Business Continuity Government Data Management Bandwidth Blockchain Windows 10 Wi-Fi Business Technology Virtualization IT Support Apps Data Security Mobile Office Vendor Two-factor Authentication Chrome Employer-Employee Relationship Budget Networking Apple Managed Services Voice over Internet Protocol App BYOD Mobile Device Management Gmail Conferencing How To BDR Hacker Avoiding Downtime Marketing HIPAA Applications Computing Access Control Information Technology WiFi Tip of the week Office 365 Analytics Office Tips Augmented Reality Managed IT Services Storage Password Computers Bring Your Own Device Website Healthcare Virtual Private Network Router Operating System Health Risk Management Help Desk Big Data Retail Scam Data loss Telephone Customer Service Windows 11 2FA Patch Management Cooperation Save Money Remote Monitoring Excel Remote Workers Vulnerability End of Support Vendor Management Going Green Physical Security Display Free Resource Printer Firewall Cybercrime Project Management Paperless Office Windows 7 Infrastructure Microsoft 365 The Internet of Things Solutions Document Management Monitoring Social Maintenance Saving Time Outlook Antivirus Money Humor Managed IT Service Customer Relationship Management Holidays Downloads Data Storage Hacking Sports Licensing Mouse Presentation Video Conferencing Entertainment Managed Services Provider Virtual Machines Professional Services Robot Supply Chain Wireless Technology Administration Telephone System IT Management Cost Management VPN Meetings iPhone Word Settings Printing Wireless Vulnerabilities Computer Repair Content Filtering YouTube Images 101 User Tip Modem Processor Multi-Factor Authentication Mobility Data Privacy Mobile Security Safety Cryptocurrency Machine Learning Virtual Desktop Data storage Smart Technology LiFi Employees Integration Managing Costs Twitter Screen Reader Workforce Distributed Denial of Service IBM Halloween eCommerce Error Service Level Agreement SSID Threats Computing Infrastructure Virtual Assistant Social Engineering Identity Workplace Strategies Surveillance Bookmark Virtual Machine Remote Computing Smart Tech Meta Hacks Scary Stories Reviews Download Medical IT Amazon Alerts Transportation Competition Fun Development Tablet Browsers Hypervisor Alert Connectivity Outsource IT Break Fix Deep Learning Media Shopping Managed IT Optimization File Sharing Upload PowerPoint Dark Data Environment Employer/Employee Relationships How To Multi-Factor Security Education Social Network PCI DSS Notifications IoT Navigation Small Businesses Dark Web User Mobile Computing Gig Economy Travel Trends Displays Customer Resource management Teamwork Regulations Google Calendar Techology Search Internet Service Provider Google Maps Regulations Compliance Data Analysis Star Wars Evernote Outsourcing Microsoft Excel IP Address Best Practice Staff Buisness Memes Unified Threat Management Gamification SQL Server Social Networking Legal Workplace Legislation IT solutions Unified Threat Management Net Neutrality Recovery Financial Data Fileless Malware History Hiring/Firing Business Growth Wearable Technology Paperless Hard Drives Smartwatch IT Content Network Congestion Health IT Azure Motherboard Co-managed IT Comparison Domains User Error Cortana Procurement Telework Directions Cyber security Assessment Tech Technology Care Permissions Alt Codes Business Communications Refrigeration Downtime CES Communitications Point of Sale Scams Specifications Public Speaking Hosted Solution Supply Chain Management FinTech Network Management Microchip Tech Support Internet Exlporer Term Hybrid Work Fraud Lithium-ion battery Typing Monitors Human Resources Entrepreneur IT Assessment Username Value Google Drive Cables Black Friday Knowledge Flexibility Organization Websites Database IT Technicians Google Apps Undo Digital Security Cameras 5G Smart Devices Remote Working Proxy Server Memory Electronic Medical Records Cookies Google Docs IT Maintenance Cyber Monday Unified Communications SharePoint Experience Running Cable Data Breach Tactics Google Play Business Intelligence Hotspot Bitcoin Writing Mirgation Google Wallet Shortcuts Videos Lenovo Electronic Health Records Wasting Time Virtual Reality Nanotechnology Ransmoware Application Laptop Server Management Trend Micro Private Cloud Addiction Security Cameras Vendors Language Windows 8 Chatbots Drones Be Proactive Superfish Software as a Service Identity Theft Management

Blog Archive