ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

What’s Better Than Watching an Eagle Snatch a Drone from the Sky? Hint: Nothing [VIDEO]

b2ap3_thumbnail_anti_drone_eagle_400.jpgDrones are great devices for entertainment. Whether they’re flying in races or recording breathtaking videos or photos from a bird’s-eye view, drones can help you feel like you’re on top of the world. Unfortunately, just like all types of technology, drones can be abused. Violations of drone legislation have led authorities to ask a difficult question: how can you get an illegal drone out of the sky, without risking those who are passing by below?

The Dutch National Police in the Netherlands are working closely with a raptor training company called Guard From Above to test whether or not eagles will be viable drone termination options in the future. In theory, they can identify drones, snatch them out of the sky, and take them somewhere where they can be safely terminated. You can see them in action in this video:

The popularity of drones is on the rise, but there’s a significant amount of controversy surrounding them. A major domestic concern is that of privacy, which stems from the fact that many drones are often equipped with cameras. Other times, they might be used to deliver illegal goods, like dropping drugs into prisons. On a larger scale, drones can be considered a threat to national security, as they can be armed with semi-automatic weapons and even close-range explosives. If that wasn't enough of a reason to be worried, drones can potentially complicate flight patterns of other aircrafts.

The natural solution is to limit the locations where drones can be flown, but people are always testing the limits of the law. Some blatantly ignore it and fly in unauthorized locations simply because they want to. It’s these people who are likely to have their drones snatched by an eagle and carried off.

Birds of prey like the bald eagle, golden eagle, and other large predatory birds like hawks, are at the top of the avian food chain. It’s only natural that they are capable of spotting something in the sky and striking at it. It appeals to the predatory instinct within.

Other ideas have been tested, like jamming drone sensors, catching them with nets, or shooting them out of the sky, but these methods can be potentially hazardous to those passing by. The Dutch police force believe that, with proper training, eagles will be able to take down drones and safely deliver them to the ground without incident. Plus, if a grown eagle is capable of carrying off relatively large prey, it can probably handle a drone.

Still, there’s the chance that the drones might do harm to the eagles used to hunt them. What if their wings got caught in the propellers, or if the drone is somehow weaponized? Would the eagles need to be equipped with protective armaments to shield them from harm? Absolutely. Chances are that until these answers are worked out, eagles will remain an interesting and all-natural alternative to traditional drone-hunting methods.

In fact, even eagles that haven’t been trained are likely to hop on the drone-hunting bandwagon, even if their methods are… less subtle. There’s a large chance that wild eagles will see a drone in their territory, perceive it as a threat, and knock it right out of the sky. While it’s not delivered to the proper authorities, the result is, more or less, the same; a terminated drone. Here’s another video that shows a slow-motion attack on a drone from a wedge-tailed eagle in Australia.

Though these birds of prey are more than strong enough to take out drones, can they be counted on to remove potentially dangerous variants of drones? What do you think? Let us know in the comments.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 05 May 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Privacy Network Security Data Cloud Business User Tips IT Support Internet Hardware Innovation Email Hosted Solutions Malware Efficiency Workplace Tips Computer Google Microsoft Collaboration Android Cybersecurity Business Management Phishing IT Services Backup Data Backup Ransomware Smartphone communications Microsoft Office Upgrade Small Business Smartphones Mobile Devices Network Data Recovery Managed IT Services Communication Productivity Quick Tips Users Social Media VoIP Mobile Device Tech Term Automation Business Continuity Facebook Windows 10 Passwords Covid-19 Holiday Disaster Recovery Apps IT Support Browser Managed Service Windows 10 Miscellaneous Cloud Computing Outsourced IT Data Management Remote Work Managed Service Provider Internet of Things Government Saving Money Operating System Gadgets Networking Windows Artificial Intelligence Workplace Strategy Managed IT services Bandwidth Encryption Business Technology Mobile Device Management Blockchain App Virtualization Spam Server WiFi Information Remote Budget History Gmail Office Apple Two-factor Authentication Information Technology Office 365 Employee/Employer Relationship BDR Cybercrime Wi-Fi Health Big Data Conferencing Analytics Access Control Data Security Compliance Voice over Internet Protocol Employer-Employee Relationship IT Management Training Help Desk Hacking Cost Management Remote Computing Document Management Patch Management Hacker Vendor Save Money Remote Monitoring Augmented Reality Word Search... Mobile Office BYOD Best Practice IBM Website Computing Managed Services Vendor Management Retail Hard Drive Data loss Alert Hiring/Firing Outlook Password Legal Data storage Money Applications Customer Service Unified Threat Management Project Management Firewall Vulnerabilities Monitoring Black Market Marketing iPhone Cleaning Healthcare Websites Running Cable Education Cortana Robot Remote Workers Meetings Content Filtering Mobility Storage Windows 7 Free Resource Google Maps Router Scam How To The Internet of Things YouTube VPN Twitter User Update Law Enforcement End of Support Laptop Printer Chrome Data Breach Paperless Office Antivirus Social Maintenance Sports Travel SaaS DDoS Virtual Reality Social Engineering Windows 11 Mobile Computing Cryptocurrency IT Consultant Multi-factor Authentication Start Menu Disaster Professional Services Computer Care Downloads Customer Relationship Management Co-Managed IT Vulnerability Saving Time Politics Entertainment Machine Learning Settings Lithium-ion battery Software as a Service Managed Services Provider Data Protection Computers Bitcoin Solid State Drive Virtual Private Network Telephone Processors Current Events Chromebook Drones Excel Solutions Automobile HIPAA Tech Terms Images 101 Integration How To Display Managed IT Wireless Technology Microchip eWaste Digital Flexibility Virtual Assistant Employees Downtime Taxes Avoiding Downtime Hack Safety Identity Theft Holidays Notifications Unified Communications Processor Virtual Desktop PowerPoint Experience Cooperation Google Docs Bluetooth Video Conferencing Administration Physical Security Distributed Denial of Service Virtual Machines Presentation Office Tips Memory Computer Repair Specifications Private Cloud Touchscreen PCI DSS Botnet Licensing Phone System Emergency Proxy Server Gig Economy Emails Humor Rental Service Computer Malfunction Fake News Supply Chain Micrsooft Computing Infrastructure Azure Flash Business Communications Vendor Mangement Service Level Agreement Internet Service Provider Management Regulations Compliance Samsung Device security Managed IT Service Telephone Systems Business Growth Competition Uninterrupted Power Supply Wireless Headphones Memes Recovery Webcam Microsoft Excel Workplace Business Cards Computer Accessories Tech Human Resources Business Mangement Going Green Net Neutrality Error Financial Data LiFi Tablets Banking Entrepreneur Google Wallet Application Deep Learning Bookmark Risk Management IT Documents Messenger Scams Supercomputer Piracy Business Intelligence Google Calendar Term Google Apps Download Virus Telework HTML Business Metrics Hosted Solution Browsers Smartwatch Nanotechnology Communitications Securty Books Motion Sickness Microsoft 365 Cables Software License Domains Language Society Comparison Google Play Google Drive Upload Procurement Social Network FinTech Monitors Visible Light Communication Knowledge Data Analysis CES Corporate Profile Screen Reader IT Assessment Troubleshooting Reading Point of Sale Employer Employee Relationship Mobile Technology Value Windows 8 Television Security Cameras Telephony Trends Supply Chain Management Customer Resource management Organization Cabling Devices Cyber security Shortcuts Public Speaking Displays Advertising Fileless Malware Tablet Smart Devices Relocation G Suite Tip of the week Streaming Media Tracking Company Culture Work/Life Balance Tech Support Mouse VoIP Gamification Remote Working Telephone System AI Regulations Trend Micro Be Proactive Keyboard Hard Drives Directions Digital Security Cameras Backup and Disaster Recovery Electronic Health Records Business Owner Web Server Transportation In Internet of Things Digital Payment Desktop Wasting Time intranet SharePoint Content Electronic Medical Records Worker Accountants eCommerce Wireless Hacks Modem Workplace Strategies Shortcut Network Congestion Heating/Cooling Writing Environment Videos Access Database Surveillance Reliable Computing Windows XP Public Cloud Managing Costs Social Networking Time Management Health IT Equifax SSID Audit Media Spyware Tactics Development Inbound Marketing Scalability Hard Drive Disposal Employer/Employee Relationships Administrator File Sharing Virtual Machine Text Messaging Proactive IT Username Redundancy Reviews Startup Optimization Bring Your Own Device Freedom of Information Smart Technology Navigation 2FA Cache Addiction email scam Teamwork Unified Threat Management Data Storage Electronic Payment Workers Mobile Security Hypervisor Music User Tip Shopping Legislation Staffing News Medical IT CCTV SQL Server IP Address Printing Evernote Paperless Network Management

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?