← Back to Directory

Sentrycs

aircyber
Operating in:IsraelUS

Sentrycs CoRF (Cyber-over-RF) attacks the drone-operator communication protocol rather than jamming RF frequencies — making it the only legally compliant C-UAS option in civilian airspace where jamming is prohibited.

Products

Counter-Unmanned Aircraft System (C-UAS)

c-uasai-assistedcyber

The Sentrycs C-UAS system is designed to detect, identify, and mitigate threats from hostile drones, providing a secure perimeter around critical assets.

Tech Specifications

RF and radar sensors, multi-layered defense protocols, operates in varied frequency bands, ensures low SWaP footprint

Software & AI

Proprietary AI and machine learning algorithms for threat detection and mitigation

Integration Possibilities

Compatible with leading C2 systems and can integrate with existing defense platforms

Why This Design

Developed to counter the increasing threat of drone intrusions in sensitive airspace, the system ensures a high level of security for military and civilian purposes.

Enables

Operators gain real-time threat detection and response capabilities against unauthorized drones.

Tradeoffs

Effectiveness can be limited in highly cluttered environments or against rapidly evolving drone technologies.

intrusion detectioninterdictionjamming

Integrations

Sentrycs CoRF ↔ Iron Drone Raider

CoRF detects and classifies the hostile drone via RF protocol analysis, passes GPS coordinates and drone model classification to Iron Drone Raider via a shared data protocol. Raider launches autonomously, confirms target via onboard optics, and executes net capture.

Control Points

Criticality 4/5low replaceability

CoRF drone interception protocol (cyber-over-RF methodology)

protocol · cyber

Joint Ventures

Sentrycs × IDF CoRF deployment

active
Announced Mar 12, 2024

Operational CoRF (cyber-over-RF) C-UAS deployment with the Israeli Defense Forces for border airspace protection.

Israel Ministry of Defense (MOD) · IL