Our Technology
Four core technologies covering the full Counter-UAS kill chain. From passive detection to kinetic interception.
Core Technology 1
Proprietary GNSS manipulation techniques that create an impenetrable defensive shield against navigation-dependent threats.
Simultaneously generates falsified signals across GPS, GLONASS, Galileo, and BeiDou on both L1 and L2/L5 frequency bands, ensuring no navigation fallback remains available.
Three operational modes provide tactical flexibility: Push-back forces retreat, Hold Pattern traps threats in circular orbits, and Static Location triggers No-Fly Zone responses.
Low-power approach takes control of the drone's navigation rather than destroying it. Safe for populated areas, produces no debris, and preserves evidence for forensics.
TRL-9 certified. Verified against thousands of real-world threats in active combat zones. Selected by the US Department of Defense and deployed by leading western militaries.
Core Technology 2
Dual-layer detection combining machine learning with classical pattern recognition for unmatched accuracy.
AI algorithms analyze RF signatures in real-time, identifying even previously unknown drone models through pattern similarity analysis. Models improve continuously from field data.
Time-domain analysis reliably detects known protocols with extremely low false alarm rates. Particularly effective for commercial drone signatures like DJI OcuSync.
Combined AI and classical approaches leverage the strengths of both methods. The result: 99.999% detection with minimal false alarms and unknown threat identification.
Monthly protocol library updates and quarterly AI model improvements ensure the system stays ahead of the rapidly evolving drone landscape.
Core Technology 3
Targeted datalink disruption that defeats threats GNSS spoofing alone cannot reach.
Modern FPV drones navigate visually, not by GNSS. Datalink jamming severs their video and control links, forcing loss of control regardless of navigation mode.
Jamming techniques specifically designed for drone protocols maximize effectiveness while minimizing power consumption and collateral spectral impact.
Sub-second activation time. When integrated with RF detection, jamming is automatically triggered on the correct frequency bands for each classified threat.
When drones lose communication links, most activate failsafe protocols: hovering, landing, or returning home. The threat is neutralized without kinetic force.
Core Technology 4 - Coming Soon
When electronic warfare isn't enough, DART provides the final layer of defense.
Autonomous drones with inertial navigation don't respond to GNSS spoofing or datalink jamming. Physical interception is the only option.
Integrated into LeC2, DART automatically escalates from soft-kill to hard-kill when electronic countermeasures don't achieve the desired effect.
Leverages fused data from RF detection, radar, and optical tracking for precise target acquisition. An intelligent system, not just a launcher.
Physical interception provides absolute certainty. No protocol updates, no firmware countermeasures, no escape. The threat is eliminated.
Full Kill Chain
Five stages. One integrated system. Every threat covered.
Passive RF detection identifies and classifies the threat.
Radar and optical systems provide precise tracking data.
AI determines drone type and optimal countermeasure.
GNSS spoofing and datalink jamming engage the threat.
DART kinetic interception for threats that resist EW.
Platform Integration
LeC2 ties it all together - Regulus systems and third-party vendors unified in a single operational picture.