Airports & Critical Infrastructure

In today’s world, wireless technology has become part of every aspect of life. Most of those uses promote and improve our wellbeing, by streamlining manufacturing and improving services, improving communication and providing better healthcare. However, as wireless technologies become more pervasive, they also find their way into the hands of those who pose a threat to critical infrastructure.

Adverse uses of wireless technologies against critical infrastructure are widely diverse and include: 

  1. The use of radio or cellular communications to control explosive devices
  2. Using surveillance tools to gain access to information and attack critical information assets
  3. Using wireless cyber tools to infiltrate networks and system and cause Denial of Service (DoS), saturation of sensors, neutralize security systems, manipulate information and more.

Netline’s Critical Infrastructure Protection solutions provide a full-scale solution to these threats. By combining Netline’s abilities to Deny, Control and Detect most forms of wireless communications, customized solutions can be created to manage any organization’s security risks.

This new paradigm for protecting critical sites provides an integrated holistic solution that mitigates wireless physical and cyber risks. These solutions protect:

  1. Information Systems
  2. Production systems (which may be controlled by SCADA)
  3. Power, water and air-conditioning infrastructure
  4. Security systems
  5. Communication devices such as smartphones

Critical Infrastructure Protection Solutions


Netline’s Critical Infrastructure Protection solutions build on our in-depth expertise in surveillance solutions and electronic warfare to deliver custom solutions for Critical Infrastructure Protection:


  1. Communication jamming systems that prevent unauthorized communications which could be used by hostile forces or for controlling explosive devices.
  2. Communication Control systems which enable interception, manipulation and situational awareness.
  3. Communication Detection systems which enable continuous (24/7) detection of unauthorized mobile and wireless devices in critical sites.

The solutions are easy to deploy and control, and provide a user-friendly, clear graphic status on demand.

Drone Detection

Drone Detection techniques are based on continuous analysis of the time & frequency domains by RF sensors. Preloaded spectral signatures of all commercially available drones are used as the system’s database.  During the detection phase, the DroneNet searches for activity patterns corresponding to the stored signatures and alerts once a match is found. The direction of the drone, as well as its type, are determined by the receiving RF sensors and indicated on the system’s C4I.

When trying to detect drones in a spectral-saturated environment, detection time is of the essence. The DroneNet utilizes various SIGINT techniques in order to achieve a reliable yet rapid detection on the one hand and a low rate of false alarms on the other hand, presenting the first phase out of a three steps counter drone solution.

Drone Mitigation

When a drone is detected, the system alerts the operator and initiates mitigation procedures to neutralize the threat. Upon detection the RF jammers block the communication between the drone and its operator on ISM bands, as well as any GPS signals used by the drone.

Each band can be programmed to block either the entire frequency band (broadband) or to be limited to selected channels or active drones’ frequencies. Netline’s DroneNet jammer is composed of 5 bands that cover all potential drone frequencies (433MHz, 900MHz, GPS and Wi-Fi). 

The system’s modular design enables future upgrade and insertion of additional frequencies and threats.

Drone Detection & Localization