Saturday, July 26, 2025
Advertise with us
Support us
Write for us
No Result
View All Result
claws
  • Home
  • About Us
    • Director General
    • Additional Director General
    • Jottings by Director General Emiritus
    • CLAWS Membership
    • Faculty
  • Publication
    • Web Articles
    • Issue Briefs
    • Manekshaw Papers
    • Newsletter
    • CLAWS Journal
    • Scholar Warrior
    • Books
    • Essay
    • Intern Articles
    • External Publications
  • Research Areas
    • Global & Regional Security
      • China
      • Pakistan
      • Afghanistan
      • South Asia
      • Indo Pacific
      • US, EU & Russia
      • MENA
      • CAR
    • National Security
      • National Security Strategy
      • Nuclear Deterrence
      • Non Traditional Threats
      • Intelligence
      • Terrorism & Internal Security
      • Grey Z & IW
      • Security Laws
    • Military Studies
      • Military Doctrine
      • Military Strategy
      • Peace Keeping Ops
      • Military History
      • Military Logistics
      • Out of Area Contingency Ops
      • Leadership
    • Military Technology & Defence Acquisition
      • Military Technology
      • Defence Acqn
      • Budgets & Finance
      • Defence Infrastructure
      • Human Resources
    • Multi Domain Studies
      • Jointmanship & Integration
      • Space
      • Cyber
      • Spl Operations
      • Energy & Environment
      • Defence Eco System
      • Defence Diplomacy
      • HADR
  • Web Archive
  • Events
    • Seminars
    • Webinars/RTD
  • PROMEX
  • University Cell
    • About The Initiative
    • Admission: Eligibility and Procedure
    • Important Information
    • Administration
    • Guides | Supervisors
  • Careers
  • Contact
  • Home
  • About Us
    • Director General
    • Additional Director General
    • Jottings by Director General Emiritus
    • CLAWS Membership
    • Faculty
  • Publication
    • Web Articles
    • Issue Briefs
    • Manekshaw Papers
    • Newsletter
    • CLAWS Journal
    • Scholar Warrior
    • Books
    • Essay
    • Intern Articles
    • External Publications
  • Research Areas
    • Global & Regional Security
      • China
      • Pakistan
      • Afghanistan
      • South Asia
      • Indo Pacific
      • US, EU & Russia
      • MENA
      • CAR
    • National Security
      • National Security Strategy
      • Nuclear Deterrence
      • Non Traditional Threats
      • Intelligence
      • Terrorism & Internal Security
      • Grey Z & IW
      • Security Laws
    • Military Studies
      • Military Doctrine
      • Military Strategy
      • Peace Keeping Ops
      • Military History
      • Military Logistics
      • Out of Area Contingency Ops
      • Leadership
    • Military Technology & Defence Acquisition
      • Military Technology
      • Defence Acqn
      • Budgets & Finance
      • Defence Infrastructure
      • Human Resources
    • Multi Domain Studies
      • Jointmanship & Integration
      • Space
      • Cyber
      • Spl Operations
      • Energy & Environment
      • Defence Eco System
      • Defence Diplomacy
      • HADR
  • Web Archive
  • Events
    • Seminars
    • Webinars/RTD
  • PROMEX
  • University Cell
    • About The Initiative
    • Admission: Eligibility and Procedure
    • Important Information
    • Administration
    • Guides | Supervisors
  • Careers
  • Contact
No Result
View All Result
CLAWS
No Result
View All Result
Home Articles

Reinventing Border Management: Drone Threat in Border Areas

Lt. Gen. Rakesh Sharma PVSM,UYSM,AVSM,VSM (Retd.)byLt. Gen. Rakesh Sharma PVSM,UYSM,AVSM,VSM (Retd.)
October 4, 2019
in Articles
A A
0
Post Views: 92

On 14 September 2019 at 4.00am, Saudi Arabia suffered a deadly attack on its oil facility at Abaqiq and Khurais oil field, with, as stated, swarm of 18 small drones and seven cruise missiles.   Very highly protected and fortified facilities, in addition to armed guards, the area had six battalions of Patriot Defence Systems, Oerlikon GDF 35mm cannons equipped with the Skyguard radar and Surface to Air Missiles (SAM). The targets were designated with pin point accuracy and hence the strikes were most effective. It destroyed nearly 50 per cent of the country’s global supply of crude. The crude prices rose sharply in the international market that saw the US Secretary of State proclaiming it was an ‘Act of War’.  By exactitude the perpetrators were unidentified, even the trajectory of the flights of the missiles and drones could not be ascertained; only remnants of a Quds1 missile (linking it to Yemen) were displayed.  The conjectures are aplenty – from drone swarms, to cruise missiles, to stealth aircraft and even ground action!  This is also fallout of the usage of this modern war weaponry – plausible deniability!

Is this methodology of using drones as offensive weapons new? In 2015, a man protesting Japan’s nuclear policy dropped a drone carrying radioactive sand from the Fukushima nuclear disaster onto the Prime Minister’s office premises, though the amount of radiation was minimal.  In January 2015, a drone crashed onto the White House lawn after its operator lost control, prompting concerns that the US President’s residence may be vulnerable.   In July 2018, in the UAE, terrorists claimed to have sent an armed drone to attack the international airport in Abu Dhabi, the capital of the United Arab Emirates, a claim denied by the authorities. In August 2018, a failed assassination attempt against Venezuelan President Nicolás Maduro was mounted with explosive-armed drones in Caracas during a televised national event. The drones detonated explosives above the audience, which led to a few injuries. There had been previously too reports of drone strikes by the Yemeni Houthis against Saudi Arabian targets.  In March 2017, the BBC quoted US Gen David Perkins in a symposium that a Patriot missile – usually priced at about $3m – was used to shoot down a small quadcopter drone that costs US $200 at Amazon.com!

The major one was in Jan 2018, when mysteriously a swarm of ten drones rigged with explosive devices descended over Russia’s Hmeimim air base in Syria while a further three targeted the Russian Naval CSS point in the nearby city of Tartus.  Russia claimed to have shot down some of the 13 drones, and used electronic countermeasures to safely bring down the others, and that no serious damage was caused.

Closer home, between 09 and 16 Sep 2019, in Punjab, high alert has been sounded after multiple (stated to be ten) drones flew from across the border in Pakistan to drop arms and ammunition. In ten days attempts were made to drop AK-47 rifles, counterfeit currency and narcotics, from Pakistan. Previously too Punjab Police had recovered of a crashed ‘Hexacopter Drone’ on 13 August 2019 from Mohawa village in Amritsar district – a mere 1.5 kms from the Indo-Pak border.

India as a nation with its very large population is vulnerable internally too, with inimical elements seeking to avail of opportunities for disruption. A data estimation study stated that over 6 lakh unregulated drones, of various sizes and capacities are present within the country and anyone of them can be used for launching a nefarious act by disruptive elements. However, this is a subject of another analysis, and this paper will restrain itself and delve into threats in border areas.

With the intransigent attitude of the Pakistan, the border areas are greatly susceptible to this fast emerging and potent threat. In the border areas, the drones could be utilised for surveillance, spying and tracking, to electronically send video, images and other data to enable spatial reconstruction, reconnaissance and tracking movements.  These can also cause physical attacks, drop dangerous explosive payload, weapons and ammunition and even subversive literature. As is evident in Punjab, it is feasible to smuggle in contraband like fake foreign currency and drugs using drones. These can be nano, micro, small, medium and large based on their weight, or their threat or damage potential.

The first and basic issue is detection of drones, which are much harder to detect that manned aircraft, especially if they fly below the radar envelope.  There are varied of methods that can be utilized like human observers (sentries or villagers), who can use their smart phones to capture photos of detected drones and obtain confirmation from a centralized database. Radio Frequency (RF) scanners and spectrum analysers are primarily used to detect drone radio signatures by detecting bands that are known to be used by drones and other radio signatures. In dark conditions, thermal cameras and electro-optical gadgets can be very effective. Acoustic/ aural detection methods use microphone array to detect drones by analyzing the noise of the rotors, and these are not dependent on the line of sight or the size of the drone. Monostatic radar (transmitter and receiver) is a method of drone detection, which can detect the electromagnetic waves (EM) reflected from objects in order to determine a drone’s range, speed, and velocity. However, the detection of the smallest consumer drones requires high frequency radar system, and for distinguishing between a drone and a bird, machine learning algorithms will have to be utilised.

Second important issue is of interdicting unauthorized drones and neutralizing their threat. Most of the methods being contemplated are either physical interdiction like a close-in weapon system to shoot to kill or exploit vulnerabilities in the communication systems of drones, which we can be termed as hacking.  Sensor based interdiction (also called spoofing) can be used against drones containing motion sensors, gyroscopes, obstacle avoidance sensors, camera sensors and many others used for various flight functions.  This would typically disrupt or spoof the sensor outputs of the drone to receive error signals and the drone is likely to either crash or activate an internal safety manoeuvre to land safely. Spoofing the GPS to force a drone to change its preprogrammed mission plan to another safe one is also a common interdiction methodology. The RF jamming guns typically disrupt transmission of radio signals communications between the drone operator and the drone thus breaking the communication link and initiating a default “return to home” or a “stand-by” and hence neutralising the threat.

The all important question that emanates is whose task it is to detect and destroy the unwarranted intrusion of the drones from across the borders, in peace and during hostilities in India.  The responsibility for manning and guarding borders in peace time is of Central Armed Police Forces (BSF and ITBP), and in war is of the Armed Forces. Obviously, division between peace and war has been blurred; the case in point is the drones that carried war-like stores into Punjab recently.

The threat is so omnipresent and omnipotent and a newer manifestation, that a planned system must not be delayed inordinately. Hence, there is need to reinvent the border management aspects that deal with the threat that emanates from UAVs. Indian Army and Airforce have to undertake conjoined planning to this end.  Following pathways are proffered:

  • The Regiment of Artillery is responsible for Surveillance and Target Acquisition (SATA), deployed as units and subunits, under field formations. This systemic has outlived its utility. Dissolving the existing system of SATA units, it is recommended that the border areas be divided into SATA sectors that are permanently allocated responsibility – as an example, from River Ravi to NH1 and NH1 to River Sutlej.  This permanence will be most advantageous for sectoral specialization, in creation of data bases that can be electronically correlated, and deciphered. The movement of SATA units to differing operating environments will stand obviated, and with hybrid detection equipment and sensors, real time information will be generated. The transition to war scenario will also be seamless.
  • In addition to physical (sentries and villagers), detection should be in real time organised in a gridded system with multi-modal sensor utilisation.
  • A border-secure Air Defence / electronic warfare (EW) sectoral environment of permanent nature will be of immense advantage for targeting. This will involve direct kill using ground/ air based weapons and air defence. The EW establishments must be equipped with a system of jamming/ neutralising the terminal guidance.
  • A secure communication and decision support system will be mandatory to link between detectors, destroyers and decision makers in peace and during war in a seamless manner, with requisite data base that will correlate in real time.

In sum, the threat from drones and their swarms is real, very serious and on the head – that is immediate.  This mandates re-invention of border management and taking over this responsibility by the army and airforce in coordination with border guarding forces and even local inhabitants.  We have to accept the challenge in all manifestations and work to deny advantage to the adversary. The threat cannot be allowed to be shackled by battle of the turf among multitude of agencies, or on human resource management issues.

Tags: Bio-TechnologyBorder ManagementDronesIndia’s National Security Challenges
Previous Post

Geo-Political and Technological Trends and Evolving Security Paradigms

Next Post

Northeast India: A Path to Regional Connectivity

Lt. Gen. Rakesh Sharma PVSM,UYSM,AVSM,VSM (Retd.)

Lt. Gen. Rakesh Sharma PVSM,UYSM,AVSM,VSM (Retd.)

Next Post

Northeast India: A Path to Regional Connectivity

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Support Us Donate Now

Web Updates

List of Shortlisted Officers / Candidates: PhD Batch – 7

Field Marshal Manekshaw Essay Competiton 2025

Guidelines to Publish with CLAWS

Summer Internship Capsule 2025

Application Form – Study Mtrl for DSSC 2025

[NEW] Application Form for membership for PROMEX (PART B or D)

  • Trending
  • Comments
  • Latest

Summer Internship Capsule 2025

April 8, 2025
Results | Field Marshal Manekshaw Essay Competition – 2024

Field Marshal Manekshaw Essay Competiton 2025

May 23, 2025
Op Sindoor 2.0: Why & How India Must Prepare for the Next Round?

Op Sindoor 2.0: Why & How India Must Prepare for the Next Round?

May 21, 2025
DefAI: Cyber & AI Frontiers for Defence | The Third Cyber Workshop from CLAWS & HACKTIFY

DefAI: Cyber & AI Frontiers for Defence | The Third Cyber Workshop from CLAWS & HACKTIFY

June 9, 2025

Front Organisations: The Valley’s Homegrown ‘Resistance’ or Pakistan’s Evolving Terrorism Tactics?

2
DefAI: Cyber & AI Frontiers for Defence | The Third Cyber Workshop from CLAWS & HACKTIFY

DefAI: Cyber & AI Frontiers for Defence | The Third Cyber Workshop from CLAWS & HACKTIFY

2
Great Power Rivalry in the Arctic and India

Great Power Rivalry in the Arctic and India

2

Clausewitz, pagers, and the evolving art of supply chain attacks

1
Operation Sindoor and India’s Future Warfighting Readiness: Lessons Learnt

Operation Sindoor and India’s Future Warfighting Readiness: Lessons Learnt

July 23, 2025
Strategic Intelligence for Strategic Outcomes: Operation Rising Lion an instructive case study for Indian Security Establishment to invest in Contemporary Intelligence Capabilities

Strategic Intelligence for Strategic Outcomes: Operation Rising Lion an instructive case study for Indian Security Establishment to invest in Contemporary Intelligence Capabilities

July 23, 2025
Opinion | Trump, India, Pahalgam: When Terrorists Are Easier To Deal With Than Tariffs

Opinion | Trump, India, Pahalgam: When Terrorists Are Easier To Deal With Than Tariffs

July 22, 2025
Unmasking LAMEHUG: APT28’s AI-Fuelled Cyber Offensive Against Ukraine

Unmasking LAMEHUG: APT28’s AI-Fuelled Cyber Offensive Against Ukraine

July 21, 2025

Popular Stories

  • Summer Internship Capsule 2025

    0 shares
    Share 0 Tweet 0
  • Field Marshal Manekshaw Essay Competiton 2025

    0 shares
    Share 0 Tweet 0
  • Op Sindoor 2.0: Why & How India Must Prepare for the Next Round?

    0 shares
    Share 0 Tweet 0
  • DefAI: Cyber & AI Frontiers for Defence | The Third Cyber Workshop from CLAWS & HACKTIFY

    0 shares
    Share 0 Tweet 0
  • Pahalgam Response: Why India Must Fight Smart?

    0 shares
    Share 0 Tweet 0

About us

CLAWS

The Centre for Land Warfare Studies (CLAWS), New Delhi, India is an independent think tank on strategic studies and land warfare. The mandate of CLAWS covers national security issues, conventional military operations and sub-conventional warfare.

Follow Us

Browse by Category

  • Articles
  • Autumn 2019
  • Autumn 2020
  • Books
  • CLAWS Focus
  • CLAWS Journal
  • Essay
  • Events
  • External Publications
  • FMMEC
  • Intern Articles
  • Issue Briefs
  • Jottings by Director General Emiritus
  • Manekshaw Papers
  • Newsletter
  • Round Tables
  • Scholar Warrior
  • Seminars
  • Uncategorized
  • Web Updates
  • Winter 2019
  • YouTube Podcast

Recent News

Operation Sindoor and India’s Future Warfighting Readiness: Lessons Learnt

Operation Sindoor and India’s Future Warfighting Readiness: Lessons Learnt

July 23, 2025
Strategic Intelligence for Strategic Outcomes: Operation Rising Lion an instructive case study for Indian Security Establishment to invest in Contemporary Intelligence Capabilities

Strategic Intelligence for Strategic Outcomes: Operation Rising Lion an instructive case study for Indian Security Establishment to invest in Contemporary Intelligence Capabilities

July 23, 2025
  • Site Map
  • Tenders
  • Advertise With Us
  • Terms of use
  • Privacy Policy
  • Other Think Tanks

© 2008-2024 Centre for Land Warfare Studies (CLAWS).

No Result
View All Result
  • Home
  • About Us
    • Director General
    • Additional Director General
    • Jottings by Director General Emiritus
    • CLAWS Membership
    • Faculty
  • Publication
    • Web Articles
    • Issue Briefs
    • Manekshaw Papers
    • Newsletter
    • CLAWS Journal
    • Scholar Warrior
    • Books
    • Essay
    • Intern Articles
    • External Publications
  • Research Areas
    • Global & Regional Security
      • China
      • Pakistan
      • Afghanistan
      • South Asia
      • Indo Pacific
      • US, EU & Russia
      • MENA
      • CAR
    • National Security
      • National Security Strategy
      • Nuclear Deterrence
      • Non Traditional Threats
      • Intelligence
      • Terrorism & Internal Security
      • Grey Z & IW
      • Security Laws
    • Military Studies
      • Military Doctrine
      • Military Strategy
      • Peace Keeping Ops
      • Military History
      • Military Logistics
      • Out of Area Contingency Ops
      • Leadership
    • Military Technology & Defence Acquisition
      • Military Technology
      • Defence Acqn
      • Budgets & Finance
      • Defence Infrastructure
      • Human Resources
    • Multi Domain Studies
      • Jointmanship & Integration
      • Space
      • Cyber
      • Spl Operations
      • Energy & Environment
      • Defence Eco System
      • Defence Diplomacy
      • HADR
  • Web Archive
  • Events
    • Seminars
    • Webinars/RTD
  • PROMEX
  • University Cell
    • About The Initiative
    • Admission: Eligibility and Procedure
    • Important Information
    • Administration
    • Guides | Supervisors
  • Careers
  • Contact

© 2008-2024 Centre for Land Warfare Studies (CLAWS).