Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Police Recruit Eagles to Take Out Illegal Drones... Seriously

b2ap3_thumbnail_eagles_for_drones_400.jpgWhile they might seem like glorified toys for adults, drones are fantastic tools that can help people take some breathtaking photos and videos of their local scenery. Unfortunately, as is the case with most good technology, there are people out there who want to use them for nefarious purposes. This leads authorities to a tough question: how do you knock an illegal or dangerous drone out of the sky without harming those down below? The answer is simple: eagles.

That’s right; there are now people in this world that are training eagles to take out illegal drones. The Dutch National Police in the Netherlands are working out ways to effectively terminate illegal drone activity by working with a raptor training company called Guard From Above. They firmly believe that eagles can be taught how to identify drones, capture them, and deliver them safely away from the public. You can see them in action in this video:

Since the drone popularity explosion began, there has been much controversy surrounding the remote-controlled flying machines. There have been stories of drones dropping drug deliveries into prisons, as well as armed drones exploiting semi-automatic weapons or even toting explosives on the frontlines. Another major domestic concern is that of privacy, as drones often come equipped with cameras. Plus, considering how drones can potentially mess with other aircrafts, their use naturally has to be limited in certain places. These reasons are part of why governments want to crack down on the use of drones in unauthorized locations.

If you think about it, hunting illegal drones with eagles would be a great, low-tech way of handling the drone problem. Birds of prey like the bald eagle, golden eagle, and others, are generally at the top of the avian food chain, so what better way to hunt down flying machines than with natural born aerial predators? There are some other ways to do it, like using other drones with nets, shooting them out of the sky, or jamming their sensors, but these tactics are somewhat difficult to maneuver around without endangering people in the nearby vicinity. If trained properly, the Dutch police force seems to think that eagles can snatch drones out of the sky and deliver them safely to the ground without incident.

Still, a common cause for concern is that the drones might, in some way, pose a threat to these birds of prey. What would happen if an eagle were to be hurt by the drone’s propeller blades, or if the drone is weaponized in some way? Should eagles be wearing protective armaments on their talons? While these details are being worked out, it’s likely that the practice of hunting drones with eagles won’t be a set-in-stone practice for some time, though it remains a viable option until proven otherwise.

Still, it seems that eagles are more than capable of taking out drones relatively effectively, though wild eagles are more likely to just see the drone as a threat and knock it out of the sky, rather than make sure it’s delivered to the authorities. Here’s another video that shows a slow-motion attack on a drone from a wedge-tailed eagle in Australia.

These powerfully-built birds of prey are definitely strong enough to stop drones in their tracks, but are they an effective countermeasure to more dangerous variants of drones? Let us know in the comments.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 21 September 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Business Productivity Software Innovation Hackers Cloud Network Security Hardware User Tips Efficiency Internet Malware IT Support Privacy Google Computer Email Workplace Tips Phishing IT Services Collaboration Hosted Solutions Users Ransomware Workplace Strategy Mobile Device Microsoft Small Business Quick Tips Backup Saving Money Cybersecurity Passwords Communication Data Backup Smartphone Managed Service Android Upgrade VoIP Business Management Smartphones Productivity Mobile Devices communications Disaster Recovery Data Recovery Browser Social Media Windows Microsoft Office Managed IT Services AI Current Events Network Tech Term Remote Internet of Things Artificial Intelligence Facebook Automation Covid-19 Miscellaneous Gadgets Cloud Computing Information Holiday Managed Service Provider Remote Work Training Server Outsourced IT Compliance Employee/Employer Relationship Encryption Spam Office Windows 10 IT Support Business Continuity Data Management Government Bandwidth Windows 10 Virtualization Blockchain Wi-Fi Business Technology Mobile Office Data Security Apps Vendor Two-factor Authentication Tip of the week Chrome Mobile Device Management Budget Gmail Apple Networking App Employer-Employee Relationship BYOD Managed Services Voice over Internet Protocol Marketing Conferencing How To WiFi BDR HIPAA Computing Applications Information Technology Hacker Access Control Avoiding Downtime Office 365 Analytics Website Office Tips Augmented Reality Retail Storage Password Bring Your Own Device Managed IT Services Big Data 2FA Operating System Router Virtual Private Network Risk Management Healthcare Computers Health Help Desk Windows 7 Document Management Microsoft 365 Firewall Solutions Telephone Scam Data loss Cooperation The Internet of Things Windows 11 Going Green Patch Management Social Save Money Remote Monitoring Vulnerability Excel End of Support Vendor Management Cybercrime Remote Workers Physical Security Customer Service Display Printer Paperless Office Infrastructure Free Resource Monitoring Project Management Images 101 Outlook Machine Learning Money Saving Time Multi-Factor Authentication Mobility Word Humor Managed IT Service Maintenance Antivirus Sports Downloads Employees Mouse Licensing Integration Safety Entertainment Administration Holidays Data Storage Telephone System Robot Cost Management Supply Chain Settings Video Conferencing Printing Managed Services Provider Wireless Virtual Machines Professional Services Content Filtering IT Management Customer Relationship Management VPN YouTube Meetings Cryptocurrency User Tip Modem Hacking Processor Presentation iPhone Computer Repair Mobile Security Virtual Desktop Data storage LiFi Wireless Technology Vulnerabilities Data Privacy Smart Technology SharePoint IT Assessment Addiction IT Maintenance Electronic Medical Records Language Value Business Intelligence Halloween Chatbots Recovery Flexibility Management Organization Lenovo Screen Reader Hard Drives Shortcuts Writing Distributed Denial of Service Digital Security Cameras Smart Devices Service Level Agreement Domains Ransmoware Virtual Reality Computing Infrastructure Hacks Server Management Memory Vendors Scary Stories Private Cloud Identity Remote Working Superfish Bookmark Data Breach Identity Theft Smart Tech Refrigeration Google Play Be Proactive Fun Twitter Alerts Videos Electronic Health Records Deep Learning Download Public Speaking Workforce Lithium-ion battery Wasting Time Threats Error Browsers Trend Micro Education Connectivity Security Cameras Workplace Strategies Social Engineering Break Fix Entrepreneur Remote Computing Software as a Service Upload Meta Mobile Computing Social Network Managing Costs Amazon Multi-Factor Security eCommerce Tablet IoT Undo SSID Search Dark Web Virtual Assistant Outsource IT Alert Surveillance Best Practice Trends Managed IT Customer Resource management Virtual Machine Environment Buisness File Sharing Regulations Media Dark Data Google Calendar Reviews Legal Data Analysis IT solutions Star Wars Medical IT How To Microsoft Excel Transportation Small Businesses Notifications Staff Development Business Growth Gamification Hypervisor Displays Travel Social Networking Application Legislation Shopping Techology Fileless Malware Optimization Google Maps PowerPoint Cortana Employer/Employee Relationships Outsourcing Wearable Technology Alt Codes Content IBM PCI DSS Health IT Downtime Unified Threat Management Motherboard Navigation Comparison Gig Economy Unified Threat Management Directions Hosted Solution Assessment Workplace Permissions Teamwork Hiring/Firing Internet Service Provider Typing Regulations Compliance Evernote Paperless Network Congestion Specifications Google Drive User Error Microchip Memes Internet Exlporer Competition Co-managed IT Knowledge Fraud SQL Server Technology Care Net Neutrality Username Financial Data History Point of Sale Business Communications 5G Black Friday Smartwatch Google Docs IT Unified Communications Database Scams Experience Azure Hybrid Work Running Cable Tech Support IT Technicians User Procurement Bitcoin Network Management Telework Google Wallet Proxy Server Cyber security Cookies Tech Human Resources Monitors Cyber Monday CES Communitications Tactics Cables Hotspot IP Address Laptop Websites Mirgation Supply Chain Management Windows 8 FinTech Drones Nanotechnology Term Google Apps

Blog Archive