Skip to content

How Drone Swarms Work—From Iran’s Shahed Attack to Ukraine’s Operation Spiderweb

Technology
1 1 0
  • Six hours after Israel’s air strikes in Iran last Friday, farmers in Iraq could have looked up and seen Iranian drones traveling west: more than 100 of them flew on a 1,700-kilometer journey to Israel, with their propellers buzzing like Weedwackers.

    Among them was the Shahed-136. Composed mostly of foam and plywood, each Shahed-136 drone is 3.5 meters long and has a 2.5-meter wingspan and a 40- to 50-kilogram warhead at its nose. The drone’s “brain,” a sensor the size of a cough drop, measures every movement while a credit-card-sized GPS onboard listens for microwave chirps from navigation satellites. The Shahed’s route (its waypoints in latitude, longitude and altitude) is uploaded before a booster rocket fires it into the sky. And it is loud: its 50-horsepower motor is slightly more potent than that of a 1960s Volkswagen Beetle and would be as noisy as a lawn mower or a moped at full throttle—now multiplied by 100 in what military strategists sometimes refer to as a rudimentary swarm.

    Iran’s recent launch of drones at Israel—or Russia’s use of them against Ukraine, where Shahed drones are nicknamed “flying mopeds”—the swarm’s power is in its numbers. One missile with a similar range can cost upward of $1 million, but a Shahed can be knocked together for $20,000 to $50,000. Iran’s Islamic Revolutionary Guard Corps (IRGC) fires them from portable rails or from racks on trucks, and the small pulse rocket on the bottom of each drone slams it to cruise speed before falling off. The Center for Strategic and International Studies describes such drone salvos as tools “used as much to saturate air defenses as they are to attack targets, cluttering radar screens and forcing command centers to make decisions about where to fire their more capable surface-to-air missiles,” exactly the situation Israel faced.

    Last Friday, as the more than 100 Iranian drones flocked toward Tel Aviv and were shot down by fighter jets, Israel’s Iron Dome air defense system and a U.S. Navy destroyer in the Mediterranean, they couldn’t adjust their course based on what was happening on the battlefield.

    The Shahed, which means “Witness” in Persian, is generally a “fire and forget” drone: it cannot transmit information back or receive updated trajectories (though it is often modeled in different ways, and some Shahed drones used by Russia have reportedly had communication equipment). Rather the swarmlike power of such attacks is based in their cost: in the one late last week, the IRGC could afford to fire drones in a wave so dense that fighter pilots, radar operators and Iron Dome crews had to sort through a moving cloud of identical radar blips.

  • 0 Stimmen
    1 Beiträge
    0 Aufrufe
    Niemand hat geantwortet
  • 892 Stimmen
    179 Beiträge
    3 Aufrufe
    K
    Most jokes need to be recognizable as funny? Like if you say the word cucked, ever, I'm going to assume you're serious and an imbecile and I would be right to do that, no?!
  • 694 Stimmen
    140 Beiträge
    0 Aufrufe
    H
    Maybe I don't want you to stop, big boy.
  • 456 Stimmen
    48 Beiträge
    9 Aufrufe
    L
    That's good to know, thanks.
  • 1 Stimmen
    2 Beiträge
    4 Aufrufe
    A
    If you're a developer, a startup founder, or part of a small team, you've poured countless hours into building your web application. You've perfected the UI, optimized the database, and shipped features your users love. But in the rush to build and deploy, a critical question often gets deferred: is your application secure? For many, the answer is a nervous "I hope so." The reality is that without a proper defense, your application is exposed to a barrage of automated attacks hitting the web every second. Threats like SQL Injection, Cross-Site Scripting (XSS), and Remote Code Execution are not just reserved for large enterprises; they are constant dangers for any application with a public IP address. The Security Barrier: When Cost and Complexity Get in the Way The standard recommendation is to place a Web Application Firewall (WAF) in front of your application. A WAF acts as a protective shield, inspecting incoming traffic and filtering out malicious requests before they can do any damage. It’s a foundational piece of modern web security. So, why doesn't everyone have one? Historically, robust WAFs have been complex and expensive. They required significant budgets, specialized knowledge to configure, and ongoing maintenance, putting them out of reach for students, solo developers, non-profits, and early-stage startups. This has created a dangerous security divide, leaving the most innovative and resource-constrained projects the most vulnerable. But that is changing. Democratizing Security: The Power of a Community WAF Security should be a right, not a privilege. Recognizing this, the landscape is shifting towards more accessible, community-driven tools. The goal is to provide powerful, enterprise-grade protection to everyone, for free. This is the principle behind the HaltDos Community WAF. It's a no-cost, perpetually free Web Application Firewall designed specifically for the community that has been underserved for too long. It’s not a stripped-down trial version; it’s a powerful security tool designed to give you immediate and effective protection against the OWASP Top 10 and other critical web threats. What Can You Actually Do with It? With a community WAF, you can deploy a security layer in minutes that: Blocks Malicious Payloads: Get instant, out-of-the-box protection against common attack patterns like SQLi, XSS, RCE, and more. Stops Bad Bots: Prevent malicious bots from scraping your content, attempting credential stuffing, or spamming your forms. Gives You Visibility: A real-time dashboard shows you exactly who is trying to attack your application and what methods they are using, providing invaluable security intelligence. Allows Customization: You can add your own custom security rules to tailor the protection specifically to your application's logic and technology stack. The best part? It can be deployed virtually anywhere—on-premises, in a private cloud, or with any major cloud provider like AWS, Azure, or Google Cloud. Get Started in Minutes You don't need to be a security guru to use it. The setup is straightforward, and the value is immediate. Protecting the project, you've worked so hard on is no longer a question of budget. Download: Get the free Community WAF from the HaltDos site. Deploy: Follow the simple instructions to set it up with your web server (it’s compatible with Nginx, Apache, and others). Secure: Watch the dashboard as it begins to inspect your traffic and block threats in real-time. Security is a journey, but it must start somewhere. For developers, startups, and anyone running a web application on a tight budget, a community WAF is the perfect first step. It's powerful, it's easy, and it's completely free.
  • 272 Stimmen
    80 Beiträge
    4 Aufrufe
    S
    that sub seems to be fully brigaded by bots from marketing team of closed-ai and preplexity
  • 112 Stimmen
    34 Beiträge
    4 Aufrufe
    fredselfish@lemmy.worldF
    Nlow that was a great show. I always wanted in on that too. Back when Radio Shack still dealt in parts for remote control cars.
  • 0 Stimmen
    2 Beiträge
    2 Aufrufe
    P
    It's a shame. AI has potential but most people just want to exploit its development for their own gain.