← BackCounter-UAS

CoRF vs Jamming: Why Protocol Matters

Sentrycs cyber-over-RF approach compared to traditional RF disruption

4/8/20268 min read

The Fundamental Problem

Most counter-drone systems jam RF frequencies. This works in military zones but is illegal in civilian airspace in most jurisdictions. Sentrycs CoRF takes a fundamentally different approach.

Key Fact
RF jamming is prohibited under FCC regulations in the United States and equivalent bodies in the EU. Only military and certain federal agencies have jamming authority. This makes jamming-based C-UAS systems unusable for 90% of the addressable market.

How CoRF Works

CoRF (Cyber-over-RF) attacks the communication protocol between the drone and its operator — not the RF spectrum itself. It identifies the specific protocol, injects commands, and takes control of the drone.

Technical Detail
CoRF performs real-time protocol analysis across multiple frequency bands simultaneously. Once it identifies the drone-operator link protocol, it injects authenticated commands that the drone accepts as legitimate operator instructions. This is protocol-level interception, not signal-level disruption.

The Legal Advantage

Because CoRF doesn't emit broadband RF energy, it doesn't trigger jamming regulations. This is the single most important architectural decision in the OAS C-UAS stack.

CoRF + Iron Drone: The Complete Stack

CoRF handles drones with active RF links (soft-kill). Iron Drone Raider handles autonomous drones with no RF link (hard-kill via net capture). Together they cover the full threat spectrum.