THE AGGRESSOR COUNTRY HAS CHOSEN THE TACTIC OF DESTROYING INFRASTRUCTURE FACILITIES WITH KAMIKAZE DRONES AND OTHER LOW-SPEED AERIAL VEHICLES.
Currently, there is a threat to the following facilities:
• power generation;
• gas supply;
• water supply;
• financial services;
• transport, logistics etc.
According to the classification, there are more than 500,000 critical infrastructure facilities of various categories in Ukraine.
Since the beginning of the war, according to the State Emergency Service of Ukraine, 21,779 critical infrastructure facilities and buildings have been completely destroyed, and almost 140,000 have been partially destroyed.
Who can protect a critical infrastructure facility?
The Ukrainian Armed Forces are performing combat missions at the frontlines and cannot effectively organise the defence of facilities in the interior.
These tasks can be conducted by:
• National Guard of Ukraine;
• Units of Territorial Defence Forces;
• Equipped facility security units.
How to organise this?
To implement the unified platform for protecting critical infrastructure that includes the following components:
Radar early warning subsystem

Intelligent multi-layered acoustic sensor system "FENEK", which detects and identifies targets at low altitudes

The "VENATOR" subsystem , for UAV destruction

Fires active countermeasures

Multifunctional video surveillance subsystem

A subsystem for managing, visualising and analysing the overall
security status of critical infrastructure facilities
What does it look like?
Acoustic sensors
Video surveillance
subsystem

How does it work?
1
Radiolocation system located outside the facility detects targets at a distance of up to 30 km..

2
Multi-layered acoustic sensor system "FENEK" determines azimuth and elevation and identifies the target.

3
Video surveillance subsystem provides visual and thermal round-the-clock surveillance

4
6
Information from the radiolocation, acoustic and video surveillance system is transferred to the control, visualisation and analysis subsystem.

Simultaneously, all information about the target and its trajectory is transferred to the tablets of the security units equipped with small arms.

5
Information is processed automatically, gives a command to the UAV destruction subsystem, and is transferred to ADA units and others equipped with anti-aircraft weapons and small arms.