top of page

Contact

info@mowadefense.com

+38 099 131 45 68 (WhatsApp, Signal

Address

Kyiv, Ukraine

Follow

© 2024 by MOWA

MOWA 2024

  • Writer's pictureMOWA

Lessons learned from the attempt on Presidential Candidate Trump's life and the use of drones in event security

On July 13, 2024, during a rally in Butler, Pennsylvania, an assassination attempt was made on presidential candidate Donald Trump. The assailant, Thomas Matthew Crooks, a 20-year-old from Bethel Park, Pennsylvania, armed with a semiautomatic AR-style rifle, took a position on a rooftop about 400 feet (approximately 120 meters) from the stage. The attack resulted in Trump being injured in the ear, causing panic among the attendees. One person was killed, and two others were critically injured. The Secret Service ultimately neutralized the assailant.

 

Incident Timeline

Based on information from CNN and Fox News, the following timeline outlines the critical events of the assassination attempt:



  • 7:05 PM: Donald Trump takes the stage and starts his speech. The atmosphere is initially energetic and supportive.

  • 7:15 PM: As Trump continues his speech, an assailant on a rooftop approximately 200 meters from the stage begins to set up his position. The assailant is armed with an AR rifle.

  • 7:20 PM: Attendees and security personnel need to be made aware of the threat as the rally proceeds without incident.

  • 7:30 PM: The assailant fires multiple shots towards the stage. Trump is struck in the ear, causing immediate panic among the crowd.

  • 7:31 PM: Secret Service agents swiftly react by evacuating Trump and securing the area. A chaotic scene unfolds as attendees scramble for cover.

  • 7:32 PM: One rally attendee is killed, and two others are critically injured as the shots continue.

  • 7:33 PM: The Secret Service identifies the shooter's position and neutralizes the threat. The shooter is confirmed dead shortly after.

  • 7:35 PM: Emergency medical services arrive to treat the injured. Trump is quickly moved to a secure location and then to a hospital for treatment of his ear injury.

  • 8:00 PM: Law enforcement thoroughly investigates the scene, collecting evidence and interviewing witnesses.

The FBI and local law enforcement agencies secure the area and continue their investigation, including the assailant's background and motives. Political leaders, including President Biden, condemn the violence and emphasize the need for unity and enhanced security measures at public events.


 

Current Security Shortcomings

  • Inadequate Aerial Surveillance

    • Existing cameras and ground patrols must adequately monitor elevated positions like rooftops.

    • Fixed cameras and stationary guards could not cover all angles, leaving blind spots.

  • Limited Field of Vision

    • Ground patrols and cameras had limited visibility, failing to monitor critical zones.

    • Ineffective use of modern surveillance technology to cover all possible angles and heights.

  • Delayed Response

    • Static security measures could not adapt to the assailant's movements.

    • The lack of flexible and mobile surveillance units left critical areas unchecked.


 

Using Drones to Enhance Security: A Promising Future


Enhanced Surveillance Capabilities

Drones provide continuous and comprehensive monitoring by covering large areas and tracking movements from an aerial perspective. This ensures that no area, including rooftops and other high vantage points, is left unchecked.


  1. Rooftop and Elevated Position Patrolling

    1. Drones can patrol rooftops and other elevated positions to identify potential threats before they materialize.

    2. Equipped with thermal imaging, drones can identify individuals in restricted areas, serving as an early warning system for security teams.

  2. Crowd Monitoring

    1. Drones offer an aerial view of the crowd, identifying unusual movements or behaviors that could indicate a potential threat.

    2. This bird's-eye view helps security personnel monitor large gatherings more effectively than ground-based methods.


Real-Time Data Transmission

Drones can transmit real-time data to security teams, enabling rapid response to emerging threats and improving overall situational awareness. This real-time feed is crucial for quick decision-making and effective deployment of security personnel.


Cost Efficiency Compared to Helicopters

Drones are significantly cheaper to operate and maintain compared to helicopters. They require less fuel, fewer personnel, and lower maintenance costs. This cost efficiency makes drones a more viable option for continuous surveillance and event security.


Weather Resistance and Limitations

While drones offer significant advantages, their use can be limited by weather conditions. However, modern drones are increasingly weather-resistant. For instance, the DJI M300 RTK drone has demonstrated resilience against harsh weather conditions, including heavy rain and strong winds. This capability ensures that drones can operate effectively in various environments, maintaining surveillance and monitoring functions without interruption.


DJI M300 RTK
DJI M300 RTK

Alternative: Balloon-Based Surveillance Systems

Balloons equipped with surveillance cameras can provide long-term, stable monitoring from high altitudes. These systems can be tethered to specific locations, offering continuous observation without the need for frequent repositioning.


 

Regulatory Challenges

Deploying drones in the U.S. must comply with Federal Aviation Administration (FAA) regulations, which include restrictions on flying over people, beyond visual line-of-sight, and in restricted airspace. These regulations can pose challenges but can be managed through waivers and close coordination with the FAA. Public safety agencies may have more flexibility under Certificates of Waiver or Authorization (COAs).


 

Training and Coordination

  • Regular Training

    • Security personnel should undergo regular training on drone operations and data interpretation to maximize the effectiveness of drone surveillance.

    • Familiarity with the technology will ensure they can respond quickly and effectively to any threats identified by drones.

  • Coordinated Response

    • Integrating drones into security protocols requires seamless coordination between drone operators and ground security teams to ensure rapid and effective responses.

    • This coordination is essential for translating drone-detected data into actionable security measures.


 

Conclusion: The assassination attempt on presidential candidate Trump highlights the need for enhanced security measures at high-profile events. Integrating drones into security protocols can significantly improve surveillance and threat detection capabilities. By leveraging the advantages of drone technology, security teams can better protect VIPs and prevent security incidents at public events in the future.

Comments


bottom of page