Protecting the asset properly: layered defence and vulnerability-led planning

In the previous articles in this series, the focus has been on planning, understanding the environment, and positioning capability effectively within it.

The next step is to understand what is actually being protected and why not all parts of a site or operation carry the same consequences. This is where Counter-UAS planning needs to move beyond simple perimeter thinking.

Too often, protection strategies are built around site boundaries rather than operational vulnerability. Coverage is designed to “cover the area” without properly considering which assets matter most, which activities carry the greatest risk, or where the operational impact would be most severe if a drone threat succeeded.

In practice, effective Counter-UAS planning is not about protecting everything equally. It is about prioritising protection based on vulnerability and consequence.

Not all assets carry the same risk

Every site contains areas that are more critical than others.

That may include operational control centres, fuel storage, power infrastructure, aircraft movement areas, public gathering points, communications systems, or sensitive operational activity. In some cases, the most important asset may not even be physical infrastructure. It may be an event, a process, or a temporary activity taking place within the site.

A drone intrusion over a low-priority area may have limited operational effect. The same intrusion over a critical function could have significant safety, security, or operational consequences.

Good planning recognises that difference.

This means protection should not be distributed evenly across the environment simply because the geography appears symmetrical. Capability should be weighted towards the areas where the consequences of failure are highest.

The perimeter is not the objective

A common mistake in Counter-UAS planning is treating the perimeter itself as the problem.

Perimeters matter, but they are only one part of the wider picture.

An organisation may have strong coverage around its boundary while still leaving critical internal areas vulnerable. Equally, it may be impossible or impractical to achieve full perimeter coverage due to terrain, infrastructure, urban clutter, or operational constraints.

This is why vulnerability-led planning is more effective than perimeter-led planning.

The key question is not simply, “Can we detect something crossing the boundary?”

The more important question is, “Can we protect the assets and activities that matter most?”

That shift in thinking changes how capability is prioritised and deployed.

Layered defence creates resilience

No single sensor, tracker or effector should be treated as a complete solution.

Effective Counter-UAS planning relies on layers.

Layered defence means structuring capability so that multiple opportunities exist to detect, track and respond to a threat as it moves through the environment. If one layer is degraded, obstructed or bypassed, another remains available.

This improves resilience and reduces reliance on any single point of capability.

In practical terms, layered defence may involve:

The objective is not to create perfect coverage everywhere. It is to create a structure that continues to function even when conditions are not ideal.

Layered defence is not always about more technology

Layered defence does not always mean multiple layers of hardware.

In some environments, capability may be constrained by budget, terrain, infrastructure, availability of equipment or operational practicality. In those situations, understanding where a drone is likely to be launched from can become just as important as the deployment itself.

This is where drone launch site assessments become valuable.

By analysing terrain, access routes, concealment opportunities, standoff distance, and line of sight to the target area, it is possible to identify the locations most likely to be used by a hostile operator. Once those areas are understood, organisations can begin to apply proportionate mitigation measures around them.

That may include targeted patrol strategies, observation points, temporary monitoring activity, or operational procedures designed to disrupt or deter hostile drone activity before it reaches the protected asset.

This is still layered defence. The layers simply extend beyond technology alone.

Good Counter-UAS planning is not always about introducing more equipment. Often, it is about understanding the operational environment well enough to focus existing resources where they are most effective.

Planning for degradation and fallback

Counter-UAS environments are rarely static.

Weather, clutter, terrain, infrastructure, and operational activity all affect performance. Temporary structures may appear. Vehicle movement may change visibility. Urban environments may introduce interference or obstruction that was not present during initial assessment.

Good planning assumes that some degradation will occur.

That is why fallback and redundancy matter. If one area becomes restricted, where does the next layer of visibility or response come from? If one sensor loses effectiveness, where is continuity maintained?

Without that resilience, a deployment may perform well under ideal conditions but struggle during real-world operations.

Matching capability to consequence

A vulnerability-led approach also helps organisations make better decisions about resource allocation.

Not every asset requires the same level of protection. Not every area justifies the same density of coverage.

By understanding consequence properly, organisations can focus capability where it delivers the greatest operational value.

That creates a more balanced and defensible posture. It avoids spreading capability too thinly across low-priority areas while leaving genuinely critical assets exposed.

This becomes particularly important for large or complex sites where full uniform coverage may not be realistic or proportionate.

From geography to operational effect

Good Counter-UAS planning is about operational effect, not map coverage.

A deployment may appear comprehensive visually, but if it does not align with vulnerability and consequence, it may still leave the organisation exposed in the areas that matter most.

This is why vulnerability-led planning is so important.

It forces the discussion away from simply covering space and towards understanding operational priorities, risk, and consequence. It ensures capability is aligned to what genuinely needs protecting rather than being distributed evenly for the sake of appearance.

That is where layered defence becomes effective. Not as a collection of disconnected systems, but as a structured response built around the mission, the environment, and the vulnerability of the protected asset.

In the final article in this series, the focus will move to friendly UAS operations, deconfliction and the challenge of balancing defensive Counter-UAS postures with legitimate drone activity in the same environment.

If you would like to explore the planning challenge further, we would be very happy to discuss the problem in more detail and, where useful, arrange a demo. Call +44 (0)1794 834750 or email enquiries@cunningrunning.co.uk. You can also follow Cunning Running Software Ltd on LinkedIn, or connect with Phil Cowell or John Overend.