On the night of January 12 into January 13 Ukrainian defenses reported destroying or suppressing roughly 240 strike drones as part of a much larger combined missile and drone barrage. Major outlets and Ukrainian briefings put the scale at roughly 293 strike UAVs launched and about 240 drones neutralized alongside a small number of missiles.
Numbers alone do not explain the result. The operational story is layered. Kinetic interceptors and mobile fire groups stopped many vehicles at close range. Simultaneously, electronic warfare systems and networked countermeasures suppressed a large fraction of the incoming swarm, causing loss of control, navigation failure, or early termination for dozens to hundreds of vehicles. Public reporting and technical analysis from the field show that EW was a material contributor to the high attrition rate that night.
What EW tools were in play and why they work
1) Massed, synchronized jamming and selective suppression. Ukraine has been moving from stand alone jammers toward coordinated networks that can time-align transmissions and shape coverage over a theater. That network approach matters because modern GNSS resistant receivers and multi element antennas require stronger, angle-diverse interference to be suppressed. When jammers act in concert they increase the probability of denying satellite navigation or overwhelming narrowband command links across multiple approach axes. Field reporting and program descriptions of Ukraine’s recent EW networking efforts support this model.
2) GNSS jamming plus spoofing tradecraft. Older Shahed-style loitering munitions rely heavily on satellite navigation aided by an inertial measurement unit. Jamming denies the satellite fix and forces reliance on the inertial backup which drifts quickly. Spoofing, where a false but plausible GNSS signal is injected, can subtly move a vehicle off target without requiring high instantaneous power. Ukraine has developed spoofing concepts at scale that force these systems to miss or divert. Forbes and other technical reporting have documented Pokrova style spoofing experiments and the doctrinal emphasis on spoofing as a theater tool.
3) Command and control link disruption. Many strike drones remain tethered to telemetry, command, or telemetry relay links via 3G/4G modems, short range datalinks, or satellite channels. Targeting those links with narrowband or protocol-aware jamming can sever operator control or degrade situational awareness for the swarm commander. Technical write ups and reverse engineering of recovered systems show an increasing reliance on cellular modems and low-cost single board computers in some Russian-launched types, which are vulnerable to these kinds of attacks.
4) Exploiting inertial limits and sensor gaps. Modern GNSS resistant navigation stacks still depend on INS to bridge GNSS outages. INS errors integrate quickly without frequent GNSS updates. EW that denies GNSS for tens of seconds to minutes can push a loitering munition beyond acceptable targeting accuracy. That is a simple physics vulnerability that even modest jamming can exploit at scale. Analysis of Shahed family guidance packages and field results underline this weak point.
5) Integration with detection and shooter networks. EW does not operate in a vacuum. Acoustic detectors, radar nets, and human observers cue mobile fire groups and missiles. The jamming layer buys time and shapes the swarm, making kinetic interception more effective and reducing salvo saturation risk. IEEE and open source reporting on Ukraine’s Atlas and detection initiatives outline how sensor-to-shooter chains and automated jamming allocation improve whole-of-defence outcomes.
Why the 240 figure is plausible, technically speaking
When a large salvo is launched the attacker counts on saturation and redundancy. If a defender can apply three effects at scale — detect early, jam or spoof comms and navigation en masse, and place mobile shooters into intercept windows — the cumulative kill probability rises quickly. Jamming and spoofing do not need to physically destroy a drone to neutralize it. For many loitering munitions, denial of navigation or command for a short interval is sufficient to convert a precision strike into a miss or to induce an early crash. The combination of these layers explains how the defenders could credibly claim suppression of around 240 drones that night.
What the attackers are doing to blunt EW
Russia has not been static. Recovered drones have shown upgraded multi element CRPA style antennas, higher channel-count GNSS receivers, and in some variants on board compute and comms that let the vehicle navigate or re-plan without a continuous satellite fix. Reports indicate incorporation of Chinese produced antennae and even commodity single board computers and cellular modems to give autonomy and alternative PNT inputs. Those changes raise the bar for jammers and force defenders to expand coverage, power, and sophistication of spoofing.
Civilian tech spillover and why it matters
The Ukraine battlefield has been a crucible for low cost components being recombined into hardened offensive systems. Two trends stand out with civilian implications.
1) Commodity compute and comms moving into munitions. Recovered drones with Raspberry Pi style controllers and 3G/4G modems show how off the shelf parts can be pressed into military roles. That lowers the threshold for new actors to field capable systems and complicates attribution. It also means that techniques developed for military EW will leak back into civilian contexts where similar components are in use.
2) Antenna and navigation tech cross pollination. Controlled Radiation Pattern Antenna arrays and multi channel GNSS front ends built for aviation or high end surveying can be repurposed to harden hostile drones. The same antenna advances appear in commercial maritime and aeronautical gear. That raises costs for simple jammers and pushes mitigation toward more systemic, layered resilience rather than one off RF power.
This spillover has two direct civilian impacts. First, GNSS jamming and spoofing at scale jeopardizes timing and position services that underpin power grids, telecoms, banking, and transport. Second, the adaptation of commodity electronics into weapons creates regulatory and safety headaches for supply chain and hobbyist communities. Both trends argue for stronger spectrum stewardship and clearer legal boundaries for RF experimentation.
Practical resilience steps for civilians and infrastructure operators
-
Treat GNSS as a sensor, not an oracle. Instrument receivers with spoof and jamming detection, maintain timing holdover with rubidium or cesium clocks or PTP over fiber, and test GNSS outage drills at least annually. Several industry and government analyses have recommended layered PNT solutions including eLoran, fiber timing and INS augmentation.
-
Harden comms and add redundancy. Critical telemetry and control links should not rely on a single civilian cellular path without encrypted, authenticated fallbacks and watchdog timers. Where permissible, use frequency hopping and authenticated control protocols. Field reports show many strike systems failed when C2 was disrupted.
-
Increase passive detection. Acoustic sensors, inexpensive radar and networked visual systems provide early cueing. Early detection reduces the number of interceptors you must fire and improves EW allocation efficiency. Ukraine’s layered sensor approach is instructive.
-
Do not operate jammers casually. Civilian use of jammers is illegal in many jurisdictions and can interfere with life critical services. If you are a researcher, work with regulators and spectrum authorities and perform tests in shielded ranges or with licensed temporary authority. The defensive advantage of jamming comes with serious public risk if misapplied.
Conclusions
The January 13 event is a useful case study. It shows modern EW is not a magic bullet. It is a force multiplier when integrated into an air defence architecture that includes sensors, shooters, and command. The interplay between jamming, spoofing and kinetic effects can deliver outsized results against massed, lower cost loitering munitions. At the same time the conflict highlights the accelerating feedback loop between civilian electronics and battlefield adaptation. That loop makes policy, spectrum governance and PNT resilience not just technical problems but public safety priorities. For engineers and hobbyists interested in EW the takeaway is clear. Learn the physics, respect the law, and design for layered resilience rather than single point fixes.