SENSITIVE // INTERNAL ANALYSIS // RSR-2026-0315
Threat Intelligence Assessment · Barksdale AFB · March 9–15, 2026

Barksdale AFB
Drone Incursion Series

A sustained, multi-night state-level intelligence-gathering campaign against one of the United States' most sensitive strategic installations. Seven days. Twelve to fifteen drones per wave. Nuclear-capable B-52H Stratofortresses in the target zone.

REPORT:RSR-2026-0315
DATE:15 March 2026
ANALYST:Red Storm Research
CLASS:SENSITIVE // INTERNAL
7
Day Campaign Window
12–15
Drones Per Wave
4hrs
Loiter Time Per Incursion
CHARLIE
FPCON Level Reached

Incident Summary

Between March 9 and March 15, 2026, Barksdale Air Force Base in Shreveport, Louisiana was subjected to a series of coordinated drone incursions. The operation was not a single event — it was a sustained, multi-night intelligence-gathering campaign conducted against one of the United States' most sensitive strategic installations.

Swarms of 12 to 15 drones appeared over the installation across multiple nights, each loitering over the base for approximately four hours per incursion. Critically, the drones flew directly over the most sensitive areas of the installation — including the main flight line where nuclear-capable B-52H Stratofortress bombers are housed and maintained.

The Air Force response was immediate and severe. A shelter-in-place order was issued for base personnel. The installation's Force Protection Condition was elevated to "Charlie" — indicating a credible threat to the installation. A multi-agency investigation was launched with FBI involvement.

Key Incident Facts
ParameterDetail
Event locationBarksdale AFB, Shreveport, Louisiana
Campaign windowMarch 9 – 15, 2026 (7 days)
Swarm size12 to 15 drones per wave
Loiter timeApproximately 4 hours per incursion
Target areasMain flight line — nuclear-capable B-52H Stratofortresses
Official responseShelter-in-place; FPCON elevated to Charlie; FBI investigation launched

Capabilities & Strategic Intent

The drones observed over Barksdale were not hobbyist hardware. Signal analysis confirmed non-commercial control characteristics, long-range control links, and active resistance to standard military jamming protocols. This level of technical sophistication — combined with the operational discipline to sustain a week-long surveillance campaign near a secure military installation — strongly indicates a state-level actor.

Capability Indicator Score
Signal sophisticationNon-commercial control characteristics confirmed95/100
Jamming resistanceActive resistance to standard military jamming90/100
Operational security7-day sustained multi-night operation88/100
ISR sensor capabilityHigh-resolution imaging payload suspected82/100
Persistence / loiter time~4 hours per incursion, repeated nightly78/100
The Deliberate Visibility Tactic
The most analytically significant detail of this operation is what the drones did not do: they did not attempt stealth. The drones flew with their lights on throughout each incursion. This was not a tradecraft failure — it was a deliberate intelligence collection strategy. By making themselves conspicuous, the operators were able to observe and record the base's entire response chain in real time: security force reaction times, communication patterns, emergency procedures, and the public statements of base officials. The base's response to the threat became as valuable to the adversary as any sensor data collected by the drones themselves.
Primary Objective: Digital Twin Creation
The primary strategic objective of this operation was almost certainly the creation of a high-resolution digital twin of the Barksdale installation. Using LiDAR, photogrammetric sensors, or other advanced imaging payloads, the drone swarms would have been collecting precise three-dimensional data across the installation during each loiter period. This data enables precise targeting of critical infrastructure — weapon storage bunkers, hangar dimensions, fuel lines, command nodes — and provides actionable mission-planning capability for a future strike, infiltration, or sabotage operation. Combined with patrol route observation, a complete operational picture of the base's defensive architecture could be assembled over the course of the week.
Operational Context
The timing of the incursion campaign carries additional analytical weight. The campaign commenced shortly after the initiation of Operation Epic Fury, a major US military operation. This correlation suggests the Barksdale incursions were not opportunistic — they were a reactive intelligence collection mission by a peer adversary assessing US strategic posture and nuclear readiness at a directly relevant installation during a period of elevated operational tempo.

Launch & Control Analysis

Identifying the launch and control methodology is critical to understanding both the adversary's operational sophistication and the practical feasibility of future interdiction. Three primary scenarios were assessed.

Scenarios Ruled Out
Fixed launch sites (residential or commercial buildings) were assessed and eliminated. A stationary launch point operating over a multi-day window near a federal installation would be trivially identified through signals triangulation by either law enforcement or organic military intelligence assets. Similarly, a single stationary vehicle — while theoretically capable of housing drone launch equipment — would present unacceptable exposure risk during a sustained, multi-night operation near an Air Force security perimeter.

Hybrid C2 / LRT Operation

The operational pattern most consistent with the observed evidence is a compartmentalized hybrid operation running two distinct cells simultaneously.

C2
Mobile Command & Control Node
Specialized vehicle (van or RV) in constant motion on the surrounding road network, miles from the base. Never stationary — immune to triangulation. Houses operators and advanced control equipment. High-value assets, collected intelligence data, and control hardware are never exposed to interdiction risk associated with the launch site.
TYPE:Specialized vehicle
POSTURE:Constant motion
EXPOSURE:Near-zero interdiction risk
LRT
Launch & Recovery Team
Small ground team transporting drone swarms to concealed rural launch sites each night — wooded areas, swampland, or farmland common to the Shreveport region. Launches the swarm, which links to the distant C2 node. Even if the LRT were compromised during a launch window, the primary intelligence-gathering capability and its personnel would remain secure and operational.
SITES:Concealed rural locations
TERRAIN:Wooded / swampland
FUNCTION:Expendable launch asset
Analytical Assessment
This operational pattern reflects professional, doctrine-based intelligence tradecraft. The deliberate separation of high-value assets from exposure risk, sustained multi-night operational tempo, and the sophistication of the drone platforms themselves are collectively inconsistent with criminal, commercial, or non-state actor activity. The indicators are consistent with a state-sponsored collection operation executed against a nuclear-relevant US military installation during a period of elevated strategic interest.