Contemporary Counter Unmanned Aerial System Technologies

38 Student-NCOs of the 1-254 INF (NJARNG) Advanced Leader Course conducted the course field training exercise, with support from ET2RC Army Counter-UAS program and C5ISR GOST Branch. Students operated in an sUAS threat environment, putting to practice lessons learned from classroom instruction, and shared real-world TTPs from NCOs across the many units and compositions attending the course. Support offered saw classroom instruction on sUAS Threat Awareness, sUAS Identification, and DroneBuster Operator Course. This training built the foundation for Day 1 FTX sUAS flying as OPFOR "Threat" sUAS against the students. Day 2 allowed students to utilize the pilots and platforms to act as an organic BLUFOR Intelligence, Surveillance, and Reconnaissance asset, increasing the overall control and effectiveness of their final raid (New Jersey Army National Guard).
38 Student-NCOs of the 1-254 INF (NJARNG) Advanced Leader Course conducted the course field training exercise, with support from ET2RC Army Counter-UAS program and C5ISR GOST Branch. Students operated in an sUAS threat environment, putting to practice lessons learned from classroom instruction, and shared real-world TTPs from NCOs across the many units and compositions attending the course. Support offered saw classroom instruction on sUAS Threat Awareness, sUAS Identification, and DroneBuster Operator Course. This training built the foundation for Day 1 FTX sUAS flying as OPFOR "Threat" sUAS against the students. Day 2 allowed students to utilize the pilots and platforms to act as an organic BLUFOR Intelligence, Surveillance, and Reconnaissance asset, increasing the overall control and effectiveness of their final raid (New Jersey Army National Guard).

Presented: July 12, 2023 2:00 pm (ET)
Presented by: Yeonjoon “Ethan” Park, Ph.D.

This webinar presentation contains CUI and is therefore limited to government and contractors only.

 

As unmanned aerial system (UAS) technologies spread globally, UAS attacks with improvised explosive devices (IEDs) and military explosives are rapidly increasing worldwide. Here, we examine types of UASs, attack patterns, various counter unmanned aerial system (CUAS) methods with effective ranges, and the future of CUAS technologies. Open-source information will be used in this presentation to study various contemporary aspects of CUAS strategies.

  • Types of UASs
  • UAS Classification
    • DoD Group 1-5
    • NATO Class 1-3
  • UAS Threat Types
    • UAS With Direct Warhead (Kamikaze Drone)
    • UAS With Proximity Bomb
    • Bomb Dropping UAS
    • UAS With (Directional) IEDs
    • Ranged Attack Guidance UAS
  • Counter UAS Procedure
    • Find
    • Fix
    • Finish
  • Counter UAS Technologies – Find/Fix
    • Radar (Active Radio Frequency [RF])
    • Passive RF
    • RF Geolocation Sensors
    • Electro-optical (EO)/Infrared (IR)
    • Acoustic
  • Counter UAS Technologies – Finish
    • RF Jamming
    • GNSS Jamming
    • RF Takeover (Spoofing, Cyber Attack)
    • Kinetic Methods

This webinar presentation contains CUI and is therefore limited to government and contractors only. 

Computer Icon

Host a Webinar with HDIAC

Are you interested in delivering a webinar presentation on your DoD research and engineering efforts?

Want to find out more about this topic?

Request a FREE Technical Inquiry!