NOT Quite Everything You Wanted to Know about Counter Drone…

Counter-UAS Technology: Addressing Drone Security Threats with Advanced Detection Solutions

But a Mighty Fine Primer in Late 2024

I have been writing over the past several months about go-to-market strategies, how to engage with customers to refine your product-market fit, and other ways that I help clients. However, this time I wanted to shift focus and discuss a very important, fast-changing topic in the unmanned systems industry: Counter UAS. 

I also decided to try something different with this article, co-authoring it with Zev Nadler from UAS Strategic (email: [email protected]). I greatly enjoy collaborating with others, so this seemed like an excellent opportunity to do so. We hope this high-level overview is interesting, informative, and helpful. 

This is a fast-changing technology, so please understand that while this information is current and relevant today, aspects, strategies, and technologies will evolve in the future. That’s just the nature of the topic.

What is CUAS, and Why is it Increasingly Important?

CUAS, or Counter-UAS (Uncrewed Aircraft System), refers to solutions designed to carry out one or more of the following functions: Detect, Track, Identify and Defeat (DTID) nefarious uncrewed aircraft. While full DTID capabilities are primarily utilized in conflict zones, there is an increasing risk from bad actors in civilian areas worldwide. In the United States, only four federal agencies and one armed force are authorized to perform DTID operations:

  • Department of Homeland Security (DHS)
  • Department of Defense (DOD)
  • Department of Energy (DOE)
  • Department of Justice (DOJ)
  • United States Coast Guard (under DHS policies)

The US Coast Guard deploys its C-UAS capabilities to protect high-risk facilities, assets, and special events within the maritime domain. These agencies have been re-authorized to conduct federal counter-UAS operations from May 11, 2024, to October 1, 2024. The short re-authorization period is intended to accelerate progress toward establishing more meaningful and robust CUAS authorities.

Unfortunately, the most critical agencies in need of these authorities—our State, Local, Tribal, and Territorial (SLTT) law enforcement agencies—have not been included in the latest regulations. 

With approximately 18,000 agencies nationwide, SLTT law enforcement will always be the first responders to any nefarious drone attack. Yet, they are currently unable to respond effectively or proactively plan for such events. Additionally, they are only legally permitted to actively detect drones if they are working in conjunction with one of the four federal agencies mentioned earlier.

There is a strong ongoing effort to include SLTT agencies in the following areas:

  • Advancing critical infrastructure issues, approaches, and best practices at the SLTT level.
  • Sharing information on critical infrastructure issues among SLTT colleagues.
  • Submitting policy recommendations to the federal government regarding national plans, policies, and programs.
  • Collaborating with other sector partnerships to exchange ideas, address common concerns, and develop solutions together.

The Growing Importance of Counter-UAS Technology

Many industry leaders agree that the success of the planned Unmanned Aircraft System Traffic Management (UTM) and Advanced Air Mobility (AAM) systems will heavily depend on the simultaneous development of CUAS (Counter-UAS) to protect goods and people traveling in the air. Airports, state penitentiaries, power plants, and other sites classified as “Critical Infrastructure” will likely be the first to benefit from detection capabilities. Simultaneously, a limited number of SLTT (State, Local, Tribal, and Territorial) agencies will also begin implementing detection measures. 

As more agencies gain the authority to utilize increasingly robust CUAS solutions, large commercial enterprises may also be granted permission for detection.

The level of government oversight required for these permissions could vary significantly—ranging from the stringent requirements similar to obtaining a concealed carry firearm in New York City to the more straightforward process of acquiring a home alarm permit in Arizona.

Within the United States, Secretary of Homeland Security Alejandro Mayorkas warned Americans about the dangers of drones along the U.S.-Mexican border and urged Congress to expand the department’s drone defense capabilities in the interest of national security. He stated, “While drones present such remarkable potential in terms of innovation and their productive use, in the wrong hands, they also present a real threat, and we see that threat materialize—most notably on the border, where criminal organizations are seeking to use drones to carry drugs across the border, where they’re using it as a force multiplier in their ability to understand where our law enforcement resources are deployed and seek to circumvent them”

Understanding the Security Threats Posed by Drones

Safety and Security Hazards: The growing presence of unmanned aerial systems (UAS) in civilian public life has raised significant safety concerns. Drones, especially those operated without proper oversight or operator training, can pose threats to public safety, ranging from accidental collisions with people or infrastructure to more serious incidents like interference with manned aircraft. Additionally, drones introduce new security risks, including the potential for espionage, smuggling, or even acts of terrorism in public spaces. Unauthorised drones can be used to breach secure facilities, deliver contraband, or carry out attacks on the public.

Privacy Concerns: As drones become more widespread, privacy concerns are also on the rise. Equipped with high-resolution cameras and other sensors, drones can easily capture images and data from private properties or individuals without their consent. This increased potential for surveillance by individuals or companies is a valid concern for many. For example, a case in Modesto, California highlighted concerns when a drone was used to capture images that led to a homeowner’s insurance being dropped. 

While property owners do not have the right to control the airspace above their property boundaries, an unauthorised drone over private property may be considered trespassing in some states. It’s also important to note that shooting down or damaging a flying drone is a federal offence, as unmanned aircraft are still classified as aircraft and thus protected by federal law. If you need legal advice or guidance on these topics, feel free to reach out, and I can connect you with top experts in the field!

Developing Effective CUAS Systems for Modern Challenges

The International Centre for Counter-Terrorism has this to say about innovations in drone attacks by non-state actors: “We have observed a wide variety of types of drones used, procurement networks, supporting infrastructure, and techniques. Accordingly, the type of threats posed by non-state actors’ use of drones varies between groups, locations, and targets. ISIS, while often cited as the preeminent non-state drone user, developed its own infrastructure, munitions, and aircraft without state patronage. As a result, the terror group used drones both as a powerful tool within its propaganda machine and to conduct attacks by using large numbers of small quadcopters to drop modified grenades. In this, it differed from the large number of drone-using Iran-supported groups (such as Hamas, Hezbollah, and Houthi forces), which tended to privilege pilot-to-target attacks, whereby drones loaded with explosive charges crash into—or near—a target and explode.”

Surveillance and Espionage: In the defense sector, the proliferation of unmanned aerial systems (UAS) has heightened concerns about surveillance and espionage. Drones equipped with advanced cameras and sensors can easily infiltrate sensitive areas, gather intelligence, and transmit data to adversaries, compromising national security as well as the security of individuals in the field or on base.

Weaponization: The weaponization of drones represents one of the most significant and evolving changes in modern warfare. Adversaries can easily modify UAS to carry and deliver explosive devices, chemical agents, or other dangerous payloads, transforming them into effective tools of attack. First Person View (FPV) drones have been widely used in some current conflicts as an effective and affordable way to deliver explosives accurately and with lethal force.

Disruption: Drones have also become tools of disruption in military operations, capable of interfering with communications, logistics, and battlefield dynamics. Small, agile drones can be used to disrupt supply lines, block communication channels, create confusion, or even disable critical infrastructure.

Photo: Fortem Technologies

As we can see, the risks are varied and require a broad toolset of CUAS capabilities to manage these threats posed by UAS systems of various sizes, speeds, and capabilities in different environments and legal frameworks. It’s complex. Different threats require different approaches.

Innovative Drone Detection Solutions for Critical Infrastructure

The most common detection systems start with Radio Frequency (RF) Detection/Signal Analysis that analyzes the communication signals to help identify the type and origin of the drone. This can either be an ACTIVE or PASSIVE system.

Other than the authorized federal agencies listed above, only PASSIVE detection of RF can be performed at critical infrastructure sites like airports and used by SLTT agencies. However, as drones become more autonomous and less reliant on a C2 operator to Transmit/Receive with the drone, RF is becoming less available for identification. That’s where some, or all, of the following sensors can be used:

  • Electro-Optical/Infrared (EO/IR): These systems use high-resolution cameras to visually detect and track drones. They can be installed in fixed locations or on mobile platforms like vehicles or ships. The cameras operate in both visible (daylight) and infrared (nighttime) spectrums, allowing for round-the-clock surveillance.
  • Acoustic: Acoustic-based systems utilize sound detection and analysis to identify, track, and sometimes neutralize drones. These systems focus on detecting the unique sound signatures produced by drone propellers and motors.
  • Radar: Radar-based systems (C-UAS) are an important technology for detecting, tracking, and mitigating threats in the air. Using radar, these systems can identify and monitor drones, providing a real-time response to potential threats.
  • Multi-Sensor Systems: As with most technology, everything has benefits and challenges, so using a combination of different sensor types can be a very productive approach. These systems are designed to provide comprehensive coverage and improve the reliability of detection and response.
  • Artificial Intelligence (AI): AI algorithms enhance the accuracy of drone identification by analyzing sensor data and airspace usage.

Mitigation Approaches

Jamming and Spoofing the RF and GPS transmissions: This disrupts the communication link between the drone and its operator to neutralize the threat. However, these are difficult to deploy in civil situations due to the disruptions to many public services that use GPS and potentially affected RF bands.

Several options include:

  • Return to Sender: Great if you are in a conflict zone and not concerned about any explosive detonating near the operator.
  • Drop Where it Is: Again, possibly good in a conflict zone but certainly not at a July 4th parade.
  • Tractor Beam: Take over the C2 and land the drone where HAZMAT or EOD await.

Directed Energy: Using lasers or other directed energy weapons to disable or destroy drones. HPM or High Powered Microwave is a good example. Use of any high-energy device requires analysis of the collateral damage it might cause. This includes cell phones, pacemakers, dialysis machines, and other health-related systems.

Kinetic: Physical Interception that can include:

  • Deploying Nets: Capture the drone and either allow the net to stall the UAV by stopping proper propeller function or tow/drop it to a safe location using a tether.
  • Artillery: Munitions such as guns and missiles are used but present a greater risk of collateral damage.
  • Drones: Warfighters deploy drones for CUAS missions against enemy drones, destroying them with kinetic payloads or by ramming.
  • High RPM Guns: Phalanx CIWS, M134D Minigun, or similar systems.

Electro-Optical Jamming: Some systems use EO/IR sensors to detect and then direct jamming signals to the drone’s optical sensors, potentially blinding or confusing it. This method can disrupt the drone’s navigation and control systems.

These are of course not all the options, nor a detailed description of how they work, but this does provide a state of the tech as of today.

Insights into the Future of CUAS Technology

In general, as the technologies on both nefarious drones and CUAS systems evolve and mature, we can expect the integration of existing systems and new technologies blended with AI to play a large role in providing a comprehensive approach to threat management.  Currently it’s very much a cat and mouse game with the technological and operational approaches being deployed and tested.

AI and machine learning will play a crucial role in improving the accuracy and efficiency of detection, identification, and mitigation processes by leveraging the speed of processing large amounts of disparate data points. Autonomous robotics will help to quickly deploy mitigation systems, increasing safety and keeping people out of harm’s way.

We can expect that both nefarious drones and CUAS systems will equally benefit from Moore’s Law, and miniaturization will both increase the threat risk as well as enable CUAS systems to be more prevalent in both the battlefield and civil/public life.

Within civil/public life, where regulators like the FAA and FTC manage airspace frequencies, there is a large amount of work needed to develop robust regulatory frameworks that will support the deployment and use of CUAS technologies. These frameworks must ensure that CUAS technologies are used responsibly and effectively while also potentially providing increased methods to discern which drones are problematic and need CUAS attention. 

Each country will handle and move forward in different ways. The challenge is that nefarious drone operators intending to do harm in civil public life won’t be concerned about following regulations or laws and thus may have the upper hand in staying ahead of regulators and law enforcement. It will be interesting to see how this all balances and affects our personal, business, and civil lives from a day-to-day perspective.

At Clarify Consulting, LLC, we help companies grow their markets and understand their customers. Are you ready to take the next step? Connect with me or schedule a consultation call to discuss how Clarify Consulting LLC can help craft strategies specifically tailored for your business.