Menu Close
  • Home
  • White Papers
  • UAS Threats
  • The Rapid Proliferation of UAS and Emerging Threats

    Systems to Counteract Unauthorized Drone Activities

    The rapid proliferation of Unmanned Aerial Systems (UAS), commonly known as drones, has revolutionized various sectors, including commercial, recreational, and governmental operations. The latest generation of UAS are remarkably easy to fly, and generally inexpensive, making for widespread use by hobbyists but also by ‘bad actors’. While the benefits of UAS are numerous—ranging from aerial photography and agricultural monitoring to delivery services and disaster response—this widespread adoption has also introduced a series of new types of threats. Unauthorized surveillance, airspace obstruction, and the potential use of drones to carry destructive payloads have become pressing concerns. This article explores these threats and discusses the systems available to mitigate them.

    Emerging Threats from the Proliferation of UAS

    Unauthorized Surveillance and Privacy Breaches

    One of the most significant concerns with the widespread use of UAS is the potential for unauthorized surveillance and privacy breaches. Drones equipped with high-resolution  visual and thermal cameras can capture detailed images and videos, day or night, without the knowledge or consent of individuals being observed. This capability raises serious privacy issues, as drones can be used to monitor private property, gather intelligence, or conduct industrial espionage.

    Airspace Obstruction

    As the number of drones in the sky increases, so does the risk of airspace obstruction. Unauthorized or uncoordinated drone flights can interfere with human-crewed aircraft operations, posing a hazard to aviation safety. Airports, in particular, face significant challenges in ensuring that their airspace remains free of unauthorized UAS, which could lead to dangerous situations, including potential collisions.

    Potential Use for Destructive Payloads

    Drones can be easily modified to carry and deliver harmful payloads, making them a potential tool for terrorists or criminals. This includes transporting explosives, hazardous materials, or chemical and biological agents, as has been seen by many prisons, where drones are used to drop contraband items inside the prison walls. The use of drones for such purposes poses a severe threat to public safety and national security, necessitating effective countermeasures.

    Counter-UAS Systems and Solutions

    Various Counter-UAS (C-UAS) systems and technologies have been developed to address these emerging threats. The steps to address the threat is generally defined as the ‘kill-chain’: these steps include detection of the drone, tracking, assessment of the threat, and mitigation of the threat. There are many systems on the market that address one or more steps in the kill-chain, though it requires a fully integrated solution, bringing a variety of technologies together, to address them all. 

    Detection and Identification Systems

    Radio Frequency (RF) Detection: RF detection systems monitor the radio frequencies drones use for communication and control. By identifying the unique signatures of these signals, RF detection can locate and track drones in real time. Most RF detection systems are library based, meaning that they can detect (and sometimes mitigate) drones only if the signals from the drone are stored in its library.   

    Radar Systems: Traditional radar systems have been adapted to detect and track small, low-flying drones. These systems can provide early warning of unauthorized UAS in a given area. Unlike RF detection systems, radars detect everything in their field of regard, not just drones that are in their library.  However, for radar systems tuned to detect small UAS, they will also detect birds….of which there are nearly always far more, than there are drones.

    Acoustic Sensors: Acoustic detection systems use microphones to pick up the distinct sounds of drone motors. These systems are particularly useful in urban environments where visual detection may be challenging.  However, they can have difficulty in windy or noisy conditions.

    Electro-Optical and Infrared (EO/IR) Cameras: EO/IR cameras provide visual and thermal imaging capabilities, allowing for the identification and tracking of drones, even in low-visibility conditions.

    Tracking and Mitigation Systems

    Jamming Systems: Jamming systems disrupt the communication link between the drone and its operator by emitting signals at the same frequency. This can cause the drone to lose control and either return to its home location or land immediately.

    Spoofing Systems: Spoofing systems send false navigation signals to the drone, tricking it into thinking it is in a different location than it actually is. This can redirect the drone from sensitive areas or force it to land.

    Net Capture Systems: Net capture systems deploy nets to physically capture drones in flight. This method effectively neutralizes drones without damaging surrounding infrastructure.

    Laser Systems: Directed energy weapons, such as high-power lasers, can turn off drones by damaging their critical components. These systems offer a precise and effective way to neutralize drone threats; however, they require a high degree of precision to be aimed properly.

    Kinetic Interceptors: Kinetic interceptors are designed to collide with drones and physically bring them down. They can include specially designed projectiles or even trained birds of prey.

    Conclusion

    The rapid proliferation of UAS has introduced new and complex threats that require sophisticated and multifaceted countermeasures. As drones become more prevalent, the need for robust counter-UAS systems will continue to grow. By leveraging a combination of detection, identification, tracking, and mitigation technologies, authorities can effectively manage and neutralize the risks posed by unauthorized and potentially malicious drone activities. As technology advances, so will the strategies and tools available to ensure the safe and secure integration of UAS into our airspace.