Back to news

July 6, 2018 | International, Aerospace

Study finds these gaps in Army’s small unit counter-drone capabilities

Army units at and below the battalion level are unprepared to defeat aerial drones and current plans can't keep up with rapidly evolving technology, according to a recent study.

Back in 2016, the Army Research Office asked an outside organization, The National Academies of Science, Engineering and Medicine, to evaluate their counter drone capabilities for battalion and below operations.

The report they published earlier this year notes some significant gaps and threats to soldiers with this technology.

“Contrary to the past, when U.S. warfighters may have found (improvised explosive devices), now the IEDs will find our warfighters,” according to the report.

While the Army and Marine Corps, which also included representatives in the study, are throwing resources at the small drone problem, they are not keeping pace with the threat.

“Army time frames are significantly out of sync with the rapidly advancing performance capabilities of individual (small Unmanned Aerial Systems) and teams of sUASs,” according to the report.

The report noted that most of the service's counter drone asset work was focused on heavy vehicle platforms or on fixed sites, which leaves smaller units most likely to first encounter the threat more exposed.

“Significant quantities of man-portable” counter-drone systems have been fielded, Army spokesman Maj. Chris Ophardt told Army Times in an email. The Army will continue to pursue those capabilities based on emerging threats.

Based on his response, which did not include details of capabilities, the Army is pursuing other ways to defeat drones. A large portion of the study was classified, due to operational security concerns.

“Future Army C-UAS systems will encompass a variety of potential platforms to include fixed, mobile, and Soldier-portable capabilities,” Ophardt wrote.

But beyond the types of systems employed, what they're targeting or attacking also came under fire in the report.

The Army and other branches have invested significantly in counter-drone technology, “often focusing on detecting radio frequency transmissions and GPS signals of individual sUASs. However, today's consumer and customized sUASs can increasingly operate without radio frequency (command and control) links.”

Drones now available can use automated target recognition, tracking, obstacle avoidance and other software-enabled activities instead of traditional RF and GPS.

Ophardt did not divulge specifics of how the Army is addressing this, but responded that the service's counter drone capabilities, “include multiple methods in order to detect, identify and defeat enemy UAS.”

A new school began last month at Fort Benning, Georgia to give basic trainees familiarity with small drones. The drone school gives infantry and scouts the ability to fill out a seven-line report when they encounter a drone then relay that info to their headquarters.

The students use both fixed-wing and helicopter small drones. They also learn defensive tactics such as how to use dispersal and hiding tactics to minimize casualties from drone-coordinated fires, according to an Army release.

Those introductory tactics can help even brand-new soldiers start thinking about how to deal with drone threats.

But, at the same time, the low-level tactics currently used for counter drone work have tried to use “kinetic effects,” basically shooting down the drone by interfering with its signals or overheating its circuits.

The report noted that method isn't practical on a wide scale for large numbers of troops, especially dismounted units.

That path only adds more gear from the equipment to the batteries, to an already overloaded soldier, not to mention the “cognitive load” of training and using another piece of equipment, according to the report.

Ophardt responded that the Army's counter-drone strategy included “multiple methods” to detect, identify and defeat” enemy drones.

The major provided a similar response when asked about Army efforts at counter-drone tactics, capabilities against swarming drones and collaboratively acting drone groups, which the report remarks will be more prevalent and sophisticated as soon as 2025.

Report authors urge Army leaders to adjust their timelines for matching tech development, which are woefully inadequate for the exponential changes in software, hardware and drone capabilities.

Current Army time frames consider near-term planning to run from now until 2025; mid-term planning in the 2026 to 2035 window and far-term at the 2036 to 2050.

Those efforts mirror vehicle acquisition strategy timelines, not the drone arena.

The report pushes for a near-term planning of one to two years, mid-term at the three- to five-year level and far term in drone tech at the six- to eight-year range.

The advances are happening so quickly, authors point out, that it is “impossible to predict performance capabilities beyond eight years.”

https://www.armytimes.com/news/your-army/2018/07/05/study-finds-these-gaps-in-armys-small-unit-counter-drone-capabilities

On the same subject

  • UK convenes top defense official to fix '€“ or end '€“ the Army's Ajax vehicle program

    October 6, 2021 | International, Land

    UK convenes top defense official to fix '€“ or end '€“ the Army's Ajax vehicle program

    David Marsh, the MoD's director of project delivery, was named as the senior official responsible for one of Britain's most high-profile military programs in a letter released by the department and the government's Infrastructure and Projects Authority.

  • How contractors can guard against cyber intrusions

    June 17, 2019 | International, Security, Other Defence

    How contractors can guard against cyber intrusions

    By: Mark Pomerleau Contractors, facing an increasing barrage of cyber intrusions by foreign entities, should protect themselves using traditional regulatory approaches but also new techniques such as blockchain and artificial intelligence, according to a new report from Deloitte. As companies in the defense supply chain began following the Defense Federal Acquisition Regulation Supplement (DFARS) cybersecurity regulations and the Department of Defense started to assess how adoption went, “we started to form our own ideas on what we see as emerging issues and solutions that [can] ... improve the cybersecurity posture against our enemies,” Jeff Lucy, managing director in cyber risk services practice at Deloitte, told Fifth Domain. On the regulatory side, the report, titled “Third-party risk management: Cybersecurity in the Defense Industrial Base,” says prime contractors must comply with the defense regulations measuring their companies' compliance with national cybersecurity standards. They should also create awareness among their subcontractors and smaller companies by providing training. Third, primes should create third party assessment programs for performing cybersecurity evaluations of their suppliers. However, the paper also suggests non-regulatory approaches, including automating supply chain functions, integrating blockchain to boost cybersecurity and using artificial intelligence to gain real time visibility into the threat landscape. Lucy noted that the Pentagon is beginning to take these regulations seriously and the problems aren't going away. “In 2019 we've seen that the DoD has started to move forward, start to take action to enforce their expectations around the DFARS requirements,” he said. “It's clear now with the steps that we're seeing with [Undersecretary of Defense for Acquisition and Sustainment] Ellen Lord getting the [Defense Contract Management Agency] on board to start auditing the suppliers processes for assessing their suppliers.” Cyber intrusions into the supply chains of defense contractors have become more prevalent in recent years. In a recent example, the Chinese government was blamed for a series of hacks and while the information they stole was not technically classified, in aggregate, it was considered to be quite damaging to the U.S. This year's Department-wide annual report on Chinese military activity included a new section highlighting that China's exfiltration of sensitive military information from the defense industrial base could allow it to gain a military advantage. Ultimately, Lucy said the solution to the supply chain and cybersecurity for the defense industrial base is manageable. “Most primes, from what I've seen with interactions with our customers, have put some level of the basic elements for a supplier assessment program in place already,” he said. “They've done some level of canvassing their suppliers, critical suppliers, taking a risk based approach to understand whether their suppliers are in adopting” standards. https://www.fifthdomain.com/industry/2019/06/14/how-contractors-can-guard-against-cyber-intrusions/

  • In A&D Industry, Who Has The Best Environmental Requirements? | Aviation Week Network

    September 7, 2021 | International, Aerospace, Naval, Land, C4ISR, Security

    In A&D Industry, Who Has The Best Environmental Requirements? | Aviation Week Network

    Green is the new green in aerospace and defense, but how do companies compare when it comes to their own standards?

All news