18 décembre 2019 | International, Aérospatial

Study: Counter-Drone Systems Proliferate, Challenges Endure

Graham Warwick

Counter-drone systems continue to proliferate on the market, but technical and operational challenges in countering small unmanned aircraft systems (UAS) have not yet been fully surmounted, says a new report by the Center for the Study of the Drone at Bard College, New York.

The second edition of the Center's Counter-Drone Systems report lists 537 systems marketed by 227 companies in 38 countries, up from 235 in the first edition published in February 2018. This is despite removing 24 products from the database that no longer appear to be available.

Citing a March 2019 solicitation by the Pentagon's Defense Innovation Unit which said “it has proven difficult to identify and mitigate threats using currently fielded technologies,” the report says “dozens of background interviews with military and law enforcement personnel have validated this assertion.”

The challenges extend beyond the issue of effectiveness “and include complex questions around safety, practicality, policy and legality,” says the report's author, Arthur Holland Michel, founder and co-director of the Center.

When it comes to detection effectiveness, radar may struggle to pick up small UAS flying close to the ground, while cameras might confuse a drone with a bird or aircraft and be degraded by poor weather, low visibility and strong sunlight.

Electromagnetic interference may degrade the detection performance of radio-frequency sensors, with many potential sources of interference in urban areas. Radar, some RF systems and electro-optical/ infrared (EO/IR) sensors require line of sight to the drone, which can be problematic in urban areas.

Acoustic sensors and RF detection systems rely on a library of sounds and signals emitted by known drones, but given the rapid rate at which drones are emerging on the market “even libraries that are updated often will never cover 100% of the drones that might be operating,” the report says.

A major detection issue is the level of false negatives and false positives, the report said, noting that results of FAA testing of counter-drone systems showed distinguishing true positives from false positives in cluttered environments required a high level of manpower.

Distinguishing between legitimate and illegitimate drone use is another issue. Remote identification technology and the FAA's pending Remote ID rulemaking, “may go a long way to addressing this issue once implemented, but it will not be a total fix,” the report says.

There is a short time window available in which to respond to a drone threat and potential dangers posed to bystanders by some counter-drone interdiction techniques. Long-range systems such as lasers and high-power microwaves “could pose a serious threat to aircraft operated above the targeted drone.”

In terms of interdiction effectiveness, the report points to results of a 2017 counter-UAS event staged by the U.S. Joint Improvised Threat Defeat Organization that showed the drones were resilient against damage. “More recent C-AUS exercises indicate this problem remains an enduring one,” it says.

Jammers have no effect against drones operating autonomously without an active RF link; many signal jammers have an effective range of only a few hundred meters; spoofing systems may not be universally effective; and all kinetic systems may struggle against drones moving fast or in unpredictable patterns.

Drone technology, meanwhile, is not standing still, the report says, noting research underway on UAS that can operate in GPS-denied environments, negating jamming, and are capable of actively defeating jamming or spoofing attacks.

Consumer drones may soon be controllable via mobile LTE networks rather than an RF link, the report says. LTE drones could be operated at essentially unlimited range and “would be difficult or dangerous to interdict with jamming systems without interfering with ubiquitous cellular communications,” it says.

The proliferation of counter-UAS systems will inevitably accelerate the development of technology to render them less effective, the report concludes, by programming drones to maneuver in patterns that make them hard to detect by automatic target algorithms.

The report also highlights the challenges posed by drone swarms. “A swarm doesn't have to be dynamic or truly autonomous to achieve these effects: 10 individual drone operators flying 10 drones in unison may just be as difficult to defend against as a true autonomous swarm of 10 aircraft,” it says.

https://aviationweek.com/defense-space/study-counter-drone-systems-proliferate-challenges-endure

Sur le même sujet

  • «Le Fonds européen de la défense est essentiel» : entretien avec Hélène Conway-Mouret, vice-présidente du Sénat, membre de la commission des Affaires étrangères, de la Défense et des Forces armées

    4 juin 2020 | International, Aérospatial, Naval, Terrestre, C4ISR, Sécurité

    «Le Fonds européen de la défense est essentiel» : entretien avec Hélène Conway-Mouret, vice-présidente du Sénat, membre de la commission des Affaires étrangères, de la Défense et des Forces armées

    DEFENSE «Le Fonds européen de la défense est essentiel» : entretien avec Hélène Conway-Mouret, vice-présidente du Sénat, membre de la commission des Affaires étrangères, de la Défense et des Forces armées Dans un entretien accordé à L'Usine Nouvelle, Hélène Conway-Mouret, vice-présidente du Sénat, membre de la commission des Affaires étrangères, de la Défense et des Forces armées, souligne l'importance du secteur de la défense pour le plan de relance : «Il ne faut absolument pas que l'industrie de défense française soit abandonnée. C'est l'une des plus performantes en Europe», déclare-t-elle, soulignant : «la relance économique passe par un soutien à l'industrie de défense. Le caractère stratégique de cette industrie, qui représente 200 000 emplois directs, peu exposés aux délocalisations, est au cœur de notre souveraineté. Qui plus est, tous les efforts en matière d'innovation et de recherche militaires ont un effet dual et profitent au secteur civil». Quant au Fonds européen de la défense, «c'est le premier outil de l'Union destiné à soutenir fortement l'innovation et la recherche militaire. Il n'est pas simplement utile, mais absolument essentiel», insiste Mme Conway-Mouret. L'Usine Nouvelle du 4 juin

  • USAF Picks B-21 For Software Learning Demo Challenge

    20 septembre 2019 | International, Aérospatial

    USAF Picks B-21 For Software Learning Demo Challenge

    By Steve Trimble The U.S. Air Force has selected the Northrop Grumman B-21 to demonstrate a potentially revolutionary approach to flightworthy software. The future stealth bomber will demonstrate a software architecture running the operational flight program (OFP) that learns and adapts as it flies a mission, says Will Roper, assistant secretary of the Air Force for acquisition, technology and logistics. Such an approach potentially “allows them to land with better code than they took off with,” Roper tells Aerospace DAILY. The architecture enables the code to update itself during a mission. Asked if the demonstration involves software code in the OFP, the operating system of a military aircraft, Roper replied affirmatively: “Within the OFP. That kind of adaptability is what we want to aspire to.” As a special access program, details of the B-21's schedule, capabilities and even cost are kept secret. But Roper says he is able to discuss what he calls the “digital bullet challenge,” albeit within strict limits. Asked if the B-21 software demonstrations imply the insertion of a deep learning technique known as a neural network, Roper declined to answer. “Details of how I won't go into,” Roper says. “But B-21 is trying to not just do agile software. They want to blaze new territory, a new trail for the Air Force. The idea that one of our most complicated airplanes with one of the most challenging missions is also taking on one of the most challenging software approaches to make their software living [and] breathing on the plane itself is inspiring. “They're going to be pushing the boundaries of how aircraft software should work in this century, and increasingly the software is where the cutting edge—the winning edge—is going to come from,” he explained. Roper's description appears to push the boundaries of software used in the flight computers of a commercial or military aircraft. Aircraft certification standards demand a highly rigid approach to software architecture, with the function of each line of code validated and verified on the ground before it is allowed to be used in flight. The challenge set for the B-21 could lead to altering or even adding software lines of code in the OFP during a flight. The Air Force launched the B-21 program in 2015 by awarding a $21.4 billion contract to Northrop. Air Force officials have previously announced that first flight is scheduled around December 2021. The aircraft will take off from Northrop's final assembly center in Palmdale, California, and fly to the flight test center on the adjoining Edwards Air Force Base. https://aviationweek.com/defense/usaf-picks-b-21-software-learning-demo-challenge

  • Why small cyberattacks on power systems more likely than a long-running blackout

    8 août 2018 | International, C4ISR

    Why small cyberattacks on power systems more likely than a long-running blackout

    By: Justin Lynch Attacks on American power systems are likely to be small and localized, according to a cybersecurity firm, casting doubt on the ability of a foreign power to take down broad swaths of U.S. electric systems at once. Given current technology it is not reasonable to expect an enemy to shut down large portions of the U.S grid., but hackers do have the ability to target an individual location, Joe Slowik, an adversary hunter at the cybersecurity firm Dragos, told Fifth Domain at the Black Hat conference. “I might not be able to turn off the eastern seaboard, but if I want to cause a power blip in Washington D.C., that is feasible,” Slowik said. His cautions come after a series of warnings from the U.S. government regarding the potential for attacks on the power infrastructure. "Think about New England in January, the grid going down for three days. A lot of people are going to suffer and die,” Director of National Intelligence Dan Coats said during a July 13 event at the Hudson Institute. Full Article: https://www.fifthdomain.com/show-reporters/black-hat/2018/08/08/why-small-cyberattacks-on-power-systems-more-likely-than-a-long-running-blackout/

Toutes les nouvelles