Homeland Counter UAV Architecture Development Francesca D Arcangelo 27 October 2015 Sponsor: David Masters, DHS Science and Technology Directorate, HSARPA Distribution Statement A. Approved for public release; distribution is unlimited. This work is sponsored by DHS S&T under Air Force Contract #FA8721-05-C-0002. Opinions, interpretations, recommendations and conclusions are those of the author and are not necessarily endorsed by the United States Government.
Evolving UAV Threat Payload (kg) 10 4 10 3 10 2 10 1 10 0 10-1 10 0 Hobbyist (e.g., 3DR X8) 3DR Strategic Tactical 10 1 10 2 Wingspan or Width (ft) Strategic UAVs: Limited to state sponsors Tactical UAVs: Acquisition, manpower, and logistical challenges Small UAVs: Widely available (COTS) Inexpensive Easy to use Adaptable The small UAV threat introduces several unique challenges Homeland CUAV - 2
Small UAV Challenges Growing popularity Equivalent sensor signature to bird Low adherence to safety guidelines Quiet motors No blue force identification Slow speeds Example: DJI Phantom Low altitudes Battery-powered engine Rapid launch capability Small signatures Control on ISM* bands The growing use of these challenging threats is leading to many security concerns Homeland CUAV - 3 *ISM bands: Industrial, scientific, and medical radio bands, used by common radio devices
Global Small UAV Security Concerns Key Examples Illegal Entry Airport/Airline Safety Heathrow GB, Jul. 2014 Illicit Transport Drug Trafficking Tijuana MX, Jan. 2015 Weapons Delivery Critical Infrastructure Protection DC, Jan. 2015 Susan Walsh/AP ISR of Sensitive Areas Transport into Prisons Special Security Events France, Oct Nov. 2014 Maryland, Aug. 2015 Dresden GE, Sept. 2013 Odd Andersen/AFP Projected >1,000,000 drone sales globally in 2015 Homeland CUAV - 4
UAV Threat Engagement Chain and Counters Prepare Launch Fly Out Endgame Threat Action Acquire Platform Test Aircraft/Payload Select Target Select Launch Site Test Controls Prepare Aircraft Take Off Gain Elevation Guidance Control Manned Autonomous Cue Attack Image Area Collision Disperse Agent Explode Counter Action Intelligence Monitor sales HUMINT, OSINT Modify Airspace Rules Educate public High Alert Restrict launch areas Detect Anomalies Acoustics RF emissions Rooftop activities Airspace violation Cue Responses Track ID Assess Threat Protective Actions Bunker Evacuate Defeat Local jamming Net gun Policy-Based Solutions Technology-Based Solutions Homeland CUAV - 5
UAV Threat Engagement Chain and Counters Prepare Launch Fly Out Endgame Threat Action Acquire Platform Test Aircraft/Payload Select Target Select Launch Site Test Controls Prepare Aircraft Take Off Gain Elevation Guidance Control Manned Autonomous Cue Attack Image Area Collision Disperse Agent Explode Counter Action Intelligence Monitor sales HUMINT, OSINT Modify Airspace Rules Educate public High Alert Restrict launch areas Detect Anomalies Acoustics RF emissions Rooftop activities Airspace violation Cue Responses Track ID Assess Threat Protective Actions Bunker Evacuate Defeat Local jamming Net gun Policy-Based Solutions Technology-Based Solutions Homeland CUAV - 6
Current UAV Air Space Policy Government Use Certificate of Authorization (COA) Military training areas Customs and Border Protection patrol regions 6 National Test Sites Current Commercial Use Section 333 Exemption* 1,505 authorizations granted Commercial applications Aerial photography Agriculture Delivery Search and rescue Local law enforcement Proposed Commercial and Recreational Use Notice of Proposed Rulemaking* Applies to UAVs under 55 lbs Below 400 ft, daytime only Line of sight to UAV at all times No flights over people Prohibited regions Within 5 mi of airports National Capital Region Homeland CUAV - 7 * Current and future parts of FAA Modernization Act of 2012
Potential Future Policy Aids Hardware Aids IFF transponder/beacon RFID tag Corner reflector Signal at known RF/acoustic frequency Software Aids Programmed keep-out zones (geo-fencing) Law enforcement kill-switch RFID IFF Transponder DJI Corner Reflector Example: DJI Phantom No Fly Zones ATC Solutions UAV flight routing Restricted airspace monitoring Blue force UAV coordination Homeland CUAV - 8
UAV Threat Engagement Chain and Counters Prepare Launch Fly Out Endgame Threat Action Acquire Platform Test Aircraft/Payload Select Target Select Launch Site Test Controls Prepare Aircraft Take Off Gain Elevation Guidance Control Manned Autonomous Cue Attack Image Area Collision Disperse Agent Explode Counter Action Intelligence Monitor sales HUMINT, OSINT Modify Airspace Rules Educate public High Alert Restrict launch areas Detect Anomalies Acoustics RF emissions Rooftop activities Airspace violation Cue Responses Track ID Assess Threat Protective Actions Bunker Evacuate Defeat Local jamming Net gun Policy-Based Solutions Technology-Based Solutions Homeland CUAV - 9
Existing Counter UAV Capabilities Military Systems Commercial Sensors Consumer Devices Blighter Drone Shield Limited demonstrated capability against small commercial UAVs Testing and evaluation mostly performed outside of urban environments Homeland CUAV - 10
CUAV Technology Components Sensing Components Response Components Radar EO IR Kinetic Electronic Directed Energy Acoustic RF Sensing Nets Non-Lethal Technology Many potential technology components can have a role in a CUAV system Testing, evaluation, and architectural assessment needed to determine true value Primary testing need in cluttered urban environments Homeland CUAV - 11
Decision Support for Technology Use Threat Assessment Goal: Determine identity and/or intent of UAV Visual ID (e.g., Amazon UAV) Blue force tracking, IFF Behavior assessment (e.g., speed, direction) Consideration of alert state Response Goal: Prevent UAV-based threat UAV Operator Warning Protective Actions UAV Defeat Visual/audio alert Electronic message Short disruption of UAV flight Divert manned aircraft Evacuate event Seal doors/hvac Divert path and/or capture Down in a controlled manner Destroy Choice of response(s) determined by alert state, perceived threat, timeline, and resources Homeland CUAV - 12
Counter UAV Layered Architecture Technologies Sensing Response Policy and Intel Data Fusion/Processing Network Communication Integration CONOPS Development Detect Track ID Assess Respond Network Communication Situational Awareness Fixed Displays Mobile Displays Web Interfaces Homeland CUAV - 13
Challenges to Implementing a CUAV Architecture Challenges Anticipated Needs Multiple homeland stakeholders Stakeholder coordination/joint ownership Rapidly expanding commercial use Policy based on risk-benefit analysis Significant anticipated UAV volume IFF technology & decision support tools Difficult threats to detect, track, & defeat RDT&E to support comprehensive solution Many homeland environments Adaptable, plug-and-play architecture Homeland CUAV - 14
Homeland Counter UAV Architecture Scenarios Open Dense Airport protection Border monitoring Stadium/special event security Urban critical infrastructure protection Mobile Stationary Ship defense In-flight aircraft protection Motorcade protection Parade/marathon security Homeland CUAV - 15
Homeland Counter UAV Architecture Scenarios Open Dense Airport protection Border monitoring Stadium/special event security Urban critical infrastructure protection Stationary Today s Focus Ship defense In-flight aircraft protection Motorcade protection Parade/marathon security Mobile Homeland CUAV - 16
Homeland Counter UAV Architecture Scenarios Open Dense Airport protection Border monitoring Stadium/special event security Urban critical infrastructure protection Stationary Today s Focus Mobile Ship defense In-flight aircraft protection Motorcade protection Parade/marathon security Key Questions 1. What threat vectors are of most concern? 2. What are the challenges to sensing UAVs? 3. What is the ideal response outcome? 4. What legitimate UAV traffic must be managed? Homeland CUAV - 17
UAV Threats and Trajectories Airport Protection 1 UAV-Based Threats Aircraft attack Engine ingestion Passenger attack Air traffic disruption In-air targeting Trajectories On-tarmac targeting Innocent blunderers Homeland CUAV - 18
CUAV System Needs Airport Protection 2 Sensing: Sensing in regions of primary concern Discrimination from birds and ground traffic Testing and integration of existing sensors Homeland CUAV - 19
CUAV System Needs Airport Protection 2 Sensing: 3 Sensing in regions of primary concern Discrimination from birds and ground traffic Testing and integration of existing sensors Response: Separation of UAV from aircraft No interference with aircraft electronics Attribution of UAV operator Homeland CUAV - 20
CUAV System Needs Airport Protection 4 Policy/Regulation: Protected airspace around airport IFF system to allow blue UAVs entrance 2 Sensing: 3 Response: Sensing in regions of primary concern Separation of UAV from aircraft Discrimination from birds and ground traffic No interference with aircraft electronics Testing and integration of existing sensors Attribution of UAV operator Homeland CUAV - 21
UAV Threats and Trajectories Special Event Security 1 UAV-Based Threats Explosive attack Chem/Bio attack Inciting panic Trajectories External-origin trajectories Internal trajectories Homeland CUAV - 22
CUAV System Needs Special Event Security 2 Sensing: Sensing in area surrounding event Capability in high noise environment (acoustic, RF, etc.) Discrimination from vehicles & humans Homeland CUAV - 23
CUAV System Needs Special Event Security 2 Sensing: 3 Sensing in area surrounding event Capability in high noise environment (acoustic, RF, etc.) Discrimination from vehicles & humans Response: Ability to deter UAV No impact on humans Capability in noisy environment Attribution of UAV operator Homeland CUAV - 24
CUAV System Needs Special Event Security 2 Sensing: Sensing in area surrounding event Policy/Regulation: Capability in high noise environment (acoustic, RF, etc.) Discrimination from vehicles & humans 4 Restricted airspace around event Screening of entrants for UAVs Tracking of internal commercial UAVs 3 Response: Ability to deter UAV No impact on humans Capability in noisy environment Attribution of UAV operator Homeland CUAV - 25
Counter UAV Considerations Key Questions Airport Protection Considerations Special Event Security 1. What threat trajectories are of most concern? Highest air traffic areas Active runways High population areas Ability to screen attendees 2. What are the challenges to sensing UAVs? Need for dual-use ATC tech Airport surroundings Areas with moving targets Event/crowd emissions Areas with moving targets 3. What is the ideal response outcome? Impact of rerouting aircraft Aircraft safety requirements Need to intercept operator Human safety Possibility of inciting panic Need to intercept operator 4. What legitimate UAV traffic must be managed? Future use of cargo UAVs UAV use for video/tv Homeland CUAV - 26
Summary The growing trend of small UAV popularity is leading to a wide range of security incidents The UAV engagement chain presents several opportunities to prevent security threats: Policy and Regulations Intelligence Detection Technologies Response Methods To construct a CUAV architecture, it is important to examine the threat space, environment, surrounding traffic/clutter, and desired outcome Homeland CUAV - 27