Aerospace & Defense Technology - May 2022 - 13

Counter-Drone Technology
Militaries can designate certain sUASs
as authorized, so these drones can continue
to perform their vital functions
without interruption during the rogue
drone mitigation process. And by pinpointing
the pilot's location at the point
of takeoff, the military can focus on the
terror source, ending the cycle of repeat
attacks.
Cyber-takeover technology can be
affixed to a military vehicle to offer a
bubble of protection, so forces can enjoy
full mobility without limitations imposed
by the rogue drone threat. By operating
mostly in passive mode, takeover technology
maintains the element of surprise
by not electronically unmasking military
units. Other counter-drone methods,
such as radars, may emit signals that can
provide a trail of breadcrumbs to terrorists,
leading them and their anti-radar
missiles directly to the target.
Cyber-takeover technologies, like
those provided by D-Fend Solutions,
function by passively and continuously
scanning and detecting unique communication
signals used by commercial
drones. Once detected, they extract the
drone identifiers for drone identification
and classification and decode the
telemetry signal to extract the drone
position with GPS accuracy, as well as
its take-off position near the pilot in
real time.
During the mitigation process, the
drone user pilot then loses control of the
drone, including video and telemetry
information. He cannot regain control
over the drone until the process is completed.
Meanwhile, the cyber-takeover
technology emits a non-jamming solution
that transmits a precise and short
signal, taking control over the rogue
drone without interfering with other
drones and communication signals.
Controlling rogue drones and reaping
the accompanying intelligence is critical
on today's battlefield. Traditional
solutions are under fire for not measuring
up to these requirements, while
cyber-takeover technology continues to
evolve along with militants' commercial
drone technology.
This article was written by Jeffrey Starr,
Counter-Drone Specialist, D-Fend Solutions
(McLean, VA). For more information, visit
http://info.hotims.com/82321-501.
Aerospace & Defense Technology, May 2022
Cyber-Takeover Counter-Drone Approach
Flagship C-s UAS System
Radio frequency(RF)-based,
cyber-takeover technology
Detects& takescontrol
Lands drones safely in a
designated zone
▪
▪
▪
-
Immediate Benefits
Non jamming provides continuity
Non kinetic prevents collateral
damageissues
Line of sight not required
-
-
-Safe
Zone
Capabilities forControl and Safety
Across theRogue DroneIncidentLifecycle
Detect &
Alert
Locate &
Track
Discover Pilot Position &
Identification
Take Control &
Land
Identify the Drone
(IFF)
Fend-off
PASSIVE
ACTIVE RF
-
Cyber Counter-Drone Core Concepts for Continuity
CONTROL
The bestway to control the drone threat is to take
control of the drone
CONTROL
SAFETY
A safe landing or fending off the rogue drone is the
best possible outcome for safe airspace and continuity
FOCUS
FUTURE
Continuity
SAFETY
Counter-drone measures must focus on the real risk,
the most dangerous drones, andemploy drone risk
analysis, assessment, and prioritization
FUTURE
Theconstantly changing and increasingly complex
drone threat requiresforeseeing the drone future and
always staying a drone threat ahead
FOCUS
mobilityengineeringtech.com
13
ADT Feature 2 - Counter UAS Technology 0522_1.indd 13Intro
Cov
ToC
+
-
A
µ
4/28/22 2:03 PM
È
http://info.hotims.com/82321-501 http://www.mobilityengineeringtech.com http://info.hotims.com/82321-830

Aerospace & Defense Technology - May 2022

Table of Contents for the Digital Edition of Aerospace & Defense Technology - May 2022

Aerospace & Defense Technology - May 2022 - Intro
Aerospace & Defense Technology - May 2022 - Cov 4
Aerospace & Defense Technology - May 2022 - Cov 1
Aerospace & Defense Technology - May 2022 - Cov 2
Aerospace & Defense Technology - May 2022 - 1
Aerospace & Defense Technology - May 2022 - 2
Aerospace & Defense Technology - May 2022 - 3
Aerospace & Defense Technology - May 2022 - 4
Aerospace & Defense Technology - May 2022 - 5
Aerospace & Defense Technology - May 2022 - 6
Aerospace & Defense Technology - May 2022 - 7
Aerospace & Defense Technology - May 2022 - 8
Aerospace & Defense Technology - May 2022 - 9
Aerospace & Defense Technology - May 2022 - 10
Aerospace & Defense Technology - May 2022 - 11
Aerospace & Defense Technology - May 2022 - 12
Aerospace & Defense Technology - May 2022 - 13
Aerospace & Defense Technology - May 2022 - 14
Aerospace & Defense Technology - May 2022 - 15
Aerospace & Defense Technology - May 2022 - 16
Aerospace & Defense Technology - May 2022 - 17
Aerospace & Defense Technology - May 2022 - 18
Aerospace & Defense Technology - May 2022 - 19
Aerospace & Defense Technology - May 2022 - 20
Aerospace & Defense Technology - May 2022 - 21
Aerospace & Defense Technology - May 2022 - 22
Aerospace & Defense Technology - May 2022 - 23
Aerospace & Defense Technology - May 2022 - 24
Aerospace & Defense Technology - May 2022 - 25
Aerospace & Defense Technology - May 2022 - 26
Aerospace & Defense Technology - May 2022 - 27
Aerospace & Defense Technology - May 2022 - 28
Aerospace & Defense Technology - May 2022 - 29
Aerospace & Defense Technology - May 2022 - 30
Aerospace & Defense Technology - May 2022 - 31
Aerospace & Defense Technology - May 2022 - 32
Aerospace & Defense Technology - May 2022 - 33
Aerospace & Defense Technology - May 2022 - 34
Aerospace & Defense Technology - May 2022 - 35
Aerospace & Defense Technology - May 2022 - 36
Aerospace & Defense Technology - May 2022 - 37
Aerospace & Defense Technology - May 2022 - 38
Aerospace & Defense Technology - May 2022 - 39
Aerospace & Defense Technology - May 2022 - 40
Aerospace & Defense Technology - May 2022 - 41
Aerospace & Defense Technology - May 2022 - 42
Aerospace & Defense Technology - May 2022 - 43
Aerospace & Defense Technology - May 2022 - 44
Aerospace & Defense Technology - May 2022 - 45
Aerospace & Defense Technology - May 2022 - 46
Aerospace & Defense Technology - May 2022 - 47
Aerospace & Defense Technology - May 2022 - 48
Aerospace & Defense Technology - May 2022 - Cov 3
Aerospace & Defense Technology - May 2022 - Cov 4
https://www.nxtbook.com/smg/techbriefs/24ADT02
https://www.nxtbook.com/smg/techbriefs/23ADT12
https://www.nxtbook.com/smg/techbriefs/23ADT10
https://www.nxtbook.com/smg/techbriefs/23ADT09
https://www.nxtbook.com/smg/techbriefs/23ADT08
https://www.nxtbook.com/smg/techbriefs/23ADT06
https://www.nxtbook.com/smg/techbriefs/23ADT05
https://www.nxtbook.com/smg/techbriefs/23ADT04
https://www.nxtbook.com/smg/techbriefs/23ADT02
https://www.nxtbook.com/smg/techbriefs/22ADT12
https://www.nxtbook.com/smg/techbriefs/22ADT10
https://www.nxtbook.com/smg/techbriefs/22ADT09
https://www.nxtbook.com/smg/techbriefs/22ADT08
https://www.nxtbook.com/smg/techbriefs/22ADT06
https://www.nxtbook.com/smg/techbriefs/22ADT05
https://www.nxtbook.com/smg/techbriefs/22ADT04
https://www.nxtbook.com/smg/techbriefs/22ADT02
https://www.nxtbook.com/smg/techbriefs/21ADT12
https://www.nxtbook.com/smg/techbriefs/21ADT10
https://www.nxtbook.com/smg/techbriefs/21ADT09
https://www.nxtbook.com/smg/techbriefs/21ADT08
https://www.nxtbook.com/smg/techbriefs/21ADT06
https://www.nxtbook.com/smg/techbriefs/21ADT05
https://www.nxtbook.com/smg/techbriefs/21ADT04
https://www.nxtbook.com/smg/techbriefs/21ADT02
https://www.nxtbookmedia.com