DHS Explores Counter-UAS Measures
Wednesday, July 21, 2021 | Comments

The Department of Homeland Security (DHS) Science and Technology Directorate (S&T) is supporting counter unmanned aerial system (C-UAS) research, testing, training and evaluation across multiple DHS missions and components.

In the last few years, drones have flown over, and in some cases landed within, restricted areas across the country, with notable incidents in the nation’s capital. In 2015, a quadcopter crashed on the grounds of the White House. Later that same year, a drone crash-landed on the White House Ellipse, near the South Lawn. Though benign hobbyists often use them, these small UAS can be exploited for any number of illegal activities, thereby posing a significant threat to facilities related to critical infrastructure and national security.

The popularity of UAS, or drones, has grown as the cost has become more affordable. Their nefarious capabilities continue to increase, as well. They can attain high speeds and move in three dimensions with the potential to carry dangerous payloads, smuggle contraband and conduct illicit surveillance. The applications are endless, which creates a formidable challenge for national security agencies, including DHS S&T.

Adaptation is key to ensuring resilience. A number of tests have been executed over the last year and more are planned in coordination with the U.S. Coast Guard (USCG), U.S. Secret Service (USSS), Federal Protective Services (FPS) and Customs and Border Protection (CBP).

“It's important for us to determine how technologies perform in operational environments, especially in urban environments, where we have very high radio frequency or spectrum noise,” said S&T Program Manager Shawn McDonald. “There are also tall buildings where you have reflections of that energy. So, we need to adequately characterize the performance of these systems. We're testing various commercial and government systems against realistic threats to obtain those performance characteristics so our DHS components clearly understand what the system does and how effective it is against those threats.”

Until recently, when a DHS agent or officer observed a drone that was violating restricted airspace, or was a credible threat to the public, they could not do much to counteract. Agents could only warn the operator that they were violating air space. DHS could detect, identify, monitor and track unmanned aircraft using traditional radar or electro-optical/infrared systems, but with the rising incidents of unauthorized usage, it became apparent that mitigation authority was also necessary.

In 2018, Congress passed the Preventing Emerging Threats Act, which provided limited legal authority for law enforcement officers performing specific authorized missions to disrupt, seize, control, confiscate and if necessary, disable, damage, or destroy unmanned aircraft posing a threat to certain facilities and assets. This amendment provides exemption from certain criminal laws applicable to electronic communications and to aircraft flight so the government can protect American citizens without violating legal, privacy, or other civil rights and/or liberties.

“C-UAS is a layered approach of state-of-the-art technology, tactics, and procedures that law enforcement utilizes to mitigate hostile UAS threats,” said FPS Branch Chief Jarred Pennington.

Mitigation strategies range from electronic disruption of the operator’s control to physically interdicting the UAS operator. The C-UAS equipment listens for unique UAS RF signatures within a protected area to supply real-time threat information to the command center to identify, classify and track UAS, as well as establish the location of the operator. It provides air domain awareness to develop trend data that enables the agent to better understand the operator's intent and determine the proper tactic to mitigate a potential threat while adhering to strict privacy-sustaining procedures and safeguards.

In light of this enhanced authority, continuing to protect the civil liberties of those using drones in a legal and responsible manner is paramount. A balance must be maintained between the ability of our government to mitigate a threatening drone and protect a lawful drone user’s privacy. A variety of C-UAS technologies are available today, but they must adhere to strict guidelines established under U.S. Code Title 6, Section 124n to protect the privacy and rights of U.S. citizens. The process for receiving approval to use C-UAS technologies with the potential to violate Title 18 or 49 of the U.S. Code is known as the 124n process, which is a collaborative, interagency effort.

“124n gives DHS the ability to defend itself against bad actors while still preserving the privacy of lawful users and encouraging safe and secure integration of UAS into the national airspace,” said Brent Cotton of the DHS C-UAS Program Management Office.

S&T is collaborating internally with DHS components performing C-UAS-authorized missions according to U.S. Code Title 6, Section 124n, which includes the Transportation Security Administration (TSA), CBP, FPS, USCG and USSS. They have developed strong interagency partnerships with the Federal Aviation Administration (FAA), National Telecommunications and Information Administration (NTIA), Department of Justice (DoJ), Department of Defense (DoD), and the National Security Council (NSC) at the White House.

“We have recognized that this is a whole-of-government problem, not just a DHS problem, and we're collaborating internally and externally to make sure we have appropriate strategies to deal with it,” said Cotton.

S&T works with the various DHS components by lending expertise to help identify requirements and select the best C-UAS technology for the mission. DHS, S&T, FAA and NTIA collaborate to develop the necessary policies, operational plans, and legal and privacy documents required for approval to use new C-UAS technologies. This holistic government approach streamlines a complex process into a clearly defined, repeatable set of steps that allows DHS to efficiently work towards meeting the 124n requirements, which include coordinating with the FAA.

S&T tests all the equipment and coordinates with interagency organizations to minimize any impact, if any, to the national airspace. They work with DHS components to install, integrate and test those technologies in operational environments to fully understand the capabilities and limitations of those systems. Lessons learned during the testing are shared across all the components so that all can move forward as quickly and as safely as possible.

“The collaboration between the components has greatly sped up the development of the technology and this has been critical in providing feedback to appropriately use the technology,” said Aaron Godbey, district commander with the FPS. “As that happens, we're able to better identify the adversaries and how this technology will be used to address these emerging threats.”

S&T is responsible for coordinating with system vendors to set up and train DHS components so that after a test event, they have C-UAS equipment in place and ready to use. For a single test event, several C-UAS systems are installed across a facility to provide a robust system of systems approach to addressing the threat. Officials fly target UAS from various locations with varying flight profiles to evaluate performance capabilities as the different technologies detect, track, identify and mitigate the incoming target. The goal is to identify a C-UAS system, or combination of systems, that will be able to detect, confirm and react in real time to thwart acts of terror and threats of violence. S&T testers validate how well a C-UAS technology performs each of the major steps of detection, tracking, identification and mitigation for each target.

“Probably most importantly, this testing gives our law enforcement men and women time to use the systems so they can become comfortable with how they operate and what the expected performance is for each,” said McDonald. “We want them to be adequately trained and comfortable with the system capabilities so that when they are called on to use them, they're ready to execute with confidence in the technology.”

Would you like to comment on this story? Find our comments system below.

Post a comment
Name: *
Email: *
Title: *
Comment: *


No Comments Submitted Yet

Be the first by using the form above to submit a comment!


November 2022

8 - 10
Communications Marketing Conference (CMC)
Albuquerque, New Mexico

March 2023

27 - 30
International Wireless Communications Expo (IWCE) 2023
Las Vegas

More Events >

Site Navigation