G2TT
来源类型Report
规范类型报告
DOIhttps://doi.org/10.7249/RR3023
来源IDRR-3023-DHS
Small Unmanned Aerial System Adversary Capabilities
Bradley Wilson; Shane Tierney; Brendan Toland; Rachel M. Burns; Colby P. Steiner; Christopher Scott Adams; Michael Nixon; Raza Khan; Michelle D. Ziegler; Jan Osburg; et al.
发表日期2020-03-12
出版年2020
语种英语
结论

Consequential nefarious sUAS uses are possible—and even likely—with today's technologies

  • The research identified four likely and consequential notional use cases involving the nefarious use of sUASs: unauthorized reconnaissance or surveillance, conveying illicit material, conducting a kamikaze explosive (i.e., kinetic) attack, and conducting a chemical, biological, or radiological attack.
  • Of the systems on the market today, 27 could complete all four of these notional missions, though they are predominately available to defense markets. However, approximately 500 currently available systems can perform at least one of the missions.

Trends in the commercial sUAS market continue to improve sUAS capabilities

  • Miniaturized radar, hyperspectral capabilities, and light detection and ranging (LIDAR) payloads have been developed to work onboard sUASs.
  • Global Navigation System satellite jamming and spoofing will continue to be attractive to nefarious sUAS users because a limited amount of power is required and because an sUAS has the ability to get into unobstructed positions, maximizing the impact of such attacks.
  • There are many how-to guides on the internet describing how to fit an sUAS with a cellular network transceiver for remote control, providing the ability to operate the sUAS from a distance and safeguarding human operators from law enforcement detection when conducting nefarious operations.
  • There is a robust open-source software and hardware ecosystem for supporting autonomous control, autopilot, and other sensors and control systems needed for remote operation.
摘要

It is difficult to detect, identify, classify, and—consequently—counter nefarious small unmanned aerial systems (sUASs) weighing less than 55 lbs, particularly in environments with high levels of sensory clutter, such as urban areas. As the U.S. Department of Homeland Security (DHS) prepares for potential threats from sUASs, it will need to know the types of threat scenarios in which these systems could be used, which design elements are likely to be exploited by a nefarious actor, and which technologies and capabilities may be available in the near future to either threaten public safety or facilitate DHS efforts to counter such activities.

,

To support the department's efforts to identify where it should prioritize investments in counter-UAS capabilities, this report examines trends in sUAS development, the features that are likely to aid nefarious users, and how such actors could use an sUAS (or multiple systems) to conduct various types of operations—from surveilling U.S. government facilities to dispersing a chemical agent at a large public event.

,

Overall, the commercial sUAS market has been moving toward smaller, lighter, and more-difficult-to-detect systems. There have also been notable increases in speed, range, and endurance and decreases in acoustic signatures. Certain sUAS models have adequate payload capacity to carry a significant amount of explosive material or illicit goods. All these trends could benefit nefarious actors—and challenge DHS efforts to counter them.

目录
  • Chapter One

    Introduction

  • Chapter Two

    Technology Capability Assessment

  • Chapter Three

    Performance Analysis

  • Chapter Four

    Novel and Likely Nefarious Tactical Use Cases

  • Chapter Five

    sUAS Detectability

主题Civilian and Commercial Drones ; Terrorism Threat Assessment
URLhttps://www.rand.org/pubs/research_reports/RR3023.html
来源智库RAND Corporation (United States)
引用统计
资源类型智库出版物
条目标识符http://119.78.100.153/handle/2XGU8XDN/524030
推荐引用方式
GB/T 7714
Bradley Wilson,Shane Tierney,Brendan Toland,et al. Small Unmanned Aerial System Adversary Capabilities. 2020.
条目包含的文件
文件名称/大小 资源类型 版本类型 开放类型 使用许可
RAND_RR3023.pdf(4017KB)智库出版物 限制开放CC BY-NC-SA浏览
x1584018801475.jpg.p(5KB)智库出版物 限制开放CC BY-NC-SA浏览
个性服务
推荐该条目
保存到收藏夹
导出为Endnote文件
谷歌学术
谷歌学术中相似的文章
[Bradley Wilson]的文章
[Shane Tierney]的文章
[Brendan Toland]的文章
百度学术
百度学术中相似的文章
[Bradley Wilson]的文章
[Shane Tierney]的文章
[Brendan Toland]的文章
必应学术
必应学术中相似的文章
[Bradley Wilson]的文章
[Shane Tierney]的文章
[Brendan Toland]的文章
相关权益政策
暂无数据
收藏/分享
文件名: RAND_RR3023.pdf
格式: Adobe PDF
文件名: x1584018801475.jpg.pagespeed.ic.dIyGo_aebp.jpg
格式: JPEG

除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。