您的浏览器禁用了JavaScript(一种计算机语言,用以实现您与网页的交互),请解除该禁用,或者联系我们。 [Calhoun]:全球地缘政治环境中的反无人机系统(C-UAS)互操作性 - 发现报告

全球地缘政治环境中的反无人机系统(C-UAS)互操作性

国防军工 2021-09-01 - Calhoun 测试专用号2高级版
报告封面

Golphin, Allen N., III; Offord, Boswyck D., II Monterey, CA; Naval Postgraduate School https://hdl.handle.net/10945/68325 This publication is a work of the U.S. Government as defined in Title 17, UnitedStates Code, Section 101. Copyright protection is not available for this work in theUnited States. Downloaded from NPS Archive: Calhoun MONTEREY, CALIFORNIA THESIS THISPAGEINTENTIONALLYLEFTBLANK Approved for public release. Distribution is unlimited. COUNTER-UNMANNED AERIAL SYSTEMS (C-UAS)INTEROPERABILITY IN THE GLOBAL GEOPOLITICALENVIRONMENT Allen N. GolphinLieutenant, United States NavyBS, Georgia State University, 2013MS, Johns Hopkins University, 2018 Boswyck D. OffordLieutenant Commander, United States NavyBS, Norfolk State University, 2009 Submitted in partial fulfillment of therequirements for the degree of MASTER OF SCIENCE IN COMPUTER SCIENCE from the NAVAL POSTGRADUATE SCHOOLSeptember 2021 Approved by:Britta HaleAdvisor Douglas L. Van BossuytCo-Advisor Gurminder SinghChair, Department of Computer Science THISPAGEINTENTIONALLYLEFTBLANK ABSTRACT The U.S. Navy (USN) and U.S. Marine Corps (USMC) are tasked with providingcounter-unmanned aerial system (C-UAS) defense for a multitude of mission facets.Using theplethora of C-UAS capabilities available for market purchase,bothserviceshave invested in non-complementary C-UAS capabilities.Furthermore,C-UAS coordination and integration is not well-defined in USN or USMC warfaredoctrines.Thisworkaddresses thecurrentandfutureC-UAShardwareinteroperabilityand effectiveness needsbydistinguishing where and wheninteroperabilityisappropriate,identifyingoperationalinterferences,andrecognizingany duplication of efforts.Areas of responsibility and host nations’operationalauthority,legal restrictions,and variances in unmanned aerial system(UAS)threats serve as constraints and impose restraints on which C-UAS technologiesare optimal for universal employment. We focus on threats from smaller, handheld,commercially available UASs. To meet the demand of joint C-UAS requirements,the USN and USMC must divest from the previous mentality of interim solutions tosolve apermanent problem.Long-term,interoperable C-UAS solutions capable ofperforming at high rates of effectiveness against current and future UAS threats areneeded. THISPAGEINTENTIONALLYLEFTBLANK Contents 1Introduction 1 1.1Problem Statement........................11.2Methodology ..........................3 2Background7 2.1Unmanned Aerial System Groups ..................72.2UAS Employment in History....................82.3UAS Employment by Non-state Actors ................102.4Modern UAS Threat Scenarios ...................142.5UAS Modes of Operation .....................172.6UAS Tactics Overview ......................192.7U.S. CUAS Technology ......................252.8CUAS Market.........................282.9CUAS Targeting Cycle ......................312.10 Current CUAS Technological and Legal Limitations..........352.11 Applications of CUAS Products..................402.12 Summary...........................41 3Adversarial UAS Operators43 3.1Unmanned Aerial System Employment Overview...........433.2Hobbyist............................443.3Non-state Actors........................453.4State Actors..........................493.5Adversarial UAS Employment Association ..............523.6Summary...........................53 4UAS Technologies 55 4.1Unmanned Aerial Systems Architecture Overview...........554.2UAS Flight Controller......................56 4.3UAS Ground Control Station....................584.4UAS Command and Control ....................584.5DJI UAS Case Study .......................714.6Summary...........................82 5UAS Threats In Each Area of Responsibility85 5.1Adversarial Tactics by Area of Responsibility .............855.2Summary...........................113 6Current USN and USMC CUAS Technologies115 6.1The Counter Unmanned Aerial Systems Kill Chain ...........1156.2Detection and Tracking Techniques .................1206.3Mitigation Techniques......................1246.4USN and USMC CUAS Interoperability ...............1266.5Summary...........................126 7Modeling and Simulation of the Effectiveness of CUAS Technologies129 7.1Counter Unmanned Systems Effectiveness Factors ...........1297.2Model Description, Limitations, Assumptions, and Constraints ......1297.3Effectiveness Against Current UAS Threats ..............1377.4Effectiveness Against Emerging UAS Threats .............1477.5Summary...........................159 8CUAS Legal Limitations in Each Area of Responsibility161 8.1Counter Unmanned Aerial Systems Employment Framework .......1618.2Overview Of CUAS Legal Implications In The Continent Of The United States 1628.3Overview Of CUAS Legal Implications Outside The Continent of the UnitedStates .............................1658.4CUAS Legal Implications in each Geographic Area of Responsibility....1698.5CUAS Employment – Legal Framework Way Ahead..