Enterprise approach enables C2 counter-UAS for nationwide security
Since the mid-2000s, drones – both commercial and military-grade unmanned aerial systems (UAS) – have seen drastic advances in their capabilities and ways in which they are used for nefarious purposes on and off the battlefield, and so too have the methods used to detect and defeat them.
Early waves of drones were slow and could only carry limited cargo, making them easy to shoot down if they were deemed to pose a threat. Today, even off-the-shelf consumer-grade drones are smaller, fly faster, move in groups or swarms, and can be incredibly difficult to detect and track.
Radio frequency (RF) jamming has proved to be the most effective means of stopping drones without causing collateral damage and allowing for the tracking of pilots. This has been proven in various settings, most prominently in Ukraine’s defence against Russia’s invasion.
But the continued proliferation in drone capabilities and volumes has driven a need for heightened intelligence and control – and this is where command-and-control systems (C2) become crucial.
C2 systems are an essential part of a counterdrone network of sensors and effectors, providing central control nodes at all echelons of Command. That is from the Tactical Commander in the field to the General’s ‘big picture view’ at the operational level of Command.
Traditionally, C2 systems are defence-grade items. This has meant they have been priced accordingly (often incredibly expensive), and require security restrictions on their use (mostly for appropriately secret cleared defence personnel), making them inaccessible to non-defence applications).
While this is appropriate for C2 systems focussed on traditional battle management, it’s too limiting for counterdrone or counter-UAS (C-UAS) systems needed by law enforcement, critical infrastructure, airports, data centres and other civilian users.
An “enterprise approach” to counter-UAS C2 plugs this gap, extending the advantages of a C2 system that offers capabilities up to military standards to industries that don’t have or need military security clearances, classified networks or other logistical impediments of a traditional C2. The added benefit is an enterprise system is that it comes with a clean separation of technologies in the case of a breach.
There are several critical elements to an effective C2 system:
The system needs to be designed and built to serve as a "master brain" (one which draws on multiple C2 nodes distributed to protected sites) as well as the ability to operate as a tactical system - off the network - including the ability to be deploy on tablets that enable full functionality in the field.
It must operate via a secure cloud, or in a closed on-premises form.
Analysis and reporting tools need to be built into each node of the system, as these are vital to understand the pattern of the drone threat, which helps inform deterrence and defeat strategies.
The C2 system should be an open system architecture, meaning the system is open for system integration and can be employed across all echelons of Command.
It would be supplied by a provider with a proven history and ongoing commitment to both software updates and integration of new sensors and effectors to ensure users can rely on a future-proofed solution capable of evolving alongside a developing drone threat landscape.
Opting for a supplier with experience as both the hardware (sensor/effector) maker and a C2 provider is helpful, as it enables expertise and capability for the best overall product.
The C-UxS C2 system needs strong operability and the ability to be integrated into larger systems, such as AIR6500 in Australia. Again, an open system architecture supports the integration of the counter drone picture into Joint All Domain C2 (JADC2) systems in a system of systems approach.
DroneShield currently provides its DroneSentry-C2 ‘enterprise’ system to military and civilian users around the world, both in its flagship DroneSentry-C2 format, and the tactical, field commander based, DroneSentry-C2 Tactical.