The fight against unmanned aerial systems (UAS) is both an art and science when it comes to countering proliferation and ever-advancing threats across the modern battlefield. Since its founding in 2017, Onyx has been at the edge of the counter unmanned aerial systems (CUAS) technology, having served as a trusted and strategic advisor for both the public and private sector clients seeking to explore innovative methods to address this new type of rapidly evolving threat.
Onyx has assessed CUAS technologies across the industry to provide insight and expert consultation to both domestic and foreign defense ministries to aid in expansive defense modernization programs. These assessments have traditionally aided in developing and refining requirements for countering unmanned systems, testing and evaluating the efficacy of detect and deter platforms, and advising on policy matters while shaping programs and practices to advance the implementation of counter-unmanned systems to protect critical infrastructure in dynamic operational environments. The Onyx CUAS solution was created to assist our clients in guiding the development of new and innovative technologies that reinforce critical defense in depth against such threats.
Tactical unmanned systems have benefited from advancing autonomy, inertial navigation, and GPS-denied flight technologies that have increased the capabilities of the threat. Similar to the cat-and-mouse challenges of the counter-improvised explosive devices (C-IED) threat experienced during the War on Terror, the CUAS fight has exposed a 3-dimensional challenge that requires a comprehensive strategy enabled by even more innovative tiered defensive technologies.
The recent media reporting on the conflict in Ukraine has put the spotlight on the matter, highlighting the use of military drones in this new threat environment.
There is no silver bullet to the CUAS crisis. It is our position that this fight of technology and wit requires a comprehensive and layered approach. If we look at the fundamentals of a tactical defense strategy, it is exponentially effective when each layer of a defensive network reinforces in concert by feeding real-time updates and assessments that drive critical decisions when time is finite.
Onyx counter unmanned aerial systems Defense in Depth implies a focus on one or more objects projecting threat to static or dynamic resources.
Perimeter security is the first layer that seeks to detect and classify a threat from the greatest range possible. Once a platform has been classified, this data instantly feeds the response loop.
Electronic Security refers to the gate which analyzes the information served from perimeter data to determine appropriate technical engagements. These can include radio jamming, telemetry exploitation, or GPS affecters. The design of the electronic security gate is to affect both the trajectory and accuracy of the threat system.
Endpoint Security is the last attempt to incapacitate an unmanned object; electronic mitigations have failed, and kinetic or physical response must damage or destroy the object to protect critical assets. There are many solutions on the market for these applications, and each is riddled with pros and cons in both effectiveness and distance. The threat continues its attack profile on the path to a critical resource.
Structural protections serve as a last resort to dampen the effects of impact. These include physical improvements like cages, fences, or nets that reduce the impact or mitigate a triggering mechanism from direct contact.
A layered CUAS solution requires controls throughout the chain. These controls provide oversight to the system and are reflected through effective policy management, monitoring, and response. Critical to these controls are permissions and authorizations to engage highly technical or physical responses that potentially have effects beyond the targeted object(s).
Onyx has adopted a layered approach to ensure appropriate controls throughout the chain of organizational structure:
Administrative: an organization's policies and procedures will drive the responsiveness and engagement strategies beyond the identification and classification of a potential threat. At what point is the system considered a threat, and at what stage is policy able to engage in either physical or technical prevention?
Technical: technical controls are the hardware and software mechanisms with the purpose of protecting resources and infrastructure. These may include electronic jamming, packet intrusions, or other technical means of affecting the telemetry, controls or trigger inherent failsafe to mitigate the threat of the object.
Physical: physical controls are any security access features that a counter unmanned solution will provide. Be it projectile, air burst munitions, water jets, or nets. These are the barriers that react to the physical impact or threat posed by the platform(s).
Contact us today to explore how Onyx can help you effectively counter threats posed by unmanned aerial systems and enhance mission success.
AI Airborne Operations Air Force Artificial Intelligence ATAK AUSA Critical Infrastructure CUAS Cyber Defense Technology Drones Force Modernization Force Protection FYNDER Ground Operations Human-Machine Teaming ISOF ISR JUMP V60 Logistics Enablement Maritime Mobility NAUT NighHawk NightHawk Onyx Events Onyx Industries Onyx Partners Onyx X360 Pararescue PJ Rodeo RAMT RAW Risk Mitigation Robotics SENTRY Situational Awareness SOF Week Special Operations Threat Assessment UAVs UGVs Unmanned Mobility Unmanned Systems USAF VEST V60