06.01.2013 Views

Unmanned Aircraft Systems Roadmap 2005-2030 - Federation of ...

Unmanned Aircraft Systems Roadmap 2005-2030 - Federation of ...

Unmanned Aircraft Systems Roadmap 2005-2030 - Federation of ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

UAS ROADMAP <strong>2005</strong><br />

such as flares, chaff, other decoys, and/or traditional aircraft vulnerability reduction design concepts. The<br />

cost and intended purpose <strong>of</strong> the unmanned aircraft system will inform the decision to invest in the<br />

survivability <strong>of</strong> the aircraft.<br />

Command and Control System<br />

All current UAS have a command and control system for preprogramming the flight and/or direct remote<br />

piloting. The sophistication <strong>of</strong> the command and control system varies, but generally consists <strong>of</strong> uplink<br />

and downlink communications, navigation equipment and Global Positioning System, applications<br />

s<strong>of</strong>tware to control the aircraft and the payload. These links may be encrypted, but <strong>of</strong>ten are not. UAS<br />

have a ground station that may range from a laptop in the hands <strong>of</strong> a soldier or Marine in contact with<br />

hostile forces to a fixed plant installation within the continental United States. The physical threat to the<br />

ground station varies according to size and employed location. The uplink transmits command and<br />

control information from the ground station to the UA while the downlink provides health and status<br />

information from the UA to the operator. Information for the control <strong>of</strong> the payload can also be<br />

transmitted in the downlink. Generally, these communications channels emit continuously, thereby<br />

allowing radio direction finding techniques to be employed against the ground station and its UA.<br />

Depending upon the UAS, the command and control links may be interleaved with the payload (i.e.,<br />

information dissemination) data link or there may be two separate links.<br />

Data links are susceptible to jamming and intrusion by hostile forces. Jamming may degrade the ability<br />

<strong>of</strong> the system to transmit signals between the ground station and the UA, especially if the antenna on the<br />

UA is omni-directional, vice steerable. UA operating within radio line <strong>of</strong> sight from their control stations<br />

are more likely to use an omni-directional antenna approach, while UA operating through communication<br />

satellites are more likely to employ a steerable dish antenna with a relatively narrow beam. Unintentional<br />

jamming from friendly or neutral communications emitters may also degrade the UA’s capabilities.<br />

Hostile forces may intrude into either the C2 or the data link in order to take over the UA or degrade the<br />

UA control or payload data reception so that it cannot carry out its intended mission.<br />

Navigation equipment, <strong>of</strong>ten augmented by GPS, and mission management s<strong>of</strong>tware provide the UA the<br />

capability to fly a given route and collect the desired information. Because such navigation systems are<br />

dependent upon receiving GPS satellite signals, any denial <strong>of</strong> GPS service will impact the mission<br />

effectiveness <strong>of</strong> the UA, perhaps even causing its loss. Although events like the jamming or destruction<br />

<strong>of</strong> a GPS satellite are beyond the control <strong>of</strong> the UA operator, that jamming or destruction would<br />

essentially bring most UA operations to a rapid halt.<br />

Finally, the mission management s<strong>of</strong>tware can be affected through several means either before or after the<br />

aircraft is launched. Viruses, Trojan horses, and other hostile s<strong>of</strong>tware agents can infect the UAS’<br />

s<strong>of</strong>tware and keep the system from fulfilling its mission.<br />

Payloads<br />

Payloads vary according to UA type and mission, with the overwhelming majority <strong>of</strong> UA payloads being<br />

imaging payloads; therefore this discussion will be limited to imaging payload survivability. Payloads<br />

can be either external, as in a ball or pod that hangs from the aircraft, or internal. In smaller, less<br />

expensive UAS, locating the payload internally does not dramatically decrease vulnerability. Payloads<br />

are generally not specifically targeted in the smaller aircraft because it is just as easy to destroy or degrade<br />

the UA itself.<br />

Payloads are susceptible to physical threats; even though the payload is not likely to be targeted<br />

specifically it may suffer collateral damage from an attack on the UA. Passive payloads may be degraded<br />

by electronic attack, but a relatively long dwell time is required to cause permanent damage. However<br />

active sensors, such as radars, are more susceptible to electronic attack. Even a short-term attack can<br />

cause significant long-term damage.<br />

APPENDIX K – SURVIVABILITY<br />

Page K-3

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!