Unmanned Aircraft Systems Roadmap 2005-2030 - Federation of ...
Unmanned Aircraft Systems Roadmap 2005-2030 - Federation of ...
Unmanned Aircraft Systems Roadmap 2005-2030 - Federation of ...
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
UAS ROADMAP <strong>2005</strong><br />
such as flares, chaff, other decoys, and/or traditional aircraft vulnerability reduction design concepts. The<br />
cost and intended purpose <strong>of</strong> the unmanned aircraft system will inform the decision to invest in the<br />
survivability <strong>of</strong> the aircraft.<br />
Command and Control System<br />
All current UAS have a command and control system for preprogramming the flight and/or direct remote<br />
piloting. The sophistication <strong>of</strong> the command and control system varies, but generally consists <strong>of</strong> uplink<br />
and downlink communications, navigation equipment and Global Positioning System, applications<br />
s<strong>of</strong>tware to control the aircraft and the payload. These links may be encrypted, but <strong>of</strong>ten are not. UAS<br />
have a ground station that may range from a laptop in the hands <strong>of</strong> a soldier or Marine in contact with<br />
hostile forces to a fixed plant installation within the continental United States. The physical threat to the<br />
ground station varies according to size and employed location. The uplink transmits command and<br />
control information from the ground station to the UA while the downlink provides health and status<br />
information from the UA to the operator. Information for the control <strong>of</strong> the payload can also be<br />
transmitted in the downlink. Generally, these communications channels emit continuously, thereby<br />
allowing radio direction finding techniques to be employed against the ground station and its UA.<br />
Depending upon the UAS, the command and control links may be interleaved with the payload (i.e.,<br />
information dissemination) data link or there may be two separate links.<br />
Data links are susceptible to jamming and intrusion by hostile forces. Jamming may degrade the ability<br />
<strong>of</strong> the system to transmit signals between the ground station and the UA, especially if the antenna on the<br />
UA is omni-directional, vice steerable. UA operating within radio line <strong>of</strong> sight from their control stations<br />
are more likely to use an omni-directional antenna approach, while UA operating through communication<br />
satellites are more likely to employ a steerable dish antenna with a relatively narrow beam. Unintentional<br />
jamming from friendly or neutral communications emitters may also degrade the UA’s capabilities.<br />
Hostile forces may intrude into either the C2 or the data link in order to take over the UA or degrade the<br />
UA control or payload data reception so that it cannot carry out its intended mission.<br />
Navigation equipment, <strong>of</strong>ten augmented by GPS, and mission management s<strong>of</strong>tware provide the UA the<br />
capability to fly a given route and collect the desired information. Because such navigation systems are<br />
dependent upon receiving GPS satellite signals, any denial <strong>of</strong> GPS service will impact the mission<br />
effectiveness <strong>of</strong> the UA, perhaps even causing its loss. Although events like the jamming or destruction<br />
<strong>of</strong> a GPS satellite are beyond the control <strong>of</strong> the UA operator, that jamming or destruction would<br />
essentially bring most UA operations to a rapid halt.<br />
Finally, the mission management s<strong>of</strong>tware can be affected through several means either before or after the<br />
aircraft is launched. Viruses, Trojan horses, and other hostile s<strong>of</strong>tware agents can infect the UAS’<br />
s<strong>of</strong>tware and keep the system from fulfilling its mission.<br />
Payloads<br />
Payloads vary according to UA type and mission, with the overwhelming majority <strong>of</strong> UA payloads being<br />
imaging payloads; therefore this discussion will be limited to imaging payload survivability. Payloads<br />
can be either external, as in a ball or pod that hangs from the aircraft, or internal. In smaller, less<br />
expensive UAS, locating the payload internally does not dramatically decrease vulnerability. Payloads<br />
are generally not specifically targeted in the smaller aircraft because it is just as easy to destroy or degrade<br />
the UA itself.<br />
Payloads are susceptible to physical threats; even though the payload is not likely to be targeted<br />
specifically it may suffer collateral damage from an attack on the UA. Passive payloads may be degraded<br />
by electronic attack, but a relatively long dwell time is required to cause permanent damage. However<br />
active sensors, such as radars, are more susceptible to electronic attack. Even a short-term attack can<br />
cause significant long-term damage.<br />
APPENDIX K – SURVIVABILITY<br />
Page K-3