0 0
Read Time:47 Second

Professor of Practice, UAS – Cybersecurity Randall K. Nichols, DTM, Kansas State University Polytechnic, Salina KS

wyvernKSU

  • Executive Summary
  • C-UAS Overview
  • Key Indicators
    • Political
    • US Legislation
    • Economic
    • Military
  • Summary
  • Open Source
  • References

Executive Summary

  • UAS technology is a rapidly growing and dynamic industry
  • US aerospace and privacy laws have been slow to address the developments in this industry
  • There is a domestic and military need for the ability to prevent UAS intrusion AND the ability to deter the offending system, pilot, and command signals

C-UAS Counter Reconnaissance

  • Counter-reconnaissance seeks to undermine the threat’s ability to conduct reconnaissance and surveillance efforts
  • UAS plays a significant role in reconnaissance for both threat and friendly forces;
  • Thus, all counter-reconnaissance plans must account for UAS

UAS

UAS Electronic Warfare Operations

  • Electronic Warfare (EW) efforts are integrated through targeting and will occur at all echelons as applicable and must be synchronized

NCIE Counter Unmanned Aircraft Systems (C-UAS) in the US

About Post Author

Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence
Happy
Happy
0 %
Sad
Sad
0 %
Excited
Excited
0 %
Sleepy
Sleepy
0 %
Angry
Angry
0 %
Surprise
Surprise
0 %

By Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence