control the drone to control the threat

22
Control the Drone to Control the Threat Control and Safety based C - sUAS Approaches for Air Defense in Sensitive Environments Air Defence Week 2021 Defence iQ 22 June 2021

Upload: others

Post on 21-Dec-2021

2 views

Category:

Documents


0 download

TRANSCRIPT

Control the Drone to Control the Threat

Control and Safety based C-sUAS Approaches for Air Defense in Sensitive Environments

Air Defence Week 2021Defence iQ

22 June 2021

2

Global Presence & Success

Hundreds of deployments worldwide across 5 continents, including forward-operating bases.

100+ staff in 5 global offices.

Large-Scale

Entrusted to protect large, complex events globally, with tens of thousands of attendees

Selected & Proven

Selected as a best-in-class RF system & deployed at high-level governmental agencies – military, federal law enforcement & homeland security

About D-Fend SolutionsLeading global provider of cyber-takeover, counter-drone solutions for sensitive & challenging environments.

OfficesGlobal Presence

BURKINAFASO

EL SALVADOR

HONDURAS

HAITI DOMINICAN REPUBLICPUERTO RICO

SAINT KITTS AND NEVIS

MONTSERRAT

GUADELOUPE

DOMINICA

MARTINIQUE

BARBADOS

TRINIDAD AND TOBAGO

PANAMA

GUATEMALA

BELIZE

SAINT VINCENT

CUBA

JAMAICA

THE BAHAMAS

GALAPAGOS

ALASKA

CANADA

USA

MEXICO

VENEZUELA

COLOMBIA

GUYANA

SURINAME FRENCH GUIANA

ECUADOR

PERU BRAZIL

BOLIVIA

CHILE

ARGENTINA

URUGUAY

SOUTH AFRICA

PARAGUAY

LESOTHO

SWAZILAND

BOTSWANA

ANGOLA

DEMOCRATICREPUBLIC

OF THE CONGO

ZAMBIA

CABINDA

CONGO

GABON

EQUATORIAL GUINEA

BIOKO UGANDA

KENYA

SOMALIA

ETHIOPIA

DJIBOUTI

YEMENERITREASUDANCHAD

CENTRAL

AFRICANREPUBLIC

SEYCHELLES

MALAWIMOZAMBIQUE

TANZANIA

COMOROS

MAYOTTE

MADAGASCAR

REUNION

MAURITIUS

KERGUELEN ISLAND

HEARD ISLANDS

BURUNDI

RWANDA

NAMIBIA

ZIMBABWE

NIGERIA

NIGERMALI

ALGERIALIBYA

EGYPT

OMAN

SAUDIARABI

PAKISTAN

INDIA

SRI LANKA

AFGANISTAN

TURKMENISTANAZERBAIJAN

ARMENIA

UZBEKISTAN

KAZAKHSTAN

CHINA

MONGOLIA

NORTHKOREA

SOUTHKOREA

JAPAN

RUSSIA

KASHMIR

NEPAL

BHUTAN

BANGLADESH

MYANMAR

LAOS

THAILAND

VIETNAM

PHILIPPINES

BRUNEI

MALAYSIA

INDONESIAPAPUA

NEW

GUINEA

SOLOMON ISLANDS

VANUATU

NEW CALEDONIA

AUSTRALIA

TASMANIA

NEW ZEALAND

CAMBODIA

AND

QATAR

IRAQ IRAN

SYRIA

TURKEYGREECE

BULGARIA

ROMANIA

MOLDOVA

UKRAINE

BELARUS

LITHUANIA

LATVIA

ESTONIA

FINLAND

SWEDEN

NORWAY

MACEDONIA

MONTENEGRO

SERBIA

HUNGARY

SLOVAKIA

CROATIA

SLOVENIA

AUSTRIA

CZECH

POLANDGERMANY

BOSNIAAND

HERZEGOVINA

ITALYSPAIN

FRANCESWITZERLAND

LIECHTENSTEIN

LUXEMBOURG

BELGIUM

NETHERLANDS

IRELAND

FAROE ISLANDS

ICELAND

SVALBARDGREENLAND

UK

DENMARK

PORTUGAL

TUNISIA

MOROCCO

JORDAN

ISRAELLEBANON

CYPRUS

BENIN

COTRE

D’IVOIRELIBERIA

SIERRA LEONE

GUINEA-BISSAU

MAURITANIA

WESTERNSHARAH

SENEGAL

GUINEA

TOGO

CAMEROON

3

The Drone Threat in Action Across Environments

Confidential

Stadiums & Events: Major League Baseball (MLB) Game Aviation & Airports: Blue Angels

NUISANCE/SURVEILLANCE COLLISION

Military: ISIS Asymmetric Warfare Drone AttackPrisons: Smuggling

ATTACKSMUGGLING

4

The Drone Threat: Non-Stop Incidents…

Confidential

5

Military & Special Forces

Law Enforcement & First Responders

Air TrafficGovernment & VIP

Protection

National & Homeland

SecurityMaritime Borders

Environments for Counter-Drone Deployments

Confidential

6

Landmarks & Govt Buildings

Prisons Media EnterpriseStadiums &

ArenasCritical

InfrastructureLocal Govt. &

Safe City

Environments for Counter-Drone Deployments (continued)

Confidential

7

©2021 D-Fend Solutions AD Ltd.

Rogue drones use cases:

• Explosive attacks

• Collection of intelligence on troop formations,

movements, bases, etc.

• Disruption to helicopter & plane flight patterns

The Asymmetrical Threatto Military & Special Forces

8

Confidential

The depicted drones are:

• Do It Yourself (DIY) drones –built from off-the-shelf commercial parts

• Commercial drones (cost < U.S. $1,500)

The Drones from these Incidents: Easy to Purchase & Build

8

9

Deal with All Types of Drones

Do It Yourself (DIY) Drones Wi-Fi Drones

Long-Range,Heavy-Payload Drones

Confidential

1010Confidential

1111

©2021 D-Fend Solutions AD Ltd.

Capture the Drone, Capture Intelligence

Traditional solutions fail to procure sUAS intelligence

• Kinetic counter-drone solutions destroy the drone

• Jammers are often unable to capture drones

• Forces do not learn about rogue drones or pilots’ locations

12

Sensitive Environments Require a Next-Gen Approach

Confidential

Detection

.Outcome:

Fast & Accurate Detection

No False Positives

No Line-of-Sight Required

Radio Frequency (RF) Cyber-Detection

.

Mitigation

RF Cyber-Takeover Outcome:

Disconnect, Takeover & Control

Safe Route to a Safe Landing

Total Continuity: No Communication Disruption,

Collateral Damage, Stoppages, etc.

Today’s Sensitive & Complex Environments

13

RF-Cyber Takeover-Based Counter-Drone Approach

Immediate advantages:

• Non-jamming

• Non-kinetic

• No line-of-sight required

Next gen counter-drone system

• Radio frequency (RF) cyber takeover technology

• Detects & takes control

• Lands drones safely in a designated zone

Confidential

Safe Zone

14

Capabilities for Control and SafetyAcross the Rogue Drone Incident Lifecycle

Classify the Drone Detect & Alert

Discover Pilot Position & Identification

Take Control & Land

Locate & Track

Fend-Off

PASSIVE ACTIVE-RF

Confidential

15

• Exploit captured drone data, while keeping troop location concealed

• Communications remain intact & authorized drones continue operating

• Locate drone pilot with GPS accuracy

• Moving bubble of protection

15©2021 D-Fend Solutions AD Ltd.

Military Theater Capabilities

16

Adapt and transfer in minutes…

Multiple Deployment Options for Operational Flexibility

Confidential

Military Vehicle VehicleHigh-Altitude

StationaryLong-Range Directional

High-Altitude Tactical

Ground-Level Tactical

17

• Single & aggregated view

• Sensors & C2 knowledge-sharing

• Mitigation command

– Executed by optimal sensor

– Triggered by C2 or sensor

Multiple Sensor Command & Control (MSC2)

Confidential

IP

IP

IP IP

18

A Cyber Takeover Ensures Continuity…

…And Continuity is KEY

• Communications

• Transportation

• Commerce

• Everyday life

Confidential

19

Future-Ready with Continuous Updates –Always stay a Drone Threat Ahead

• Continuous system updates

• Anticipating the unpredictable by proactively building for coming threats

• Rapid response

Confidential

20

Core Concepts for Continuity

Confidential

CONTROL The best way to control the drone threat is to take control of the drone

SAFETYA safe landing or fending off of the rogue drone is the best possible outcome for safe airspace and continuity

FOCUS Counter-drone measures must focus on the real risk, the most dangerous drones, and employ drone risk analysis, assessment, and prioritisation

FUTURE The constantly changing and increasingly complex drone threat requires foreseeing the drone future and always staying a drone threat ahead

Thank You!

22

Confidential