The threat posed by drones to Europe’s armed forces

Slides:



Advertisements
Similar presentations
Science | innovation | technology Defence Technology & Innovation Centre Defence Technology & Innovation Centre Weapons Integrated Technology Team CDE.
Advertisements

UAV’s: Planes of the New Millennium
Building a Strategy for Combating Terrorism. “We have to fight terrorists as if there were no rules, and preserve our open society as if there were no.
 Ground operations  Air Operations  Negotiations Current Situation.
On the creation of a nuclear crisis in the ME. Luc Reychler On the creation of a nuclear crisis in the ME KU Leuven
Drone Armament Nathan Krussel.
Challenge of Nuclear Weapons
Iran, the Persian Gulf and American Security. WHY DO WE CARE ABOUT IRAN?
Prof. Dr. T.D. Gill University of Amsterdam & Netherlands Defence Academy.
May 2010 The Principles of Short Range Missile Defense RubinconLtd. Defense Technology Consulting 1  Classification of regional missiles and rockets.
Saferworld Working for the prevention of armed violence Definitions Small arms Light weapons Conventional weapons.
C/3C Lucas Carlson UAV Systems. Development Mission Specifications EmploymentOverview 2.
Suicide Bombing Robert J. Brym. The Lessons of Suicide Bombing: History of Suicide Bombing: Unfortunately, suicide bombing attacks have become a more.
What is Terrorism? Terrorism - The use or threatened use of violence for the purpose of creating fear in order to achieve a political, economic, religious,
MILITARY AIR VEHICLE, AS A SYSTEM György Seres DSc
Previous Slide TRADOC DCSINT Office of the Deputy Chief of Staff for Intelligence U.S. Army Training and Doctrine Command TRADOC DCSINT.
Military use of Drones! by, Scott Amack.
Missile Defence - Threats, Responses and Projections - Bradford March 2004 Dr Philip Webber Chair, Scientists for Global Responsibility SGR Arms and Arms.
Instilling rigor and imagination in analysis Countering the Iranian Nuclear Threat Stuxnet and its Broader Implications Randolph H. Pherson Mary C. Boardman.
Alone In Kurdistan By Kevin Wright. Kurdistan Kurdistan is not a country, not a state, or a city. Kurdistan is an region where mainly only Kurds live.
A Review Of The Threat To Civil Aviation & The International Response
Strike Warfare MIDN 3/C Draper and MIDN 4/C Hollis.
Precision Effects v. Precision Munitions
| Unclassified For Official Use Only For Official Use Only Strategic Division // Israel Defense Forces Boarding of the “Al-Karame” Ship 20 July 2011.
Force Protection. What is Force Protection? Force protection (FP) is a term used by the US military to describe preventive measures taken to mitigate.
Unclassified // FOUO The Strategic Division // Israel Defense Forces 1 Increased Rocket and Mortar Fire from the Gaza Strip OVERVIEW OF AUGUST
Hezbollah “The Party of God”. What led to the creation of Hezbollah? The Iranian Revolution of 1979 The Israeli invasion of Southern Lebanon in 1982.
1 Hamas and the terrorist threat: The Goldstone Report vs. the factual findings Intelligence and Terrorism Information Center.
DRONES HISTORY CLASSIFICATION AND USES
UAS Combat Threat Survivability SURVICE Engineering Company
August CSA A Method for Civilian Damage Assessment from Rockets & Missiles ISMOR 2011 Maj. Barak Corem Center of System Analysis Planning Division.
Branch Orientation Benjamin Brownlee MS-I W&J ROTC.
MIDN 4/C Coleman and MIDN 4/C Thompson-James
The Cold War as Total (Virtual) War: Prospect of Nuclear War The Post-World War Two Condition for Almost Fifty Years.
THE TYPES OF TRANSPORT npor. Ing. Zuzana Sudolská.
Force Packaging >. Overview  Force Packaging  Process of Force Packaging  Detached Support  Developing Packages.
UAS for Remote Sensing Myths and Realities 33rd International Symposium of Remote Sensing of the Environment Steve Wegener Bay Area Environmental Research.
Global Counter Unmanned Aerial Vehicle Defense System Market WEBSITE Single User License: US$ 2500 No of Pages: 56.
ENVIRONMENTAL INTELLIGENCE PLATFORM Company Specialized in : SEARCHES FOR INNOVATION SECURITY ENVIORMENT AND LOGISTICS ENERGY.
Date____ Page____ Title: Global Terrorism. What is terrorism? The use of violence against people or property to force changes in societies or governments.
With the ARNG’s vital role in providing support for homeland defense and the war on terrorism, the nature and types of threats against us have become.
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Ballistic Protection Market Price Trends Industry Outlook & Forecast
Hamas Method of Operation
Terrorism and War Maps Osama Bin Laden Timeline America at War
“The use of RPAS/drones and the impact on aviation safety and security
GOVT Module 16 Defense Policy.
The vulnerability of economic markets to crime in 2015
International Security and Peace
Air Power “The ability to use platforms operating in or passing through the air for military purposes”
Drones, Targeted Killing, and the Law
Application of Air power
The Long War Reporting on The Long War Afghanistan Pakistan
The Russian Way of War TEFOR G-27
Hot Rail LLC Company Profiles Clients & Experience
Advanced Artillery System
U.S. and Israeli Drone downed in Iranian Cyber Attack
Intensive Production – Assessment 1
Intelligence and Terrorism
Modern world today There are a lot of internal and international conflicts all over the world. Force methods are often used and have high effectiveness.
How far did the Invasion of Iraq of 2003 reflect modern warfare?
Management of Multiple Dynamic Human Supervisory Control Tasks
Counter UAV program within NATO Joint Capability Group on Ground Based Air Defence by Fred Klumpers (NLD-MoD) Chairman JCGGBAD NATO UNCLASSIFIED.
Force Packaging.
Recommended Initiatives
CSIS – PONI Winter Conference December 10, 2015 Making the Case for Preserving the INF Treaty A European Perspective Anna Péczeli, PhD Research Fellow,
controlled by 100 vehicles controlled by 100 vehicles
Impact of Hypersonic Glide Technologies on Nuclear Deterrence
Military Influence of the USA
Artificial Intelligence in Unmanned Aerial Vehicles (UAV)
S&T Main Focus Areas Linkages to 2018 NDS
Presentation transcript:

The threat posed by drones to Europe’s armed forces Technical Analysis, Regional and Global Implications Tal Inbar Head, Space Research Center The Fisher Institute for Air & Space Strategic Studies, Israel Brussels, November 20, 2018 FOUO, UNCLASSIFIED

Disclaimer This presentation is based exclusively on unclassified open source information The views presented represent the author and do NOT necessarily represent an official Israeli governmental position;

The threat – and some countermeasures needed The threat of drones and UAV should be understood by the forces on the ground, and lead to changes in the situational awareness and the concept of operations. To cope with drone and UAV threats, we should switch from “national” (or theater) aerial defense to bringing the countermeasures to the units at the TACTICAL and OPERATIONAL levels. (In a way, back to classic AA capabilities).

The threat – and some countermeasures needed We have to distinct between the threats in peacetime and war. During peacetime we could work with drone (and UAV) manufacturers – in terms of regulations, technical means to make the vehicles inoperative at specific areas etc., creating UTM database – to name few options. We should understand the threat and its various tiers – and to tailor a suitable technological solution for each tier. Counter Drone and UAV capabilities needs unorthodox thinking. One possible solution is to create a dedicated Air-to-Air UAV for the purpose of keeping the sky clean of hostile UAVs and drones.

Seized ISIS munitions for quadcopters, Syria (October 2017) 3D printed tail and body Fragmentations

Tail – from badminton ball From improvisation….. Tail – from badminton ball Plastic tube 40 mm grenade

Fuse taken from mortar bombs To serial production Fuse taken from mortar bombs Standardization – unified body and tail. Some are 3d printed, some molded

Tube for holding bomblet ISIS operated armed quadcopter Tube for holding bomblet Camera

ISIS operated armed quadcopter

ISIS operated armed quadcopter Tank Military vehicle Bomblet

Explosion od the bomblet and a destruction of military vehicle ISIS operated armed quadcopter Explosion od the bomblet and a destruction of military vehicle

insurgents attack on Hemimim AFB, Syria, January 2018

Fuse taken from mortar bomb insurgents attack on Hemimim AFB, Syria, January 2018 Fuse taken from mortar bomb

Fuse (taken from mortar shell) Improvised munition for UAV insurgents attack on Hemimim AFB, Syria, January 2018 Fuse (taken from mortar shell) Improvised munition for UAV 3D printed tail and body Fragmentation Remains of fuse

insurgents attack on Hemimim AFB, Syria, January 2018

insurgents attack on Hemimim AFB, Syria, January 2018 Damaged Russian Su-24

Armed Quadcopter, Syria RPG warhead

ISIS made armed drone, Iraq ATGM

Original Houthi infographics The Houthi UAV force Original Houthi infographics

“Qasef” UAV – Iranian Ababil

“Qasef” UAV – Iranian Ababil

Original Iranian Ababil 2

October 2016 display in Tehran Iran’s advanced UAV More than 20 types of UAVs could ne identified in Iranian use. Iran officially admits it copied US and Israeli vehicles that fell in Iran. October 2016 display in Tehran Original US MQ-1 Original US RQ 170

Iran’s advanced UAV Note the defying banner – “from US and Israel to Iran” Original US MQ-1 “Predator” displayed by Iran on October 1, 2016

Iran’s advanced UAV Shahed 109, an Iranian “clone” if Israel’s Hermes 450, operated in Lebanon, Syria and Iraq. ~24 hours endurance

Iran’s advanced UAV “Stealth” , Armed Iranian UAV, operated from Syria against Israel. One vehicle was shot down over Israel on 2017.

This UAV was put in to action on 2018 over targets in Iraq Iran’s advanced UAV This UAV was put in to action on 2018 over targets in Iraq

Conclusions and Future prospects The threat is real. The wide availability and low cost of UAS platforms make them an attractive purchase for terrorists or criminals adding aerial capability to illicit activities. In their unmodified state, UAS platforms can create a public nuisance, interfere with aircraft or airspace operations, collect information that can be utilized for illicit purposes, and be employed as a kinetic weapons.

Conclusions and Future prospects Moreover, the use of unmanned systems adds a new layer of complication in the investigative process, as automation and increased standoff distances provide perpetrators a shield of anonymity. In the event of a plot failure, this anonymity reduces the risk of capture, leaving terrorists or criminals "free to strike another day.".

Counter drones strategies Identification Prevention Mitigation

Counter-swarm capabilities: still an unanswered challenge

New threat: cheap drones with greater lethality ATGM Bombs A/G missile 40 mm grenade launcher A/G rockets

Are we ready for the challenges?

talinbar@fisherinstitute.org.il Tal Inbar @inbarspace Thank you for your attention! talinbar@fisherinstitute.org.il Tal Inbar @inbarspace