Counter UAS Technology and Techniques
Interested in attending? Have a suggestion about running this course near you?
Register your interest now
Want to run this event on-site? Enquire about running this event in-house
This three-day course delivers a thorough overview promoting an understanding and building a successful Counter Unmanned Aerial System (UAS) architecture. The threat posed by small UAS operated by criminals or terrorists has become more prevalent in recent years. Overall mission effectiveness in countering these systems depends upon appropriate systems and technology. This course presents a comprehensive view of the threat, counter UAS systems, the associated architectures, and organizations that promote and coordinate these activities. It begins with fundamental scientific principles, shows how those principles are exploited in various technologies, and describes current systems that take the technology into practice. The course evaluates and ranks various CUAS technologies. The legal framework for CUAS activities is reviewed.
What You Will Learn:
- The small UAS threat to critical infrastructure
- Theory and operations of counter UAS sensor systems.
- Counter UAS engagement systems and effectiveness
- Organizations that promote and coordinate counter UAS activities.
- The legal framework for CUAS activities.
- The threat posed by criminals and terrorists exploiting small UAS in disruptive activities at airports and other critical infrastructure. Small commercial UAS that are available and typically employed.
- Recent events in which criminals or terrorists have threatened critical infrastructure such as airports, in the US and abroad, employing small UAS.
- Sensor systems that are used to detect, identify, and track small UAS. These include radar, radio frequency sensing, electro-optical, infrared, and acoustic sensors. The characteristics, strengths, and weakness of each type of sensor type is discussed.
- The small UAS engagement systems are discussed. These include the use of high-power lasers, jamming, communications capture, and attack drones. The advantages and disadvantages of each of these is discussed.
- Organization, both government and commercial, that promote and coordinate counter UAS activities. These include organizations of the US and other countries.
- The legal framework within which CUAS activities may take place is reviewed.
Dr. Clayton Stewart has over 30 years of experience performing across the spectrum of research direction, line management, program management, system engineering, engineering education, flight operations, and research and development. He has had extensive involvement at all levels as Technical Director, Principal Investigator, Operations Manager, Director of Research, Program Manager, Associate Professor, Chief Scientist, Systems Analyst, Member of the Technical Staff, and Aircrew Member.
REGISTRATION: There is no obligation or payment required to enter the Registration for an actively scheduled course. We understand that you may need approvals but please register as early as possible or contact us so we know of your interest in this course offering.
SCHEDULING: If this course is not on the current schedule of open enrollment courses and you are interested in attending this or another course as an open enrollment, please contact us at (410)956-8805 or email@example.com. Please indicate the course name, number of students who wish to participate. and a preferred time frame. ATI typically schedules open enrollment courses with a 3-5 month lead-time. To express your interest in an open enrollment course not on our current schedule, please email us at firstname.lastname@example.org.
For on-site pricing, you can use the request an on-site quote form, call us at (410)956-8805, or email us at email@example.com.
|MIDS JTRS and Baseline Upgrade-2 Capabilities||Register interest|
|Cybersecurity Foundations||Register interest|
|21st Century Electronic Warfare||Register interest|
|Joint Range Extension Applications Protocol - Crash Course||Register interest|