13 DISC

C-UAS Equipment (Cyber Takeover)

1.What is the Problem (Need)? (a) Problem Statement: Drones are Force Multipliers which are ubiquitous in contemporary battlefields. The threat has emerged as major challenge for traditional weapon system to counter and hence require specialized C-UAS eqpt. Multitude of C-UAS tech are being explored to counter this threat. Each counter measure also possesses weaknesses which can be exploited by the UAS. Worldwide, the electronic warfare sys including anti-UAS rely on spectrum-based detection and RF spectrum as the key means of interdicting the threat. However, Jx and spoofing are not precise solutions and will invariably interfere with other nearby Communication systems. These options will also adversely impact friendly drone ops. (b) Evaluation of the Problem: As witnessed in recent conflicts, UAS Tech curve is fast evolving, but C-UAS tech has not been able to keep up with it. The UAS attacks are pervasive and ubiquitous on the battlefield even in presence of so-called comprehensive C UAS measures deployed for protection of field forces and installations. Contemporary counter measures rely on spectrum based detection and RF based interdiction. While these solutions are relatively low cost and portable, they present greater challenge of electronic fratricide of own eqpt using the EM spectrum. There is a need to evolve a tech which can leverage the advantages of the soft kill measures at the same time negates its cons. Cyber Takeover Tech is step in this direction. (c) How is it Being Over Come? : Presently RF based detection & interdiction sys are in use. These Soft Kill measures like jamming and spoofing are less precise and cause collateral damage. Use of Hard Kill sys incl AD Msls are un-economical keeping in mind the low cost of tgt being engaged. 2. Why it is imp to solve? Small sized commercial drone being used en masse to saturate on Air Defences has evolved as a maj challenge in contemporary battlefield. After almost two and half years of continuous conflict the drones still op freely in presence of EW sys like Krasukha, Leer, Pole 21 eqpt used by Russia & EDMGS, LDR 30 & LDR 50 eqpt being used by Ukraine. This proves that either these sys are not effective or are being used in a calibrated manner to limit risks of electronic fratricide. Therefore, there is need to leverage the soft kill measures albeit with engagement capb. Cyber Takeover tech eqpt as part of hybrid C-UAS solution more precise (when dply with other hard kill measures) will provide precise engagement capb and will exponentially increase the tgt handling capb of this integrated sys. 3. Contemporary Solutions by Other Countries / Org: Globally C-UAS tech firms are exploring Cyber Takeover tech as a pragmatic solution to meet op reqmts. D-Fend's EnforceAir sys can takeover hostile drone without causing collateral damage. The sys can also be effectively utilised to counter SWARM threats. The sys enables user to define the defensive envelope as per op reqmt. On successful decoding/ decrypting, the libraries are updated through precise analysis of intercepted signals, forensic reporting and memory recall in future. These sys when dply with hard kill instruments will provide comprehensive C-UAS protection. 4. Deliverables: A complete sys with fwg capb :- (a) Op dply - Tac, Vehicular, Sty/ Tripod Based & Man Portable. (b) Compact, Lightweight Small Form Factor. (c) Interdiction: - (i) Fend Off: Disconnect drone sig from GCS. (ii) Take Cont/Land: Safe/crash landing of hostile drone at pre defined loc. (d) Rg Coverage:- (i) Min 5 km detection rg. (ii) Mitigation rg between 1.2-4km. (iii) 360° omni coverage. (e) Technical Specifications: Operating Frequency is 400MHz 6GHz or above.