JAPCC RPAS Operations in Contested Environments
JAPCC RPAS Operations in Contested Environments
© This work is copyrighted. No part may be reproduced by any process without prior written permission. Inquiries should be made to: The Editor,
Joint Air Power Competence Centre (JAPCC), [email protected]
Disclaimer
This publication is a product of the JAPCC. It does not represent the opinions or policies of the North Atlantic Treaty Organisation (NATO) and is
designed to provide an independent overview, analysis, food for thought and recommendations regarding a possible way ahead on the subject.
Author
Major André Haider (DEU A), JAPCC
Release
This document is releasable to the Public. Portions of the document may be quoted without permission, provided a standard source credit is
included.
SUBJECT:
Remotely Piloted Aircraft Systems in Contested Environments
DISTRIBUTION:
Over the past two decades, Remotely Piloted Aircraft Systems (RPAS) have been fielded in
increasing numbers across many nations and military services. From the first operational
deployment of the MQ-1 Predator during Operation Deliberate Force in 1995 to Operation
von-Seydlitz-Kaserne I Römerstraße 140 I 47546 Kalkar I Germany/Allemagne I Tel +49 (0) 2824 90 2201 I Fax +49 (0) 2824 90 2208 I www.japcc.org
Unified Protector over Libya in 2011, their flight hours have grown exponentially, providing
distinctive capabilities with reduced risk and extensive time on station in comparison with
manned systems.
In contrast to ground and manned aviation operations, recent RPAS missions have been
conducted in a permissive air environment only, where Allied forces did not anticipate
vigorous enemy Air Defence assets. Based on the assumption that in the future, NATO will be
forced to deal with something other than an inferior or outgunned enemy, adversaries will
have the capability and intent to oppose or disrupt NATO air operations and will represent a
serious threat to Allied RPAS assets.
Joachim Wundrak
Lieutenant General, DEU AF
Executive Director, JAPCC
JAPCC | Remotely Piloted Aircraft Systems in Contested Environments | September 2014 iii
TABLE OF CONTENTS
EXECUTIVE SUMMARY.........................................................................................................................................................................1
CHAPTER I
Introduction
1.1 Aim................................................................................................................................................................................................................7
1.2 Assumptions............................................................................................................................................................................................7
1.3 Limitations................................................................................................................................................................................................7
CHAPTER II
Definitions
2.1 Remotely Piloted Aircraft Systems.............................................................................................................................................8
2.2 RPAS Classifications.............................................................................................................................................................................9
2.3 Operational Environments..............................................................................................................................................................9
CHAPTER III
Operational Environment Background
3.1 Balkan Operations.............................................................................................................................................................................11
3.2 Iraq Operations...................................................................................................................................................................................12
3.3 Afghanistan Operations.................................................................................................................................................................12
3.4 Libya Operations................................................................................................................................................................................12
CHAPTER IV
Possible Future Conflict Scenarios – Strategic and Operational Challenges
in Future Combat Environments
4.1 Proliferation of Air Defence Technology..............................................................................................................................14
4.2 State and Non-State Actors.........................................................................................................................................................15
4.3 Proliferation of Advanced Technology.................................................................................................................................15
4.4 Proliferation of RPAS Technology.............................................................................................................................................16
4.5 Symmetric vs. Asymmetric Warfare........................................................................................................................................16
CHAPTER V
Threat and Vulnerability Identification Methodology
5.1 Defining the Threat Level.............................................................................................................................................................17
5.2 Determining the Vulnerability Level .....................................................................................................................................18
CHAPTER VI
Threat Identification
6.1 Surface-Based Air Defence Systems......................................................................................................................................21
6.2 Combat Aircraft..................................................................................................................................................................................24
CHAPTER VII
Vulnerability Identification
7.1 Remotely Piloted Aircraft..............................................................................................................................................................53
7.2 Payload.....................................................................................................................................................................................................57
7.3 Human Element ................................................................................................................................................................................61
7.4 Control Element.................................................................................................................................................................................65
7.5 Data Links...............................................................................................................................................................................................71
7.6 Support Element................................................................................................................................................................................77
CHAPTER VIII
Threat and Vulnerability Consolidation
8.1 Threat Summary.................................................................................................................................................................................79
8.2 Vulnerability Summary...................................................................................................................................................................80
8.3 Consolidated Criticality Assessment Matrix......................................................................................................................81
CHAPTER IX
Recommendations
9.1 Enhancing Remotely Piloted Aircraft Survivability.......................................................................................................82
9.2 Enhancing Payload to Improve System Survivability..................................................................................................87
9.3 Enhancing Survivability of the Human Element............................................................................................................90
9.4 Enhancing Control Element Survivability...........................................................................................................................91
9.5 Enhancing Data Link Survivability...........................................................................................................................................94
9.6 Enhancing Support Element Survivability.........................................................................................................................97
CHAPTER X
Conclusions
10.1 Remotely Piloted Aircraft and Payload..............................................................................................................................99
10.2 Ground-Based RPAS Elements............................................................................................................................................. 102
10.3 Command, Control, Communications and Computers ..................................................................................... 103
10.4 Automation and Human Interaction............................................................................................................................... 104
10.5 Final Remarks.................................................................................................................................................................................. 104
ANNEX I–K
Recommendations by Implementation Timeframe
I. Short-Term Recommendations to Improve RPAS Survivability.......................................................................... 122
J. Mid-Term Recommendations to Improve RPAS Survivability............................................................................. 123
K. Long-Term Recommendations to Improve RPAS Survivability........................................................................... 125
ANNEX L–N
Recommendations by Application Area
L. Technical Recommendations to Improve RPAS Survivability.............................................................................. 126
M. Operational Recommendations to Improve RPAS Survivability........................................................................ 128
N. Education & Training Recommendations to Improve RPAS Survivability.................................................... 130
ANNEX O
Acronyms and Abbreviations......................................................................................................................................................... 131
Swarm RPAS - designed for expendability and oper- This study did not identify protective measures cur-
ating in large numbers, forming a swarm; rently in place for off-duty personnel. Pre-emptively
deterring threats for home-based RPAS infrastructure
Carrier RPAS - designed to carry an immense stock of and personnel must not be considered a military-only
long-range, precision-guided air-to-air and air-to- task. Military Force Protection Conditions (FPCON)
ground munitions, designated to project military should be complemented with additional protective
power like naval aircraft carriers. measures provided by local civilian authorities. Com-
prehensive and joint civil and military force protection
Ground-Based RPAS Elements and Personnel measures should also encompass the domestic envi-
ronment to include families of RPAS personnel.
To improve the survivability of deployed RPAS ground
components, users should employ established and Command, Control,
proven measures such as camouflage and dispersion Communications and Computers
of equipment, reducing radio transmissions or in-
creasing mobility to facilitate leapfrog operations. Improvement of RPAS Command, Control, Communi-
However, the best way to protect RPAS ground ele- cations, and Computer (C4) security must be compre-
ments would be to not deploy them at all. Therefore, hensive and should encompass the physical compo-
the range of RPA must be significantly improved so nents required for RPAS communication, the
Adversary RPAS
Combat Aircraft
Cyber Warfare
Asymmetric
MANPADS
Threats
Forces
SSBM
SBAD
ASAT
EW
RPAS Elements
Remotely
Piloted Aircraft
Payload
Human Element
Control Element
Data Link
Support Element
Low Critical
Moderately Critical
Highly Critical Indicated levels are not in accordance with the official NATO threat levels defined in the ACO Security Directive AD 70-1
Remotely
In contrast to RPA, Remotely Operated Aircraft (ROA) Piloted
Aircraft
are remotely controlled by an operator who has not
Support
been trained nor certified to the same standards as Element
Payload
RPAS
the pilot of a manned aircraft. ROAs are typically op-
erated by services other than the air force. For the
purposes of this study, the term RPA will include Data Link
Human
Element
ROA as well.
Control
Element
2.1.2 Payload
2.1.3 Human Element The Support Element includes all of the prerequisite
equipment to deploy, transport, maintain, launch and
The Human Element consists of the aircraft’s pilot and recover the RPA and enable communications. These
the payload operator. RPAS personnel also include tasks are typically conducted by Launch and Recovery
maintainers, mission commanders and intelligence Units (LRU).10
analysts.7
450
400
350
300
250
200
150
100
9/11
50
0
1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012
ing in a designated airspace. This resulted in a predict- this global fight against terrorism.9 On 14 November
able pattern that was easily recognized by Serbian 2001, the first strike of an armed RPA took place in Af-
forces. This led to additional RPA losses.6 ghanistan, when a combined F-15/Predator attack
killed key Taliban and al-Qaeda decision makers re-
sponsible for the attacks of 11 September 2001. Since
3.2 Iraq Operations
then, RPAS have become an integral part of military
During the beginning of operations in Iraq in 2003, efforts in Afghanistan.10
aging first-generation RPA were used as decoys to ex-
pose Iraqi AD and stir up Iraqi fighters.7 RPAS were The most prominent role of RPAS in Afghanistan con-
used in joint manned/unmanned missions for the first tinues to be ISR, in which their remote sensing capa-
time. Also, RPAS directly supported US Army Counter bilities are utilized to the fullest extent. Additionally,
Improvised Explosive Device (C-IED) task forces by us- armed RPAS were frequently switched from the pri-
ing Electro-Optical and Infrared (EO/IR) sensors to de- mary ISR role into a strike asset. Often employed in
tect and identify insurgents placing Improvised Explo- coordination with troops on the ground, they have
sive Device(s) (IED) under the cover of night.8 eliminated insurgent leaders and destroyed critical
enemy infrastructure.11
YES
Threat Suppression Can the threat be supressed?
NO
YES
Detection Avoidance Can detection be avoided? Low Critical
NO
YES
Engagement Avoidance Can engagement be avoided? Survival
NO
YES
Hit Avoidance Can a hit be avoided?
NO
NO
Adversary RPAS
Combat Aircraft
Cyber Warfare
Asymmetric
MANPADS
Threats
Forces
SSBM
SBAD
ASAT
EW
RPAS Elements
Remotely
Piloted Aircraft
Payload
Human Element
Control Element
Data Link
Support Element
Targeted Component
Secondary Effects
Figure 5 – Air Defence Weapon Envelopes and Estimated Costs per Round.10
ALTITUDE
[kft ]
30
20
SA-8
SA-13
“Trash Fire Envelope”
10 AAA SA-3 SA-2 SA-10b SA-10c SA-5
MANPADS SA-11 SA-4 SA-12a/b
SA-6
SA-10a
Adversary RPAS
Combat Aircraft
Cyber Warfare
Asymmetric
MANPADS
Threats
Forces
SSBM
SBAD
ASAT
EW
RPAS Elements
Remotely
Piloted Aircraft
Payload
Human Element
Control Element
Data Link
Support Element
Low Critical
Moderately Critical
Highly Critical Indicated levels are not in accordance with the official NATO threat levels defined in the ACO Security Directive AD 70-1
6.2.2.2 Air-to-Ground. Combat sensors and weap- 6.2.4 Accessibility of RPAS to Combat Aircraft
ons enable manned aircraft to engage ground tar-
gets from great distances. Adversaries may also be Only nations with strategic air assets have the capabil-
capable of employing Precision-Guided Munitions ity of conducting strategic air strikes. Hence, it is highly
(PGM) using laser guidance or the GPS unencrypted unlikely that most potential adversaries will be capa-
signals or other global satellite navigation systems ble of conducting an attack by combat aircraft on Mis-
like the Russian ‘GLONASS’ or the Chinese ‘BeiDou’2 to sion Control Elements (MCE), GCS and communica-
engage RPAS ground components, i.e. the LRU, the tions infrastructure deep inside NATO territory.
GCS and airport or logistic infrastructure hosting the
Support Element. Conversely, the RPA, GCS and other supporting
equipment deployed to the AOO are highly acces-
6.2.2.3 Electronic Warfare. ECM equipment may sible to enemy aircraft. It can be assumed even
enable manned aircraft to disrupt communication legacy combat aircraft with a fairly low level of tech-
between the RPA and the GCS, rendering the RPA nology will impose a viable threat to any deployed
helpless against an impending kinetic attack. RPAS due to their capabilities in air-to-air and air-to-
ground combat. The accessibility of deployed RPAS
6.2.3 Availability of Combat Aircraft elements to adversary combat aircraft is therefore
assessed as ‘high’.
In 2014, roughly 10,000 combat aircraft and 9,300
combat helicopters are listed in the active duty inven- 6.2.5 Threat Assessment
tories of air services from more than 120 nations out-
side the United States and Western Europe. (cf. Fig. 6) The availability of combat aircraft for possible future
Most of th ose countries are equipped with Russian adversaries has been assessed as ‘high’. The accessi-
Cyber Warfare
Asymmetric
MANPADS
Threats
Forces
SSBM
SBAD
ASAT
EW
RPAS Elements
Remotely
Piloted Aircraft
Payload
Human Element
Control Element
Data Link
Support Element
Low Critical
Moderately Critical
Highly Critical Indicated levels are not in accordance with the official NATO threat levels defined in the ACO Security Directive AD 70-1
bility of home-based RPAS elements to adversary sary combat aircraft against any element of the
combat aircraft has been assessed as ‘low’ while it RPAS is assessed as ‘high’. (cf. Table 6)
has been assessed as ‘high’ for the deployed ele-
ments. The overall threat assessment takes the high- 1. Dr. Carlo Kopp, ‘Measures of Fighter Capability’, 1999 - 2005. [Online]. Available: http://www.ausair-
power.net/air-superiority-3.html. [Accessed 24 Jun. 2013].
er rating for the deployed RPAS elements into ac- 2 .International Committee on Global Navigation Satellite Systems, ‘Current and Planned Global and Re-
gional Navigation Satellite Systems and Satellite-based Augmentations Systems’, United Nations Office
count because the main focus of potential for Outer Space Affairs, New York, 2010.
adversaries is estimated to be inside or close to the 3. Flightglobal Insight, ‘World Air Forces 2014’, 2014. [Online]. Available: http://www.flightglobal.com/
products/insight/. [Accessed 14 Aug. 2014].
AOO. Therefore, the overall threat rating for adver- 4. Ibid.
orbits are the Low Earth Orbit (LEO), Medium Earth Orbit 6.3.3.1 Laser Attacks. High-power lasers can subject
(MEO) and the Geostationary Orbit (GEO). (cf. Fig. 7) satellites in LEO to large amounts of laser energy. The
resulting heat can upset the delicate thermal balance
Satellites in LEO operate at altitudes of between ap- of the satellite long enough to damage the satellite’s
proximately 150 km and 2,000 km.5 LEO satellites have components. If it is sufficiently intense, it can damage
orbital periods of 90-120 minutes with an orbital a satellite’s structure.
speed of up to 7,800 m/s. Due to the relatively low al-
titude, the satellites field of view is limited and the 6.3.3.2 Ground-Based Kinetic Energy Attacks.
over flight time is very short. Consequently, a satellite Also referred to as Direct-Ascent Attacks, Ballistic
network is required to provide coverage of the entire missiles can carry a warhead above the atmos-
earth’s surface. Therefore this orbit type is most com- phere into LEO and release it in the direction of
monly used by satellites which provide observation the target satellite. It is then detonated in the vi-
and not for communication satellites.6 cinity of the satellite with the objective of creating
an inert collision or ejecting a large cloud of pel-
Satellites in MEO have altitudes from roughly 2,000 km lets into the satellite’s path.9 China (2007) and the
to 36,000 km. A special type of MEO is the semi syn- US (1980’s and 2008) have already demonstrated
chronous orbit, which has a period of 12 hours, an al- this capability.
titude of roughly 20,000 km and an orbital speed of
3,900 m/s. The United States’ GPS, the Russian Glonass 6.3.3.3 Space-Based Kinetic Energy Attacks. Also
navigational satellites and the European Galileo navi- referred to as ‘Space Mines’ or ‘Kill Vehicles’, these types
gation system use this orbit.7 of ASATs are used in all orbits up to GEO and are de-
ployed in space well before they are intended to be
Satellites in GEO have an orbital period equal to the Earth’s used. They are capable of delivering the same effects
rotation which makes them appear as a fixed point in the as Ground-Based Kinetic Energy Attacks, but, by plac-
sky. The GEO is at roughly 36,000 km with an orbital speed ing them in a crossing orbit, the kinetic energy is
of 3,100 m/s. In GEO three satellites can provide world- much greater.10 Every enemy satellite in the same or-
wide coverage, excluding the Polar Regions. The area of bital regime as the target could potentially be used as
visibility of the satellite covers about 43% of the Earth’s a kinetic kill vehicle.
surface. Most SATCOM systems use the GEO, e.g. the U.S.
Defense Satellite Communications System (DSCS).8 6.3.3.4 High-Altitude Nuclear Explosion. The in-
tense EMP resulting from a nuclear explosion would
6.3.3 ASAT Capabilities likely destroy all unshielded satellites in LEO that are
in line of sight. In addition, the explosion would
Depending on the satellite’s orbit, disruption of satel- generate a persistent radiation environment
lite communication and navigation signals may be (months to years) that would slowly damage
achieved by the following types of attacks. unshielded satellites.11
ASAT weapons are most likely available to state-actors Critical military satellite infrastructures such as GPS or the
only. Depending on whether the potential adversary U.S. DSCS use either semi synchronous or geostationary
is a space faring or a non-space faring nation, the orbits12 and are well out of range for any ground-based
availability of certain ASATs and the effective employ- KEW or DEW. Only the LEO satellites are currently in range
ment of those ASATs may differ significantly. As only a of these types of weapons. However, it may take a signifi-
handful of nations possess space capabilities, the cant number of ASATs to disrupt those networks, as they
availability of ASAT weapons to possible future adver- typically consist of a very large number of satellites, e.g.
saries is assessed as ‘low’. Iridium (66 satellites) or Globalstar (32 satellites).
Adversary RPAS
Combat Aircraft
Cyber Warfare
Asymmetric
MANPADS
Threats
Forces
SSBM
SBAD
ASAT
EW
RPAS Elements
Remotely
Piloted Aircraft
Payload
Human Element
Control Element
Data Link
Support Element
Low Critical
Moderately Critical
Highly Critical Indicated levels are not in accordance with the official NATO threat levels defined in the ACO Security Directive AD 70-1
6.4 Electronic Warfare directed against RPAS data links (cf. Fig. 8) in order to
'The EM-cyber environment is now so fundamental disrupt the communications between the GCS and
to military operations and so critical to our national the RPA or to disrupt GPS signals. Either of these
interests that we must start treating it as a warfight- could disable RPAS operations entirely. Ground
ing domain on par with – or perhaps even more im- troops may also have transmissions sent directly
portant than – land, sea, air, and space. Future wars from the RPA disrupted.
will not be won simply by effectively using the EM
spectrum and cyberspace; they will be won within 6.4.1 Principal Types of Electronic Attack
the EM-cyber domain.'
Admiral Jonathan Greenert, RPAS consist of three communication nodes. These
Chief of US Naval Operations are the RPA, the satellite and the GCS. Signals sent
from the GCS to the satellite are referred to as the up-
Electronic Warfare (EW) is defined as ‘military action link, those from the satellite to the GCS as the down-
to exploit the electromagnetic spectrum encom- link. There are primarily three ways to interfere with
passing: the search for, interception and identifica- electromagnetic signals. They are ‘jamming’, ‘spoofing’
tion of electromagnetic emissions, the employment and ‘meaconing’.
of electromagnetic energy, including directed ener-
gy, to reduce or prevent hostile use of the electro- 6.4.1.1 Jamming refers to disrupting communication
magnetic spectrum, and actions to ensure its effec- by overpowering the signals being sent from a trans-
tive use by friendly forces.’1 In contrast to kinetic mitter to a receiver by using a signal at the same fre-
weapons, EW usually does not cause permanent quency, but with higher power. The jamming signal
physical damage to its target. EW capabilities can be overloads the targeted frequencies with so much
electronic noise that communications cannot get 6.4.1.3 Meaconing is a composite term from ‘mislead’
through to the intended receivers.2,3,4,5 Simple jam- and ‘beacon’. It refers to the interception and delayed
mers are inexpensive to make or to purchase. For ex- rebroadcast of navigation signals. Global Navigation
ample, GPS jammers available on the commercial Satellite Systems (GNSS) operate on the basis of time
market can reportedly interfere with receivers 150– of arrival ranging. Introducing a signal delay falsifies
200 km away. Additionally, instructions for construct- the user’s computed position which results in location
ing an inexpensive GPS jammer are currently available errors. In the worst case, the RPA can be misdirected or
on the Internet.6 A document allegedly written by al- forced to land in an enemy controlled area. Unfortu-
Qaeda on how to defend against RPAS claimed they nately, even encrypted military GPS signals are not
used legacy Russian radio transmitters to successfully entirely protected from sophisticated meaconing at-
disrupt satellite communications in the local area.7 tacks.9,10,11,12
The RPAS contains several receivers within the differ- 6.4.2.2 Uplink. The receiving antenna of the satellite
ent elements of the remotely piloted system. De- is aligned to face the location of the ground-based
pending on the receiver’s alignment relative to the transmitter (i.e. RPA or GCS). A geostationary satellite
other components’ transmitters, an attacker must be can usually cover approximately one-third of the
positioned in a very specific location to successfully Earth’s surface in its field of view. Any location within
conduct an EW attack. the satellite’s coverage area can be used to conduct
an EW attack on an unprotected satellite’s uplink.
6.4.2.1 Downlink. The receiving antennas of the RPA Military satellites usually use phased-array antennas
and the GCS are aligned to face a satellite usually in and nullifying techniques to reject signals from
GEO. To inject a spurious signal into the antennas, the transmitters outside the specified area. Therefore,
attacker must be positioned at a higher altitude than the attacker must be located near the AOO. As the
the RPA or GCS and be aligned between the RPA/GCS attacker’s signal must travel the same distance to the
and satellite. Such an EW attack may be conducted satellite as the target, the one with more power will
Adversary RPAS
Combat Aircraft
Cyber Warfare
Asymmetric
MANPADS
Threats
Forces
SSBM
SBAD
ASAT
EW
RPAS Elements
Remotely
Piloted Aircraft
Payload
Human Element
Control Element
Data Link
Support Element
Low Critical
Moderately Critical
Highly Critical Indicated levels are not in accordance with the official NATO threat levels defined in the ACO Security Directive AD 70-1
MRBM
SRBM
India
Iran Afghanistan Iraq
Israel Armenia Kazakhstan Taiwan
North Korea Bahrain Libya Turkmenistan
China Pakistan Belarus South Korea Ukraine
Russia Saudi Arabia Egypt Syria United Arab Emirates
6.5.1.5 Ballistic Missiles can be subdivided into and rocket launchers are an inherent part of almost
short (less than 1,000 km), medium (1,000-3,000 km) any modern army. Additionally, the threat from
and intermediate (3,000-5,500 km) range missiles. short-, medium- and intermediate-range ballistic
Missiles with maximum effective ranges greater than missiles (SRBM s, MRBM s and IRBM s) is growing
5,500 km are considered Intercontinental Ballistic steadily. (cf. Fig. 9) In 2011, excluding the inventories
Missiles (ICBM).3,4 of Russia and China, the total number of ballistic
missiles outside NATO was estimated more than
With some exceptions, SSBM typically carry an ex- 5,900.7,8,9 Correspondingly, the availability of SSBM
plosive payload to deliver a kinetic effect on their to a potential future adversary is assessed as ‘high’.
target (blast, heat and fragmentation). SSBM may
detonate either in an air-burst or ground-burst mode 6.5.3 Accessibility of RPAS to SSBM
to damage the target’s exterior or with a delayed
fuse which permit it to penetrate the target and de- Any personnel and material supporting RPAS opera-
stroy it from within. tions in the AOO will most likely be accessible to the
effects of SSBM as long as it is in firing range of those
6.5.2 Availability of SSBM weapons. Adversary target acquisition of RPAS infra-
structure such as shelters, runways and GCS satellite
Next to small arms, RPGs and mortars have been the dishes may also be quite easy as they usually cannot
weapons of choice of most non-state actors in re- be hidden from view.
cent conflicts. Almost 50 countries have manufac-
tured one or more types of mortars, making it the Satellite antennas needed for communication be-
most widely produced light weapon worldwide. In- tween the GCS, the satellite and the RPA may be the
surgent and terrorist groups have used mortars with most valuable targets for an adversary as they are in-
deadly effect in almost all conflicts since the Second herently sensitive components and vulnerable to
World War. Mortars have found favour among these fragmentation and blast.
groups given their wide availability, longevity, ease
of operation, and low cost. Regardless, currently no 6.5.4 Threat Assessment
non-state armed group is known to use or possess
guided mortars.5 SSBM inflict serious damage to any unprotected
RPAS ground equipment and personnel inside the
Artillery guns, rocket launchers and ballistic missiles AOO. Nations with regular armed forces are likely to
are usually found only in the inventories of state- be capable of delivering high precision surface-to-
actors. Nearly 40 countries have produced or still surface strikes. Ballistic missiles may also deliver ki-
produce artillery systems.6 Towed guns, howitzers netic effects outside the AOO (such as against a
Adversary RPAS
Combat Aircraft
Cyber Warfare
Asymmetric
MANPADS
Threats
Forces
SSBM
SBAD
ASAT
EW
RPAS Elements
Remotely
Piloted Aircraft
Payload
Human Element
Control Element
Data Link
Support Element
Low Critical
Moderately Critical
Highly Critical Indicated levels are not in accordance with the official NATO threat levels defined in the ACO Security Directive AD 70-1
enough to have significant implications for the safety groups as well as state-actors are likely to possess
of aircraft taking off or landing. Figure 10 shows the MANPADS or at least have the ability to acquire them
approximate area around a runway from which a when needed. Therefore, the estimated availability
MANPADS could be fired with some likelihood of strik- rating is ‘high’.
ing an aircraft.5
6.6.4 Accessibility of the RPAS to MANPADS
The same characteristics that make MANPADS suita-
ble for battlefield use also make them useful to terror- Like most weapon systems, MANPADS require a basic
ist groups and insurgents. They have been used in ter- level of operator skill to be used effectively. The batter-
rorist attacks against civilian aircraft in a number of ies generally provide power for less than a minute,
documented cases and have been employed as effec- and the operator must be able to acquire a target and
tive weapons in Afghanistan and Iraq.6 launch the missile before the battery runs out. This
can be challenging without continued practice. Many
6.6.3 Availability of MANPADS of the MANPADS on the black market are early-gener-
ation designs that require a rear-aspect shot to have a
MANPADS have been exported widely and licensed high probability of locking onto the target. This limits
for production in a number of countries. It is estimat- the ability of the shooter to find a suitable firing posi-
ed that worldwide inventories include between tion. This may explain why hit rates in Iraq and Af-
500,000 and 750,000 MANPADS developed or pro- ghanistan have been low compared to the number of
duced under licence by a number of countries. Most missiles fired.9
are part of their national military inventories while
others have been safely decommissioned. However, Engaging an RPA is only possible if it is in the MAN-
some are known to have been illegally traded to third PADS operator’s field of view. RPA are usually more
parties, including non-state actors.7 difficult to detect due to their smaller size and lower
noise level as compared to a manned combat air-
Non-state actors are able to acquire MANPADS in a va- craft. At decent operating altitudes, MANPADS can-
riety of ways, including from grey/black markets, arms not successfully engage RPA. Although low speed,
dealers, front companies, trans-shipment, intermedi- limited manoeuvrability and lack of protective meas-
aries, end-use certificate falsification and corrupt gov- ures could make RPA highly susceptible to MANPADS
ernment officials. Terrorist groups and other non-state attacks, based on the historical successful engage-
actors are demonstrating increasingly sophisticated ment rates in recent operations, the estimated ac-
and aggressive approaches towards acquiring MAN- cessibility of the RPA to MANPADS is determined to
PADS.8 Therefore, it is assessed that non-state armed be ‘moderate’.
Adversary RPAS
Combat Aircraft
Cyber Warfare
Asymmetric
MANPADS
Threats
Forces
SSBM
SBAD
ASAT
EW
RPAS Elements
Remotely
Piloted Aircraft
Payload
Human Element
Control Element
Data Link
Support Element
Low Critical
Moderately Critical
Highly Critical Indicated levels are not in accordance with the official NATO threat levels defined in the ACO Security Directive AD 70-1
Adversary RPAS
Combat Aircraft
Cyber Warfare
Asymmetric
MANPADS
Threats
Forces
SSBM
SBAD
ASAT
EW
RPAS Elements
Remotely
Piloted Aircraft
Payload
Human Element
Control Element
Data Link
Support Element
Low Critical
Moderately Critical
Highly Critical
Adversary RPAS
Combat Aircraft
Cyber Warfare
Asymmetric
MANPADS
Threats
Forces
SSBM
SBAD
ASAT
EW
RPAS Elements
Remotely
Piloted Aircraft
Payload
Human Element
Control Element
Data Link
Support Element
Low Critical
Moderately Critical
Highly Critical Indicated levels are not in accordance with the official NATO threat levels defined in the ACO Security Directive AD 70-1
Figure 11 – German Chancellor Angela Merkel (1st, L) and Defence Minister Thomas de Maiziere (1st, R) Watch
a Quadcopter Crashing onto the Stage During an Election Campaign Event of Her German Christian Demo-
cratic Union (CDU) Party in Dresden, Eastern Germany on 15 September 2013.1
Unmanned technology does not only offer new Commercially available RPAS do not usually exceed 20 kg,
opportunities; it also presents challenges and har- classifying them as ‘Micro’ or ‘Mini’ RPAS according to NA-
bours potential threats. Adversary remotely piloted TO’s RPAS classification guide. Payloads range from a few
systems in the MALE / HALE category could impose hundred grams to a few kilograms for larger models. De-
the same threat to friendly RPAS operations just like pending on the transmitter and receiver installed, the air-
any other combat aircraft, i.e. air-to-air and air-to- craft can be remotely controlled at ranges of up to 10 km.
ground strikes as well as employing EW capabilities. Typically, Micro and Mini RPAS do not operate above
Those threats have already been outlined in chapter 3,000 ft, are usually powered by a rechargeable battery,
6.2.2, so this chapter will focus on the emerging and have a low operating time of approximately one
threats from smaller RPAS which are not only re- hour. Military grade Micro and Mini RPAS share most of
stricted to military use, but are also available com- the same limitations as their commercial counterparts al-
mercially. Small, low and slow flying RPAS could in- though their range and endurance are usually greater.
troduce new strike capabilities to the military and
non-state armed groups. They could also be direct- 6.9.2 Detecting the RPAS Threat – A Real Challenge
ed against ground-based elements of the RPAS, i.e.
personnel, the GCS and the RPA itself if it is not Current MALE and HALE RPAS will most likely be de-
airborne. tected by radar because they share the size, speed
Mission radius 10 km 20 - 40 km 5 km 10 km
and operating altitude with legacy, non-stealthy RPAS doesn’t require formal pilot training; it’s as simple
combat aircraft. In contrast, Micro and Mini RPAS are as flying a model plane. Hence, the availability of mi-
very small, can be flown at very low altitudes and cro and mini RPAS is assessed as ‘high’.
slow speeds. Even if a low flying object is detected,
AD systems usually filter out those targets too slow 6.9.4 Accessibility of Friendly RPAS by Adversary
and too small, in order to eliminate clutter and false Micro and Mini RPAS
indications. This filtering technique opens a window
of opportunity for Micro and Mini RPAS to operate Micro and Mini RPAS are man-portable and the opera-
undetected until they are in visual range. When con- tor can easily hide as no large ground control equip-
sidering RPA size, this visual range can be assumed to ment is necessary. Depending on the RPAS range, the
be quite close. Destroying such a small object will adversary only has to be located somewhere in the
most likely be a significant challenge. During German vicinity of a possible target, which can be up to 10km
Chancellor Angela Merkel’s election campaign in with current COTS models. Although endurance is
2013, her security service was completely taken by limited, there may still be time to loiter undetected
surprise when a commercial quadrocopter RPAS was above the target to strike when the opportunity aris-
flown towards the stage and almost crashed into her. es, e.g. when personnel leave their shelter. Due to the
What fortunately turned out to be a joke clearly illus- challenge of timely detection of Micro and Mini RPAS,
trated the possible threat that Micro and Mini RPAS the accessibility of friendly RPAS elements to those
impose.6 (cf. Fig. 11) systems is assessed as ‘high’.
Usually still referred to as model aircraft, small RPAS Even the smallest RPAS can carry small payloads of
can be acquired easily by anyone. A simple internet some hundred grams of explosives and can cause
search for the terms ‘drone’ or ‘quadrocopter’ reveals fatal injuries to personnel and catastrophic damage
hundreds of those small aircraft for purchase starting to external GCS communications equipment or air-
at less than $100. (cf. Table 13) Operating commercial craft on the ground. They may be a weapon of choice
Adversary RPAS
Combat Aircraft
Cyber Warfare
Asymmetric
MANPADS
Threats
Forces
SSBM
SBAD
ASAT
EW
RPAS Elements
Remotely
Piloted Aircraft
Payload
Human Element
Control Element
Data Link
Support Element
Low Critical
Moderately Critical
Highly Critical Indicated levels are not in accordance with the official NATO threat levels defined in the ACO Security Directive AD 70-1
6.10.3 Contractors
© Amnesty International
With a few exceptions, current RPAS are not equipped 7.1.5 Vulnerability Assessment
with a threat warning system to detect and avoid
threats such as AD systems, MANPADS and combat 7.1.5.1 Vulnerability to SBAD, Combat Aircraft &
aircraft. Integration of equipment from manned avia- RPAS. The RPA itself is by design highly vulnerable. Cur-
tion may be problematic due to RPA Size, Weight and rent systems were never intended to operate in contest-
Power (SWaP) limitations. ed environments. The highest risk to RPA comes from
enemy AD systems and combat aircraft as they are de-
7.1.3 Hit Avoidance signed to detect aircraft at long ranges and can engage
the RPA with radar or IR-guided missiles. Given their high
Most of the current MALE RPAS share 1980’s design prin- radar visibility and their limited airspeed and manoeuvra-
ciples that sought to optimize long endurance and low bility, this leads to an overall ‘high’ vulnerability to adver-
fuel consumption. The most prominent features are sary SBAD and combat aircraft. As the magnitude of los-
wings with a very high aspect ratio combined with a ing an RPA is rated as ‘moderate’ to ‘high’, the overall
rear mounted, fuel efficient propeller engine. Together, vulnerability rating with respect to SBAD and combat
these provide the desired flight characteristics but bring aircraft is assessed as ‘high’. The higher rating was chosen
with them certain disadvantages. High aspect ratio to reflect the possibility of complete – but at least tempo-
wings have a fairly high amount of inertia that prevents rary – mission failure in the case of losing an RPA. Adver-
the RPA from conducting flight manoeuvres with a high sary RPAS may be capable of air-to-air combat and may
roll angular acceleration and G-force.15 Additionally, the be able to detect and engage friendly RPA. However, cur-
average cruising speed of propeller driven RPAS is quite rent systems offer very limited capabilities in that regard,
low, e.g. 70 knots (kts) for the MQ-1 Predator or 200 kts which is why the vulnerability rating with reference to
for the MQ-9 Reaper.16,17 Therefore, the RPA is unable to adversary RPA is reduced to ‘moderate’. (cf. Table 15)
conduct ‘last ditch’ manoeuvres and becomes a rigid tar-
get when compared to manned fighter aircraft. 7.1.5.2 Vulnerability to MANPADS. MANPADS engage-
ment towards an RPA has two perspectives, normal air-
7.1.4 Hit Tolerance borne operations and launch and recovery. Typically, the
operating altitude of MALE RPA is higher than the visual
RPAS are typically capable of operating more than one acquisition range of ground personnel and therefore the
RPA at a time. So the loss of a single RPA may only result threat of MANPADS may be easily mitigated. This situation
in failure of the current mission if a substitute RPA is not is different when the RPA is operating at lower altitudes
available for mission completion. Any payload attached such as during launch & recovery or when it is required for
to the RPA will also be lost. This may result in the loss of operational reasons. If the RPA is in spotting range of the
Adversary RPAS
Combat Aircraft
Cyber Warfare
Asymmetric
MANPADS
Threats
Forces
SSBM
SBAD
ASAT
EW
RPAS Elements
Remotely
Piloted Aircraft
Payload
Human Element
Control Element
Data Link
Support Element
Low Critical
Moderately Critical
Highly Critical Indicated levels are not in accordance with the official NATO threat levels defined in the ACO Security Directive AD 70-1
7.2.1.2 Synthetic Aperture Radar Sensor Stand- contributor to its maximum range. Consequently, the
Off Capabilities. In contrast to EO/IR sensors, Syn- same type of a LGB or JDAM will have a shorter range if
thetic Aperture Radar (SAR) technology can provide released from an RPA than if released from a combat
high-resolution imagery in inclement weather, at aircraft. (cf. Fig. 15)
night and/or at higher ranges. As a result of the com-
plex information processing capability of modern 7.2.2 Engagement Avoidance
digital electronics, SAR imagery can deliver a strictly
vertical view of the target independent of the actual 7.2.2.1 Situational Awareness. The RPA's sensors are
viewing angle.6,7 Given the same slant range, a SAR the operators’ ‘eyes and ears’. Sensors are the only di-
can operate at considerably higher target ranges than rect source of information to build situational aware-
EO/IR sensors and achieve the same imagery resolu- ness. Although the RPA sensor suite can take a very
tion. Although only the slant range actually contrib- detailed look of a very small area, the viewer has no
utes to the stand-off capability of the sensor, SAR may awareness of anything outside the ‘soda straw’ view of
be preferred if target range is a challenge (e.g. when the aircraft's sensors. Boresight cameras mounted on
border crossing issues are a factor). the RPA’s nose or tail provide the crew with a broader
view of the flight direction, but they still do not re-
7.2.1.3 Weapon Stand-Off Capabilities. In current ceive the kind of cues they get from their propriocep-
operations, many RPAS can be armed with Air-to- tive senses.12,13,14
Ground Missiles (AGM), Laser-Guided Bombs (LGB)
and/or Joint Direct Attack Munitions (JDAM). Unlike Increased automation can lower an operators’ task load
self-propelled munitions (i.e. guided missiles), the range to the point where vigilance is negatively affected and
of a LGB or JDAM depends exclusively on the airspeed boredom may result. As increased automation shifts con-
and altitude of the delivery platform. Current propeller- trollers into system management positions, monotony,
driven MALE RPA have a cruising speed of about loss of vigilance and boredom are more likely to occur.
200 kts8 and future jet-propelled RPA are expected to With recent advances in automation, it is not uncommon
achieve speeds of up to 400 kts9. Modern manned for an RPAS operator in search and reconnaissance mis-
fighter aircraft are capable of bomb releases at high sions to spend the majority of the mission merely waiting
subsonic or even supersonic speeds and at higher alti- for a system anomaly to occur and to only interact with
tudes.10 The total potential (altitude) and kinetic (air- the system occasionally. This reduced need for interac-
speed) energy of the weapon at release is the main tion can result in a lack of sustained attention, which can
Figure 15 – Stand-Off Ranges of GBU-38 JDAM, 30 degree impact angle, on-axis release.22
ALTITUDE
[kft ]
30
20
SA-8
SA-13
“Trash Fire Envelope”
10 AAA SA-3 SA-2 SA-10b SA-10c SA-5
MANPADS SA-11 SA-4 SA-12a/b
SA-6
SA-10a
Adversary RPAS
Combat Aircraft
Cyber Warfare
Asymmetric
MANPADS
Threats
Forces
SSBM
SBAD
ASAT
EW
RPAS Elements
Remotely
Piloted Aircraft
Payload
Human Element
Control Element
Data Link
Support Element
Low Critical
Moderately Critical
Highly Critical Indicated levels are not in accordance with the official NATO threat levels defined in the ACO Security Directive AD 70-1
Although the RPA itself does not carry a human 7.3.1 Detection, Engagement and Hit Avoidance
crew, there are a lot of personnel involved in the op-
eration of the RPAS. For example, a MQ-9 Reaper 7.3.1.1 Launch and Recovery Unit. Depending on
Combat Air Patrol (CAP) consisting of four RPA has a the RPA’s effective range, the Launch and Recovery
strength of approximately 200 personnel. Roughly Unit (LRU) is usually located in or near the AOO. For
one-third of these personnel are deployed in or near smaller MALE RPAS, the LRU is most likely deployed
the AOO to launch, recover and maintain the air- inside the AOO. For larger MALE RPA with higher effec-
craft.1 Attacking the personnel rather than the RPA tive ranges and airspeeds, the LRU may be deployed
itself may also be a favourable option for an adver- to a neighbouring host nation. Currently, only HALE
sary. Attacking personnel involved in RPAS opera- RPA such as the Global Hawk have their LRU located
tions has already begun and has allegedly proven outside the AOO. Launching and recovering a MALE
successful. The leader of the Haqqani Network in RPA requires a LOS Data Link from a local GCS and a
Afghanistan claimed that ‘accurate drone-strike op- suitable airport infrastructure with a runway of r oughly
erations against the Mujahedeen decreased 90 per- 2,000 m. Like any other military aircraft, additional
Adversary RPAS
Combat Aircraft
Cyber Warfare
Asymmetric
MANPADS
Threats
Forces
SSBM
SBAD
ASAT
EW
RPAS Elements
Remotely
Piloted Aircraft
Payload
Human Element
Control Element
Data Link
Support Element
Low Critical
Moderately Critical
Highly Critical Indicated levels are not in accordance with the official NATO threat levels defined in the ACO Security Directive AD 70-1
7.4 Control Element trols to operate the RPA and a satellite earth terminal
The Control Element consists of three components: for BLOS communications. Due to their unique size
the physical infrastructure (external hardware), com- and shape, the hardware components may serve as a
puter systems (internal hardware) and a non-physical means to positively identify them as RPAS compo-
(software) component. All of them may be subjected nents to an adversary. Additionally, their persistent
to different types of attack. The GCS and its associated radio transmissions may also reveal their location to
communication equipment form the physical part of enemy electronic reconnaissance.
the control element while the software running the
control element’s computer systems forms the non- Deployable GCS shelters usually have standard di-
physical part. The physical part may be subject to at- mensions of 12 ft or 24 ft to fit common transport re-
tack by kinetic weapons while the non-physical part quirements. They are similar in appearance to other
may be subject to attack through cyber-warfare. One military shelters used for a variety of purposes. Some
important difference between a kinetic and cyber-at- GCS also use a 30 ft trailer to house the hardware
tack is that a kinetic attack always requires the attacker components. This results in a more distinctive appear-
to be in relatively close proximity to the intended tar- ance as compared to other standard military C2
get. For a cyber-attack, this is not the case. equipment. However, the directional antenna used
for LOS communication may distinguish the GCS from
7.4.1 Detection and Engagement Avoidance other general purpose or C2 shelters.1
7.4.1.1 External Hardware Components. The Con- Non-deployable GCS integrated into a base’s exist-
trol Element’s prominent hardware components typi- ing infrastructure help to make them indistinguish-
cally consist of a shelter or trailer containing the con- able from other multi-purpose buildings. Although
roof mounted communication equipment may re- and to the PED element at Langley AFB, both in the
veal the purpose of the building, an adversary would United States.5 Conversely, deployed GCS usually have
need precise intelligence, e.g. the building’s blue- their own satellite earth terminal nearby and do not
prints, to locate the GCS inside the infrastructure. typically have a wired network infrastructure. De-
The most prominent characteristics of any GCS are ployed GCS are more exposed to detection by enemy
the BLOS satellite earth terminals which can have electronic reconnaissance as their radio transmissions
antenna diameters of several metres. For example, originate within or close to the AOO and therefore
the Predator Primary Satellite Link (PPSL) uses a within the possible range of an adversary. In summary,
20 ft / 6.1 m satellite dish. Communication antennas the probability of locating, identifying and engaging
of this size are easily recognizable, since they require an RPAS control element depends on its physical loca-
a minimum safety distance from surrounding equip- tion. Its exposure to enemy kinetic actions is ‘high’ if
ment and personnel due to the radiation hazard. the control element is located inside the AOO while it
Fixed installations of satellite earth terminals could is ‘moderate’ to ’low’ if it’s not. Home-based RPAS con-
even be identified by using publicly available trol elements may not be identified if they are located
Google Earth pictures.2 (cf. Fig. 17) far from SATCOM equipment or if they are covertly
integrated into other military infrastructure.
Depending on the location of the GCS, the location of
the satellite earth terminal may vary. Fixed GCS instal- 7.4.1.2 Internal Hardware Components. Military
lations in the MCE may not have their own satellite computer systems similar to those used in the GCS,
dish. They could use a wired network infrastructure to Satellite Earth Terminals or Mission Control Centres of-
link them to a distant satellite earth terminal located ten include COTS components or sub-components
remotely (even on another continent). For example, although the complete system is usually adapted and
RPAS operations in the Middle East may use satellite configured to the military’s specific requirements. The
earth terminals at Ramstein Air Force Base (AFB) in Eu- supply chain for microelectronics is extremely diffuse,
rope for BLOS communication with the RPA and use complex, and globally dispersed, making it difficult to
the wired portion of the military network to connect verify the trust and authenticity of the electronic
the satellite earth terminal to the MCE at Creech AFB equipment used in the RPAS. Identifying the multiple
layers of subcontractors and suppliers contributing to rupted supply chains has not yet drawn the appro-
the design or fabrication of a specific chip is difficult; priate attention that it should.10 Due to the preva-
tracing all of the contributors for a complete integrat- lence of COTS components inside military computer
ed circuit is even more so. Hence, this widely dis- systems, the vulnerability to this form of cyber-war-
persed supply chain may provide an adversary with fare is assessed as ‘high’.
opportunities to manipulate those components or
penetrate the distribution chain with counterfeit 7.4.1.3 Software Components. To destroy, disrupt or
products.6 (cf. Fig. 18) infiltrate the software portion of the Control Element,
an adversary must first gain access to the network, ei-
Deliberate modification of the product assembly and ther directly or remotely. The software components
delivery could provide an adversary with the prospect necessary to operate an RPAS are not limited to the
of gaining covert access and monitoring of sensitive GCS, but also include the aircraft, satellites and ground
systems, to degrade RPAS mission effectiveness, or to stations if applicable, as well as support systems for
insert false information or instructions that could logistics, maintenance or PED. This provides an adver-
cause premature failure or complete remote control sary with a broad spectrum of possible entry points
or destruction of the targeted RPAS.7 Hardware-level into the RPAS network.11
vulnerabilities can also be exploited to completely
sidestep software-based security countermeasures. Traditionally, each RPAS was procured as a fully inte-
For example, a team of university researchers recently grated, vendor-specific solution, consisting of the air
demonstrated that carefully chosen alterations in por- system, ground station, communications channels,
tions of a chip involved in encryption processing encryption technologies and payloads. These single-
could allow an attacker to extract encryption keys.8 system variants were typically ‘closed’ systems utiliz-
ing proprietary interfaces throughout the system ar-
This study could identify only one official initiative chitecture. To overcome this vendor-centric
aimed at establishing reliable and trustworthy sup- approach, an open RPAS architecture is currently un-
ply chains of microelectronics for military purposes. der development which should utilize common in-
This leads to the assumption the threat from cor- terface standards.12,13
Adversary RPAS
Combat Aircraft
Cyber Warfare
Asymmetric
MANPADS
Threats
Forces
SSBM
SBAD
ASAT
EW
RPAS Elements
Remotely
Piloted Aircraft
Payload
Human Element
Control Element
Data Link
Support Element
Low Critical
Moderately Critical
Highly Critical Indicated levels are not in accordance with the official NATO threat levels defined in the ACO Security Directive AD 70-1
7.5 Data Links The RPAS hardware and software components’ vul-
’Right now, most UAS don't even have Link-16, the nerabilities against cyber-threats have been outlined
NATO standard for data links first established in the in the previous chapter. These vulnerabilities also ap-
1990s. In the benign airspace over Afghanistan, Ma- ply to the data link’s network nodes used for BLOS
rine operators can control their Shadow drones just communications. Therefore, this chapter focuses on
fine but they must rely on voice communications the vulnerabilities of RPAS radio transmissions only.
over radio to talk to troops on the ground. The big- An adversary targeting RPAS radio transmissions has
gest number-one issue is we can't talk to the people two options; using transmissions to jam or spoof a
we need to... digitally. There are no encrypted data targeted receiver or using a receiver to exploit a
links.‘ transmitted signal.
Lieutenant Colonel Kevin Murray,
Commanding Officer Marine UAS Squadron 1, 7.5.1 General Radio Antenna Characteristics
AUVSI Annual Conference 2012
The radio signals establishing communication be-
Data links connect the RPA with the GCS, enabling tween the RPA, the GCS and possibly the satellite are
operators to remotely control the RPA and receive usually transmitted and received by directional anten-
transmissions. Data links can be established either by nas. This is to ensure transmitters only broadcast in
radio for LOS communications or satellites and net- the direction of the intended receiver and receivers
work nodes for BLOS communications. The radio only receive transmissions from the intended trans-
transmissions may be subject to attack by EW where- mitter. Some RPA also use omnidirectional antennas
as the network nodes may be attacked by means of to broadcast their FMV stream in all directions to ena-
cyber-warfare. ble ground troops to receive the FMV signal.1
Modern Ku-band antennas produce a narrow main 7.5.3.1 Remotely Piloted Aircraft. RPA typically use
lobe beam of less than 10 degrees and low side two or more antennas to maintain their data link to
lobes. Jammers which do not enter directly into the the GCS and the satellite. Antennas to receive signals
main lobe of the antenna can be substantially at- from the GCS face downwards and may be direction-
tenuated. When received via side lobes, jammers are al or omnidirectional. Antennas to receive satellite
attenuated by approximately 20 dB for the first side signals face upwards and are typically directional.5 As
lobe and by an even greater amount for the addi- the omnidirectional LOS antennas are usually only
tional side lobes. Antennas designed for particularly used for launch and recovery, the timeframe to inter-
low side lobes reach an attenuation of greater than fere with the LOS data link is quite short. Unfortu-
40 dB, which means, if an adversary seeks to jam a nately, the RPA is vulnerable to a possible data link
signal via side lobe injection, it must be more than loss especially during the landing phase. This may
10,000 times stronger than the original signal re- cause the loss of control of a landing RPA and possi-
ceived by the main lobe.2 bly the loss of the aircraft. The directional antenna for
satellite communication can be considered less vul-
7.5.2 Detection Avoidance nerable to ground-based electromagnetic interfer-
ence, as neither its main lobe nor side lobes face the
To lower the probability of interception, radio com- ground. Successfully injecting signals into the RPA’s
munications between the RPAS transmitters and re- satellite antenna requires either airborne or space-
ceivers often use highly directional antennas with nar- based EW assets.
row beams and frequencies in the Extremely High
Frequency (EHF) spectrum. Additionally, the signal 7.5.3.2 Ground Control Station. Like the RPA, the
can either be spread over a wider spectrum or modu- GCS uses separate, directional antennas for LOS and
lated with a random noise pattern to make it appear BLOS communications. Depending on the position
noise-like. The signal can also be rapidly moved of the RPA or satellite, the LOS and BLOS antenna
around in the frequency spectrum to further reduce may have to be aimed at shallow angles and in the
its detection. These measures significantly reduce the
area from which an adversary could intercept RPAS 0°
communications.3,4
-45° 45°
-20 dB
-10 dB
-10 dB
-20 dB
-30 dB
0 dB
-20 dB
-10 dB
-10 dB
-20 dB
-30 dB
7.5.6 Additional Considerations This study assumes not all currently fielded RPAS are
capable of transmitting encrypted video feeds. This is
7.5.6.1 Bandwidth Congestion. Current operational especially a concern for smaller systems with SWaP
requirements for FMV already exceed the bandwidth limitations that may prevent the installation of addi-
capacity of available military spacecraft. The develop- tional encryption equipment.
ment of new FMV feeds exacerbates this issue. Cur-
rent RPAS with wide-area surveillance sensors are able Figure 21 – ROVER System.
to produce 10 FMV streams simultaneously. That ca-
pability is expected to increase to greater than 50 FMV
streams simultaneously. More bandwidth is required
to facilitate ISR operations and the bandwidth pres-
sure will only increase as wide-area surveillance tools
grow more capable and new high definition sensors
and advanced radars are integrated in the RPAS. To try
to keep up, the military has leased bandwidth from
commercial carriers for more than a decade. It is fur-
ther estimated that demand for satellite communica-
© US Air Force, Staff Sgt. Angelique Pere
Adversary RPAS
Combat Aircraft
Cyber Warfare
Asymmetric
MANPADS
Threats
Forces
SSBM
SBAD
ASAT
EW
RPAS Elements
Remotely
Piloted Aircraft
Payload
Human Element
Control Element
Data Link
Support Element
Low Critical
Moderately Critical
Highly Critical Indicated levels are not in accordance with the official NATO threat levels defined in the ACO Security Directive AD 70-1
7.6 Support Element ters for refuelling, arming and maintenance. MALE
’The most valuable and, ironically, most ignored UAS RPAS usually also require an adequate airport infra-
target is the launch recovery site – the aircraft carrier structure with a runway of roughly 2,000 m. The in-
of the battlefield. Why focus on killing individual air- frastructure necessary to operate an RPAS is usually
borne platforms when the high payoff is to kill multi- part of a military compound. Support Element per-
ple airframes along with operators and sustainers in sonnel working on-base should be well protected
a single blow? Given the fact that the launch recovery from immediate threats as a result of force protec-
site is a vital component of the total system, kinetic tion measures already in place.
attack is a near-certainty for a capable enemy.‘
Lieutenant General (ret.) Michael F. Spigelmire, former 7.6.2 Engagement Avoidance, Hit Avoidance and
commander U.S. Army Special Operations Command Hit Tolerance
and VII Corps
The exposure of deployed Support Element person-
The Support Element includes all of the prerequisite nel and equipment, the precautions against threats as
equipment to deploy, transport, maintain, launch and well as the magnitude of personnel or equipment
recover the RPA and associated communications losses are identical to those that apply to the LRU and
equipment. the deployed MCE. These have already been discussed
in chapter 7.3.
7.6.1 Detection Avoidance
7.6.3 Vulnerability Assessment
The Support Element is typically deployed and lo-
cated in or near the AOO, depending on the RPA’s Support Element functions and tasks are typically
effective range. Like manned aircraft, RPAS typically conducted at the same location as the LRU. Therefore,
require an appropriate logistics footprint, e.g. shel- the Support Element and the personnel assigned to
Adversary RPAS
Combat Aircraft
Cyber Warfare
Asymmetric
MANPADS
Threats
Forces
SSBM
SBAD
ASAT
RPAS Elements EW
Remotely
Piloted Aircraft
Payload
Human Element
Control Element
Data Link
Support Element
Low Critical
Moderately Critical
Highly Critical Indicated levels are not in accordance with the official NATO threat levels defined in the ACO Security Directive AD 70-1
Threat and Vulnerability To determine the probability of attack, the lower over-
Consolidation all rating from either the ‘Availability’ or the ‘Accessibil-
ity’ was used. For example, if a weapon system was
8.1 Threat Summary estimated to be ‘highly available’ to a possible future
Chapter VI identified possible threats and their esti- adversary but at the same time it was determined that
mated probability of attack against an RPAS. The prob- the enemy couldn’t get ‘access’ to the RPAS with that
ability of attack ratings were derived from two key specific weapon system, the overall probability of at-
factors; ‘Availability’ and ‘Accessibility’. ‘Availability’ re- tack was rated as ‘low’. The ‘probability of attack’ rating
ferred to the probability that a given weapon, weap- does not consider the possibility of success or failure
on system or military force necessary to produce a of an attack. It merely rates the likelihood that possible
threat to the RPAS was obtainable for an adversary. future adversaries may be in possession of a given
‘Accessibility’ referred to the probability that an adver- weapon, weapon systems or military force and NATO
sary could get the weapon, weapon system or mili- should anticipate their use against friendly RPAS.
tary force into striking distance. If analysis determined
that a given threat delivered different ratings within The following table summarizes all threats and their
one factor, the highest rating was used in that specific overall probability of attack ratings previously dis-
factor. For example, if a deployed RPAS element was cussed in chapter VI. The individual ratings are dis-
estimated as more ‘accessible’ to a certain threat than played below using the standard ‘traffic light colour
if home-based, the higher rating for the deployed system’. (cf. Table 22)
Adversary RPAS
Combat Aircraft
Cyber Warfare
Asymmetric
MANPADS
Threats
Forces
SSBM
SBAD
ASAT
EW
RPAS Elements
Remotely
Piloted Aircraft
Payload
Human Element
Control Element
Data Link
Support Element
Low Critical
Moderately Critical
Highly Critical Indicated levels are not in accordance with the official NATO threat levels defined in the ACO Security Directive AD 70-1
Adversary RPAS
Combat Aircraft
Cyber Warfare
Asymmetric
MANPADS
Threats
Forces
SSBM
SBAD
ASAT
EW
RPAS Elements
Remotely
Piloted Aircraft
Payload
Human Element
Control Element
Data Link
Support Element
Low Critical
Moderately Critical
Highly Critical Indicated levels are not in accordance with the official NATO threat levels defined in the ACO Security Directive AD 70-1
Adversary RPAS
Combat Aircraft
Cyber Warfare
Asymmetric
MANPADS
Threats
Forces
SSBM
SBAD
ASAT
EW
RPAS Elements
Remotely
Piloted Aircraft
Payload
Human Element
Control Element
Data Link
Support Element
Low Critical
Moderately Critical
Highly Critical Indicated levels are not in accordance with the official NATO threat levels defined in the ACO Security Directive AD 70-1
9.1.1.1 Ensure Crew Rotations are Properly 9.1.1.3 Use Proper Mission Planning Techniques
Scheduled. Aircrew fatigue, the physical or mental to Avoid Surface-/Air-Based Threats. The best way
9.1.1.5 Properly Weaponize the RPA to Suppress 9.1.1.9 Incorporate a Self-Destruct Mechanism to
Surface-/Air-Based Threats. Equipping RPAS with Deter Enemy Exploitation of the RPA. Modern RPA
lethal air-to-air or air-to-ground weapons will force are complex systems consisting of highly advanced
the adversary to weigh the risk of losing equipment and classified technology. If the loss of an RPA cannot
and personnel versus the benefit of destroying the be avoided, an automated self-destruct mechanism
RPA. RPAS could also take the role of Suppression of should guarantee that classified technology or on-
Enemy Air Defence (SEAD) assets if armed with High- board data will not be compromised. A reliable denial
Speed-Anti-Radiation-Missiles (HARM). Due to their of adversary exploitation of friendly technology will
extended loiter time, they may be better suited to directly support suppression of future threats.
perform this mission than manned aircraft.
9.1.1.10 Consider Stratospheric Employment of
9.1.1.6 Consider Visual and Aural Thresholds in RPAS to Suppress Surface-/Air-Based Threats. Cur-
Mission Planning. The range from which an object in rently the stratosphere is out of range for most surface-
the sky can be spotted is dependent on its size, con- based threats. RPAS flying at stratospheric altitudes
trast, engine noise level and the atmospheric condi- could operate as very long endurance stationary
tions. RPAS can improve the likelihood of avoiding weapons and ISR platforms to conduct offensive op-
MANPADS engagements by remaining outside the erations and wide area surveillance. Equipped with
spotting range of airspace observers. Mission plan- sophisticated guided and homing air-to-surface and
ners must be aware of the RPAS’ visual and audible air-to-air missiles, stratospheric RPAS could project air
thresholds to determine the appropriate target range, power similar to today’s naval aircraft carriers.
slant range and route. These factors are especially
critical for missions with long, on-station loiter times. 9.1.2 Enhancing Detection Avoidance
9.1.1.7 Control Image / Video Resolution Re- 9.1.2.1 Incorporate Terrain Following Flight Tech-
quirements to a Reasonable Level to Improve nology to Avoid Radar Detection. Radars can typi-
RPAS Stand-Off Range. The altitude, target range cally only detect targets that are in direct line of sight.
and slant range are dependent on the sensor’s angu- An RPAS capable of highly automated, very low alti-
9.4.2.2 Reduce Radio Transmissions to Impede Lo- 9.4.3.2 Enable Stationary RPAS MCEs to Redeploy
cating the GCS by Electronic Reconnaissance. As in a Reasonable Timeframe. In recent asymmetric
most RPAS require constant communication with the conflicts, home-based mission control elements of
GCS, an adversary could detect these radio signals RPAS provided a high level of security simply by the
and employ direction-finding techniques to locate amount of distance from the AOO, but a more capa-
the source of transmission (cf. 9.4.2.1). Minimizing ra- ble opponent may be able to conduct attacks deep
dio communications would lower the risk of being inside NATO territory, e.g. by long-range ballistic mis-
detected electronically. However, this requires a high siles, stealth aircraft or even RPAS. Therefore, RPAS mis-
degree of automation, enabling the RPA to conduct sion control elements should be capable of redeploy-
its mission with only minimal human intervention and ing in a reasonable timeframe to evade enemy
eventually a minimum of radio transmissions (cf. engagement. A contingency plan for evacuating the
9.5.2.5). stationary military infrastructure and procedures to
continue operations with a mobile control element
9.4.2.3 Choose an Inconspicuous Location for the nucleus should be considered a minimum require-
GCS. An RPAS encompasses several components. This ment.
enables an adversary to visually detect, identify and draw
conclusions where other elements may be located. Lo- 9.4.3.3 Locate SATCOM Antennas Away from the
cating the GCS in the vicinity of other RPAS elements, e.g. GCS and Permit It to Be Quickly Relocated to Ham-
parked RPA, aircraft hangars or communications equip- per Adversary Electronic Reconnaissance. Modern
ment, may be convenient, but could also endanger the electro-optical or electronic reconnaissance is likely to
GCS. Whenever possible, the GCS should be placed in an locate any active command post after a certain
inconspicuous location where it blends in with other ge- amount of time (cf. 9.4.3.1). If it is not feasible to regu-
neric military equipment or infrastructure. larly move the GCS itself, relocating detached com-
munication antennas around a concealed GCS could
9.4.2.4 Remove Signs Indicating the Operational be a viable option. Although relocating detached ra-
GCS Location to Avert On-Site Espionage. Enemy dio antennas could confuse adversary electronic re-
intelligence gathering does not stop at the front gates connaissance, it may only delay locating and identifi-
of military compounds. The common practice of em- cation of the actual GCS.
ploying locals for non-military duties offers the oppor-
tunity for enemy on-site espionage. This tactic does 9.4.3.4 Consider the Use of Decoy SATCOM Anten-
not apply only to deployed operations, any signs indi- nas to Mislead the Adversary. Satellite dishes with a
cating the location of operational GCS should be re- diameter of several metres are difficult to hide, likely
moved to protect against enemy on-site espionage to be recognized by enemy reconnaissance and high-
activities. ly vulnerable to blast and fragmentation. This makes
9.5.3.1 Use Strong Encryption to Prevent Enemy 9.5.4 Enhancing Hit Avoidance
Eavesdropping or Exploitation of RPAS Transmis-
sions. To enhance RPAS data link survivability, all radio 9.5.4.1 Incorporate Larger Antennas with In-
transmissions to and from the RPA should be appro- creased Signal Power and Higher Focus to In-
priately encrypted. This includes downlinks from the crease Gain. In general, antennas must discriminate
RPA to ROVER or other types of ground-based, porta- between the preferred signals and unwanted noise.
ble receiver systems. This would deny an adversary Increasing the signal’s power and concentrating it
the ability to intercept and exploit the transmitted into a narrow beam increases the likelihood of over-
100 JAPCC | Remotely Piloted Aircraft Systems in Contested Environments | September 2014
scenario. As a prerequisite, the RPA must be equipped manned fighter aircraft. They could operate on their
with an RWR to provide the required situational own in non-permissive and hostile air environments
awareness of enemy radar sites. as well. The absence of a human in the aircraft would
allow Combat RPAS to sustain higher G-forces and
10.1.2.3 Training Possibilities. RPAS aircrews may or would be limited only by the airframe’s aerodynamics.
may not have a background as combat aircraft pilots Combat RPAS should incorporate comprehensive
as not all nations recruit them from manned aviation. sensor suites that can provide a real-time, compre-
Some nations have introduced a separate career for hensive air picture. This would enable them to react
RPAS personnel, qualifying them to fly only RPA. Those automatically to any incoming threats. Combat RPAS
RPAS aircrews have never experienced real air-to-air should be capable of conducting automated offen-
combat. Education and training syllabi for RPAS oper- sive and defensive flight manoeuvres, outperforming
ators should incorporate aerial combat on an elemen- any manned fighter aircraft. They should be capable
tary level to increase the probability of successfully of coordinating their flight manoeuvres as a formation
evading threats. automatically, enabling them to simultaneously at-
tack single or multiple targets. In order to enable the
10.1.3 Future Vision for Remotely Piloted Aircraft operator to cope in such a dynamic environment,
workload should be reduced to a minimum. For ex-
This study has determined that it is very unlikely there ample, it should only consist of choosing from multi-
will be a ‘one size fits all’ solution for future RPAS. Multi- ple pre-defined flight manoeuvres and approving the
role systems offering a multitude of capabilities are release of lethal weapons. Combat RPAS are expected
expected to be very expensive. This would contradict to be the most expensive and technologically ad-
the principle of RPAS expendability due to their sheer vanced RPAS.
unit price. This study recommends optimizing future
RPAS for specific purposes as outlined below. 10.1.3.3 Swarm RPAS. In contrast to highly expen-
sive Deep Penetration or Combat RPAS, Swarm RPAS
10.1.3.1 Deep Penetration RPAS. Deep Penetration should be relatively cheap and expendable. They
RPAS would conduct reconnaissance and air strikes should be designed to operate together in large num-
deep in enemy territory. They should be optimised for bers, forming a swarm to simply overwhelm the ad-
remaining undetected across the entire electromag- versary’s defensive capabilities. These are to be the
netic spectrum. This would require not only tradition- ‘system of choice’ for most dull, dirty and dangerous
al stealth shaping techniques and radar absorbing tasks. They may be individually armed, releasing their
materials, but also an extensively higher degree of munitions and returning to their base, or may consist
automation to reduce C2 communications to an ab- only of a warhead which will make the Swarm RPA an
solute minimum. As supersonic speed and very high individual strike asset. They could eventually take the
altitudes would further support the survivability of a SEAD role from manned combat aircraft. Unarmed
Deep Penetration RPAS, the incorporated sensors and versions could serve as decoys, luring AD sensors and
weapons would have to be capable of providing ap- weapons away from manned aircraft and high value
propriate results under these circumstances as well. assets. As a prerequisite, the swarm should be capable
Deep Penetration RPAS are expected to be high value of coordinating its flight manoeuvres automatically,
assets, not only in financial, but technological terms as permitting operation by a single aircrew. The swarm
well. To avoid revealing highly classified technology should also be capable of adapting to the loss of indi-
and data, a deep strike RPA must incorporate a reliable vidual RPA, reorganizing the remaining RPA as needed
self-destruct mechanism. during combat operations.
10.1.3.2 Combat RPAS. Combat RPAS could conduct 'Quantity has a quality all its own.'
air-to-air and air-to-ground combat alongside Russian saying
JAPCC | Remotely Piloted Aircraft Systems in Contested Environments | September 2014 101
10.1.3.4 Carrier RPAS. Aircraft carriers provide the eral thousands of miles away from hostilities, their
ability to project military power and deterrence glob- threat perception is lower. Home-based RPAS person-
ally. Carrier RPAS should use this concept to project nel are able to join their families and live their normal
military power in a similar way. Unlike their naval lives after their combat shifts conclude. It is because of
counterparts, they will not carry individual aircraft, but this reason the off-duty environment was identified as
will carry an immense stock of long-range, precision- a critical vulnerability. This study couldn’t identify any
guided air-to-air and air-to-ground munitions instead. protective measures currently in place for the off-duty
They may also carry air surveillance radars and act as environment. On the contrary, countless press-related
an armed, airborne early warning asset. Ultra long en- references were found clearly revealing names and
durance and a massive cargo lifting capability may be photos of RPAS personnel. This may open a window of
achieved by using a solar powered airship instead of a opportunity to identify and target RPAS personnel in
conventionally powered aircraft. Integrated into a fu- their home country. Attacks on RPAS personnel’s fami-
ture net-centric environment, other Allied manned lies, friends and homes cannot be ruled out.
and remotely piloted aircraft could have remote ac-
cess to the weapons load carried by the Carrier RPAS. 10.2.2 Improving Force Protection
This reach-back capability could enable unarmed
Swarm RPAS to employ weapons from the Carrier 10.2.2.1 Deployed RPAS Ground Elements. Im-
RPAS to engage hostile targets. Carrier RPAS should be proving the survivability of deployed RPAS ground
capable of defending itself to a certain degree, but components should employ established and proven
would be dependent on additional external assets measures such as camouflage and dispersion of
such as NATO’s Airborne Early Warning and Control equipment, reducing radio transmissions or increased
System (AWACS). mobility to facilitate leapfrog operations. However,
the best way to protect deployed RPAS ground ele-
10.1.3.5 Reconnaissance RPAS. Armed or unarmed ments would be to not deploy them at all, so the
Reconnaissance RPAS would continue providing the range of RPA must be significantly improved that they
capabilities that current MALE/HALE RPAS deliver, but can be launched and recovered from inside NATO ter-
with upgraded sensor suites to enable better situa- ritory. An automated air-to-air refuelling and rearma-
tional awareness than today’s systems. They would still ment capability for RPAS would be essential in achiev-
be required to operate in benign air environments and ing this goal. With the exemption of disposable Swarm
would be enabled by Swarm or Combat RPAS. Recon- RPAS, all envisioned future RPAS as described above
naissance in non-permissive or hostile environments (cf. 10.1.3) should strive for this capability.
would become a mission for Deep Penetration RPAS.
10.2.2.2 Home-Based RPAS Ground Elements. The
recommended key actions to protect home-based
10.2 Ground-Based RPAS Elements
RPAS infrastructure and personnel should focus on
10.2.1 Critical Vulnerabilities threat suppression and detection avoidance.
BLOS communications permit RPAS ground installa- • Threat Suppression. Pre-emptively deterring
tions to be located anywhere on the globe. RPAS ele- threats for home-based RPAS infrastructure and per-
ments located in the AOO share the threat and force sonnel must not be considered a military only task.
protection measures of other deployed combat sup- Military FPCON should be complemented with ad-
port troops. This study didn’t identify any risks unique ditional protective measures provided by local civil-
to deployed RPAS personnel. However, the vulnerabil- ian authorities. Comprehensive and joint civil and
ity assessment is significantly different for home-based military force protection measures should also en-
RPAS installations and personnel. Because home- compass the domestic environment to include fami-
based RPAS personnel remotely operate RPA from sev- lies of RPAS personnel.
102 JAPCC | Remotely Piloted Aircraft Systems in Contested Environments | September 2014
• Detection Avoidance. RPAS ground components lo- cious software. This is most likely due to the prolific
cations and identities of RPAS personnel should be use of discs and removable drives. Once discovered, it
protected, deterring adversaries from obtaining infor- took several years to disinfect the compromised sys-
mation on where to strike. This requires adopting com- tems. Eventually, the human factor turned out to be
munication and classification guidelines as they are the weakest link for gaining access to even highly se-
established for other units particularly at risk. cured and physically separated military networks.
JAPCC | Remotely Piloted Aircraft Systems in Contested Environments | September 2014 103
10.3.2.3 Software Packages. Capable, trustworthy in this study. Future RPAS are projected to perform au-
and updated security software suites are essential in tomated flight between waypoints selected by the
defending computer networks. Cutting off potential operator. This will significantly lower the need for radio
entry points into the RPAS, e.g. network bridges or re- communications as a permanent C2 data link, making
movable devices, would further improve cyber-secu- it no longer necessary. They are also predicted to auto-
rity. In addition to these defensive measures, offensive matically take-off, land, refuel, navigate and eventually
and pre-emptive cyber-operations should be con- conduct combat manoeuvres. These capabilities al-
ducted to eliminate threats in advance. ready exist, providing the prerequisites to introduce
them into future RPAS. Automated target identifica-
10.3.2.4 Electromagnetic Spectrum. Use of the tion and engagement was introduced a decade ago in
electromagnetic spectrum is required for all RPAS op- 155mm artillery sub-munitions. The automated take-
erations. This study strongly recommends the imme- off and landing of RPA on a carrier flight deck has re-
diate incorporation of already available protective cently been demonstrated by the U.S. Navy. Automat-
measures. Future RPAS development should focus on ed flight navigation is a common capability of many
reducing radio communications dependency by in- currently available business aircraft.
troducing new means of data transmissions and in-
creasing RPA automation. However, what is technically possible is not neces-
sarily desirable. The automated release of lethal
10.3.2.5 Human Personnel. To prevent corruption, weapons should be considered very judiciously
adversary recruitment or blackmail attempts, RPAS with respect to legal, moral and ethical questions.
personnel should receive mandatory training to raise This study recommends two fundamental types of
the awareness of those issues. Keeping the identities lethal weapon release, i.e. deliberate attack and au-
of RPAS personnel classified could also help to deter tomated defence.
those activities. In addition, computer system access
policies (both for software and hardware) should be • Deliberate Attack. For any target that requires ap-
as restrictive as necessary to defend against intrusion proval by the Joint Targeting Process (this includes
attempts or exploitation of human carelessness. pre-planned, dynamic and time-sensitive targets) a
deliberate human decision for weapon release must
be enforced.
10.4 Automation and Human
• Automated Defence. Automated weapon release
Interaction should be approved for any target that is actively en-
'In three years, Cyberdyne will become the largest gaging the RPA. The threshold of what is considered
supplier of military computer systems. All stealth an active attack should follow the same principles as
bombers are upgraded with Cyberdyne computers, for manned combat aircraft.
becoming fully unmanned. Afterwards, they fly with
a perfect operational record. The Skynet Funding Although technically feasible, this study refrains from
Bill is passed. The system goes online on August 4th, recommending an ‘Automated Attack’ mode for RPAS.
1997. Human decisions are removed from strategic Such an automated attack mode would entail a mul-
defense. Skynet begins to learn at a geometric rate. titude of legal, moral and ethical questions.
It becomes self-aware 2:14 AM, Eastern time, Au-
gust 29th. In a panic, they try to pull the plug.'
10.5 Final Remarks
Quote taken from the Movie
‘Terminator 2 – Judgment Day’ Remotely Piloted Aircraft Systems are still in their in-
fancy. The current state of RPAS development is often
Future use of higher levels of automation is a prerequi- compared to the point at which the Wright Flyer first
site in enabling many of the recommendations made took flight in 1903. Academia, industry, regulatory au-
104 JAPCC | Remotely Piloted Aircraft Systems in Contested Environments | September 2014
thorities as well as the military are working diligently study or any future issues it identifies. Please feel free
to improve RPAS and better integrate them into the to contact the author of this document at the JAPCC
civilian airspace and military force structures. The cur- staff via email: [email protected]
rent and future vulnerability issues highlighted in this
document are provided to help improve the effective- ‘War is not about fairness; it’s about inflicting dam-
ness, efficiency and overall safety of RPAS in future age on your enemy without suffering damage your-
combat operations and to stimulate further thought self. RPA provide one of those asymmetries...’
and analysis. We welcome your comments on this Lieutenant General (ret.) Dave Deptula, US Air Force, 2013
JAPCC | Remotely Piloted Aircraft Systems in Contested Environments | September 2014 105
ANNEX A
Recommendations to Improve RPAS Survivability Against SBAD Threats
Technical Development
Operational Planning
Overall Criticality
Recommendation Chapter
9.1.1.1 Ensure Crew Rotations are Properly Scheduled x x
9.1.1.2 Sustain Properly Trained Crews at All Times x x
9.1.1.3 Use Proper Mission Planning Techniques to Avoid Surface-/Air-Based Threats x x
9.1.1.4 Employ Sensor Capabilities to Detect Surface-/ Air-Based Threats x x
9.1.1.5 Properly Weaponize the RPA to Suppress Surface-/Air-Based Threats x x
9.1.1.6 Consider Visual and Aural Thresholds in Mission Planning x x
9.1.1.7 Control Image/Video Resolution Requirements to a Reasonable Level to Improve RPAS Stand-Off Range x x
9.1.1.8 Escort RPA to Suppress Surface-/Air-Based Threats x x x
9.1.1.10 Consider Stratospheric Employment of RPAS to Suppress Surface-/Air-Based Threats x x x
9.1.2.1 Incorporate Terrain Following Flight Technology to Avoid Radar Detection x x x
9.1.2.2 Conduct Low Level Flights to Avoid Radar Detection x x x
9.1.2.3 Reduce the Remotely Piloted Aircraft’s Radar Signature to Impede Enemy Detection x x
9.1.2.4 Reduce the Remotely Piloted Aircraft’s Noise Signature to Lower the Range of Audibility x x
9.1.2.5 Reduce the Remotely Piloted Aircraft’s Visual Signature to Lower the Spotting Range x x
9.1.2.6 Reduce the Remotely Piloted Aircraft’s Thermal Signature to Impede Enemy Detection x x
9.1.2.7 Limit RPAS Radio Transmissions to Avoid Detection in the Electromagnetic Spectrum x x
9.1.3.1 Keep RPAS Pilots/ Operators Focused to Counteract Crew Fatigue x x x
9.1.3.2 Incorporate Radar Warning Receivers to Increase Situational Awareness x x x
9.1.3.3 Install Identification, Friend or Foe Transponders x x
9.1.3.4 Consider Employment of Decoy RPA to Distract from High Value or Mission Critical RPA x x x
9.1.3.5 Enhance Sensor Fusion to Improve the Situational Awareness for RPAS Operators x x
9.1.3.6 Increase Operating Altitude to Avoid Engagement by SAF, AAA and Low Tier SAMs x x
9.1.3.7 Consider RPAS Operations in the Stratosphere to Avoid Engagement by Most Weapons x x
9.1.3.8 Increase RPA Operational Cruise and Top Speed to Enhance its Stand-Off Capabilities x x
9.1.4.1 Increase RPA Manoeuvrability x x
9.1.4.2 Incorporate Aerial Combat Training for RPAS Operators x x
9.1.4.3 Incorporate Automated Laser Warning Systems x x x
9.1.4.4 Incorporate Missile Warning Systems x x x
9.1.4.5 Incorporate Active Countermeasures Against Thermal Detection and Tracking x x
9.1.5.1 Consider Partial Component Redundancy x x
9.1.5.2 Minimize the Exposure of Critical System Components x x
9.1.5.3 Incorporate Passive Damage Suppression Measures x x
9.1.5.4 Incorporate Active Damage Suppression Components x x
9.1.5.5 Incorporate Reconfigurable Flight Control Systems x x
9.1.5.6 Develop Universal/Modular RPAS Assemblies to Quickly Repair Damaged Components x x
9.2.1.1 Equip RPA With High-Speed Anti-Radiation Missiles x x x
106 JAPCC | Remotely Piloted Aircraft Systems in Contested Environments | September 2014
Technical Development
Operational Planning
Overall Criticality
Recommendation Chapter
9.2.1.2 Incorporate Gunfire Detection Systems and Self-Protection Missiles x x
9.2.1.4 Reduce the Size of Active Jamming Systems to Introduce ECM Capabilities to RPAS x x
9.2.2.1 Integrate Payloads Internally Into the Airframe x x
9.2.2.2 Consider Use of Micro-Munitions to Support Internal Payload Integration x x
9.2.2.3 Incorporate Retractable Sensors x x
9.2.3.1 Incorporate 360 Degree Field of View Optical Systems x x x
9.2.3.2 Improve Sensor Sensitivity and Angular Resolution x x
9.2.3.3 Consider Micro/Mini Scout-RPA as Payload of HALE/MALE RPAS x x x x
9.2.3.4 Consider Armament with Non-Lethal Weapons to Minimize Collateral Damage ... x x x x
9.2.3.5 Consider Implementation of Extended Range Air-to-Ground Weaponry x x x
9.2.4.2 Incorporate Highly Automated Countermeasure Packages x x
9.2.5.1 Consider Payload Redundancy to Compensate for Sensor Failures x x
9.2.5.2 Consider Emergency Release of Payloads to Avoid Cascading Damage x x x
JAPCC | Remotely Piloted Aircraft Systems in Contested Environments | September 2014 107
ANNEX B
Recommendations to Improve RPAS Survivability Against
Combat Aircraft and Adversary RPAS Threats
Technical Development
Operational Planning
Overall Criticality
Recommendation Chapter
9.1.1.1 Ensure Crew Rotations are Properly Scheduled x x
9.1.1.2 Sustain Properly Trained Crews at All Times x x
9.1.1.3 Use Proper Mission Planning Techniques to Avoid Surface-/Air-Based Threats x x
9.1.1.4 Employ Sensor Capabilities to Detect Surface-/ Air-Based Threats x x
9.1.1.5 Properly Weaponize the RPA to Suppress Surface-/Air-Based Threats x x
9.1.1.8 Escort RPA to Suppress Surface-/Air-Based Threats x x x
9.1.1.9 Incorporate a Self-Destruct Mechanism to Deter Enemy Exploitation of the RPA x x
9.1.1.10 Consider Stratospheric Employment of RPAS to Suppress Surface-/Air-Based Threats x x x
9.1.2.1 Incorporate Terrain Following Flight Technology to Avoid Radar Detection x x x
9.1.2.2 Conduct Low Level Flights to Avoid Radar Detection x x x
9.1.2.3 Reduce the Remotely Piloted Aircraft’s Radar Signature to Impede Enemy Detection x x
9.1.2.5 Reduce the Remotely Piloted Aircraft’s Visual Signature to Lower the Spotting Range x x
9.1.2.6 Reduce the Remotely Piloted Aircraft’s Thermal Signature to Impede Enemy Detection x x
9.1.2.7 Limit RPAS Radio Transmissions to Avoid Detection in the Electromagnetic Spectrum x x
9.1.3.1 Keep RPAS Pilots/ Operators Focused to Counteract Crew Fatigue x x x
9.1.3.2 Incorporate Radar Warning Receivers to Increase Situational Awareness x x x
9.1.3.3 Install Identification, Friend or Foe Transponders x x
9.1.3.4 Consider Employment of Decoy RPA to Distract from High Value or Mission Critical RPA x x x
9.1.3.5 Enhance Sensor Fusion to Improve the Situational Awareness for RPAS Operators x x
9.1.3.7 Consider RPAS Operations in the Stratosphere to Avoid Engagement by Most Weapons x x
9.1.3.8 Increase RPA Operational Cruise and Top Speed to Enhance its Stand-Off Capabilities x x
9.1.4.1 Increase RPA Manoeuvrability x x
9.1.4.2 Incorporate Aerial Combat Training for RPAS Operators x x
9.1.4.4 Incorporate Missile Warning Systems x x x
9.1.4.5 Incorporate Active Countermeasures Against Thermal Detection and Tracking x x
9.1.5.1 Consider Partial Component Redundancy x x
9.1.5.2 Minimize the Exposure of Critical System Components x x
9.1.5.3 Incorporate Passive Damage Suppression Measures x x
9.1.5.4 Incorporate Active Damage Suppression Components x x
9.1.5.5 Incorporate Reconfigurable Flight Control Systems x x
9.1.5.6 Develop Universal/Modular RPAS Assemblies to Quickly Repair Damaged Components x x
9.2.1.3 Consider Employment of Air-to-Air Weapons in Future Combat-RPAS x x x x
9.2.1.4 Reduce the Size of Active Jamming Systems to Introduce ECM Capabilities to RPAS x x
9.2.2.1 Integrate Payloads Internally Into the Airframe x x
108 JAPCC | Remotely Piloted Aircraft Systems in Contested Environments | September 2014
Technical Development
Operational Planning
Overall Criticality
Recommendation Chapter
9.2.2.2 Consider Use of Micro-Munitions to Support Internal Payload Integration x x
9.2.2.3 Incorporate Retractable Sensors x x
9.2.3.1 Incorporate 360 Degree Field of View Optical Systems x x x
9.2.3.3 Consider Micro/Mini Scout-RPA as Payload of HALE/MALE RPAS x x x x
9.2.4.2 Incorporate Highly Automated Countermeasure Packages x x
9.2.5.1 Consider Payload Redundancy to Compensate for Sensor Failures x x
9.2.5.2 Consider Emergency Release of Payloads to Avoid Cascading Damage x x x
9.3.2.1 Prohibit Proliferation of Commercial Satellite Imagery of RPAS Installations x x
9.3.4.1 Protect the Work Areas of RPAS Personnel x x x
9.3.5.1 Establish Sufficient Quantities of Qualified RPAS Personnel in Reserve x x x
9.4.2.1 Locate Satellite Ground Terminals Away from the GCS to Prevent Visual and Electronic Identification x x x
9.4.2.2 Reduce Radio Transmissions to Impede Locating the GCS by Electronic Reconnaissance x x
9.4.2.3 Choose an Inconspicuous Location for the GCS x x x
9.4.3.1 Enable Deployable RPAS Control Elements to Leapfrog and Handover Command x x x x
9.4.3.2 Enable Stationary RPAS MCEs to Redeploy in a Reasonable Timeframe x x x
9.4.3.3 Locate SATCOM Antennas Away from the GCS and Permit It to Be Quickly Relocated … x x x
9.4.3.4 Consider the Use of Decoy SATCOM Antennas to Mislead the Adversary x x
9.4.3.5 Improve Latency and Reliability Issues Associated with BLOS Communications x x
9.4.3.6 Incorporate a Fully Automated RPA Launch And Recovery Capability … x x
9.4.4.4 Shelter Stationary GCS Equipment from Kinetic Effects x x
9.4.5.1 Establish a Redundant RPAS Control Element to Permit Failsafe Control in Case of GCS Loss x x x
9.5.5.1 Establish a ‘Routing-Enabled’ Airborne Network to Maintain RPAS Data Link Connectivity … x x
9.6.2.1 Develop a Mobile Operations Concept of RPAS Ground Elements x x x
9.6.2.2 Reduce RPA Launch and Landing Distance Requirements to Permit the Use of Improvised Airstrips x x x x
9.6.2.3 Camouflage and Disperse RPAS Ground Elements to Obstruct Enemy Reconnaissance Efforts x x x
9.6.3.1 Avoid Observable Routines to Deny Enemy Predictions on Future Actions x x x
9.6.3.2 Introduce a RPAS Air-to-Air Refuelling Capability … x x x x
9.6.3.3 Develop an Air-to-Air Rearmament Concept to Minimize the Dependency on Deployed ... Units x x x x
9.6.3.4 Consider Hypersonic Propulsion to Enable Intercontinental Employment x x
9.6.3.5 Consider Solar Powered Propulsion for RPAS to Maximize their Endurance and Range x x
9.6.4.1 Shelter RPAS Support Element Workspaces from Kinetic Effects to Enhance Survivability x x
9.6.5.1 Consider Installing Armour on Mobile RPAS Support Element Components x x
JAPCC | Remotely Piloted Aircraft Systems in Contested Environments | September 2014 109
ANNEX C
Recommendations to Improve RPAS Survivability Against ASAT Threats
Technical Development
Operational Planning
Overall Criticality
Recommendation Chapter
9.5.5.1 Establish a ‘Routing-Enabled’ Airborne Network to Maintain RPAS Data Link Connectivity … x x
9.5.5.2 Consider the Use of Stratospheric RPAS as Airborne Network Backbones … x x x
110 JAPCC | Remotely Piloted Aircraft Systems in Contested Environments | September 2014
ANNEX D
Recommendations to Improve RPAS Survivability Against EW Threats
Technical Development
Operational Planning
Overall Criticality
Recommendation Chapter
9.1.2.7 Limit RPAS Radio Transmissions to Avoid Detection in the Electromagnetic Spectrum x x
9.1.3.5 Enhance Sensor Fusion to Improve the Situational Awareness for RPAS Operators x x
9.2.1.4 Reduce the Size of Active Jamming Systems to Introduce ECM Capabilities to RPAS x x
9.4.2.2 Reduce Radio Transmissions to Impede Locating the GCS by Electronic Reconnaissance x x
9.4.5.1 Establish a Redundant RPAS Control Element to Permit Failsafe Control in Case of GCS Loss x x x
9.5.1.1 Incorporate Laser Communication Technology to Eliminate RPAS Radio Transmissions x x
9.5.1.2 Use On-Board Data Storage and Subsequent Analysis if Real Time Imagery is not Imperative x x x
9.5.1.3 Allow RPAS to be Operated from a Manned C2 Aircraft to Reduce BLOS SATCOM Dependency x x x x
9.5.2.1 Increase the Level of Automation to Minimize RPAS Radio Transmissions x x
9.5.2.2 Use Frequency Spreading Techniques to Lower the Probability of Intercept of RPAS Data Links x x
9.5.2.3 Use Frequency Hopping Techniques to Lower the Probability of Intercepting RPAS Data Links x x
9.5.2.4 Reduce Radio Signal Strength to Lower RPAS Data Link Detectability x x
9.5.2.5 Reduce Duty Cycles of Radio Transmissions to Lower RPAS Data Link Detectability x x
9.5.3.1 Use Strong Encryption to Prevent Enemy Eavesdropping or Exploitation of RPAS Transmissions x x x
9.5.3.2 Incorporate RPAS Transmitter-Receiver Authentication Processes to Improve Resistance to Deception x x x
9.5.3.3 Maximize On-Board Data Processing and Data Compression to Minimize RPAS Radio Transmissions x x
9.5.4.1 Incorporate Larger Antennas with Increased Signal Power and Higher Focus to Increase Gain x x
9.5.4.2 Use Frequency Spreading Techniques to Improve RPAS Data Link Persistence x x
9.5.5.1 Establish a ‘Routing-Enabled’ Airborne Network to Maintain RPAS Data Link Connectivity … x x
9.5.5.2 Consider the Use of Stratospheric RPAS as Airborne Network Backbones … x x x
9.5.5.3 Increase Transmitter Power to Achieve Better RPAS Data Link Resistance to Enemy Jamming x x
9.5.5.4 Use On-Board Buffer Memory and Time-Shift Functionality … x x x
9.5.5.5 Incorporate Additional Navigational Backup Systems … x x x
JAPCC | Remotely Piloted Aircraft Systems in Contested Environments | September 2014 111
ANNEX E
Recommendations to Improve RPAS Survivability
Against SSBM Threats
Technical Development
Operational Planning
Overall Criticality
Recommendation Chapter
9.3.2.1 Prohibit Proliferation of Commercial Satellite Imagery of RPAS Installations x x
9.3.4.1 Protect the Work Areas of RPAS Personnel x x x
9.3.5.1 Establish Sufficient Quantities of Qualified RPAS Personnel in Reserve x x x
9.4.2.1 Locate Satellite Ground Terminals Away from the GCS to Prevent Visual and Electronic Identification x x x
9.4.2.2 Reduce Radio Transmissions to Impede Locating the GCS by Electronic Reconnaissance x x
9.4.2.3 Choose an Inconspicuous Location for the GCS x x x
9.4.3.1 Enable Deployable RPAS Control Elements to Leapfrog and Handover Command x x x x
9.4.3.2 Enable Stationary RPAS MCEs to Redeploy in a Reasonable Timeframe x x x
9.4.3.3 Locate SATCOM Antennas Away from the GCS and Permit It to Be Quickly Relocated … x x x
9.4.3.4 Consider the Use of Decoy SATCOM Antennas to Mislead the Adversary x x
9.4.3.5 Improve Latency and Reliability Issues Associated with BLOS Communications x x
9.4.3.6 Incorporate a Fully Automated RPA Launch And Recovery Capability … x x
9.4.4.4 Shelter Stationary GCS Equipment from Kinetic Effects x x
9.4.5.1 Establish a Redundant RPAS Control Element to Permit Failsafe Control in Case of GCS Loss x x x
9.6.2.1 Develop a Mobile Operations Concept of RPAS Ground Elements x x x
9.6.2.2 Reduce RPA Launch and Landing Distance Requirements to Permit the Use of Improvised Airstrips x x x x
9.6.2.3 Camouflage and Disperse RPAS Ground Elements to Obstruct Enemy Reconnaissance Efforts x x x
9.6.3.1 Avoid Observable Routines to Deny Enemy Predictions on Future Actions x x x
9.6.3.2 Introduce a RPAS Air-to-Air Refuelling Capability … x x x x
9.6.3.3 Develop an Air-to-Air Rearmament Concept to Minimize the Dependency on Deployed ... Units x x x x
9.6.3.4 Consider Hypersonic Propulsion to Enable Intercontinental Employment x x
9.6.3.5 Consider Solar Powered Propulsion for RPAS to Maximize their Endurance and Range x x
9.6.4.1 Shelter RPAS Support Element Workspaces from Kinetic Effects to Enhance Survivability x x
9.6.5.1 Consider Installing Armour on Mobile RPAS Support Element Components x x
112 JAPCC | Remotely Piloted Aircraft Systems in Contested Environments | September 2014
ANNEX F
Recommendations to Improve RPAS Survivability
Against MANPADS Threats
Technical Development
Operational Planning
Overall Criticality
Recommendation Chapter
9.1.1.1 Ensure Crew Rotations are Properly Scheduled x x
9.1.1.2 Sustain Properly Trained Crews at All Times x x
9.1.1.3 Use Proper Mission Planning Techniques to Avoid Surface-/Air-Based Threats x x
9.1.1.4 Employ Sensor Capabilities to Detect Surface-/ Air-Based Threats x x
9.1.1.5 Properly Weaponize the RPA to Suppress Surface-/Air-Based Threats x x
9.1.1.6 Consider Visual and Aural Thresholds in Mission Planning x x
9.1.1.7 Control Image / Video Resolution Requirements to a Reasonable Level … x x
9.1.1.10 Consider Stratospheric Employment of RPAS to Suppress Surface-/Air-Based Threats x x x
9.1.2.4 Reduce the Remotely Piloted Aircraft’s Noise Signature to Lower the Range of Audibility x x
9.1.2.5 Reduce the Remotely Piloted Aircraft’s Visual Signature to Lower the Spotting Range x x
9.1.2.6 Reduce the Remotely Piloted Aircraft’s Thermal Signature to Impede Enemy Detection x x
9.1.3.1 Keep RPAS Pilots/ Operators Focused to Counteract Crew Fatigue x x x
9.1.3.6 Increase Operating Altitude to Avoid Engagement by SAF, AAA and Low Tier SAMs x x
9.1.3.7 Consider RPAS Operations in the Stratosphere to Avoid Engagement by Most Weapons x x
9.1.4.1 Increase RPA Manoeuvrability x x
9.1.4.2 Incorporate Aerial Combat Training for RPAS Operators x x
9.1.4.3 Incorporate Automated Laser Warning Systems x x x
9.1.4.4 Incorporate Missile Warning Systems x x x
9.1.4.5 Incorporate Active Countermeasures Against Thermal Detection and Tracking x x
9.1.5.1 Consider Partial Component Redundancy x x
9.1.5.2 Minimize the Exposure of Critical System Components x x
9.1.5.3 Incorporate Passive Damage Suppression Measures x x
9.1.5.4 Incorporate Active Damage Suppression Components x x
9.1.5.5 Incorporate Reconfigurable Flight Control Systems x x
9.1.5.6 Develop Universal/Modular RPAS Assemblies to Quickly Repair Damaged Components x x
9.2.3.2 Improve Sensor Sensitivity and Angular Resolution x x
9.2.3.3 Consider Micro/Mini Scout-RPA as Payload of HALE/MALE RPAS x x x x
9.2.4.2 Incorporate Highly Automated Countermeasure Packages x x
9.2.5.1 Consider Payload Redundancy to Compensate for Sensor Failures x x
9.2.5.2 Consider Emergency Release of Payloads to Avoid Cascading Damage x x x
9.5.5.1 Establish a ‘Routing-Enabled’ Airborne Network to Maintain RPAS Data Link Connectivity … x x
JAPCC | Remotely Piloted Aircraft Systems in Contested Environments | September 2014 113
ANNEX G
Recommendations to Improve RPAS Survivability
Against Asymmetric Threats
Technical Development
Operational Planning
Overall Criticality
Recommendation Chapter
9.1.1.5 Properly Weaponize the RPA to Suppress Surface-/Air-Based Threats x x
9.1.1.6 Consider Visual and Aural Thresholds in Mission Planning x x
9.1.1.7 Control Image / Video Resolution Requirements … x x
9.1.1.9 Incorporate a Self-Destruct Mechanism to Deter Enemy Exploitation of the RPA x x
9.2.1.2 Incorporate Gunfire Detection Systems and Self-Protection Missiles x x
9.2.3.3 Consider Micro/Mini Scout-RPA as Payload of HALE/MALE RPAS x x x x
9.2.3.4 Consider Armament with Non-Lethal Weapons … x x x x
9.2.4.1 Incorporate Adaptive Spectral Filters to Protect EO/IR Sensors from Being Hit by Laser Energy x x
9.2.4.2 Incorporate Highly Automated Countermeasure Packages x x
9.2.5.1 Consider Payload Redundancy to Compensate for Sensor Failures x x
9.2.5.2 Consider Emergency Release of Payloads to Avoid Cascading Damage x x x
9.3.1.1 Protect Identities of RPAS Personnel x x x
9.3.1.2 Raise RPAS Personnel’s Awareness for Dealing with Social Media and the Internet x x
9.3.1.3 Raise the Media’s Awareness of Asymmetric Threats against Home-Based Combatants x x x
9.3.1.4 Consider RPAS Personnel’s Family Environment when Applying Force Protection Conditions Measures x x
9.3.1.5 Establish Close Cooperation with Civilian Authorities x x
9.3.2.1 Prohibit Proliferation of Commercial Satellite Imagery of RPAS Installations x x
9.3.2.2 Prohibit Wearing Name Tags, Badges or Uniforms Outside Military Compounds x x x
9.3.5.1 Establish Sufficient Quantities of Qualified RPAS Personnel in Reserve x x x
9.4.1.2 Apply NATO Class II Security Area Restrictions to the RPAS Control Element Infrastructure x x x
9.4.2.1 Locate Satellite Ground Terminals Away from the GCS to Prevent Visual and Electronic Identification x x x
9.4.2.2 Reduce Radio Transmissions to Impede Locating the GCS by Electronic Reconnaissance x x
9.4.2.3 Choose an Inconspicuous Location for the GCS x x x
9.4.2.4 Remove Signs Indicating the Operational GCS Location to Avert On-Site Espionage x x
9.4.3.1 Enable Deployable RPAS Control Elements to Leapfrog and Handover Command x x x x
9.4.3.2 Enable Stationary RPAS MCEs to Redeploy in a Reasonable Timeframe x x x
9.4.3.3 Locate SATCOM Antennas Away from the GCS and Permit It to Be Quickly Relocated … x x x
9.4.3.4 Consider the Use of Decoy SATCOM Antennas to Mislead the Adversary x x
9.4.3.5 Improve Latency and Reliability Issues Associated with BLOS Communications x x
9.4.3.6 Incorporate a Fully Automated RPA Launch And Recovery Capability … x x
9.4.5.1 Establish a Redundant RPAS Control Element to Permit Failsafe Control in Case of GCS Loss x x x
9.6.3.1 Avoid Observable Routines to Deny Enemy Predictions on Future Actions x x x
9.6.4.1 Shelter RPAS Support Element Workspaces from Kinetic Effects to Enhance Survivability x x
114 JAPCC | Remotely Piloted Aircraft Systems in Contested Environments | September 2014
ANNEX H
Recommendations to Improve RPAS Survivability
Against Cyber Threats
Technical Development
Operational Planning
Overall Criticality
Recommendation Chapter
9.4.1.1 Consider Pre-Emptive Cyber-Attack Operations to Suppress Enemy Cyber-Capabilities x x
9.4.4.1 Improve Computer Security Techniques and Policies to Defend Against Cyber-Threats x x x x
9.4.4.2 Use Proprietary Software and Hardware for the Core Functions of RPAS … x x
9.4.4.3 Raise RPAS Personnel’s Cyber-Awareness to Prevent Infiltration of RPAS Computer Systems x x
9.4.5.1 Establish a Redundant RPAS Control Element to Permit Failsafe Control in Case of GCS Loss x x x
9.4.5.2 Isolate C2 Systems from Kinetic Weapons Payloads to Minimize the Impact of Cyber-Attacks x x
9.5.3.1 Use Strong Encryption to Prevent Enemy Eavesdropping or Exploitation of RPAS Transmissions x x x
9.5.3.2 Incorporate RPAS Transmitter-Receiver Authentication Processes to Improve Resistance to Deception x x x
9.1.1.9 Incorporate a Self-Destruct Mechanism to Deter Enemy Exploitation of the RPA x x
JAPCC | Remotely Piloted Aircraft Systems in Contested Environments | September 2014 115
ANNEX I
Short-Term Recommendations to Improve RPAS Survivability
Asymmetric Force
Overall Criticality
Combat Aircraft
Adversary RPAS
Cyber Warfare
MANPADS
SSBM
SBAD
ASAT
EW
Recommendation Chapter
9.1.1.1 Ensure Crew Rotations are Properly Scheduled x x x x
9.1.1.2 Sustain Properly Trained Crews at All Times x x x x
9.1.1.3 Use Proper Mission Planning Techniques to Avoid Surface-/Air-Based Threats x x x x
9.1.1.6 Consider Visual and Aural Thresholds in Mission Planning x x x
9.1.1.7 Control Image / Video Resolution Requirements ... x x x
9.1.1.8 Escort RPA to Suppress Surface-/Air-Based Threats x x x
9.1.2.2 Conduct Low Level Flights to Avoid Radar Detection x x x
9.1.2.5 Reduce the Remotely Piloted Aircraft’s Visual Signature ... x x x x
9.1.3.3 Install Identification, Friend or Foe Transponders x x x
9.1.3.6 Increase Operating Altitude ... x x
9.1.4.2 Incorporate Aerial Combat Training for RPAS Operators x x x x
9.2.3.5 Consider Implementation of Extended Range Air-to-Ground Weaponry x
9.2.4.1 Incorporate Adaptive Spectral Filters ... x
9.3.1.1 Protect Identities of RPAS Personnel x
9.3.1.2 Raise RPAS Personnel’s Awareness for Dealing with Social Media and the Internet x
9.3.1.3 Raise the Media’s Awareness of Asymmetric Threats ... x
9.3.1.4 Consider RPAS Personnel’s Family Environment ... x
9.3.1.5 Establish Close Cooperation with Civilian Authorities x
9.3.2.1 Prohibit Proliferation of Commercial Satellite Imagery of RPAS Installations x x x x
9.3.2.2 Prohibit Wearing Name Tags, Badges or Uniforms Outside Military Compounds x
9.3.4.1 Protect the Work Areas of RPAS Personnel x x x
9.4.1.1 Consider Pre-Emptive Cyber-Attack Operations ... x
9.4.1.2 Apply NATO Class II Security Area Restrictions ... x
9.4.2.1 Locate Satellite Ground Terminals Away from the GCS ... x x x x
9.4.2.3 Choose an Inconspicuous Location for the GCS x x x x
9.4.2.4 Remove Signs Indicating the Operational GCS Location .. x
9.4.3.3 Locate SATCOM Antennas Away from the GCS ... x x x x
9.4.3.4 Consider the Use of Decoy SATCOM Antennas to Mislead the Adversary x x x x
9.4.4.1 Improve Computer Security Techniques and Policies ... x
9.4.4.3 Raise RPAS Personnel’s Cyber-Awareness to Prevent Infiltration of RPAS ... x
9.4.4.4 Shelter Stationary GCS Equipment from Kinetic Effects x x x
9.6.2.3 Camouflage and Disperse RPAS Ground Elements ... x x x
9.6.3.1 Avoid Observable Routines to Deny Enemy Predictions on Future Actions x x x x
9.6.4.1 Shelter RPAS Support Element Workspaces from Kinetic Effects ... x x x x
9.6.5.1 Consider Installing Armour on Mobile RPAS Support Element Components x x x
116 JAPCC | Remotely Piloted Aircraft Systems in Contested Environments | September 2014
ANNEX J
Mid-Term Recommendations to Improve RPAS Survivability
Asymmetric Force
Overall Criticality
Adversary RPAS
Combat Aircraft
Cyber Warfare
MANPADS
SSBM
SBAD
ASAT
EW
Recommendation Chapter
9.1.1.4 Employ Sensor Capabilities to Detect Surface-/ Air-Based Threats x x x x
9.1.1.5 Properly Weaponize the RPA to Suppress Surface-/Air-Based Threats x x x x x
9.1.1.9 Incorporate a Self-Destruct Mechanism to Deter Enemy Exploitation of the RPA x x x x
9.1.2.1 Incorporate Terrain Following Flight Technology to Avoid Radar Detection x x x
9.1.2.4 Reduce the Remotely Piloted Aircraft’s Noise Signature ... x x
9.1.2.6 Reduce the Remotely Piloted Aircraft’s Thermal Signature ... x x x x
9.1.3.1 Keep RPAS Pilots/ Operators Focused to Counteract Crew Fatigue x x x x
9.1.3.2 Incorporate Radar Warning Receivers to Increase Situational Awareness x x x
9.1.3.5 Enhance Sensor Fusion to Improve the Situational Awareness for RPAS Operators x x x x
9.1.3.8 Increase RPA Operational Cruise and Top Speed ... x x x
9.1.4.3 Incorporate Automated Laser Warning Systems x x x
9.1.4.4 Incorporate Missile Warning Systems x x x x
9.1.4.5 Incorporate Active Countermeasures Against Thermal Detection and Tracking x x x x
9.1.5.1 Consider Partial Component Redundancy x x x x
9.1.5.2 Minimize the Exposure of Critical System Components x x x x
9.1.5.3 Incorporate Passive Damage Suppression Measures x x x x
9.1.5.4 Incorporate Active Damage Suppression Components x x x x
9.1.5.5 Incorporate Reconfigurable Flight Control Systems x x x x
9.1.5.6 Develop Universal/Modular RPAS Assemblies ... x x x x
9.2.1.1 Equip RPA With High-Speed Anti-Radiation Missiles x
9.2.1.3 Consider Employment of Air-to-Air Weapons in Future Combat-RPAS x x
9.2.2.1 Integrate Payloads Internally Into the Airframe x x x
9.2.2.2 Consider Use of Micro-Munitions to Support Internal Payload Integration x x x
9.2.2.3 Incorporate Retractable Sensors x x x
9.2.3.1 Incorporate 360 Degree Field of View Optical Systems x x x
9.2.3.2 Improve Sensor Sensitivity and Angular Resolution x x
9.2.3.4 Consider Armament with Non-Lethal Weapons ... x x
9.2.4.2 Incorporate Highly Automated Countermeasure Packages x x x x x
9.2.5.1 Consider Payload Redundancy to Compensate for Sensor Failures x x x x x
9.2.5.2 Consider Emergency Release of Payloads to Avoid Cascading Damage x x x x x
9.3.5.1 Establish Sufficient Quantities of Qualified RPAS Personnel in Reserve x x x x
9.4.2.2 Reduce Radio Transmissions ... x x x x x
9.4.3.1 Enable Deployable RPAS Control Elements to Leapfrog and Handover Command x x x x
9.4.3.2 Enable Stationary RPAS MCEs to Redeploy in a Reasonable Timeframe x x x x
JAPCC | Remotely Piloted Aircraft Systems in Contested Environments | September 2014 117
Asymmetric Force
Overall Criticality
Adversary RPAS
Combat Aircraft
Cyber Warfare
MANPADS
SSBM
SBAD
ASAT
EW
Recommendation Chapter
9.4.4.2 Use Proprietary Software and Hardware for the Core Functions of RPAS … x
9.5.1.2 Use On-Board Data Storage and Subsequent Analysis if Real Time ... x
9.5.1.3 Allow RPAS to be Operated from a Manned C2 Aircraft ... x
9.5.2.2 Use Frequency Spreading Techniques ... x
9.5.2.3 Use Frequency Hopping Techniques ... x
9.5.2.4 Reduce Radio Signal Strength to Lower RPAS Data Link Detectability x
9.5.2.5 Reduce Duty Cycles of Radio Transmissions to Lower RPAS Data Link Detectability x
9.5.3.1 Use Strong Encryption to Prevent Enemy Eavesdropping ... x x
9.5.3.2 Incorporate RPAS Transmitter-Receiver Authentication Processes ... x x
9.5.3.3 Maximize On-Board Data Processing and Data Compression ... x
9.5.4.1 Incorporate Larger Antennas with Increased Signal Power and Higher Focus ... x
9.5.4.2 Use Frequency Spreading Techniques to Improve RPAS Data Link Persistence x
9.5.5.3 Increase Transmitter Power to Achieve Better RPAS Data Link Resistance ... x
9.5.5.4 Use On-Board Buffer Memory and Time-Shift Functionality ... x
9.5.5.5 Incorporate Additional Navigational Backup Systems ... x
9.6.2.1 Develop a Mobile Operations Concept of RPAS Ground Elements x x x
9.6.3.5 Consider Solar Powered Propulsion for RPAS ... x x x
118 JAPCC | Remotely Piloted Aircraft Systems in Contested Environments | September 2014
ANNEX K
Long-Term Recommendations to Improve RPAS Survivability
Asymmetric Force
Overall Criticality
Adversary RPAS
Combat Aircraft
Cyber Warfare
MANPADS
SSBM
SBAD
ASAT
EW
Recommendation Chapter
9.1.1.10 Consider Stratospheric Employment of RPAS .. x x x x
9.1.2.3 Reduce the Remotely Piloted Aircraft’s Radar Signature ... x x x
9.1.2.7 Limit RPAS Radio Transmissions to Avoid Detection ... x x x x
9.1.3.4 Consider Employment of Decoy RPA ... x x x
9.1.3.7 Consider RPAS Operations in the Stratosphere ... x x x x
9.1.4.1 Increase RPA Manoeuvrability x x x x
9.2.1.2 Incorporate Gunfire Detection Systems and Self-Protection Missiles x x
9.2.1.4 Reduce the Size of Active Jamming Systems to Introduce ECM Capabilities to RPAS x x x x
9.2.3.3 Consider Micro/Mini Scout-RPA as Payload of HALE/MALE RPAS x x x x x
9.4.3.5 Improve Latency and Reliability Issues Associated with BLOS ... x x x x
9.4.3.6 Incorporate a Fully Automated RPA Launch And Recovery Capability … x x x x
9.4.5.1 Establish a Redundant RPAS Control Element ... x x x x x x
9.4.5.2 Isolate C2 Systems from Kinetic Weapons Payloads ... x
9.5.1.1 Incorporate Laser Communication Technology ... x
9.5.2.1 Increase the Level of Automation to Minimize RPAS Radio Transmissions x
9.5.5.1 Establish a ‘Routing-Enabled’ Airborne Network ... x x x x x
9.5.5.2 Consider the Use of Stratospheric RPAS as Airborne Network Backbones ... x x
9.6.2.2 Reduce RPA Launch and Landing Distance Requirements ... x x x
9.6.3.2 Introduce a RPAS Air-to-Air Refuelling Capability … x x x
9.6.3.3 Develop an Air-to-Air Rearmament Concept ... x x x
9.6.3.4 Consider Hypersonic Propulsion to Enable Intercontinental Employment x x x
JAPCC | Remotely Piloted Aircraft Systems in Contested Environments | September 2014 119
ANNEX L
Technical Recommendations to Improve RPAS Survivability
Asymmetric Force
Overall Criticality
Adversary RPAS
Combat Aircraft
Cyber Warfare
MANPADS
SSBM
SBAD
ASAT
EW
Recommendation Chapter
9.1.1.9 Incorporate a Self-Destruct Mechanism to Deter Enemy Exploitation of the RPA x x x x
9.1.1.10 Consider Stratospheric Employment of RPAS … x x x x
9.1.2.1 Incorporate Terrain Following Flight Technology to Avoid Radar Detection x x x
9.1.2.3 Reduce the Remotely Piloted Aircraft’s Radar Signature … x x x
9.1.2.4 Reduce the Remotely Piloted Aircraft’s Noise Signature … x x x
9.1.2.5 Reduce the Remotely Piloted Aircraft’s Visual Signature … x x x x
9.1.2.6 Reduce the Remotely Piloted Aircraft’s Thermal Signature … x x x x
9.1.2.7 Limit RPAS Radio Transmissions to Avoid Detection … x x x x
9.1.3.1 Keep RPAS Pilots/ Operators Focused to Counteract Crew Fatigue x x x x
9.1.3.2 Incorporate Radar Warning Receivers to Increase Situational Awareness x x x
9.1.3.3 Install Identification, Friend or Foe Transponders x x x
9.1.3.4 Consider Employment of Decoy RPA … x x x
9.1.3.5 Enhance Sensor Fusion to Improve the Situational Awareness … x x x x
9.1.3.7 Consider RPAS Operations in the Stratosphere … x x x x
9.1.3.8 Increase RPA Operational Cruise and Top Speed … x x x
9.1.4.1 Increase RPA Manoeuvrability x x x x
9.1.4.3 Incorporate Automated Laser Warning Systems x x
9.1.4.4 Incorporate Missile Warning Systems x x x x
9.1.4.5 Incorporate Active Countermeasures Against Thermal Detection … x x x x
9.1.5.1 Consider Partial Component Redundancy x x x x
9.1.5.2 Minimize the Exposure of Critical System Components x x x x
9.1.5.3 Incorporate Passive Damage Suppression Measures x x x x
9.1.5.4 Incorporate Active Damage Suppression Components x x x x
9.1.5.5 Incorporate Reconfigurable Flight Control Systems x x x x
9.1.5.6 Develop Universal/Modular RPAS Assemblies … x x x x
9.2.1.1 Equip RPA With High-Speed Anti-Radiation Missiles x
9.2.1.2 Incorporate Gunfire Detection Systems and Self-Protection Missiles x x
9.2.1.3 Consider Employment of Air-to-Air Weapons in Future Combat-RPAS x x
9.2.1.4 Reduce the Size of Active Jamming Systems … x x x x
9.2.2.1 Integrate Payloads Internally Into the Airframe x x x
9.2.2.2 Consider Use of Micro-Munitions to Support Internal Payload Integration x x x
9.2.2.3 Incorporate Retractable Sensors x x x
9.2.3.1 Incorporate 360 Degree Field of View Optical Systems x x x
9.2.3.2 Improve Sensor Sensitivity and Angular Resolution x x
120 JAPCC | Remotely Piloted Aircraft Systems in Contested Environments | September 2014
Asymmetric Force
Overall Criticality
Adversary RPAS
Combat Aircraft
Cyber Warfare
MANPADS
SSBM
SBAD
ASAT
EW
Recommendation Chapter
9.2.3.3 Consider Micro/Mini Scout-RPA as Payload of HALE/MALE RPAS x x x x x
9.2.3.4 Consider Armament with Non-Lethal Weapons … x x
9.2.3.5 Consider Implementation of Extended Range Air-to-Ground Weaponry x
9.2.4.1 Incorporate Adaptive Spectral Filters … x
9.2.4.2 Incorporate Highly Automated Countermeasure Packages x x x x x
9.2.5.1 Consider Payload Redundancy to Compensate for Sensor Failures x x x x x
9.2.5.2 Consider Emergency Release of Payloads to Avoid Cascading Damage x x x x x
9.3.4.1 Protect the Work Areas of RPAS Personnel x x x
9.4.2.2 Reduce Radio Transmissions to Impede Locating the GCS … x x x x x
9.4.3.1 Enable Deployable RPAS Control Elements … x x x x
9.4.3.5 Improve Latency and Reliability Issues Associated with BLOS … x x x x
9.4.3.6 Incorporate a Fully Automated RPA Launch And Recovery Capability … x x x x
9.4.4.1 Improve Computer Security Techniques and Policies … x
9.4.4.2 Use Proprietary Software and Hardware for the Core Functions of RPAS … x
9.4.5.1 Establish a Redundant RPAS Control Element … x x x x x x
9.4.5.2 Isolate C2 Systems from Kinetic Weapons Payloads … x
9.5.1.1 Incorporate Laser Communication Technology … x
9.5.1.2 Use On-Board Data Storage and Subsequent Analysis … x
9.5.1.3 Allow RPAS to be Operated from a Manned C2 Aircraft … x
9.5.2.1 Increase the Level of Automation to Minimize RPAS Radio Transmissions x
9.5.2.2 Use Frequency Spreading Techniques to Lower the Probability of Intercept … x
9.5.2.3 Use Frequency Hopping Techniques … x
9.5.2.4 Reduce Radio Signal Strength to Lower RPAS Data Link Detectability x
9.5.2.5 Reduce Duty Cycles of Radio Transmissions … x
9.5.3.1 Use Strong Encryption to Prevent Enemy Eavesdropping … x x
9.5.3.2 Incorporate RPAS Transmitter-Receiver Authentication Processes … x x
9.5.3.3 Maximize On-Board Data Processing and Data Compression … x
9.5.4.1 Incorporate Larger Antennas with Increased Signal Power and Higher Focus … x
9.5.4.2 Use Frequency Spreading Techniques to Improve RPAS Data Link Persistence x
9.5.5.1 Establish a ‘Routing-Enabled’ Airborne Network … x x x x x
9.5.5.2 Consider the Use of Stratospheric RPAS as Airborne Network Backbones … x x
9.5.5.3 Increase Transmitter Power to Achieve Better RPAS Data Link Resistance … x
9.5.5.4 Use On-Board Buffer Memory and Time-Shift Functionality … x
9.5.5.5 Incorporate Additional Navigational Backup Systems … x
9.6.2.2 Reduce RPA Launch and Landing Distance Requirements … x x x
9.6.3.2 Introduce a RPAS Air-to-Air Refuelling Capability … x x x
9.6.3.3 Develop an Air-to-Air Rearmament Concept … x x x
9.6.3.4 Consider Hypersonic Propulsion to Enable Intercontinental Employment x x x
9.6.3.5 Consider Solar Powered Propulsion for RPAS … x x x
9.6.5.1 Consider Installing Armour on Mobile RPAS Support Element Components x x x
JAPCC | Remotely Piloted Aircraft Systems in Contested Environments | September 2014 121
ANNEX M
Operational Recommendations to Improve RPAS Survivability
Asymmetric Force
Overall Criticality
Adversary RPAS
Combat Aircraft
Cyber Warfare
MANPADS
SSBM
SBAD
ASAT
EW
Recommendation Chapter
9.1.1.1 Ensure Crew Rotations are Properly Scheduled x x x x
9.1.1.3 Use Proper Mission Planning Techniques to Avoid Surface-/Air-Based Threats x x x x
9.1.1.4 Employ Sensor Capabilities to Detect Surface-/ Air-Based Threats x x x x
9.1.1.5 Properly Weaponize the RPA to Suppress Surface-/Air-Based Threats x x x x x
9.1.1.6 Consider Visual and Aural Thresholds in Mission Planning x x x
9.1.1.7 Control Image / Video Resolution Requirements … x x x
9.1.1.8 Escort RPA to Suppress Surface-/Air-Based Threats x x x
9.1.1.10 Consider Stratospheric Employment of RPAS … x x x x
9.1.2.1 Incorporate Terrain Following Flight Technology to Avoid Radar Detection x x x
9.1.2.2 Conduct Low Level Flights to Avoid Radar Detection x x x
9.1.3.4 Consider Employment of Decoy RPA to Distract from High Value … x x x
9.1.3.6 Increase Operating Altitude to Avoid Engagement … x x
9.2.1.1 Equip RPA With High-Speed Anti-Radiation Missiles x
9.2.1.3 Consider Employment of Air-to-Air Weapons in Future Combat-RPAS x x
9.2.3.3 Consider Micro/Mini Scout-RPA as Payload of HALE/MALE RPAS x x x x x
9.2.3.4 Consider Armament with Non-Lethal Weapons … x x
9.2.3.5 Consider Implementation of Extended Range Air-to-Ground Weaponry x
9.3.1.1 Protect Identities of RPAS Personnel x
9.3.1.3 Raise the Media’s Awareness of Asymmetric Threats … x
9.3.1.4 Consider RPAS Personnel’s Family Environment … x
9.3.1.5 Establish Close Cooperation with Civilian Authorities x
9.3.2.1 Prohibit Proliferation of Commercial Satellite Imagery of RPAS Installations x x x x
9.3.2.2 Prohibit Wearing Name Tags, Badges or Uniforms Outside Military Compounds x
9.3.4.1 Protect the Work Areas of RPAS Personnel x x x
9.3.5.1 Establish Sufficient Quantities of Qualified RPAS Personnel in Reserve x x x x
9.4.1.1 Consider Pre-Emptive Cyber-Attack Operations … x
9.4.1.2 Apply NATO Class II Security Area Restrictions … x
9.4.2.1 Locate Satellite Ground Terminals Away from the GCS … x x x x
9.4.2.3 Choose an Inconspicuous Location for the GCS x x x x
9.4.2.4 Remove Signs Indicating the Operational GCS Location … x
9.4.3.1 Enable Deployable RPAS Control Elements … x x x x
9.4.3.2 Enable Stationary RPAS MCEs to Redeploy in a Reasonable Timeframe x x x x
9.4.3.3 Locate SATCOM Antennas Away from the GCS and Permit It … x x x x
9.4.3.4 Consider the Use of Decoy SATCOM Antennas to Mislead the Adversary x x x x
122 JAPCC | Remotely Piloted Aircraft Systems in Contested Environments | September 2014
Asymmetric Force
Overall Criticality
Adversary RPAS
Combat Aircraft
Cyber Warfare
MANPADS
SSBM
SBAD
ASAT
EW
Recommendation Chapter
9.4.4.1 Improve Computer Security Techniques and Policies … x
9.4.4.4 Shelter Stationary GCS Equipment from Kinetic Effects x x x
9.4.5.1 Establish a Redundant RPAS Control Element … x x x x x x
9.5.1.2 Use On-Board Data Storage and Subsequent Analysis … x
9.5.1.3 Allow RPAS to be Operated from a Manned C2 Aircraft … x
9.5.3.1 Use Strong Encryption to Prevent Enemy Eavesdropping … x x
9.5.3.2 Incorporate RPAS Transmitter-Receiver Authentication Processes … x x
9.5.5.2 Consider the Use of Stratospheric RPAS as Airborne Network Backbones … x x
9.6.2.1 Develop a Mobile Operations Concept of RPAS Ground Elements x x x
9.6.2.2 Reduce RPA Launch and Landing Distance Requirements … x x x
9.6.2.3 Camouflage and Disperse RPAS Ground Elements … x x x
9.6.3.1 Avoid Observable Routines to Deny Enemy Predictions on Future Actions x x x x
9.6.3.2 Introduce a RPAS Air-to-Air Refuelling Capability … x x x
9.6.3.3 Develop an Air-to-Air Rearmament Concept … x x x
9.6.4.1 Shelter RPAS Support Element Workspaces from Kinetic Effects … x x x x
JAPCC | Remotely Piloted Aircraft Systems in Contested Environments | September 2014 123
ANNEX N
Education & Training Recommendations to Improve RPAS Survivability
Asymmetric Force
Overall Criticality
Adversary RPAS
Combat Aircraft
Cyber Warfare
MANPADS
SSBM
SBAD
ASAT
EW
Recommendation Chapter
9.1.1.2 Sustain Properly Trained Crews at All Times x x x x
9.1.1.8 Escort RPA to Suppress Surface-/Air-Based Threats x x x
9.1.2.2 Conduct Low Level Flights to Avoid Radar Detection x x x
9.1.3.1 Keep RPAS Pilots/ Operators Focused to Counteract Crew Fatigue x x x x
9.1.3.2 Incorporate Radar Warning Receivers to Increase Situational Awareness x x x
9.1.4.2 Incorporate Aerial Combat Training for RPAS Operators x x x x
9.1.4.3 Incorporate Automated Laser Warning Systems x x
9.1.4.4 Incorporate Missile Warning Systems x x x x
9.2.1.3 Consider Employment of Air-to-Air Weapons in Future Combat-RPAS x x
9.2.3.1 Incorporate 360 Degree Field of View Optical Systems x x x
9.2.3.3 Consider Micro/Mini Scout-RPA as Payload of HALE/MALE RPAS x x x x x
9.2.3.4 Consider Armament with Non-Lethal Weapons … x x
9.2.5.2 Consider Emergency Release of Payloads to Avoid Cascading Damage x x x x x
9.3.1.1 Protect Identities of RPAS Personnel x
9.3.1.2 Raise RPAS Personnel’s Awareness for Dealing with Social Media … x
9.3.1.3 Raise the Media’s Awareness of Asymmetric Threats … x
9.3.2.2 Prohibit Wearing Name Tags, Badges or Uniforms Outside Military Compounds x
9.3.5.1 Establish Sufficient Quantities of Qualified RPAS Personnel in Reserve x x x x
9.4.1.2 Apply NATO Class II Security Area Restrictions … x
9.4.2.1 Locate Satellite Ground Terminals Away from the GCS … x x x x
9.4.2.3 Choose an Inconspicuous Location for the GCS x x x x
9.4.3.1 Enable Deployable RPAS Control Elements … x x x x
9.4.3.2 Enable Stationary RPAS MCEs to Redeploy in a Reasonable Timeframe x x x x
9.4.3.3 Locate SATCOM Antennas Away from the GCS and Permit It … x x x x
9.4.4.1 Improve Computer Security Techniques and Policies … x
9.4.4.3 Raise RPAS Personnel’s Cyber-Awareness … x
9.5.1.3 Allow RPAS to be Operated from a Manned C2 Aircraft … x
9.5.5.4 Use On-Board Buffer Memory and Time-Shift Functionality … x
9.5.5.5 Incorporate Additional Navigational Backup Systems … x
9.6.2.1 Develop a Mobile Operations Concept of RPAS Ground Elements x x x
9.6.2.2 Reduce RPA Launch and Landing Distance Requirements … x x x
9.6.2.3 Camouflage and Disperse RPAS Ground Elements … x x x
9.6.3.1 Avoid Observable Routines to Deny Enemy Predictions on Future Actions x x x x
9.6.3.2 Introduce a RPAS Air-to-Air Refuelling Capability … x x x
9.6.3.3 Develop an Air-to-Air Rearmament Concept … x x x
124 JAPCC | Remotely Piloted Aircraft Systems in Contested Environments | September 2014
ANNEX O
Acronyms and Abbreviations
JAPCC | Remotely Piloted Aircraft Systems in Contested Environments | September 2014 125
ESM Electronic Support Measures IR Infrared
IADS Integrated Air Defence System MANPADS Man-Portable Air Defence System
126 JAPCC | Remotely Piloted Aircraft Systems in Contested Environments | September 2014
OAF Operation Allied Force RSO Remote Split Operation
ROVER Remotely Operated Video En- SWaP Size, Weight and Power
hanced Receiver
TTP Tactics, Techniques and Procedures
RPA Remotely Piloted Aircraft
UA Unmanned Aircraft
RPAS Remotely Piloted
Aircraft System(s) UAS Unmanned Aircraft System(s)
JAPCC | Remotely Piloted Aircraft Systems in Contested Environments | September 2014 127
Joint Air Power Competence Centre
von-Seydlitz-Kaserne
Römerstraße 140 | 47546 Kalkar (Germany) | www.japcc.org
130 JAPCC | Remotely Piloted Aircraft Systems in Contested Environments | September 2014