Interviews 4–5


DHS and other state and local law enforcement agencies are having to grapple with a variety of issues. This is similar in a sense of having a lot of hobbyists and law abiding folks who may not know that flying a drone over a football stadium is a bad thing, or the wrath of various locations

Technologically, folks are looking at a range of different countermeasures: geofencing — the drone is stopped by code — a virtual fence. Anything unsecured has options to look at countermeasures.

Dr Humphrey’s testimony is worth looking into, as one of his areas is spoofing and jamming UAS’s. If the codes to the UAS isn’t secured, Humphrey’s found the technique to hack into the drone and take it over — though this requires a lot of technical expertise and experience

Another option is having your own drone fleet to shoot nets at enemy drones. You can also use a small UAS to attack and take down an enemy, though the issue then becomes hijacking.

Detection is a challenge; it’s not just drones, which are now called “non-traditional aviation technology.” Think of when the gyrocopter was flown to the capital. It starts with FAAs pushed to register to know who is in position of these drones, and how accurate and efficient the technology is to identify these things. It can be problematic differentiating a flock of birds from drones, so you need to use electronic signatures and other means to identify

Another focus of fed/state/law enforcement is looking for the operators — many cheaper drones are operated via line of sight, andonce the technology moves away and allows for a greater distance between the operator and the tool, it allows for a bigger issue.

In some ways the law hasn’t caught up to the technology. If you’re taking down a drone, are you taking down an aircraft? Look to warfare, like cybertechnology. To what extent can law enforcement engage a drone, especially if it hasn’t done anything yet?

It is a growing issue. There have been international incidents of drones flying outside of nuclear reactors outside of Paris, and a drone came down at rally with German chancellor, and more. It is a big issue to work through privacy, civil liberties.


Many [infantry] units now are equipped with an identification tool that transmits electronic signals to ensure that our soldiers are never targeted by drones sent to destroy. There were recently instances of us bombing our own men because we didn’t know where they were.

If they have these drones that are patrolling above them, they can protect the unit by deploying the drones without giving away location. We can also implement IO type message to disrupt the enemy’s capabilities.

Another thing we can do is build up radar capabilities of our smaller drones that we employ, and relay that information to the appropriate parties. We should also improve the reception capabilities of the drones the units are using so they can detect enemy drones.

· Mission signals — cheap, will be emitting a lot more frequencies, whereas ours will have more closed circuits

· Wind patterns

· Eliminate chief enemy drones

· Disable with a swarm, though this has current limitations

· Current unit drones, give swarm capabilities for 1000 yards, send out a signal to disable or a swarm; recharge


· It is important for what the DOD does moving forward to recognize the benefits… but there is an over-reliance of drones.

· Yemen, drones used extensively between 2011 and 2016 (possibly still)

· Government overthrown by Houthis, and now we have an Iran-sponsored terrorist group in power… using drones to overthrow people

· Not enough emphasis looking at, is it actually accomplishing our objectives

Use the drones to apply information warfare. A lot of information warfare that the Navy uses that could be implemented with drones, and some underwater drone stuff that the navy is doing worth looking into.

We can also track most-used drones by enemies in these regions and target suppliers. Use electronic warfare, embedding tracer data when it’s connected to a web system. Embed electronic warfare in these suppliers — many companies if they know their products are being used nefariously, they may be willing to help.

Could still use IO type campaign to make enemies think it’s successful, so they’re afraid to buy drones

· There are additional messaging techniques that can be used by congress and the executive branch to add to this message

Like what you read? Give Siobhan Steel a round of applause.

From a quick cheer to a standing ovation, clap to show how much you enjoyed this story.