Joint unmanned air vehicles in time sensitive operations handbook
The current situation estimate intelligence and operations. Any updates to the joint AC2 structure. A call sign and frequencies for ground elements. Any control measures necessary for initial planning. The engagement criteria and available weapon systems. The ground maneuver headquarters informs its units when Shadows are inbound. The friendly situation including AC2 considerations. Changes to briefed mission. Restrictions or constraints. It is essential to positively identify locations of friendly units and supporting aircraft.
The BCT staff confirms the positive locations of friendly forces and provides the operators with updated information. However, with the fielding of the CRP, the operators will begin checking in over the established FM net. Upon initial radio contact, the MC executes a check-in, providing the following information: Identification.
Ground commander, this is the MC. Type of UAS, the location, and estimated time of arrival. The UAS selects an orbit area within communications range until required coordination is complete. The MC provides his concept for the operation based upon the ground commanders scheme of maneuver.
Upon completion of coordination, the UAS conducts the mission. C2 techniques effective during air-ground operations with UAS are Reference point techniqueuses a known target reference point or an easily recognizable terrain feature.
Grid techniqueuses grid coordinates to define the point. Phase line techniqueuses graphics available to both air and ground units.
Key pad designations through a common grid reference system. During daylight hours, the EO and IR systems allow accurate target identification. During periods of reduced visibility, the IR system alone provides adequate target resolution, but may require additional methods of verification prior to engagement. Friendly Positions Friendly forces can mark their positions with IR strobes or tape, night vision goggle lights, smoke, signal panels, body position, meal ready-to-eat heaters, chemical lights, and mirrors.
Marking friendly positions can be a more timeconsuming process than directly marking a target and can reveal friendly positions to the enemy. Aviation units require the positive identification of all friendly elements before an attack is authorized during CCA. Additionally, the exploitation cell should receive similar training in order to aid in imagery analysis.
Enemy Positions Target marking aids UAS target identification and engagement. The target mark must be timely, accurate, and easily identifiable to avoid confusion with other fires on the battlefield.
Methods to mark an enemy position include: Direct fire weapons missiles, tank rounds and tracer. Indirect fire weapons smoke and airborne rockets. Other methods laser designator, laser illuminator, and IR spotlight. Fratricide is the employment of friendly weapons and munitions, used with the intent to kill enemy forces or destroy its equipment or facilities, which results in unforeseen and unintentional death or injury to friendly, neutral, or noncombatant personnel.
Contributing factors of fratricide include Fatigue. Incorrect target identification. Incomplete planning and coordination.
Improper clearance of fires. Equipment failure or improper procedures. Inadequate graphic control measures. Poor land navigation. Loss of communications. Fratricide risk is reduced by Understanding the capabilities and limitations of units and components. Understanding the task, purpose, and scheme of maneuver for ground units. Understanding the enemy, identifying weaknesses, and creating opportunities to exploit enemy weaknesses.
Proper training in vehicle identification. Planning for a mission or unit training. Training with supporting branches joint and combined arms. Participating, supervising, and observing unit training. The Army, as part of a joint network, employs a three-tiered communications system. This network has aerial, space, and terrestrial components provided by individual services, linking the various elements of the joint force to the global information grid. The Shadow UAS provide an additional layer of communications relay capability in support of division- and brigade-level operations.
Shadow UAS facilitate battle command on-the-move by extending the network. During non-linear operations with little or no physical contact between units, communications capabilities are strained and operational effectiveness decreases. Land forces require a network capable of providing information to all users regardless of movement and environment.
The aerial layer figure , page , along with existing terrestrial and space layers of the network, will enable high capacity network connectivity regardless of movement or environment.
To provide the required capabilities under all conditions the aerial layer consists of high, medium, and low altitude layers. The aerial layer includes High altitude long loiter assets providing network connectivity to users dispersed across a theater material solution under developmenthigh altitude airship. Medium altitude assets providing tactical network connectivity to dispersed tactical users with CRPs. Low altitude assets providing portable network connectivity to users when all other means are lost Shadow CRP-L.
Shadow Communications Relay PackageLight This system provides extended tactical voice communications. The inherent capabilities of long-endurance, ease of deployment, flexible payloads, and communication networks, make UAS a useful platform to support Homeland Security.
UAS provide first responders with a variety of payloads to rapidly develop SA during an emergency. UAS responds to Natural disasters. Manmade disasters. Civil support action. Border security. Search and rescue. The Shadow Troop should reference FM Sustainment The recent integration of UAS into Army Aviation has made a significant impact on how sustainment is performed. System uniqueness, combined with rapid fielding, has resulted in a sustainment challenge.
The UAS sustainment effort relies heavily upon manufacturer and contractor support to maintain operations. Current field and sustainment maintenance is predominately founded in the CLS concept.
Historically, success in battle is dependent upon unity of effort between the tactical operation and its sustainment operations. The combat commander ensures success by emphasizing accurate and timely reporting. This includes logistics leaders in the planning and preparation process of operations and promoting sound logistical plans to support the commanders intent.
A thorough logistics plan includes the following characteristics: Responsiveness. The commander ultimately establishes priorities for delivery. AR , FM Components of end item: UA. Control stations. Antenna systems. Mobile directional antenna system. Additional support item of equipment: Unit vehicles.
Generator sets. Communications equipment. Fuel availability. Projected parts needed scheduled maintenance. Not mission capable-supply parts requested. Unit ATP standards program.
Aviation accident reporting plan. The FSR handles all ordering and stocking levels of parts. The technical supply should be integrated into this process, but will continue to be managed by the FSR until the Shadow parts are fully embedded in the Army supply system. The maintenance system is organized around forward support.
All damaged or malfunctioning equipment should be repaired onsite or as close to the site as possible. UAS are maintained under the two-level maintenance concept. UAS maintenance personnel perform authorized maintenance procedures within their capability. Sustainment maintenance supports beyond unit-level repair and is generally performed by the depot or forward repair activity. If the supportability strategy calls for CLS, these elements will likely be located in the brigade support area with the aviation support battalion.
This manning level prevents a conflict of interest and ensures the ARS commander the quality of maintenance performed. All of the personnel in the component repair platoon should be cross-trained in Shadow maintenance procedures to assist in maintenance surges or large maintenance tasks.
Any aviation maintainer can conduct maintenance on the Shadow TUAS, but only the qualified personnel with specific MOS and identifier are authorized to conduct the technical inspection. UAS are incorporated into a reset program along with other Army aviation assets. UAS are inspected and inventoried prior to shipment to the contractor depot. The contractor Conducts maintenance and upgrades. Disassembles sub-systems. Cleans, repairs, and replaces obsolete items.
Rehabilitates and reconstitutes components. Applies outstanding modifications. Removal and replacement of inoperative chassis-mounted components and line replaceable units LRUs down to card level. Functional tests and built-in tests BITs. Periodic inspection or replacement to comply with scheduled maintenance requirements, corrosion prevention, detection, and removal.
Electronic maintenance covering payloads and electronic-based components repair by removal and replacement of LRUs. Preoperational tests to verify the system is ready to operate using BITs. Visual inspection and a BIT analysis. Sustainment maintenance personnel perform UAS component repair, part replacement, fault detection, and fault isolation of specific parts. At this level of maintenance, maintainers focus on repair of component items and their return to the distribution system.
Component repair includes items such as major assemblies, LRUs, and repairable line items. Corps and theater maintenance activities, special repair activities, or contractors on the battlefield can perform sustainment maintenance. Sustainment maintenance actions typically involve repair of reparable Class IX components, off-system, for return to the supply system. Uniformed maintenance personnel, DA civilians, or contractors can perform sustainment maintenance.
It is designed to be user friendly while reducing man-hours through automation. It automates bench stock listings by shop codes stocked and maintained manually with an automated reordering process , PLL, reportable component management, and maintenance management processes performed by production control. It enhances and supports those tasks associated with the controlled exchange of reportable components.
This system is configured, at aviation maintenance company level, into a network operation. A notebook computer assigned to line companies facilitates those tasks previously performed on the manual logbook.
Army aviation units are normally supported by three workstation computers production control, quality control, and technical supply and a file server database positioned in the production control office. These automated systems comprise the LAN. Tasks and activities performed by quality and production control are transferred to the aircraft notebook.
ULLS A E as modified for UAS, once fielded, will be the system of record tracking logistics and maintenance actions for all aviation maintenance units.
The production control office is responsible for coordinating the input and update of all maintenance and logistics actions into ULLS-A E as modified for UAS once the system is fully operational. It will become the standard configuration baseline for all aviation systems and platforms including manned-rotary, unmanned, and FW aircraft. These systems are essentially ground systems as they are issued primarily to infantry personnel who do not have ULLSA E access.
SAMS-E was primarily designed to support Army motor pools, not aviation maintenance which requires a partially mission-capable category. Systems will only be reported as full mission-capable or not mission-capable; however, units will have an automated parts-ordering and reporting capability. Current logistics support Maintenance and supply procedures will become more automated as UAS further integrates into the Army sustainment program.
This will provide streamlined, standardized procedures that support visibility of system status throughout the sustainment process figure Contractors play a key role in the Armys ability to support their mission, and provide a responsive alternative to increasing the number of support personnel necessary to perform the mission.
During each phase of an operation, contracting support is used to augment the support structure. Contracting personnel establish their operations with, or near, the local vendor base to support deployed forces. Contracting support bridges gaps that occur as military logistics resources mobilize, and may be necessary for the duration of the contingency. Commanders must understand their role in planning for and managing contractors on the battlefield, and will ensure their staff is trained to recognize, plan for, and implement contractor requirements.
FM 3 Army Unmanned Aerial System Operations. July August TC November Cavalry Operations. December AR Unmanned Aircraft Systems Flight Regulations. Flight Regulations. April Attack Reconnaissance Helicopter Operations. February Helicopter Gunnery. Army Aviation Maintenance. Pular no carrossel. Anterior no carrossel. Explorar E-books. Os mais vendidos Escolhas dos editores Todos os e-books. Explorar Audiolivros.
Os mais vendidos Escolhas dos editores Todos os audiolivros. Explorar Revistas. Escolhas dos editores Todas as revistas. Explorar Podcasts Todos os podcasts. Explorar Documentos.
Shadow UAV Handbook. Enviado por GasMaskBob. Denunciar este documento. Fazer o download agora mesmo. Pesquisar no documento. The Troops breakdown should mirror the chart below: Figure Aerial data relay does not apply to the Shadow UAS. Conducts UAS mission planning and provides tactical and technical input to commanders at all echelons. Complete the Plan Issue the Order Develop prioritized target list. Conduct air mission brief.
Supervise and Refine Update mission tasking status. Update system tasking status. Conduct direct coordination with supported unit.
Indranil Routh. Tanveer Ali. Alok Singum. Aadhi Nana Murali. Rodriguez Arthurs. Rj Jagadesh. Immaculate Immanuel. UAVs Australia. Ahmad Bas. Mahmoud Arij. Amaryllis Mirae. Mirza Muneeb Ahsan. Terence Cruickshank.
Mais de GasMaskBob. Steve Johnson. Joseph Thomas Weber Jr. Marius Stefan Olteanu. Aaron Monk. Tim Morgan. Dinko Omerovic. Hercio Moyses. Jon Moreno. Chris Gordon. Populares em War. Haris Hadzihajdarevic. Maya Khaled. Rhiza Paelmo II. Andre Robinson. Harisadhan Ghosh. Glenn Stover. Raz SP. Parthiva Sinha. History of the Torpedo and the Relevance to Todays Navy. Putra Adam. Strong Man. Machiavellis Ideas Reflected in Marlowe's Plays.
Elise Harrington. Pier Kuipers. Antzee Dancee. Veena Anahita. David S. Painter ISBN Rocio Sosa Torres. Duke University Press. Merica 1. Muhammad Waqas.
In the near term, data compression methods developed by military initiatives will alleviate saturated communications links. Optical data links are being developed to improve existing capabilities. Following is a synopsis of the communications currently used for data links and what lies ahead. The majority of UAVs currently operate using line of sight and satellite data link communications.
Redundancy and error checking are advantages to the chipping code. In other words, if the transmitted signal succumbs to interference, the original data may still be recovered. The Predator requires 25 to 30 amps to operate the onboard Sensor Processor Modem Assembly used for data link communications. These systems are ruggedized and consist of two highly mobile multi-purpose vehicles with integrated equipment shelters, two trailer mounted satellite antennas and two diesel powered generators with onboard environmental control units.
The Trojan Spirit II also links the Predator communications system to other centralized intelligence centers within the U. Air Force in and was a key asset during Bosnian operations in Air Force F fighter aircraft flew protection 20 and escort for the Predator as it launched and destroyed enemy targets with Hellfire missile.
The Global Hawk is the next current generation of UAVs with significantly greater data communications capabilities. Like the Pioneer and Predator, the Global Hawk uses line of sight and over-the-horizon satellite communications. Command and control and sensor information is transmitted on the Ku-band through satellite communications. Using the advanced capabilities detailed above, the Global Hawk has become the premier surveillance and reconnaissance aircraft for military operations.
Prior to the Global Hawk, the manned U-2 aircraft was the primary source for collecting worldwide intelligence, surveillance, and reconnaissance. The Global Hawk is well on its way to replacing the U-2 altogether for several reasons. First, the Global Hawk is capable of flying nautical miles and loitering for 8 hours before returning to base. Finally, the U-2 can provide the same capabilities when deployed from an in-theater location but takes 5 days to set up whereas the Global Hawk can launch immediately.
Researchers and developers forecast remarkable advances in data links for the next generation of UAVs. As a result, other technologies are being tested. The benefits of optical based systems are large usable bandwidth, low probability of intercept, weigh 30 to 50 percent less than comparable RF systems, and offer immunity from interference or jamming.
In , the U. Naval Research Laboratory completed extensive testing of an optical based data link system on a small rotary wing UAV using a modulating retroreflector MRR. An MRR uses an optical retro-reflector, such as a cube, and an electrooptic shutter operating as a two way communications link consisting of a laser, telescope, and pointer-tracker. Existing technology can only support data rates in the tens of mega bits per second. More data link research and development is required for different types of UAV platforms.
Starlink has a high spectrum efficiency and wireless features immune to jamming and frequency interference. The UAV weighs about 12 pounds, has 12 hours of endurance, and can operate within a mile radius. It is easy to assemble and operate and can be launched by hand. While scientists concentrate on improving data link communications, others are focused on improving UAV capabilities which require less human control and intervention. Autonomous UAV operations may be possible with the advent of future advances utilizing highly sophisticated network centric technologies.
This chip technology would allow 20 times current chip capacities. Advances in micro technology and the computer revolution have allowed the U. The J-UCAS is being designed to revolutionize the basic construct of air warfare and is the first major step towards unmanned aircraft combat systems.
SEAD requires aircraft to suppress enemy radar missile defense systems ensuring air and space superiority and safe passage of other aircraft. Developed by Boeing, the X demonstrated seamless operations for command and control, communications, and navigation.
Their primary focus is to ensure 28 interoperability of all UAVs amongst the services, develop tactics, techniques, and procedures, and establish an overall concept of operations for future joint unmanned systems. Technologically advanced onboard sensors are another key component to continued success of UAV intelligence, surveillance, and reconnaissance applications. A myriad of sensors including thermal, video, infrared, and optical have enhanced imagery to pinpoint accuracy.
Synthetic Aperature Radar with moving target indicators, and 3. Signal Intelligence focusing on electronic data collection. The sensors are usually direct from development and testing so when fielded, require a significant amount of training for effective operation.
EO systems consist of daylight video cameras transmitting basic TV imagery to controllers. Operators can detect a temperature differential in the disturbed soil along roads where insurgents have recently buried IEDs. Although EO cannot be seen at night it has the daytime advantage of discerning color.
These sensors operate like advanced targeting pods on fighter aircraft. Fused IR with EO sensors combines the advantages of both systems. Other emerging sensor technologies have potential applications to military UAV operations. Multispectral and hyperspectral imagery HSI produce spectral bands that are unique to materials and objects. Future military applications using HSI include detecting biological and chemical agent particles.
Passive HSI imaging can help detect unconventional attacks. HSI could also use spectral sensors to counter concealment and other enemy denial tactics. Further, the system fails in addressing objects of new types with undefined motion profiles.
In order to address this issue, we develop an online self tuning module. This module works based on segment wise processing of motion trajectories. Therefore, the number of valid motion classes can change over time if a reasonable evidence is provided by the accumulated motion trajectories.
In the simulation results in section V , we use K-means clustering and set. In this section, simulation results are provided to assess the performance of the proposed method in comparison with the state of the art. Here, we assume that each drone is equipped with a tracking system and hence can monitor and estimate the location of surrounding objects.
For instance, Lidar systems, ultrasound systems, or visual cameras can be used to accurately measure the surrounding objects [ 54 ]. However, most off-the shelf commercial drones e. DJI phantom and Matrice series do not include pricey tracking systems. For such scenarios, ADS-B technology [ 55 ] can be used where drones locate themselves using embedded GPS positioning modules and periodically propagate their positions to other nodes according, to be used for trajectory prediction.
For drones in an adversary network, a ground-based tracking system e. We use the following simulation parameters unless otherwise specified. The results of the first stage using Kalman filtering with unknown input are presented in Fig. The results show a relatively accurate estimation of locations provided by step-1 of the proposed method for further analysis. This parameter determines the probability of successful observation attempts, where the value of z i k is valid.
This case is more important and shows the utility of the proposed method in predicting future node positions, when the measurement readings are not available. The prediction accuracy significantly declines if the measurement update rate r goes below an acceptable level. The second utility of the proposed method is object profiling based an motion trajectories.
These results verify the success of three sequential steps in jointly predicting the motion trajectories and profiling the objects into correct mobility classes. As shown in Fig. There are very few prior works that consider profiling object classes based on their online motion trajectories. The most closest work we found is [ 56 ] , which proposes a method to classify moving point objects MPO based on their motion patterns.
This method, we call it MPO, is based on extracting straightness and velocity indexes from the motion trajectories. Further, they classified objects such as cards, pedestrians, bicycles, and motorcycles based on statistical features e. Here, we compare our method against this method. We also applied common classification methods such as fuzzy c-means FCM , and K-means directly to the datapoints of the estimated driving forces.
Finally, we investigate the performance of the online class recognition method. This module works based on clustering motion profile vectors with a penalized number of clusters. Two key features of this method are online-learning of class-specific hyper-parameters as well as recognizing new objects as they enter the system.
These two properties are illustrated in Figs. The accuracy is represented in terms of mean squared errors MSE ratio. However, the performance also depends on the length of each segment.
The results show that longer trajectory segments provide more accurate estimate of hyper-parameters. Therefore, the system does not need to have prior knowledge about the motion properties of different object classes, which makes it more desirable for practical situations. Now, we start adding objects of a new type with an unseen motion profile to the system. The results are shown in Fig. Therefore, this module enables the system to adaptively generate new object classes over time in addition to tuning the hyper-parameters of existing classes.
In this work, a novel framework is proposed for joint mobility prediction and profiling of objects through analyzing their motion trajectories. The idea is to process the motion trajectories in terms of state transition equations to predict the objects future locations and extract the driving forces. Also, we develop a natural hierarchical generative model for the exerted direct and rotational forces. This approach enables us to exploit the motion properties of mobile objects and classify them based on their motion properties.
While the GNAT has a hour endurance, the manned relay aircraft greatly limits the overall effectiveness of the system.
The GNAT is a long-endurance tactical surveillance and support system. It can fly up to 48 hours without landing for fuel. It has a service ceiling of 25, feet and can climb at a rate of 1, feet per minute. It has a wing span of a little over 35 feet, the fuselage is 16 feet long, and its gross take-off weight, including a pound payload and gas, is 1, pounds.
This move would allow the hour endurance capability to pay off. The new sensors will pick up both communications and electronic intelligence information. One concern for the GNAT, as well as other unmanned aerial vehicles, is its vulnerability to inclement weather. For any UAV deployed to the field, measures need to be taken to protect the delicate internal electronics from dust and moisture, particularly in climates that are damp and contain sea spray.
Protecting the personnel, avionics, and maintenance areas are important factors that should be considered when planning deployed operations. Portable maintenance hangars are particularly important for maintaining clean and dry work spaces for the UAV technicians.
Of the unmanned aerial vehicle programs fielded to date, the Central Intelligence Agency appears to have provided more capability for less time and money. While the Department of Defense continues to run tests, the Central Intelligence Agency has fielded a working system that provides near-real-time information to the field Commander at what appears to be a very low cost.
The GNAT has numerous shortcomings, but it at least has been put to work in the operational environment where it can provide real-world data while its technicians continue to work out the bugs.
The Endurance models of unmanned aerial vehicles are the next generation of UAVs and have tremendous potential for future operations. If these aircraft can be properly designed and fielded at a reasonable cost, they will give the JTF Commander an expendable, long-dwell, tactical UAV system with continuous, all-weather narrow area search capability.
This class of UAV will remain on station at extended ranges for periods exceeding 24 hours. With this asset, the on-scene Commander can receive direct reconnaissance, surveillance, and target acquisition information over defended hostile areas without waiting for "national assets.
This "family" of UAVs also has several prerequisites before they will be accepted and fielded. The endurance unmanned aerial vehicles must be affordable, use commercial-off-the-shelf devices, have a quick reaction capability, and be capable of carrying payloads large enough to support a synthetic aperture radar and other imaging devices.
The Predator incorporates technological improvements pioneered by previous unmanned aerial vehicles. It is powered by a 85 horsepower, 4-stroke, fuel injected reciprocating Rotax engine with a variable pitch propeller. Unlike most unmanned aerial vehicles, the Predator is not restricted to direct line-of-sight data transmission. This system is relayed through a Ku-band, 1.
It uses a line-of-sight datalink for take-off and landing. The aircraft operating range is greater than nautical miles over kilometers because the SATCOM allows the aircraft to fly either through direct control or autonomously. The Predator wing span is over 48 feet and the fuselage is over 26 feet in length.
Its maximum take-off weight is 1, pounds. This includes pounds of fuel and a pound payload. It has a maximum altitude of 25, feet, can stay airborne over 24 hours, and flies at speeds of nautical miles per hour. It can be transported in one C cargo aircraft or multiple C aircraft, and can be made operational within six hours of arrival, assuming it has a runway for take-off.
Projected payloads include the Versatron Corporation "Skyball" multi-payload electro-optical sensor. This surveillance system has a platinum silicide staring array infrared imager with six field of view optics. This provides "TV-like" images in visibility conditions ranging from full daylight to total darkness. It also has a high resolution color CCD daylight television camera with a ten power zoom capability, a "spotter scope," and an eye-safe laser range finder.
Other sensors include additional optics capabilities and a synthetic aperture radar SAR capable of one foot resolution at 15, feet. The sensors used on the Predator produce releasable, unclassified products and does not compromise sensitive technology if lost over enemy territory.
Current plans call for 10 aircraft and three ground stations. The program goal of the High Altitude Endurance UAV is to develop and demonstrate a long dwell UAV system capable of affordable, continuous, all weather, wide area surveillance in support of military operations. The object is to get a "satellite like" surveillance and reconnaissance capability in the hands of the theater Commander so direct operational control and tasking can be made by the warfighters.
The Tier II Plus air vehicle should be capable of sustained high altitude surveillance and reconnaissance. It will operate at ranges of up to 3, nautical miles from its launch area.
Once launched, it should have the capability to loiter over the target area for 24 hours at an altitude greater than 60, feet. The Tier II Plus system is composed of three segments: air, ground, and support. The air vehicle segment consists of air vehicles, sensor payloads, avionics, and line-of-sight and satellite communications datalinks.
The ground segment consists of a launch and recovery element, a mission control element, and a ground communications element. There is also a support segment, and the operating personnel. This UAV is linked to the ground control station and theater commander by line-of-sight or satellite relay communications. The air vehicle will be capable of fully autonomous take-off, flight, and recovery.
There is no need for a person to remotely fly the aircraft; however, it is capable of in flight route and mission tasking changes, allowing it to be dynamically retasked at any time by the mission control element. If the uplink control communications is lost at any time, the aircraft is programmed to automatically return to the base from which it was launched. This program is subject to numerous changes. One of the key factors of the program is its cost. This price includes the airframe, avionics, payload, and airborne data link elements.
Therefore, this program will change as it becomes constrained by fiscal limitations. The Tier III Minus is a complementary high altitude endurance unmanned aerial vehicle with low observable technology features. The exact capabilities are still classified, but this vehicle will be capable of sustained high altitude surveillance and reconnaissance over and into high threat areas.
It will operate at ranges in excess of nautical miles from the launch area and be able to loiter over the target area for more than 8 hours at an altitude in excess of 45, feet. This UAV will carry either electro-optical or synthetic aperture radar sensors. This aircraft will employ both wideband line-of-sight and moderate bandwidth satellite communications. There are several types of UAVs that are still in prototype stages.
Due to the scope and size of this paper, these will only be briefly mentioned. Since most are still experimental and not operationally available, size, shape, and payloads may change over time. The significance of these prototype systems is not the product itself, but the emerging UAV technologies that they demonstrate.
It provides a vertical take-off and landing capability, as well as the ability to hover. It provides a mix of speeds that are slower than fixed wing aircraft and has cruise and dash speeds which exceed conventional rotary wing aircraft. Vertical launch and recovery systems include numerous experimental combinations of lift and propulsion. Included in this group are ducted fan, jet lift, vertical altitude, stopped rotor, conventional helicopter, as well as tilt rotor aircraft.
The requirements for this program include the ability for unassisted vertical take-off and landings. They must also be capable of maintaining controlled hover for a minimum of three minutes in a zero knot wind condition. The program hopes to achieve a pound payload, 5 hours endurance, a 10, feet service ceiling, and speeds of at least nautical miles per hour. It is powered by an Allison C20B heavy fuel engine capable of speeds from 0 to knots.
It has a service ceiling of 20, feet and can fly for over 2 hours. The United States Navy wants a small maritimized vertical take-off and landing UAV for use on board small naval combatant ships. Known as MAVUS, this technology has bee used to demonstrate automated launch and recovery techniques on board ships at sea.
Naval officials hope the MAVUS will eventually provide covert high resolution coastal surveillance in support of amphibious operations. The Navy wants a system that will also provide visual identification of ships without exposing or risking friendly surface ships and helicopters.
These aircraft will eventually provide over-the-horizon surveillance and target classification, allowing the naval commander to position forces and target the enemy without risking manned assets. Many aspects of UAV development depends on surpassing limitations caused by inadequate equipment and technologies. Some of the primary areas needing further development include propulsion systems, vehicle control and management, airframe development and construction, data link vulnerabilities, communications, mission sensor payloads, mobility and transportability, and aircraft survivability systems.
The most critical aspect of producing effective and dependable UAVs is engineering flight control redundancies that allow the aircraft to operate autonomously and return to its original base if the data link control signal is severed or jammed.
Most aircraft are using a common datalink used for transferring signals and imagery intelligence. The Tier II Plus and Tier III Minus vehicle command, control, and communi-cations area implemented using either Intelsat satellites or one or more of the space-based, cellular satellite systems is expected to be operational by Program managers hope diversity and the hesitancy to jam multinational, commercial communications provides adequate anti-jam capabilities.
Due to the current state of technologies there is no way to avoid enemy intercept of global communications. UAV to UAV relay is also a possibility for extending line-of-sight operations, but this increases risk and costs because you have to depend on getting more than one UAV airborne and operating at all times.
If the developers of the various systems decide to "harden" the data links, the much more expensive, but jam resistant solution, is the Milstar II satellites.
This state-of-the-art UAV overview was designed to give the reader the background from which to fairly evaluate UAVs as one of several options available to satisfy SOF capability deficiencies highlighted in Chapter 2.
A comparative analysis of UAVs and alternatives is presented in the next chapter. There are no whole truths; all truths are half-truths. It is trying to treat them as whole truths that plays the devil. The "truth" of the matter is that in place of the "Cold War" framework, there are now new dangers which fall into four broad categories: 1 Dangers posed by nuclear weapons and other weapons of mass destruction. This area includes the dangers associated with the proliferation of nuclear, biological, and chemical weapons.
In light of the "Cold War" changes and emerging new dangers, Special Operations Forces provide combatant commanders unique capabilities to fight enemies of the United States of America.
This freed the U. Air Force Fs, originally slated to target Iraqi early warning radars, to strike higher priority targets in Baghdad. The key to effective Special Operations is getting the right people, to the right place, performing the task, and returning safely without being detected or harmed. In order to accomplish these tasks, they need equipment that is sufficiently versatile and reliable.
For those cases where changes in doctrine, tactics, or training fail to resolve the deficiency, then the research and development community is called upon for assistance. The United States Special Operations Command and the Special Operations Component Commanders have enumerated their capability deficiencies and the 11 technology development objectives--listed in priority order in the previous chapter-- which show several areas where they have deficiencies in warfighting capability.
They have numerous requirements for improved equipment and mission enhancement. Of the eleven listed Technology Development Objectives, unmanned aerial vehicle technologies may have a positive affect on eight of the areas. Due to the scope of this research, the focus of this comparative analysis only includes three capability deficiencies and the corresponding Technology Development Objectives TDOs that may warrant a UAV material solution.
Problems like upgrading the weapons on AC "Gunship" aircraft, improved avionics for MHJ "Pave Low" helicopters, and improved weapons for Direct Action Teams have no applicability to unmanned aircraft. The most prevalent capability deficiency in the Special Operations community is a lack of timely intelligence. Effective intelligence must assist commanders in identifying Special Operations objectives that support the overall theater objectives.
All aspects of military operations are dependent on the determination of relevant, clear, and attainable objectives. Intelligence should provide the commander with an understanding of the enemy in terms of their goals, objectives, strengths, weaknesses, values, and critical vulnerabilities. A great deal of information is available to commanders through Service and national intelligence organizations. Special Operations usually need "target specific" intelligence that requires more research, analysis, graphics, photos, and textual elaboration.
Added to the complexity and demand for information is that Special Operations tasking often occurs very fast. Urgent, short-notice missions are not unusual. Therefore the intelligence system "feeding" the Commander and planners must be flexible enough to satisfy both time sensitive and deliberate mission planning processes. Additionally, intelligence requirements and Operational Security OPSEC should be considered carefully to ensure that adequate information can be gathered without compromising the mission or the location of the participants.
Finding technologies for detecting and classifying weapons of mass destruction, detecting passive shallow water and terrestrial mines, explosives, and booby-traps are high on the priority list. The Special Operations people also want to find technologies that locate, track, and mark targets, as well as advanced vision devices and sensors. Both programs are specifically designed to provide enhanced situational awareness to Special Operators by exploiting enemy communications and by manipulating tactical and national intelligence data.
Through these programs mission planners gain access to real time imagery, an aircraft interface capability, and an enroute threat replan capability. The "Force Application" Matrix also recommends fielding a capability to get all-source data, and real-time imagery hardware and software.
What does all this mean? As a hypothetical example, a Special Reconnaissance Team is observing a nuclear weapons production facility in a country hostile to the United States. The team is concealed and has been observing the facility 24 hours a day for the last three days. Their only contact with their military leaders is through a secure, UHF Satellite Communi-cations radio.
They have no way of passing visual information. They can speak into the radio and describe what they see. Each time they "key" the microphone on the radio to transmit a message, they endanger themselves by electronically giving away their position or by being overheard by someone nearby. These people provide the "eyes and ears" to the commander, but are limited in how they can communicate what they observe.
On the positive side, they can remain in place as long as necessary and provide 24 hour observation regardless of weather conditions.
Their stay is only limited by food, water, and being discovered. On the negative side, they have limited means for communicating what they see and hear to their command authorities. Without some means of re-supply, they are unable to observe the area beyond 72 hours. After that length of time, they are low on food, water, and batteries for their equipment. The longer they stay, the greater the risk of being discovered. Another situation where real-time information is crucial is during Direct Action operations.
If hostages are being rescued or a sensitive target is being "taken down," the Commander and men about to attack want the most current on-scene information available. If the enemy situation changes and the attacking forces are unaware of new developments, careful planning and rehearsal can quickly be overcome by events that were not planned for. The previously mentioned Son Tay raid is only one example of "perishable" intelligence. A simple thing like changing guards at a different time, or the arrival of fresh troops or hostages, can all add "fog and friction" to an environment full of uncertainty.
Could an unmanned aerial vehicle be useful in providing necessary intelligence for a situation like this? Currently, no. Sensitive surveillance, as described in the previous example, needs to be unobserved and unheard. The Tactical UAVs discussed in Chapter 3 have numerous limitations that preclude them from current consideration.
0コメント