.st0{fill:#FFFFFF;}

Capturing and Exploiting Downed UAS 

It’s getting where a day doesn’t go by without a report of a downed UAS in some conflict zone.  And that’s just what they are built for, to perform the dull, dirty, and dangerous jobs that would otherwise be performed by a person. But was anyone considering what happens when a UAS lands in the hands of an adversary or some other actor that could exploit the technology?

As an up and coming state or non-state actor that could really use the technology, I would be excited to just get my hands on some wreckage, let alone an intact, functioning equipment. As I say constantly, consumer and commercial UAS are great tools for the malicious actor, but to have access to high end military equipment would be fantastic. Here’s what you could do

  • Reverse engineer and make copies 
  • Scavenge parts for your own UAS projects
  • Repair and operate the UAS.

Reverse engineering is really nothing new in military aviation. The latest example is Iran’s claims of copying the RQ-170 and ScanEagle. Fortunately, no non-state actors and few states have the capabilities to pull this off. That’s not to say, however, an adversary couldn’t make some money or get some favors by passing UAS remains to someone who is capable of reverse engineering.

Scavenging is a particular concern from a capabilities standpoint. Adding a high-end component to a low-end design could make for an effective weapon. For example, there’s saying that you can make anything fly if you have enough propulsion. A working engine from a downed ScanEagle would be a great find for someone wanting to extend the range of their DIY mini-cruise missile. Black boxes like the autopilot and data link will be useless in most cases, but parts such as wiring, actuators, linkages, propellers, etc. could be quite useful.

Like reverse engineering, repairing and operating a UAS could be challenging for an actor. To make this happen, one would need to focus on the “S” (system) of UAS. Did they also capture the ground control station, launch equipment, support equipment, etc? If so, they might be in good shape. If not, they’ll need to make some changes which may or may not be within their knowledge, skills, and abilities (or those of a close ally). For instance, an aircraft could have the flight controls and data link replaced with familiar components. It may not be easy, but it’s possible. The payoff could be huge though. Besides adding a new weapon to their arsenal, flying the enemy’s aircraft opens up the door to several types of deception operations. 

The key thing to remember is an adversary will always find out a little bit more than they already knew if they come across a downed UAS. It may be as simple as discovering someone operating in their area. But, it could also evolve into a case of UAS technology proliferation.     


      

related posts: