EXERCISES

Service Description

Counter-UAS exercises are a necessity for anyone concerned with defending against threats employing drones. AISC can support these activities by acting as a red team/OPFOR participant representing a drone-equipped threat. We provide a single source for both drone threat expertise and realistic UAS to be used as targets in live exercises. Our in-house technical intelligence and aircraft development capabilities allow for modeling of known threats as well as a multitude of postulated threats to help you guard against technological surprise.   

We support the following types of exercises:

  • Tabletop
  • Full-scale: Real-world scenarios, onsite with full mobilization of defender capabilities
  • Functional: Real-world scenarios designed to exercise a specific counter-UAS function, onsite or at a third party site.

Full-scale exercises are conducted with a fully autonomous red team employing capabilities only constrained by the rules of engagement (RoE). Functional exercises, on the other hand, have RoE tailored to the specific purpose of the exercise. As a result, they are also very useful for counter-UAS system developmental testing, plans, policies, and procedures refinement, and operational evaluation of equipment prior to acquisition and deployment. The red team in a functional exercise is also semi-autonomous to allow for interaction with the defenders during the course of the exercise.   

All flight operations in the United States are conducted under FAA Part 107 rules. Certain scenarios or operation locations, however, may require authorizations and waivers from the FAA. Therefore, we encourage clients to contact us as early in the planning process as possible. Furthermore, we may need coordination with local, state, and federal law enforcement/homeland security officials.

AISC also takes advantage of its extensive history in aerial targets by offering expendable targets. If safety and liability constraints allow, we can craft affordable solutions to allow clients to exercise the full counter-UAS process.   

Key Components

  • Engagement information gathering
  • Threat modeling
  • Flexible attack cycle common to several types of threats
  • Post exercise activities
  • Reporting

Deliverables

  • Pre-exercise documentation as required
  • Written report
  • Onsite presentation (online, if desired)