AJAX progress indicator
  • a

  • Direct defensive action taken to destroy nullify or reduce the effectiveness of hostile air and missile threats against friendly forces and assets. It includes the use of aircraft air defense weapons electronic warfare and other available weapons (JP 3-01).
  • Active measures are those that are designed to physically disrupt, disable, or destroy a detected uncrewed aircraft system (UAS) or drone.
  • Above Ground Level, or AGL, describes the literal height above the ground over which you are flying.
  • Above Ground Level, or AGL, describes the literal height above the ground over which you are flying.
  • Defensive measures designed to destroy attacking enemy aircraft or missiles in the atmosphere or to nullify or reduce the effectiveness of such attack.
  • The commander designated to assume overall responsibility for the operation of the airspace control system in the airspace control area. (JP 3-52)
  • c

  • A Careful UAS Operator is someone that is aware of and adheres to, regulations, drone control measures, and safe drone operations. Reference- Protection against Unmanned Aircraft Systems: Handbook on UAS protection of Critical Infrastructure and Public Space: A five Phase approach for C-UAS(...)
  • A Careless UAS Operator may be aware of but may not adhere to regulations and drone control measures and whose intentions are deemed to be reckless. Reference- Protection against Unmanned Aircraft Systems: Handbook on UAS protection of Critical Infrastructure and Public Space: A five Phase(...)
  • Clueless UAS Operators are UAS or drone operators who are unaware of and do not adhere to regulations, UAS control measures, or safe UAS operations but whose intentions are deemed non-malicious. Reference- Protection against Unmanned Aircraft Systems: Handbook on UAS protection of Critical(...)
  • Counter-UAS is the deployment and use of logical, legally authorized technologies, tactics, techniques, and procedures to provide airspace awareness and protection to critical infrastructure, assets, and mass gatherings.
  • Counter-UAS is the deployment and use of logical, legally authorized technologies, tactics, techniques, and procedures to provide airspace awareness and protection to critical infrastructure, assets, and mass gatherings.
  • A Criminal UAS operator is a UAS operator who may be aware of, but does not adhere to, regulations and UAS control measures and whose intentions are deemed hostile. Reference- Protection against Unmanned Aircraft Systems: Handbook on UAS protection of Critical Infrastructure and Public(...)
  • Critical Infrastructure (CI) are those assets, systems, and networks that provide functions necessary for our way of life. In the United States, there are 16 critical infrastructure sectors that are part of a complex, interconnected ecosystem and any threat to these sectors could have(...)
  • Critical Infrastructure (CI) are those assets, systems, and networks that provide functions necessary for our way of life. In the United States, there are 16 critical infrastructure sectors that are part of a complex, interconnected ecosystem and any threat to these sectors could have(...)
  • d

  • Directed energy weapons (DEW)—such as lasers—use energy fired at the speed of light. These weapons can produce a force that ranges from deterrent to damaging to destructive. Many countries, including the U.S., are researching their use. Because they use energy instead of bullets or missiles,(...)
  • Directed energy weapons (DEW)—such as lasers—use energy fired at the speed of light. These weapons can produce a force that ranges from deterrent to damaging to destructive. Many countries, including the U.S., are researching their use. Because they use energy instead of bullets or missiles,(...)
  • m

  • Mean Sea Level or MSL is your true altitude or elevation. It is the average height above standard sea level where the atmospheric pressure is measured to calibrate altitude.
  • Mean Sea Level or MSL is your true altitude or elevation. It is the average height above standard sea level where the atmospheric pressure is measured to calibrate altitude.
  • r

  • Radio Frequency (RF) Jamming is a UAS mitigation technique where the system attempts to disrupt the RF link between the drone and its operator by generating large volumes of RF interference. Once the RF link (which can include Wi-Fi links) is severed, a drone will usually either descend to the(...)
  • Risk management is an element of the UAS threat process that applies the findings from the threat integration and the threat analysis to evaluate in depth the CI site’s specific risks and corresponding mitigation measures. Reference- Protection against Unmanned Aircraft Systems: Handbook on(...)
  • s

  • Spoofing is a UAS mitigation technique where the system attempts to take control of or misdirect the targeted UAS by feeding it a spurious communication or navigation link. Spoofing systems, however, are technically very difficult to build and implement and may not be universally effective(...)
  • u

  • In its broadest sense, the International Civil Aviation Authority defines UTM as ‘A specific aspect of air traffic management which manages UAS operations safely, economically and efficiently through the provision of facilities and a seamless set of services in collaboration with all parties(...)
  • In its broadest sense, the International Civil Aviation Authority defines UTM as ‘A specific aspect of air traffic management which manages UAS operations safely, economically and efficiently through the provision of facilities and a seamless set of services in collaboration with all parties(...)
Loading...