WEBVTT 1 00:00:04.440 --> 00:00:06.970 As commercial drone technology evolves, 2 00:00:06.970 --> 00:00:09.750 the Unmanned Aircraft System or UAS 3 00:00:09.750 --> 00:00:12.760 threat landscape advances exponentially. 4 00:00:12.760 --> 00:00:17.280 line:15% There are more than 1.7 million registered 5 00:00:17.280 --> 00:00:20.100 line:15% Unmanned Aerial Systems in the United States, 6 00:00:20.100 --> 00:00:22.510 line:15% and the market is ever expanding. 7 00:00:22.510 --> 00:00:24.170 The threat is considered high 8 00:00:24.170 --> 00:00:26.470 because UAS platforms can be used 9 00:00:26.470 --> 00:00:29.630 for clandestine surveillance of high value facilities, 10 00:00:29.630 --> 00:00:32.940 or loaded with munitions and used in attacks. 11 00:00:32.940 --> 00:00:34.780 Really what it comes down to is, 12 00:00:34.780 --> 00:00:38.750 is any nefarious actor can own his own air force. 13 00:00:38.750 --> 00:00:40.500 The Department of Homeland Security, 14 00:00:40.500 --> 00:00:44.570 Science and Technology Directorate, or DHS S&T, 15 00:00:44.570 --> 00:00:47.260 has been tasked as the lead agency for research, 16 00:00:47.260 --> 00:00:50.100 testing and evaluation within DHS 17 00:00:50.100 --> 00:00:53.710 for Counter UAS, known as C-UAS. 18 00:00:53.710 --> 00:00:56.900 C-UAS is state-of-the-art technology, 19 00:00:56.900 --> 00:01:01.310 line:15% deployed in coupling with procedures, tactics, 20 00:01:01.310 --> 00:01:04.500 line:15% that law enforcement uses to defend against 21 00:01:04.500 --> 00:01:08.300 malicious threat actors utilizing UAS platforms. 22 00:01:08.300 --> 00:01:11.280 It allows law enforcement officers the ability to 23 00:01:11.280 --> 00:01:15.220 track, identify and classify hostile UAS threats, 24 00:01:15.220 --> 00:01:17.790 determine the proper mitigation strategy, 25 00:01:17.790 --> 00:01:20.070 whether that be electronic mitigation, 26 00:01:20.070 --> 00:01:21.950 or actually physically going out there 27 00:01:21.950 --> 00:01:25.000 and interdicting the UAS operator. 28 00:01:25.000 --> 00:01:27.950 DHS is addressing the UAS situation 29 00:01:27.950 --> 00:01:29.690 while balancing its obligations 30 00:01:29.690 --> 00:01:32.000 to sustain and not erode privacy 31 00:01:32.000 --> 00:01:35.500 by adhering to privacy and civil liberties protections. 32 00:01:35.500 --> 00:01:37.800 So while cutting edge science and technology 33 00:01:37.800 --> 00:01:39.270 protect the Homeland, 34 00:01:39.270 --> 00:01:42.620 line:15% smart legislation, such as section 124n 35 00:01:42.620 --> 00:01:44.560 line:15% of the Preventing Emerging Threats Act 36 00:01:44.560 --> 00:01:47.750 line:15% and DHS privacy safeguards protect privacy 37 00:01:47.750 --> 00:01:50.560 line:15% and other rights of lawful drone users. 38 00:01:50.560 --> 00:01:52.420 But that complexity doesn't end 39 00:01:52.420 --> 00:01:55.130 with just weekend drone enthusiasts. 40 00:01:55.130 --> 00:01:58.330 line:15% DHS is fully aware that small UAS and drones 41 00:01:58.330 --> 00:02:01.530 line:15% are a key enabling technology that support 42 00:02:01.530 --> 00:02:04.050 line:15% many positive missions like safety missions 43 00:02:04.050 --> 00:02:07.350 for search and rescue, disaster surveying, 44 00:02:07.350 --> 00:02:08.780 even medical missions. 45 00:02:08.780 --> 00:02:11.460 But along with those capabilities and advances, 46 00:02:11.460 --> 00:02:14.580 comes the potential for nefarious activity. 47 00:02:14.580 --> 00:02:16.760 So when S&T conducted the first 48 00:02:16.760 --> 00:02:19.580 of its C-UAS technology test events, 49 00:02:19.580 --> 00:02:23.410 it coordinated closely with DHS components and others. 50 00:02:23.410 --> 00:02:26.300 line:15% The goal of this multi-day event is to test and evaluate 51 00:02:26.300 --> 00:02:28.860 line:15% how well these systems work in the operational environment. 52 00:02:28.860 --> 00:02:31.120 Meanwhile, S&T is always looking 53 00:02:31.120 --> 00:02:34.130 to connect with promising outside innovators. 54 00:02:34.130 --> 00:02:36.640 To ensure DHS S&T stays abreast of all of these 55 00:02:36.640 --> 00:02:38.610 technologies and [commerical] UAS, 56 00:02:38.610 --> 00:02:41.550 we've established a Long Range Broad Agency Announcement, 57 00:02:41.550 --> 00:02:44.220 where we invite academia, traditional, 58 00:02:44.220 --> 00:02:46.270 and even non-traditional providers, 59 00:02:46.270 --> 00:02:48.270 to give us their best ideas 60 00:02:48.270 --> 00:02:50.720 to address this kind of UAS problem set. 61 00:02:50.720 --> 00:02:52.900 S&T is rising to meet the challenge 62 00:02:52.900 --> 00:02:56.200 of this growing threat with its C-UAS program. 63 00:02:56.200 --> 00:02:59.460 The technology is a game changer in National Security. 64 00:02:59.460 --> 00:03:02.560 line:15% The challenge is keeping up with the evolving threat, 65 00:03:02.560 --> 00:03:05.150 line:15% and making sure that the technology continues 66 00:03:05.150 --> 00:03:07.713 line:15% to identify that that evolving threat.